Network and Applications Security (5 op)
Toteutuksen tunnus: TO00BR93-3002
Toteutuksen perustiedot
Ilmoittautumisaika
23.05.2022 - 29.05.2022
Ajoitus
27.08.2022 - 31.12.2022
Opintopistemäärä
5 op
Virtuaaliosuus
5 op
Toteutustapa
Etäopetus
Yksikkö
Laurea Leppävaara, tiko
Toimipiste
Laurea Verkkokampus
Opetuskielet
- Englanti
Paikat
40 - 50
Koulutus
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Opettaja
- Paresh Rathod
- Pasi Kämppi
Vastuuopettaja
Paresh Rathod
Ryhmät
-
TON222SYLaurea täydentävä osaaminen (amk-tutkinto), S22, Tietojenkäsittely ja tietoliikenne (ICT)
-
CCN222SYComplementary competence (bachelor’s studies), S22, Information and Communication Technologies (ICT)
Osaamistavoitteet
The student is able to
- act ethically as a member of study group, community and
working-life partners
- explain the role of ethical hacking in the offensive and defensive
network and applications security
- plan penetration testing process including footprinting,
reconnaissance, scanning networks, enumeration, vulnerability
analysis and system hacking
- select tools and techniques used in penetration testing process
- select appropriate security controls to network security based on
vulnerability analysis
- use the most common penetration testing tools in virtualized
training environment
- reflect and develop his or her own learning process and
working-life skills
Toteutustapa
o This study unit is fully online learning with the possibilities of volunteer tutoring meetings with the teachers.
o The tutoring meetings are not compulsory. Any student can participate in tutoring meeting if they need any help from teachers.
o Students need to commit weekly based on regular studies.
o Online studies, weekly basis distance learning and assignments:
>> Online Learning: Weekly module-based online learning activities including video training tutorials, eBook and other study materials.
>> This is an advanced level cybersecurity course. It demands analytical and competence development efforts (See EQF-NQF guidelines or Laurea Competence Based Study guideline).
>> Learning Tasks: Weekly assignments including material study, learning reflections and finishing targeted learning tasks.
Note:
- The content is mapped with the Certified Ethical Hacker curriculum and hands-on lab work.
- The study unit provides preparatory training for Certified Ethical Hacker but not certification exam.
- Prerequisites: R0318 Introduction to Information Security & R0319 Information Security Management OR R0385 Information Infrastructure and Security & A9185 Network Applications OR equivalent competence
VERY IMPORTANT: Any students participated old study unit titled, "Enterprise Applications Security (R0323)" with Certified Ethical Hacker professional training. Please don't enrol and participate in this study unit. This study unit is an updated version of the previous curriculum's course "Enterprise Applications Security (R0323)"
Aika ja paikka
- Not dependent on place or time (online distance studies)
Oppimateriaali ja suositeltava kirjallisuus
- More details on Course management system
Toteutuksen valinnaiset suoritustavat
o This study unit is for regular ICT & Cybersecurity students who prefer online studies.
o There is no parallel alternative method to finish this study unit.
o Any students achieved "Certified Ethical Hacker" professional training can contact teachers for AHOT (Competence Evaluation & Assessment)
Note:
>> Finishing online learning (as per requirement) is a basic requirements to consider for evaluation and grading. If student not finishing online learning as per requirements, not qualifying for evaluation and grading.
Työelämäyhteistyö ja/tai TKI
o Time to time, we are offering events, seminars and workshop participation.
o Also offering partner's announcements of internships, working life projects and thesis opportunities for Cybersecurity Module students.
For example,
>> In the past teachers offered annual event participation including Nokia HackAthon, Digia HackAthon or Visiting our partner Nixu Corporation's Cyber Defense Center.
>> Laurea also offers EU and Finnish Research, Development and Innovation project participation.
Toteutuksen tärkeät päivämäärät
All details on the course management system for accepted students only.
--Teachers are sending welcome e-mail message (Laurea student emails only) with induction details to accepted students.
--Inactive students are removed from the study unit after orientation period (the first week of the study unit).
Kansainvälisyys toteutuksella
The teachers and students are international (Finnish and English degree programme students).
- Study is suitable for exchange students.
- We are also cooperating with working life companies and both teachers are involved in European and International innovation projects.
Opiskelijan ajankäyttö ja kuormitus
The student puts 5 ECTS study effort.
o 5 cr / 137,5 hours are attached to the workload of a full-time study of learning and the associated learning outcomes.
Sisältö ja sen jaksotus
The study unit starts on week-35 and finishes at the end of semester.
¤ The weekly module open on every Monday at 09.00 and closes on Sunday midnight.
¤ Inactive students are removed from the study unit after orientation period (the first week of the study unit).
