Cybersecurity Hackathon ProjectLaajuus (3 cr)
Study unit code: TO00BR95
Credits
3 op
Learning outcomes
The student is able to
- take sole responsibility for working as a member cybersecurity
analyst team (project target varies including research, innovation,
business, cyber ranges, cyber drill or cyber defense projects)
- participate and act ethically as a member of team, community
and working-life partners
- select appropriate tools and strategies for network
reconnaissance and vulnerability analysis project in real exercise
or company environment
- present the results of network reconnaissance and vulnerability
analysis in a professional format
- analyze critically the outcome of the project
- manifest cybersecurity professional practices and apply
practitioners skills in the community
Content
Note: The learning targets can be advance studies in one or more
of following (not limited to only those): cybersecurity practices,
cyber ranges, cyber drills, cyber forensics, cyber war, cyber
defence, cybersecurity for AI and robotics, cybersecurity for
blockchain, cybersecurity for supply chain management and
relevant advance cybersecurity topics.
Qualifications
Prerequisites:
R0318 Introduction to Information Security & R0319 Information
Security Management AND R0385 Information Infrastructure and
Security & A9185 Network Applications OR equivalent
competence
Enrollment
19.05.2025 - 25.05.2025
Timing
01.08.2025 - 31.12.2025
Number of ECTS credits allocated
3 op
Virtual proportion
3 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
40 - 50
Degree programmes
- Tietojenkäsittelyn koulutus, kyberturvallisuus (NKA2), Laurea Leppävaara (Finnish)
Teachers
- Leo Johannesberg
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
NKA224KATietojenkäsittelyn koulutus, kyberturvallisuus, monimuotototeutus, K24, Leppävaara
Learning outcomes
The student is able to
- take sole responsibility for working as a member cybersecurity
analyst team (project target varies including research, innovation,
business, cyber ranges, cyber drill or cyber defense projects)
- participate and act ethically as a member of team, community
and working-life partners
- select appropriate tools and strategies for network
reconnaissance and vulnerability analysis project in real exercise
or company environment
- present the results of network reconnaissance and vulnerability
analysis in a professional format
- analyze critically the outcome of the project
- manifest cybersecurity professional practices and apply
practitioners skills in the community
Content
Note: The learning targets can be advance studies in one or more
of following (not limited to only those): cybersecurity practices,
cyber ranges, cyber drills, cyber forensics, cyber war, cyber
defence, cybersecurity for AI and robotics, cybersecurity for
blockchain, cybersecurity for supply chain management and
relevant advance cybersecurity topics.
Grading scale
H-5
Qualifications
Prerequisites:
R0318 Introduction to Information Security & R0319 Information
Security Management AND R0385 Information Infrastructure and
Security & A9185 Network Applications OR equivalent
competence
Enrollment
25.11.2024 - 01.12.2024
Timing
13.01.2025 - 06.04.2025
Number of ECTS credits allocated
3 op
Virtual proportion
3 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
20 - 40
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Degree Programme in Business Information Technology, Cyber Security (NCA2), Laurea Leppävaara
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Leo Johannesberg
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
TON224SYTäydentävä osaaminen (amk-tutkinto), S24, Tietojenkäsittely ja tietoliikenne (ICT)
-
CCN224SYComplementary competence (bachelor’s studies in English), S24, Information and Communication Technologies (ICT)
-
NCA223SADegree Programme in Business Information Technology, Cyber Security, virtual studies, S23, Leppävaara
Learning outcomes
The student is able to
- take sole responsibility for working as a member cybersecurity
analyst team (project target varies including research, innovation,
business, cyber ranges, cyber drill or cyber defense projects)
- participate and act ethically as a member of team, community
and working-life partners
- select appropriate tools and strategies for network
reconnaissance and vulnerability analysis project in real exercise
or company environment
- present the results of network reconnaissance and vulnerability
analysis in a professional format
- analyze critically the outcome of the project
- manifest cybersecurity professional practices and apply
practitioners skills in the community
Content
Note: The learning targets can be advance studies in one or more
of following (not limited to only those): cybersecurity practices,
cyber ranges, cyber drills, cyber forensics, cyber war, cyber
defence, cybersecurity for AI and robotics, cybersecurity for
blockchain, cybersecurity for supply chain management and
relevant advance cybersecurity topics.
