Cybersecurity OperationsLaajuus (5 cr)
Code: 5G00EV10
Credits
5 op
Objectives
By the end of this course students will be able to:
- Explain the role of the Cybersecurity Operations Analyst in the enterprise.
- Analyze the operation of network protocols and services.
- Explain the operation of the network infrastructure.
- Classify the various types of network attacks.
- Use network monitoring tools to identify attacks against network protocols and services.
- Use various methods to prevent malicious access to computer networks, hosts, and data.
- Explain the impacts of cryptography on network security monitoring.
- Explain how to investigate endpoint vulnerabilities and attacks.
- Evaluate network security alerts.
- Analyze network intrusion data to identify compromised hosts and vulnerabilities.
- Apply incident response models to manage network security incidents.
Content
This course covers core security knowledge and skills needed for monitoring, detecting, investigating, analyzing and responding to security events, thus protecting systems and organizations from cybersecurity risks, threats and vulnerabilities.
Assessment criteria, satisfactory (1-2)
Student
- can use network monitoring tool
- can collect network traffic
Assessment criteria, good (3-4)
Student
- can use network monitoring tool
- can collect network traffic
- is able to make basic analysis in case of network exceptions
Assessment criteria, excellent (5)
Student
- can collect network traffic for monitoring
- is able to identify network exceptions and analyze them comprehensively
Enrolment period
06.06.2023 - 31.08.2024
Timing
02.09.2024 - 15.12.2024
Credits
5 op
Mode of delivery
Contact teaching
Unit
ICT Engineering
Campus
TAMK Main Campus
Teaching languages
- Finnish
Seats
0 - 30
Degree programmes
- Degree Programme in ICT Engineering
Teachers
- Ville Haapakangas
Person in charge
Ville Haapakangas
Groups
-
22I227
Objectives (course unit)
By the end of this course students will be able to:
- Explain the role of the Cybersecurity Operations Analyst in the enterprise.
- Analyze the operation of network protocols and services.
- Explain the operation of the network infrastructure.
- Classify the various types of network attacks.
- Use network monitoring tools to identify attacks against network protocols and services.
- Use various methods to prevent malicious access to computer networks, hosts, and data.
- Explain the impacts of cryptography on network security monitoring.
- Explain how to investigate endpoint vulnerabilities and attacks.
- Evaluate network security alerts.
- Analyze network intrusion data to identify compromised hosts and vulnerabilities.
- Apply incident response models to manage network security incidents.
Content (course unit)
This course covers core security knowledge and skills needed for monitoring, detecting, investigating, analyzing and responding to security events, thus protecting systems and organizations from cybersecurity risks, threats and vulnerabilities.
Assessment criteria, satisfactory (1-2) (course unit)
Student
- can use network monitoring tool
- can collect network traffic
Assessment criteria, good (3-4) (course unit)
Student
- can use network monitoring tool
- can collect network traffic
- is able to make basic analysis in case of network exceptions
Assessment criteria, excellent (5) (course unit)
Student
- can collect network traffic for monitoring
- is able to identify network exceptions and analyze them comprehensively
Assessment scale
0-5
Completion alternatives
/
Practical training and working life cooperation
/
Enrolment period
15.07.2023 - 04.09.2023
Timing
28.08.2023 - 17.12.2023
Credits
5 op
Mode of delivery
Contact teaching
Unit
ICT Engineering
Campus
TAMK Main Campus
Teaching languages
- Finnish
Seats
0 - 45
Degree programmes
- Degree Programme in ICT Engineering
Teachers
- Ville Haapakangas
Person in charge
Ville Haapakangas
Groups
-
21I227
Objectives (course unit)
By the end of this course students will be able to:
- Explain the role of the Cybersecurity Operations Analyst in the enterprise.
- Analyze the operation of network protocols and services.
- Explain the operation of the network infrastructure.
- Classify the various types of network attacks.
- Use network monitoring tools to identify attacks against network protocols and services.
- Use various methods to prevent malicious access to computer networks, hosts, and data.
- Explain the impacts of cryptography on network security monitoring.
- Explain how to investigate endpoint vulnerabilities and attacks.
- Evaluate network security alerts.
- Analyze network intrusion data to identify compromised hosts and vulnerabilities.
- Apply incident response models to manage network security incidents.
Content (course unit)
This course covers core security knowledge and skills needed for monitoring, detecting, investigating, analyzing and responding to security events, thus protecting systems and organizations from cybersecurity risks, threats and vulnerabilities.
Assessment criteria, satisfactory (1-2) (course unit)
Student
- can use network monitoring tool
- can collect network traffic
Assessment criteria, good (3-4) (course unit)
Student
- can use network monitoring tool
- can collect network traffic
- is able to make basic analysis in case of network exceptions
Assessment criteria, excellent (5) (course unit)
Student
- can collect network traffic for monitoring
- is able to identify network exceptions and analyze them comprehensively
Assessment scale
0-5
Completion alternatives
/
Practical training and working life cooperation
/
Enrolment period
30.07.2022 - 31.08.2022
Timing
29.08.2022 - 16.12.2022
Credits
5 op
Virtual portion
2 op
Mode of delivery
60 % Contact teaching, 40 % Online learning
Unit
ICT Engineering
Campus
TAMK Main Campus
Teaching languages
- Finnish
Degree programmes
- Degree Programme in ICT Engineering
Teachers
- Ville Haapakangas
Person in charge
Ville Haapakangas
Groups
-
20I227
Objectives (course unit)
By the end of this course students will be able to:
- Explain the role of the Cybersecurity Operations Analyst in the enterprise.
- Analyze the operation of network protocols and services.
- Explain the operation of the network infrastructure.
- Classify the various types of network attacks.
- Use network monitoring tools to identify attacks against network protocols and services.
- Use various methods to prevent malicious access to computer networks, hosts, and data.
- Explain the impacts of cryptography on network security monitoring.
- Explain how to investigate endpoint vulnerabilities and attacks.
- Evaluate network security alerts.
- Analyze network intrusion data to identify compromised hosts and vulnerabilities.
- Apply incident response models to manage network security incidents.
Content (course unit)
This course covers core security knowledge and skills needed for monitoring, detecting, investigating, analyzing and responding to security events, thus protecting systems and organizations from cybersecurity risks, threats and vulnerabilities.
Assessment criteria, satisfactory (1-2) (course unit)
Student
- can use network monitoring tool
- can collect network traffic
Assessment criteria, good (3-4) (course unit)
Student
- can use network monitoring tool
- can collect network traffic
- is able to make basic analysis in case of network exceptions
Assessment criteria, excellent (5) (course unit)
Student
- can collect network traffic for monitoring
- is able to identify network exceptions and analyze them comprehensively
Assessment scale
0-5
Completion alternatives
/
Practical training and working life cooperation
/