COURSE CONENT:
Module-0: Induction and Personal Study Plan (Orientation module)
Module-1:
Topic-1- CEH: Ethical Hacking Overview and Threats
Topic-2- CEH: Hacking Concepts
Module-2:
Topic-1: CEH: Security Controls
Topic-2: CEH: Security Controls Part 2
Module-3:
Topic-1: Certified Ethical Hacker - CEH: Malware Threats
Topic-2: Certified Ethical Hacker - CEH: Malware Distribution
Module-4:
Topic-1- CEH: Hacking Web Servers
Topic-2- CEH: Common Web App Threats
Module-5:
Topic-1: Certified Ethical Hacker - CEH: Common Web App Threats Part 2
Topic-2: Certified Ethical Hacker - CEH: Practical Web App Hacking
Module-6:
Topic-1: Certified Ethical Hacker - CEH: SQL Injection
Topic-2: Certified Ethical Hacker - CEH: SQL Injection Types and Tools
Module-7:
Topic-1- CEH: Wireless Hacking Concepts
Topic-2- Certified Ethical Hacker - CEH: Wireless Hacking Tools
Topic-3- Certified Ethical Hacker - CEH: Wireless Hacking Common Threats
Module-8:
Topic-1- Certified Ethical Hacker - CEH: Cracking and Mobile Hacking
Lisätietoja opiskelijoille
The study unit is an advanced cybersecurity. It is suitable for graduate level students. Considering following points:
o Student must know: how company/organization works.
o Students knows the basics of ICT-technologies and Introduction to Information Security.
o Student is able to study independently with weekly-biweekly schedule.
VERY IMPORTANT: Any students participated old study unit titled, "Enterprise Applications Security (R0323)" with Certified Ethical Hacker professional training. Please don't enrol and participate in this study unit. This study unit is an updated version of the previous curriculum's course "Enterprise Applications Security (R0323)"
Note:
--Any student who is willing to learn the overview of information security technologies, we recommend to participate following study unit: Introduction to Information Security.
--This study unit is prioritized for TIKO and BIT students
--Safety, Security and Risk Management students should take the study unit TO007BN Information and Cybersecurity Management after R0186 Information and Cybersecurity before participating this study unit.
--Inactive students are removed from the study unit after orientation period (the first week of the study unit)
Arviointiasteikko
H-5
Arviointimenetelmät ja arvioinnin perusteet
- The weekly study, assignment and tasks
- Students collect the points for different learning activities
- Online Tests
Important Note:
o Students are responsible to finish all tasks within schedule time to gain points.
o Learning Activities and Tasks: All Details given in respective Module Folders on the course management system.
o No points after the deadline.
o Sickness or family reasons - contact teacher for tutoring discussion. Sickness needs a doctor certificate.
Teachers will evaluate student work and post points after mid-term and end-term. There are two checkpoints.
Any student not finishing 'Module-0: Induction and Study Plan' will be removed from the study unit after first week of the course.
>> Grading scale (0 to 5):
0-49 points: 0
50-59 points: 1
60-69 points: 2
70-79 points: 3
80-89 points: 4
90-100 points: 5
Hylätty (0)
Not meeting minimum requirements of learning outcomes including content knowledge, skills and competences.
Arviointikriteerit, tyydyttävä (1-2)
In addition to content knowledge, skills, abilities, tasks and practices a student is able to:
– use essential professional concepts when explaining various work practices and situations
– search for information in different sources
– report
– work under guidance using the skills and methods learned
– receive guidance
– plan the progress of his/her work and use of time under guidance
– work safely and in accordance with the professional code of conduct
– follow the provided instructions and rules
Arviointikriteerit, hyvä (3-4)
In addition to [1] Evaluation criteria - satisfactory (1-2) and, [2] content knowledge, skills, abilities, tasks and practices a student is able to:
– use professional concepts in a consistent manner when explaining various work practices and situations
– gather information and use his/her knowledge basis
– report in the agreed manner
– work using the skills and methods learned
– take part in guidance and utilise it
– plan and manage the progress of his/her work and use of time
– justify this/her actions in accordance with the professional code of conduct
Arviointikriteerit, kiitettävä (5)
In addition to [1] Evaluation criteria - good (3-4) and, [2] content knowledge, skills, abilities, tasks and practices a student is able to:
– use professional concepts extensively
– compare and choose relevant information
– report and communicate in a professional manner
– work independently, using the skills and methods learned
– anticipate his/her need for guidance
– manage his/her time appropriately, completing the agreed tasks at the required quality level
– work responsibly, applying the skills and methods learned
– plan and evaluate their work, taking safety and/or ethical aspects into consideration
Esitietovaatimukset
Prerequisites:
R0318 Introduction to Information Security & R0319 Information
Security Management OR R0385 Information Infrastructure and
Security & A9185 Network Applications OR equivalent
competence