Cybersecurity Working Life Practices (2 cr)
Code: TO00BR96-3002
General information
Enrollment
29.11.2021 - 02.01.2022
Timing
19.01.2022 - 10.06.2022
Number of ECTS credits allocated
2 op
Virtual proportion
2 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
7 - 21
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
TON221SYLaurea täydentävä osaaminen (amk-tutkinto), S21, Tietojenkäsittely ja tietoliikenne (ICT)
-
CCN221SYComplementary competence (bachelor’s studies), S21, Information and Communication Technologies (ICT)
Learning outcomes
The student is able to
- participate and act as a cybersecurity professional in workinglife events including industrial visits, seminars, workshops,
hands-on, cyber ranges, cyber drill and cyber defense activities
- act ethically as a member of team, community and working-life
partners
- network with other cybersecurity professionals
- summarize and analyze critically the content or outcome of the
event
- manifest cybersecurity professional practices and apply
practitioners skills in the community
Content
The study unit is organized as a collaboration with Nixu and Hoxhunt. The preliminary idea is to arrange the series of workshops or webinars where students have possibility to meet cybersecurity staff from recruiters to topical experts. The topics will be decided before the study unit starts.
Note: The learning targets can be advance studies in one or more
of following (not limited to only those): company presentations, recruiters tips, cybersecurity practices,
cyber ranges, cyber drills, cyber forensics, cyber war, cyber
defence, cybersecurity for AI and robotics, cybersecurity for
blockchain, cybersecurity for supply chain management and
relevant advance cybersecurity topics.
Teaching methods
- The study unit is organized as a collaboration with industry partners
- In this semester our collaborative partners are Nixu and Hoxhunt
- The industry partners offers workshops, seminars or webinars regarding contemporary cybersecurity topics including company presentations, recruitment, case studies, hands-on training and the latest news from the field
- Participants submit applied assignments in every study module
- The study unit is offered for the students who study cybersecurity as their major and they have already finished at least two of following study units: R0318 Introduction to Information Security & R0319 Information Security Management OR R0385 Information Infrastructure and Security & A9185 Network Applications OR equivalent competence
- NOTE-1: We expect active participation in workshops, seminars and webinars
- NOTE-2: Use of microphone and camera is required in the virtual sessions
Learning materials and recommended literature
- Workshops, seminars or webinars
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence
Co-operation with working life and/or RDI
- The study unit is offered in collaboration with industry partners (Nixu and Hoxhunt)
Important dates
- The details are released in the first workshop in January
Content and scheduling
- Detailed information is released when the study unit starts
- Module-1: Social Engineering and Cybersecurity Exercises
- Module-2: Threat Analysis and Security Operation Center Processes
- Module-3: Cybersecurity Awareness and Catch the flag exercise
- Module-4: Threat Simulation Workshop
- Conclusion & Feedback
Further information for students
- The study unit is offered for the students who study cybersecurity as their major and who are planning their career in cybersecurity
- The study unit offers possibility to meet HR persons and technology experts
- The study unit offers hands-on training and analytical assignments
Grading scale
H-5
Evaluation methods and criteria
- Participation to workshops, seminars and webinars
- Learning reflections
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, satisfactory (1-2)
– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes
Evaluation criteria, good (3-4)
– critically evaluate information and justify their actions with science-based knowledge
– propose creative solutions at work
- describe the development of his/her competence in relation to the learning outcomes
Evaluation criteria, excellent (5)
– analyse the acquired information, draw conclusions and combine theoretical knowledge with experiential knowledge
– evaluate the applicability of produced knowledge, skill or idea to other contexts as well as their impact
– evaluate the possibilities for utilising competence and plan his/her personal development
Qualifications
Prerequisites:
R0318 Introduction to Information Security & R0319 Information
Security Management AND R0385 Information Infrastructure and
Security & A9185 Network Applications OR equivalent
competence