Attacks, Defence and Protection (5 cr)
Code: TTC6040-3010
General information
- Enrollment
-
18.11.2024 - 09.01.2025
Registration for the implementation has ended.
- Timing
-
13.01.2025 - 30.04.2025
Implementation is running.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 0 cr
- Virtual portion
- 5 cr
- Mode of delivery
- Distance learning
- Unit
- School of Technology
- Campus
- Lutakko Campus
- Teaching languages
- English
- Seats
- 0 - 35
- Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Teachers
- Pasi Hyytiäinen
- Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TIC22S1Bachelor's Degree Programme in Information and Communications Technology
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22SMTieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
-
TTV22SM2Tieto- ja viestintätekniikka (AMK)
- Course
- TTC6040
Materials
Materials in the e-learning environment.
Evaluation scale
0-5
Completion alternatives
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Employer connections
-
Virtual portion
5
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 18 h
- assignment 35 h
- independent study 30 h
Total 135 h
Assessment criteria, satisfactory (1)
Sufficient 1: The student masters the theory passably and recognizes some parts of attack, defense and protection methods. The student is able to design and implement parts of environment protection and defense.
Satisfactory 2: The student masters the theory satisfactorily and recognizes parts of attack, defense and protection methods.The student is able to design and implement parts of environment protection and defense.
Assessment criteria, good (3)
Good 3: The student masters the theory well and recognizes parts of the attack, defense and protection methods. The student is able to design and implement parts of the environment protection and defense.
Very good 4: The student masters commendably the theory and recognizes parts of the attack, defense and protection methods. The student is able to design and implement the protection and defense of the environment.
Assessment criteria, excellent (5)
Excellent: The student masters the theory excellently and recognizes comprehensively parts of the attack, defense and protection methods. The student is able to design and implement the protection and the defense of the environment.
Exam schedules
The possible date and method of the exam will be announced in the course opening.
Teaching language
en
Teaching methods
- independent study
- distance learning
- webinars
- exercises
- learning tasks
Number of ECTS credits allocated
5
Content
- basics in malware and vulnerabilities
- malware families and types
- cyber attacks and attack modes
- utilization of defense methods and data security technologies in ICT environments
- management process of cyber security incidents and practices
- protection of systems and environments
- basics and methods of digital forensics
Objective
The objective of the course
You learn the principles of attacks and defence methods as well as protection.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice