Skip to main content

Network and Applications Security (5 cr)

Code: TO00BR93-3001

General information


Enrollment
24.05.2021 - 30.05.2021
Registration for the implementation has ended.
Timing
30.08.2021 - 31.12.2021
Implementation has ended.
Number of ECTS credits allocated
5 cr
Local portion
0 cr
Virtual proportion
5 cr
Mode of delivery
Distance learning
Campus
Laurea Virtual Campus
Teaching languages
English
Seats
20 - 40
Degree programmes
Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
Teachers
Paresh Rathod
Pasi Kämppi
Teacher in charge
Paresh Rathod
Study unit
TO00BR93

Learning outcomes

The student is able to
- act ethically as a member of study group, community and
working-life partners
- explain the role of ethical hacking in the offensive and defensive
network and applications security
- plan penetration testing process including footprinting,
reconnaissance, scanning networks, enumeration, vulnerability
analysis and system hacking
- select tools and techniques used in penetration testing process
- select appropriate security controls to network security based on
vulnerability analysis
- use the most common penetration testing tools in virtualized
training environment
- reflect and develop their own learning process and
working-life skills

Location and time

- Not dependent on place or time (online distance studies)

Materials

More details on Course management system

Teaching methods

o This study unit is fully online learning with the possibilities of volunteer tutoring meetings with the teachers.
o The tutoring meetings are not compulsory. Any student can participate in tutoring meeting if they need any help from teachers.
o Students need to commit weekly based on regular studies.
o Online studies, weekly basis distance learning and assignments:
>> Online Learning: Weekly module-based online learning activities including video training tutorials, eBook and other study materials.
>> This is an advanced level cybersecurity course. It demands analytical and competence development efforts (See EQF-NQF guidelines or Laurea Competence Based Study guideline).
>> Learning Tasks: Weekly assignments including material study, learning reflections and finishing targeted learning tasks.

Note:
- The content is mapped with the Certified Ethical Hacker curriculum and hands-on lab work.
- The study unit provides preparatory training for Certified Ethical Hacker but not certification exam.
- Prerequisites: R0318 Introduction to Information Security & R0319 Information Security Management OR R0385 Information Infrastructure and Security & A9185 Network Applications OR equivalent competence

VERY IMPORTANT: Any students participated old study unit titled, "Enterprise Applications Security (R0323)" with Certified Ethical Hacker professional training. Please don't enrol and participate in this study unit. This study unit is an updated version of the previous curriculum's course "Enterprise Applications Security (R0323)"

Employer connections

o Time to time, we are offering events, seminars and workshop participation.
o Also offering partner's announcements of internships, working life projects and thesis opportunities for Cybersecurity Module students.

For example,
>> In the past teachers offered annual event participation including Nokia HackAthon, Digia HackAthon or Visiting our partner Nixu Corporation's Cyber Defense Center.
>> Laurea also offers EU and Finnish Research, Development and Innovation project participation.

Exam schedules

All details on the course management system for accepted students only.
--Teachers are sending welcome e-mail message (Laurea student emails only) with induction details to accepted students.
--Inactive students are removed from the study unit after orientation period (the first week of the study unit).

International connections

The teachers and students are international (Finnish and English degree programme students).
- Study is suitable for exchange students.
- We are also cooperating with working life companies and both teachers are involved in European and International innovation projects.

Completion alternatives

o This study unit is for regular ICT & Cybersecurity students who prefer online studies.
o There is no parallel alternative method to finish this study unit.
o Any students achieved "Certified Ethical Hacker" professional training can contact teachers for AHOT (Competence Evaluation & Assessment)

Note:
>> Finishing online learning (as per requirement) is a basic requirements to consider for evaluation and grading. If student not finishing online learning as per requirements, not qualifying for evaluation and grading.

Student workload

The student puts 5 ECTS study effort.
o 5 cr / 137,5 hours are attached to the workload of a full-time study of learning and the associated learning outcomes.

Content scheduling

The study unit starts on week-35 and finishes at the end of semester.
¤ The weekly module open on every Monday at 09.00 and closes on Sunday midnight.
¤ Inactive students are removed from the study unit after orientation period (the first week of the study unit).

COURSE CONENT:
Module-0: Induction and Personal Study Plan (Orientation module)
Module-1:
Topic-1- CEH: Ethical Hacking Overview and Threats
Topic-2- CEH: Hacking Concepts
Module-2:
Topic-1: CEH: Security Controls
Topic-2: CEH: Security Controls Part 2
Module-3:
Topic-1: Certified Ethical Hacker - CEH: Malware Threats
Topic-2: Certified Ethical Hacker - CEH: Malware Distribution
Module-4:
Topic-1- CEH: Hacking Web Servers
Topic-2- CEH: Common Web App Threats
Module-5:
Topic-1: Certified Ethical Hacker - CEH: Common Web App Threats Part 2
Topic-2: Certified Ethical Hacker - CEH: Practical Web App Hacking
Module-6:
Topic-1: Certified Ethical Hacker - CEH: SQL Injection
Topic-2: Certified Ethical Hacker - CEH: SQL Injection Types and Tools
Module-7:
Topic-1- CEH: Wireless Hacking Concepts
Topic-2- Certified Ethical Hacker - CEH: Wireless Hacking Tools
Topic-3- Certified Ethical Hacker - CEH: Wireless Hacking Common Threats
Module-8:
Topic-1- Certified Ethical Hacker - CEH: Cracking and Mobile Hacking

Evaluation scale

H-5

Qualifications

Prerequisites:
R0318 Introduction to Information Security & R0319 Information
Security Management OR R0385 Information Infrastructure and
Security & A9185 Network Applications OR equivalent
competence

Further information

The study unit is an advanced cybersecurity. It is suitable for graduate level students. Considering following points:
o Student must know: how company/organization works.
o Students knows the basics of ICT-technologies and Introduction to Information Security.
o Student is able to study independently with weekly-biweekly schedule.

VERY IMPORTANT: Any students participated old study unit titled, "Enterprise Applications Security (R0323)" with Certified Ethical Hacker professional training. Please don't enrol and participate in this study unit. This study unit is an updated version of the previous curriculum's course "Enterprise Applications Security (R0323)"

Note:
--Any student who is willing to learn the overview of information security technologies, we recommend to participate following study unit: Introduction to Information Security.
--This study unit is prioritized for TIKO and BIT students
--Safety, Security and Risk Management students should take the study unit TO007BN Information and Cybersecurity Management after R0186 Information and Cybersecurity before participating this study unit.
--Inactive students are removed from the study unit after orientation period (the first week of the study unit)

Go back to top of page