Teaching methods
- The study unit offers students possibility to participate Hackathon or Capture the Flag (CTF) event or exercise
- The implementation of the study unit depends on current collaboration partner
- The students participate workshops, seminars, webinars and Hackathon / CTF event exercise
- The study unit is offered for the students who study cybersecurity as their major and they have already finished at least two of following study units: TO00BR89 Introduction to Information Security & TO00BR90 Information Security Management OR TO00BR88 Information Infrastructure and Security & A9185 Network Applications OR equivalent competence
- NOTE-1: We expect active participation in workshops, seminars and webinars
- NOTE-2: Use of microphone and camera is required in the virtual sessions
Learning materials and recommended literature
- Workshops, seminars, webinars and Hackathon/CTF-event
- Kali Linux Penetration Testing BibleLinks to an external site. (Khawaja, 2021)
- Penetration Testing For DummiesLinks to an external site. (Shimonski, 2020)
- Hands-On Web Penetration Testing with MetasploitLinks to an external site. (Singh & Sharma, 2020)
- Hands-On Application Penetration Testing with Burp SuiteLinks to an external site. (Lozano, Shah & Walikar, 2019)
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit is offered in collaboration with industry partners or Laurea RDI-projects
Important dates
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 3 cr / 82,5 hours
- Study unit will last 11 weeks
Content and scheduling
Modules:
- Module-0: Orientation to the studies
- Module-1: Linux Fundamentals
- Module-2: Setup Testing Environment
- Module-3: Project Plan
- Module-4: Project Execution
- Module-5: Personal Development Plan
Further information for students
- The study unit is offered for the students who study cybersecurity as their major and who are planning their career in cybersecurity
Grading scale
Approved/Failed
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Group work
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, approved/failed
– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes
Evaluation criteria, fail (0)
– is not able to use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– is not able to report and communicate in a professional manner
– is not able to act independently taking into account the operating environment
– is not able to describe the significance of his/her actions for successful co-operation
– is not able to describe his/her competence in relation to the learning outcomes
Evaluation criteria, satisfactory (1-2)
– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes
Evaluation criteria, good (3-4)
– critically evaluate information and justify their actions with science-based knowledge
– propose creative solutions at work
- describe the development of his/her competence in relation to the learning outcomes
Evaluation criteria, excellent (5)
– analyse the acquired information, draw conclusions and combine theoretical knowledge with experiential knowledge
– evaluate the applicability of produced knowledge, skill or idea to other contexts as well as their impact
– evaluate the possibilities for utilising competence and plan his/her personal development
Qualifications
Prerequisites:
R0318 Introduction to Information Security & R0319 Information
Security Management AND R0385 Information Infrastructure and
Security & A9185 Network Applications OR equivalent
competence
Enrollment
20.05.2024 - 26.05.2024
Timing
19.08.2024 - 03.11.2024
Number of ECTS credits allocated
3 op
Virtual proportion
3 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
20 - 50
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Tietojenkäsittelyn koulutus, kyberturvallisuus (NKA2), Laurea Leppävaara (Finnish)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Leo Johannesberg
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
TON224SYTäydentävä osaaminen (amk-tutkinto), S24, Tietojenkäsittely ja tietoliikenne (ICT)
-
CCN224SYComplementary competence (bachelor’s studies in English), S24, Information and Communication Technologies (ICT)
-
NKA223KATietojenkäsittelyn koulutus, kyberturvallisuus, monimuotototeutus, K23, Leppävaara
Learning outcomes
The student is able to
- take sole responsibility for working as a member cybersecurity
analyst team (project target varies including research, innovation,
business, cyber ranges, cyber drill or cyber defense projects)
- participate and act ethically as a member of team, community
and working-life partners
- select appropriate tools and strategies for network
reconnaissance and vulnerability analysis project in real exercise
or company environment
- present the results of network reconnaissance and vulnerability
analysis in a professional format
- analyze critically the outcome of the project
- manifest cybersecurity professional practices and apply
practitioners skills in the community
Content
Note: The learning targets can be advance studies in one or more
of following (not limited to only those): cybersecurity practices,
cyber ranges, cyber drills, cyber forensics, cyber war, cyber
defence, cybersecurity for AI and robotics, cybersecurity for
blockchain, cybersecurity for supply chain management and
relevant advance cybersecurity topics.
