Skip to main content

Cybersecurity OperationsLaajuus (5 cr)

Code: 5G00EV10

Credits

5 op

Objectives

By the end of this course students will be able to:
- Explain the role of the Cybersecurity Operations Analyst in the enterprise.
- Analyze the operation of network protocols and services.
- Explain the operation of the network infrastructure.
- Classify the various types of network attacks.
- Use network monitoring tools to identify attacks against network protocols and services.
- Use various methods to prevent malicious access to computer networks, hosts, and data.
- Explain the impacts of cryptography on network security monitoring.
- Explain how to investigate endpoint vulnerabilities and attacks.
- Evaluate network security alerts.
- Analyze network intrusion data to identify compromised hosts and vulnerabilities.
- Apply incident response models to manage network security incidents.

Content

This course covers core security knowledge and skills needed for monitoring, detecting, investigating, analyzing and responding to security events, thus protecting systems and organizations from cybersecurity risks, threats and vulnerabilities.

Assessment criteria, satisfactory (1-2)

Student
- can use network monitoring tool
- can collect network traffic

Assessment criteria, good (3-4)

Student
- can use network monitoring tool
- can collect network traffic
- is able to make basic analysis in case of network exceptions

Assessment criteria, excellent (5)

Student
- can collect network traffic for monitoring
- is able to identify network exceptions and analyze them comprehensively

Enrolment period

06.06.2023 - 31.08.2024

Timing

02.09.2024 - 15.12.2024

Credits

5 op

Mode of delivery

Contact teaching

Unit

ICT Engineering

Campus

TAMK Main Campus

Teaching languages
  • Finnish
Seats

0 - 30

Degree programmes
  • Degree Programme in ICT Engineering
Teachers
  • Ville Haapakangas
Person in charge

Ville Haapakangas

Groups
  • 22I227

Objectives (course unit)

By the end of this course students will be able to:
- Explain the role of the Cybersecurity Operations Analyst in the enterprise.
- Analyze the operation of network protocols and services.
- Explain the operation of the network infrastructure.
- Classify the various types of network attacks.
- Use network monitoring tools to identify attacks against network protocols and services.
- Use various methods to prevent malicious access to computer networks, hosts, and data.
- Explain the impacts of cryptography on network security monitoring.
- Explain how to investigate endpoint vulnerabilities and attacks.
- Evaluate network security alerts.
- Analyze network intrusion data to identify compromised hosts and vulnerabilities.
- Apply incident response models to manage network security incidents.

Content (course unit)

This course covers core security knowledge and skills needed for monitoring, detecting, investigating, analyzing and responding to security events, thus protecting systems and organizations from cybersecurity risks, threats and vulnerabilities.

Assessment criteria, satisfactory (1-2) (course unit)

Student
- can use network monitoring tool
- can collect network traffic

Assessment criteria, good (3-4) (course unit)

Student
- can use network monitoring tool
- can collect network traffic
- is able to make basic analysis in case of network exceptions

Assessment criteria, excellent (5) (course unit)

Student
- can collect network traffic for monitoring
- is able to identify network exceptions and analyze them comprehensively

Assessment scale

0-5

Completion alternatives

/

Practical training and working life cooperation

/

Enrolment period

15.07.2023 - 04.09.2023

Timing

28.08.2023 - 17.12.2023

Credits

5 op

Mode of delivery

Contact teaching

Unit

ICT Engineering

Campus

TAMK Main Campus

Teaching languages
  • Finnish
Seats

0 - 45

Degree programmes
  • Degree Programme in ICT Engineering
Teachers
  • Ville Haapakangas
Person in charge

Ville Haapakangas

Groups
  • 21I227

Objectives (course unit)

By the end of this course students will be able to:
- Explain the role of the Cybersecurity Operations Analyst in the enterprise.
- Analyze the operation of network protocols and services.
- Explain the operation of the network infrastructure.
- Classify the various types of network attacks.
- Use network monitoring tools to identify attacks against network protocols and services.
- Use various methods to prevent malicious access to computer networks, hosts, and data.
- Explain the impacts of cryptography on network security monitoring.
- Explain how to investigate endpoint vulnerabilities and attacks.
- Evaluate network security alerts.
- Analyze network intrusion data to identify compromised hosts and vulnerabilities.
- Apply incident response models to manage network security incidents.

Content (course unit)

This course covers core security knowledge and skills needed for monitoring, detecting, investigating, analyzing and responding to security events, thus protecting systems and organizations from cybersecurity risks, threats and vulnerabilities.

Assessment criteria, satisfactory (1-2) (course unit)

Student
- can use network monitoring tool
- can collect network traffic

Assessment criteria, good (3-4) (course unit)

Student
- can use network monitoring tool
- can collect network traffic
- is able to make basic analysis in case of network exceptions

Assessment criteria, excellent (5) (course unit)

Student
- can collect network traffic for monitoring
- is able to identify network exceptions and analyze them comprehensively

Assessment scale

0-5

Completion alternatives

/

Practical training and working life cooperation

/

Enrolment period

30.07.2022 - 31.08.2022

Timing

29.08.2022 - 16.12.2022

Credits

5 op

Virtual portion

2 op

Mode of delivery

60 % Contact teaching, 40 % Online learning

Unit

ICT Engineering

Campus

TAMK Main Campus

Teaching languages
  • Finnish
Degree programmes
  • Degree Programme in ICT Engineering
Teachers
  • Ville Haapakangas
Person in charge

Ville Haapakangas

Groups
  • 20I227

Objectives (course unit)

By the end of this course students will be able to:
- Explain the role of the Cybersecurity Operations Analyst in the enterprise.
- Analyze the operation of network protocols and services.
- Explain the operation of the network infrastructure.
- Classify the various types of network attacks.
- Use network monitoring tools to identify attacks against network protocols and services.
- Use various methods to prevent malicious access to computer networks, hosts, and data.
- Explain the impacts of cryptography on network security monitoring.
- Explain how to investigate endpoint vulnerabilities and attacks.
- Evaluate network security alerts.
- Analyze network intrusion data to identify compromised hosts and vulnerabilities.
- Apply incident response models to manage network security incidents.

Content (course unit)

This course covers core security knowledge and skills needed for monitoring, detecting, investigating, analyzing and responding to security events, thus protecting systems and organizations from cybersecurity risks, threats and vulnerabilities.

Assessment criteria, satisfactory (1-2) (course unit)

Student
- can use network monitoring tool
- can collect network traffic

Assessment criteria, good (3-4) (course unit)

Student
- can use network monitoring tool
- can collect network traffic
- is able to make basic analysis in case of network exceptions

Assessment criteria, excellent (5) (course unit)

Student
- can collect network traffic for monitoring
- is able to identify network exceptions and analyze them comprehensively

Assessment scale

0-5

Completion alternatives

/

Practical training and working life cooperation

/