Cybersecurity Hackathon Project (3 cr)
Code: TO00BR95-3005
General information
Enrollment
22.05.2023 - 28.05.2023
Timing
21.08.2023 - 17.12.2023
Number of ECTS credits allocated
3 op
Virtual proportion
3 op
RDI proportion
3 op
Mode of delivery
Distance learning
Unit
Laurea university of applied sciences
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
30 - 50
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Leo Johannesberg
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
NKA222KATietojenkäsittelyn koulutus, kyberturvallisuus, monimuotototeutus, K22, Leppävaara
Learning outcomes
The student is able to
- take sole responsibility for working as a member cybersecurity
analyst team (project target varies including research, innovation,
business, cyber ranges, cyber drill or cyber defense projects)
- participate and act ethically as a member of team, community
and working-life partners
- select appropriate tools and strategies for network
reconnaissance and vulnerability analysis project in real exercise
or company environment
- present the results of network reconnaissance and vulnerability
analysis in a professional format
- analyze critically the outcome of the project
- manifest cybersecurity professional practices and apply
practitioners skills in the community
Content
Note: The learning targets can be advance studies in one or more
of following (not limited to only those): cybersecurity practices,
cyber ranges, cyber drills, cyber forensics, cyber war, cyber
defence, cybersecurity for AI and robotics, cybersecurity for
blockchain, cybersecurity for supply chain management and
relevant advance cybersecurity topics.
Teaching methods
- The study unit offers students possibility to participate Hackathon or Capture the Flag (CTF) event or exercise
- The implementation of the study unit depends on current collaboration partner
- The students participate workshops, seminars, webinars and Hackathon / CTF event exercise
- The study unit is offered for the students who study cybersecurity as their major and they have already finished at least two of following study units: TO00BR89 Introduction to Information Security & TO00BR90 Information Security Management OR TO00BR88 Information Infrastructure and Security & A9185 Network Applications OR equivalent competence
- NOTE-1: We expect active participation in workshops, seminars and webinars
- NOTE-2: Use of microphone and camera is required in the virtual sessions
Learning materials and recommended literature
- Workshops, seminars, webinars and Hackathon/CTF-event
- Kali Linux Penetration Testing BibleLinks to an external site. (Khawaja, 2021)
- Penetration Testing For DummiesLinks to an external site. (Shimonski, 2020)
- Hands-On Web Penetration Testing with MetasploitLinks to an external site. (Singh & Sharma, 2020)
- Hands-On Application Penetration Testing with Burp SuiteLinks to an external site. (Lozano, Shah & Walikar, 2019)
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit is offered in collaboration with industry partners or Laurea RDI-projects
Important dates
- Study unit starts on week 34 (preliminary plan)
- Study unit ends on week 44 (preliminary plan)
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 3 cr / 82,5 hours
- Study unit will last 11 weeks
Content and scheduling
Modules:
- Module-0: Orientation to the studies
- Module-1: Linux Fundamentals
- Module-2: Setup Testing Environment
- Module-3: Project Plan
- Module-4: Project Execution
- Module-5: Personal Development Plan
Further information for students
- The study unit is offered for the students who study cybersecurity as their major and who are planning their career in cybersecurity
Grading scale
Approved/Failed
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Group work
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, approved/failed
– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes
Evaluation criteria, fail (0)
– is not able to use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– is not able to report and communicate in a professional manner
– is not able to act independently taking into account the operating environment
– is not able to describe the significance of his/her actions for successful co-operation
– is not able to describe his/her competence in relation to the learning outcomes
Evaluation criteria, satisfactory (1-2)
– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes
Evaluation criteria, good (3-4)
– critically evaluate information and justify their actions with science-based knowledge
– propose creative solutions at work
- describe the development of his/her competence in relation to the learning outcomes
Evaluation criteria, excellent (5)
– analyse the acquired information, draw conclusions and combine theoretical knowledge with experiential knowledge
– evaluate the applicability of produced knowledge, skill or idea to other contexts as well as their impact
– evaluate the possibilities for utilising competence and plan his/her personal development
Qualifications
Prerequisites:
R0318 Introduction to Information Security & R0319 Information
Security Management AND R0385 Information Infrastructure and
Security & A9185 Network Applications OR equivalent
competence