Teaching methods
- The study unit offers students possibility to participate Hackathon or Capture the Flag (CTF) event or exercise
- The implementation of the study unit depends on current collaboration partner
- The students participate workshops, seminars, webinars and Hackathon / CTF event exercise
- The study unit is offered for the students who study cybersecurity as their major and they have already finished at least two of following study units: TO00BR89 Introduction to Information Security & TO00BR90 Information Security Management OR TO00BR88 Information Infrastructure and Security & A9185 Network Applications OR equivalent competence
- NOTE-1: We expect active participation in workshops, seminars and webinars
- NOTE-2: Use of microphone and camera is required in the virtual sessions
Learning materials and recommended literature
- Workshops, seminars, webinars and Hackathon/CTF-event
- Kali Linux Penetration Testing BibleLinks to an external site. (Khawaja, 2021)
- Penetration Testing For DummiesLinks to an external site. (Shimonski, 2020)
- Hands-On Web Penetration Testing with MetasploitLinks to an external site. (Singh & Sharma, 2020)
- Hands-On Application Penetration Testing with Burp SuiteLinks to an external site. (Lozano, Shah & Walikar, 2019)
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit is offered in collaboration with industry partners or Laurea RDI-projects
Important dates
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 3 cr / 82,5 hours
- Study unit will last 11 weeks
Content and scheduling
Modules:
- Module-0: Orientation to the studies
- Module-1: Linux Fundamentals
- Module-2: Setup Testing Environment
- Module-3: Project Plan
- Module-4: Project Execution
- Module-5: Personal Development Plan
Further information for students
- The study unit is offered for the students who study cybersecurity as their major and who are planning their career in cybersecurity
Grading scale
Approved/Failed
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Group work
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, approved/failed
– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes
Evaluation criteria, fail (0)
– is not able to use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– is not able to report and communicate in a professional manner
– is not able to act independently taking into account the operating environment
– is not able to describe the significance of his/her actions for successful co-operation
– is not able to describe his/her competence in relation to the learning outcomes
Evaluation criteria, satisfactory (1-2)
– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes
Evaluation criteria, good (3-4)
– critically evaluate information and justify their actions with science-based knowledge
– propose creative solutions at work
- describe the development of his/her competence in relation to the learning outcomes
Evaluation criteria, excellent (5)
– analyse the acquired information, draw conclusions and combine theoretical knowledge with experiential knowledge
– evaluate the applicability of produced knowledge, skill or idea to other contexts as well as their impact
– evaluate the possibilities for utilising competence and plan his/her personal development
Qualifications
Prerequisites:
R0318 Introduction to Information Security & R0319 Information
Security Management AND R0385 Information Infrastructure and
Security & A9185 Network Applications OR equivalent
competence
Enrollment
27.11.2023 - 03.12.2023
Timing
15.01.2024 - 31.03.2024
Number of ECTS credits allocated
3 op
Virtual proportion
3 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
20 - 80
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Leo Johannesberg
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
NKA222SATietojenkäsittelyn koulutus, kyberturvallisuus, monimuotototeutus, S22, Leppävaara
-
CCN223SYComplementary competence (bachelor’s studies in English), S23, Information and Communication Technologies (ICT)
-
TON223SYTäydentävä osaaminen (amk-tutkinto), S23, Tietojenkäsittely ja tietoliikenne (ICT)
-
NCA222SADegree Programme in Business Information Technology, Cyber Security, blended learning, S22, Leppävaara
Learning outcomes
The student is able to
- take sole responsibility for working as a member cybersecurity
analyst team (project target varies including research, innovation,
business, cyber ranges, cyber drill or cyber defense projects)
- participate and act ethically as a member of team, community
and working-life partners
- select appropriate tools and strategies for network
reconnaissance and vulnerability analysis project in real exercise
or company environment
