- Get an overview of cyber security
- Use threat modeling to identify and priorize key risks for your own organization
- Try some aspects of security with simple hands on exercises
Contents
- Threat modeling
- Overview of current security scene
- Standards and models
- Security maturity
- Business continuity
- Encryption
- Authentication
- Student presentations
Implementation methods, Demonstration and Work&Study
Weekly classes: teacher talks, discussions, presentations, small groups, hands-on exercises on your own machine. Weekly homework includes reading, tests with a computer and reporting. Cross-evaluation and commenting classmates' reports. Classes are online or contact depending on realization.
Active class participation required. This course requires you join the classes, discuss with your classmates, ask and answer questions and provide feedback on your classmates presentations. You must do your homework in time and provide cross eveluation for your classmates' reports. When the implementation type of the course is contact, online or blended it is required that the student is present during those teaching hours that are marked in the study schedule. If you are absent more than 25%, your grade will be lowered by one. If you are absent more than 50%, the course is failed. Repeated absence or failing to return homework in time can result in failing the course earlier than those percentages.
Tools required: a computer with root/administrator access. Online realizations require camera, mic, headphones and an internet connection suitable for video conference. Contact realization require a laptop. (Macintosh users note: a normal PC computer, also known as amd64, is much easier to use for most exercises than a new M1, M2, M3, M4 Apple Macintosh.)
Recognition of prior learning (RPL): If students have acquired the required competence in previous work tasks, recreational activities or on another course, they can show their competence via a demonstration. The demonstration must be agreed with the course teacher. More information and instructions for recognising and validating prior learning (RPL) are available at https://www.haaga-helia.fi/en/recognition-learning Look at "Instructions to students (master)"
Learning materials
Articles and book chapters given in the class. Most of the material is freely available or free to read using Haaga-Helia credentials.
Intro
Learn cyber security.
Understand high level management view. Tie it to grass roots level with some simple hands-on exercises.
Further information
Feedback from other security courses have been used when creating "Cyber Security" course. This includes feedback from "Tunkeutumistestaus" (Penetration Testing, has reached 5.0/5), "ICT Security Basics - from Trust to Blockchain" (has reached 4.9/5), "Information Security" (has reached 4.8/5) and others. Based on feedback, an attempt is made to: discuss in the class; link theory to practical exercises (that are not highly demanding technically); have homework with both varied reading and applied tasks. Both numeric and free form feedback for these courses is available on https://terokarvinen.com/
This course gives you grand overview of cyber security and some practice with tools implementing these principles. Even though you're expected to be able to install and configure programs and troubleshoot some errors, this is not my most technical course. For demanding technical, non-masters level offensive courses, you should consider other courses such as Tunkeutumistestaus (Penetration testing), Sovellusten hakkerointi ja haavoittuvuudet (Application hacking and vulnerabilities) or Verkkoon tunkeutuminen ja tiedustelu (Network attacks in reconnaissance).
Starting level and linkage with other courses
- Can install Linux and software to a virtual machine (with some instructions)
- Can solve common computer problems, and search for solutions using web search engines
Assessment criteria
Assessment criteria - grade 1
The student knows the main concepts of cyber security at a basic level, can use the required tools individually by following instructions, has returned homework and participated classes.
Assessment criteria - grade 3
Student can apply concepts in simple and straightforward way, and can provide some new viewpoints in discussions. Student has an idea how to follow the area. Student understands the link between business and cyber security.
Student meets all criteria for lower grades.
Assessment criteria - grade 5
Student can apply the concepts shown. Student shows ability to follow the area and link new information to existing concepts. Student provides insight in discussions. Student can help others join the discussion and is able to explain cyber security concepts and issues on recipient level.