ICT Security Basics from Trust to Blockchain (5 cr)

Code: ICT4HM103-3006

Basic information of implementation


Enrollment
03.06.2024 - 18.10.2024
Enrolment for the implementation has ended.
Timing
21.10.2024 - 13.12.2024
Implementation has ended.
ECTS Credits
5 cr
Campus
Pasila Campus
Teaching languages
English
Seats
15 - 30
Degree programmes
BUTEM Degree Programme in Business Technologies
LITEM Degree Programme in Business Technologies
Teachers
Tero Karvinen
Groups
MAICTE
Information Services and Systems, Masters, Pasila
MAICTF
ICT-palvelut ja tietojärjestelmät, masterit, Pasila
EVENING
Evening implementation
EXCH
EXCH Exchange students
ONLINE
Online implementation
Course
ICT4HM103

Evaluation scale

H-5

Schedule

Online participation required. This course is based on class discussions and interactivity. You are expected to participate in online video conference during the class times each week.

Agenda will keep updating during the course. Initial agenda:

1. Welcome words. Overview of the course.
2. Fundamentals. Threat model.
3. Treath modeling. Current crime case example.
4. Hashes, passwords and cracking them.
5. Public key encryption and signing.
6. Bitcoin.
7. Modern applications (e.g. Darknet, Altcoins...).
8. Presentations.

Implementation methods, demonstration and Work&Study

Depending on the implementation, learning takes place in contact lessons, independent studies, teamwork and online-studies. The course includes the assessment of one’s own learning.

Theoretical instruction combined with practical demonstrations. Laboratory exercises in a computer lab. Independent work (reading and practice) and reporting. There are 25 machines and seats in the laboratory, so the number of participants is limited to this.

Recognition of prior learning (RPL)
If students have acquired the required competence in previous work tasks, recreational activities or on another course, they can show their competence via a demonstration. The demonstration must be agreed with the course teacher. More information and instructions for recognising and validating prior learning (RPL) are available at https://www.haaga-helia.fi/en/recognition-learning Look at "Instructions to students (master)"

Materials

Material identified by the teacher during the course. Usually includes white papers, book chapters, tutorials, manuals and hacker conference presentations. Different types of material help you to get familiar with key sources of cyber security information. Most material is available using subsciptions paid by Haaga-Helia (free for students) or free, publicly available sources.

Teaching methods and instruction

Learn security fundamentals to understand current trends. Blockchains, TOR network and video conference encryption all stand on these fundamentals.

- Weekly online video conference classes. Includes discussions and student presentations.
- Homework reported weekly. Reading tasks for theory and learning to follow cybersecurity. Hands-on tasks to connect theory to real life.
- Your own presentation to classmates.

Has reached excellent 4.9 out of 5 feedback.

Check out previous course instance agenda, homework and student feedback https://terokarvinen.com/2023/trust-to-blockchain/

Working life connections

Classes are interactive, and you can hear your classmates work experiences and bring your own insight.

Exam dates and re-exam possibilities

No exam.

Internationality

Mixed group with both Finnish and international students.

Completion alternatives

Online video conference, active participation required at class time. Homework reported every week.

Learning assignments

- Weekly classes, online video conference - active participation required at class time
- Weekly homework (theory + hands on)
- Presentation

Classes are interactive, encouraging student discussions and presentations. For each week, there is homework with written report. Homeworks have both reading and hands-on computer tasks.

Some computer skills required. We'll use actual hacker tools and techniques, but mostly to understand and practice theory. Required tasks in this course require only regular computer knowledge.

(This course does not have prerequisisite coding or hacking skills. I am teaching a different set of courses for those needing technical hacking and penetration testing skills: Tunkeutumistestaus ici001as3a, Sovellusten hakkerointi ja haavoittuvuudet ici012as3a-3001)

Assessment methods

Homework 50% and presentation 50%. Evaluation is based on totality of the skills and knowledge demonstrated.

Online classes require active participation. No tapes are provided.

Siirry alkuun