- present the results of network reconnaissance and vulnerability
analysis in a professional format
- analyze critically the outcome of the project
- manifest cybersecurity professional practices and apply
practitioners skills in the community
Content
Note: The learning targets can be advance studies in one or more
of following (not limited to only those): cybersecurity practices,
cyber ranges, cyber drills, cyber forensics, cyber war, cyber
defence, cybersecurity for AI and robotics, cybersecurity for
blockchain, cybersecurity for supply chain management and
relevant advance cybersecurity topics.
Teaching methods
- The study unit offers students possibility to participate Hackathon or Capture the Flag (CTF) event or exercise
- The implementation of the study unit depends on current collaboration partner
- The students participate workshops, seminars, webinars and Hackathon / CTF event exercise
- The study unit is offered for the students who study cybersecurity as their major and they have already finished at least two of following study units: TO00BR89 Introduction to Information Security & TO00BR90 Information Security Management OR TO00BR88 Information Infrastructure and Security & A9185 Network Applications OR equivalent competence
- NOTE-1: We expect active participation in workshops, seminars and webinars
- NOTE-2: Use of microphone and camera is required in the virtual sessions
Learning materials and recommended literature
- Workshops, seminars, webinars and Hackathon/CTF-event
- Kali Linux Penetration Testing BibleLinks to an external site. (Khawaja, 2021)
- Penetration Testing For DummiesLinks to an external site. (Shimonski, 2020)
- Hands-On Web Penetration Testing with MetasploitLinks to an external site. (Singh & Sharma, 2020)
- Hands-On Application Penetration Testing with Burp SuiteLinks to an external site. (Lozano, Shah & Walikar, 2019)
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit is offered in collaboration with industry partners or Laurea RDI-projects
Important dates
- Study unit starts on week 34 (preliminary plan)
- Study unit ends on week 44 (preliminary plan)
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 3 cr / 82,5 hours
- Study unit will last 11 weeks
Content and scheduling
Modules:
- Module-0: Orientation to the studies
- Module-1: Linux Fundamentals
- Module-2: Setup Testing Environment
- Module-3: Project Plan
- Module-4: Project Execution
- Module-5: Personal Development Plan
Further information for students
- The study unit is offered for the students who study cybersecurity as their major and who are planning their career in cybersecurity
Grading scale
Approved/Failed
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Group work
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, approved/failed
– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes
Evaluation criteria, fail (0)
– is not able to use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– is not able to report and communicate in a professional manner
– is not able to act independently taking into account the operating environment
– is not able to describe the significance of his/her actions for successful co-operation
– is not able to describe his/her competence in relation to the learning outcomes
Evaluation criteria, satisfactory (1-2)
– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes
Evaluation criteria, good (3-4)
– critically evaluate information and justify their actions with science-based knowledge
– propose creative solutions at work
- describe the development of his/her competence in relation to the learning outcomes
Evaluation criteria, excellent (5)
– analyse the acquired information, draw conclusions and combine theoretical knowledge with experiential knowledge
– evaluate the applicability of produced knowledge, skill or idea to other contexts as well as their impact
– evaluate the possibilities for utilising competence and plan his/her personal development
Qualifications
Prerequisites:
R0318 Introduction to Information Security & R0319 Information
Security Management AND R0385 Information Infrastructure and
Security & A9185 Network Applications OR equivalent
competence
Enrollment
22.05.2023 - 28.05.2023
Timing
21.08.2023 - 17.12.2023
Number of ECTS credits allocated
3 op
Virtual proportion
3 op
RDI proportion
3 op
Mode of delivery
Distance learning
Unit
Laurea university of applied sciences
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
30 - 50
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Leo Johannesberg
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
NKA222KATietojenkäsittelyn koulutus, kyberturvallisuus, monimuotototeutus, K22, Leppävaara
Learning outcomes
