Data Security (5 cr)

Code: ICT4TF022-3009

Basic information of implementation


Enrollment
13.06.2022 - 19.08.2022
Enrolment for the implementation has ended.
Timing
22.08.2022 - 14.10.2022
Implementation has ended.
ECTS Credits
5 cr
RDI portion
1 cr
Campus
Pasila Campus
Teaching languages
English
Seats
15 - 25
Degree programmes
BITE Degree Programme in Business Information Technology
Teachers
Tero Karvinen
Groups
TF3SWD
TF3SWD Bite SWD Group 3 semester
TF3DIG
TF3DIG Bite DIG Group 3 semester
EXCH
EXCH Exchange students
ONLINE
Online implementation
Course
ICT4TF022

Evaluation scale

H-5

Schedule

In course homepage, updated during the course.

Implementation methods, demonstration and Work&Study

- Teaching 48 h
- Independent study 87 h
- The assessment of one’s own learning 1 h
- Studying includes lectures and exercises

Materials

The course web pages

Material given by the teacher, including articles and book chapters. Paid content behind paywalls could be available for free using Haaga-Helia student access. Free software and tools in student's possession is used as much as practical. For example

- Hutchins et al 2011: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains,
- Santos et al: The Art of Hacking (Video Collection)
- Open Web Application Security Project: OWASP 10 2021
- MITRE: ATT&CK Enterprise Matrix
- Debian 11 Bullseye non-free
- Metasploitable
- Webgoat

For previous courses, student feedback and articles, see https://TeroKarvinen.com

Teaching methods and instruction

ONLINE: Fully remote, mandatory participation to classes.

Teaching 48 h
Independent study 87 h
The assessment of one’s own learning 1 h
Studying includes classes and exercises

Online course, fully remote. Requires active participation to classes in video conference, at the time marked in the timetable.

To participate, you'll need Internet connection, headphones, camera and a computer where you can install Linux on a virtual machine (with instructions). To be able to discuss pentest techniques, you must accept course rules.

Excellent 4.6 feedback mean.

Working life connections

Guest lectures are organized if feasible. Teacher provides information about important security events during the course.

Exam dates and re-exam possibilities

No exams.

Internationality

Likely international participation. It's possible to publish homework reports to talk to international audience. Course material is developed by authors from many countries, and some technical tools are multinational FOSS (Free, open source software) projects.

Learning assignments

- Active participation in the classes, including discussions, presentations and technical tasks
- Homework, including reporting technical tasks
- Cross evaluation of reports and giving helpful feedback to fellow students

Assessment methods

Accepted course is evaluated with grades 1 to 5.

Siirry alkuun