The student is able to
- take sole responsibility for working as a member cybersecurity
analyst team (project target varies including research, innovation,
business, cyber ranges, cyber drill or cyber defense projects)
- participate and act ethically as a member of team, community
and working-life partners
- select appropriate tools and strategies for network
reconnaissance and vulnerability analysis project in real exercise
or company environment
- present the results of network reconnaissance and vulnerability
analysis in a professional format
- analyze critically the outcome of the project
- manifest cybersecurity professional practices and apply
practitioners skills in the community
Content
Note: The learning targets can be advance studies in one or more
of following (not limited to only those): cybersecurity practices,
cyber ranges, cyber drills, cyber forensics, cyber war, cyber
defence, cybersecurity for AI and robotics, cybersecurity for
blockchain, cybersecurity for supply chain management and
relevant advance cybersecurity topics.
Teaching methods
- The study unit offers students possibility to participate Hackathon or Capture the Flag (CTF) event or exercise
- The implementation of the study unit depends on current collaboration partner
- The students participate workshops, seminars, webinars and Hackathon / CTF event exercise
- The study unit is offered for the students who study cybersecurity as their major and they have already finished at least two of following study units: TO00BR89 Introduction to Information Security & TO00BR90 Information Security Management OR TO00BR88 Information Infrastructure and Security & A9185 Network Applications OR equivalent competence
- NOTE-1: We expect active participation in workshops, seminars and webinars
- NOTE-2: Use of microphone and camera is required in the virtual sessions
Learning materials and recommended literature
- Workshops, seminars, webinars and Hackathon/CTF-event
- Kali Linux Penetration Testing BibleLinks to an external site. (Khawaja, 2021)
- Penetration Testing For DummiesLinks to an external site. (Shimonski, 2020)
- Hands-On Web Penetration Testing with MetasploitLinks to an external site. (Singh & Sharma, 2020)
- Hands-On Application Penetration Testing with Burp SuiteLinks to an external site. (Lozano, Shah & Walikar, 2019)
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit is offered in collaboration with industry partners or Laurea RDI-projects
Important dates
- Study unit starts on week 34 (preliminary plan)
- Study unit ends on week 44 (preliminary plan)
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 3 cr / 82,5 hours
- Study unit will last 11 weeks
Content and scheduling
Modules:
- Module-0: Orientation to the studies
- Module-1: Linux Fundamentals
- Module-2: Setup Testing Environment
- Module-3: Project Plan
- Module-4: Project Execution
- Module-5: Personal Development Plan
Further information for students
- The study unit is offered for the students who study cybersecurity as their major and who are planning their career in cybersecurity
Grading scale
Approved/Failed
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Group work
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, approved/failed
– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes
Evaluation criteria, fail (0)
– is not able to use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– is not able to report and communicate in a professional manner
– is not able to act independently taking into account the operating environment
– is not able to describe the significance of his/her actions for successful co-operation
– is not able to describe his/her competence in relation to the learning outcomes
Evaluation criteria, satisfactory (1-2)
– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes
Evaluation criteria, good (3-4)
– critically evaluate information and justify their actions with science-based knowledge
– propose creative solutions at work
- describe the development of his/her competence in relation to the learning outcomes
Evaluation criteria, excellent (5)
– analyse the acquired information, draw conclusions and combine theoretical knowledge with experiential knowledge
– evaluate the applicability of produced knowledge, skill or idea to other contexts as well as their impact
– evaluate the possibilities for utilising competence and plan his/her personal development
Qualifications
Prerequisites:
R0318 Introduction to Information Security & R0319 Information
Security Management AND R0385 Information Infrastructure and
Security & A9185 Network Applications OR equivalent
competence
Enrollment
28.11.2022 - 04.12.2022
Timing
16.01.2023 - 02.04.2023
Number of ECTS credits allocated
3 op
Virtual proportion
3 op
RDI proportion
1 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
40 - 50
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Paresh Rathod
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
TON222SYLaurea täydentävä osaaminen (amk-tutkinto), S22, Tietojenkäsittely ja tietoliikenne (ICT)
-
NCA221SADegree Programme in Business Information Technology, Cyber Security, blended learning, S21, Leppävaara
-
CCN222SYComplementary competence (bachelor’s studies), S22, Information and Communication Technologies (ICT)
Learning outcomes
The student is able to
- take sole responsibility for working as a member cybersecurity
analyst team (project target varies including research, innovation,
business, cyber ranges, cyber drill or cyber defense projects)
- participate and act ethically as a member of team, community
and working-life partners
- select appropriate tools and strategies for network
reconnaissance and vulnerability analysis project in real exercise
or company environment
- present the results of network reconnaissance and vulnerability
analysis in a professional format
- analyze critically the outcome of the project
- manifest cybersecurity professional practices and apply
practitioners skills in the community
Content
Note: The learning targets can be advance studies in one or more
of following (not limited to only those): cybersecurity practices,
cyber ranges, cyber drills, cyber forensics, cyber war, cyber
defence, cybersecurity for AI and robotics, cybersecurity for
blockchain, cybersecurity for supply chain management and
relevant advance cybersecurity topics.
Teaching methods
- The study unit offers students possibility to participate Hackathon or Capture the Flag (CTF) event or exercise
- The implementation of the study unit depends on current collaboration partner
- The students participate workshops, seminars, webinars and Hackathon / CTF event exercise
- The study unit is offered for the students who study cybersecurity as their major and they have already finished at least two of following study units: TO00BR89 Introduction to Information Security & TO00BR90 Information Security Management OR TO00BR88 Information Infrastructure and Security & A9185 Network Applications OR equivalent competence
- NOTE-1: We expect active participation in workshops, seminars and webinars
- NOTE-2: Use of microphone and camera is required in the virtual sessions
Learning materials and recommended literature
- Workshops, seminars, webinars and Hackathon/CTF-event
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit is offered in collaboration with industry partners or Laurea RDI-projects
Important dates
- The details are released in January
Students workload
- 3 cr / 82,5 hours
- Study unit will last 11 weeks
Content and scheduling
Modules:
- Module-0: Orientation to the studies
- Module-1: Linux Fundamentals
- Module-2: Setup Testing Environment
- Module-3: Project Plan
- Module-4: Project Execution
- Module-5: Personal Development Plan
Further information for students
- The study unit is offered for the students who study cybersecurity as their major and who are planning their career in cybersecurity
Grading scale
Approved/Failed
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Group work
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, approved/failed
– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes
Evaluation criteria, fail (0)
– is not able to use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– is not able to report and communicate in a professional manner
– is not able to act independently taking into account the operating environment
– is not able to describe the significance of his/her actions for successful co-operation
– is not able to describe his/her competence in relation to the learning outcomes
Evaluation criteria, satisfactory (1-2)
– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes
Evaluation criteria, good (3-4)
– critically evaluate information and justify their actions with science-based knowledge
– propose creative solutions at work
- describe the development of his/her competence in relation to the learning outcomes
Evaluation criteria, excellent (5)
– analyse the acquired information, draw conclusions and combine theoretical knowledge with experiential knowledge
– evaluate the applicability of produced knowledge, skill or idea to other contexts as well as their impact
– evaluate the possibilities for utilising competence and plan his/her personal development
Qualifications
Prerequisites:
R0318 Introduction to Information Security & R0319 Information
Security Management AND R0385 Information Infrastructure and
Security & A9185 Network Applications OR equivalent
competence
Enrollment
29.11.2021 - 13.02.2022
Timing
28.03.2022 - 19.06.2022
Number of ECTS credits allocated
3 op
Virtual proportion
3 op
RDI proportion
1 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
14 - 28
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Paresh Rathod
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
TON221SYLaurea täydentävä osaaminen (amk-tutkinto), S21, Tietojenkäsittely ja tietoliikenne (ICT)
-
CCN221SYComplementary competence (bachelor’s studies), S21, Information and Communication Technologies (ICT)
Learning outcomes
The student is able to
- take sole responsibility for working as a member cybersecurity
analyst team (project target varies including research, innovation,
business, cyber ranges, cyber drill or cyber defense projects)
- participate and act ethically as a member of team, community
and working-life partners
- select appropriate tools and strategies for network
reconnaissance and vulnerability analysis project in real exercise
or company environment
- present the results of network reconnaissance and vulnerability
analysis in a professional format
- analyze critically the outcome of the project
- manifest cybersecurity professional practices and apply
practitioners skills in the community
Content
Note: The learning targets can be advance studies in one or more
of following (not limited to only those): cybersecurity practices,
cyber ranges, cyber drills, cyber forensics, cyber war, cyber
defence, cybersecurity for AI and robotics, cybersecurity for
blockchain, cybersecurity for supply chain management and
relevant advance cybersecurity topics.
Teaching methods
- The study unit offers students possibility to participate Hackathon or Catch the Flag (CTF) event or exercise
- The implementation of the study unit depends on current collaboration partner
- The students participate workshops, seminars, webinars and Hackathon / CTF event exercise
- The study unit is offered for the students who study cybersecurity as their major and they have already finished at least two of following study units: R0318 Introduction to Information Security & R0319 Information Security Management OR R0385 Information Infrastructure and Security & A9185 Network Applications OR equivalent competence
- NOTE-1: We expect active participation in workshops, seminars and webinars
- NOTE-2: Use of microphone and camera is required in the virtual sessions
Learning materials and recommended literature
- Workshops, seminars, webinars and Hackathon/CTF-event
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence
Co-operation with working life and/or RDI
- The study unit is offered in collaboration with industry partners
Important dates
- The details are released in January
Content and scheduling
- Training for the Hackathon/CTF-event
- Participation to the Hackathon/CTF-event
Further information for students
- The study unit is offered for the students who study cybersecurity as their major and who are planning their career in cybersecurity
Grading scale
Approved/Failed
Evaluation methods and criteria
- Participation to workshops, seminars, webinars and Hackathon/CTF-events
- Learning reflections
Assessment scale:
Passed/Failed
Evaluation criteria, approved/failed
– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes
Evaluation criteria, fail (0)
– is not able to use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– is not able to report and communicate in a professional manner
– is not able to act independently taking into account the operating environment
– is not able to describe the significance of his/her actions for successful co-operation
– is not able to describe his/her competence in relation to the learning outcomes
Evaluation criteria, satisfactory (1-2)
– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes
Evaluation criteria, good (3-4)
– critically evaluate information and justify their actions with science-based knowledge
– propose creative solutions at work
- describe the development of his/her competence in relation to the learning outcomes
Evaluation criteria, excellent (5)
– analyse the acquired information, draw conclusions and combine theoretical knowledge with experiential knowledge
– evaluate the applicability of produced knowledge, skill or idea to other contexts as well as their impact
– evaluate the possibilities for utilising competence and plan his/her personal development
Qualifications
Prerequisites:
R0318 Introduction to Information Security & R0319 Information
Security Management AND R0385 Information Infrastructure and
Security & A9185 Network Applications OR equivalent
competence