Network and Applications Security (5 cr)
Code: TO00BR93-3004
General information
- Enrollment
-
20.05.2024 - 26.05.2024
Registration for the implementation has ended.
- Timing
-
03.09.2024 - 15.12.2024
Implementation has ended.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 0 cr
- Virtual proportion
- 5 cr
- Mode of delivery
- Distance learning
- Campus
- Laurea Virtual Campus
- Teaching languages
- English
- Seats
- 40 - 50
- Degree programmes
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Teachers
- Paresh Rathod
- Pasi Kämppi
- Paulinus Ofem
- Teacher in charge
- Paresh Rathod
- Groups
-
NKA222SATietojenkäsittelyn koulutus, kyberturvallisuus, monimuotototeutus, S22, Leppävaara
-
TON224SYTäydentävä osaaminen (amk-tutkinto), S24, Tietojenkäsittely ja tietoliikenne (ICT)
-
CCN224SYComplementary competence (bachelor’s studies in English), S24, Information and Communication Technologies (ICT)
- Study unit
- TO00BR93
Learning outcomes
The student is able to
- act ethically as a member of study group, community and
working-life partners
- explain the role of ethical hacking in the offensive and defensive
network and applications security
- plan penetration testing process including footprinting,
reconnaissance, scanning networks, enumeration, vulnerability
analysis and system hacking
- select tools and techniques used in penetration testing process
- select appropriate security controls to network security based on
vulnerability analysis
- use the most common penetration testing tools in virtualized
training environment
- reflect and develop their own learning process and
working-life skills
Location and time
Course Schedule and Tutoring Information
Fully Online and Flexible:
o This course is entirely online, offering you the flexibility to learn from anywhere, anytime (asynchronous learning).
Course Duration:
o Start Date: August 26, 2024
o End Date: December 15, 2024
Optional Tutoring Sessions: We offer optional volunteer tutoring sessions led by our instructors throughout the course.
o Schedule: Wednesdays, 5:00 PM - 6:30 PM (subject to change to align with other cybersecurity courses)
o Location: Online via Zoom (details and link provided in Canvas course materials)
o Benefits: These sessions are a great opportunity to ask questions, clarify concepts, and receive additional support from the teaching staff.
Self-Paced Learning:
o The core learning materials and activities are designed for self-paced study. You can manage your learning schedule to fit your needs, as long as you meet the assigned deadlines for weekly tasks.
Important Note:
o If you are enrolled in both advanced cybersecurity courses and did not participate in the "Introduction to Information Security" course, you can disregard any calendar entries for an "Introduction to Information Security" course scheduled from 3:00 PM to 5:00 PM.
Materials
This course offers the following learning methods and materials:
---
o Online training: You will complete the online training using Laurea's Cybersecurity Professional Training platform and Canvas. The training covers a variety of topics, including cybersecurity fundamentals, threat analysis, and incident response.
o Hands-on lab exercises: You will also have the opportunity to participate in hands-on lab exercises. These exercises will give you the chance to practice your skills in a safe and controlled environment.
o Tutoring sessions: Volunteer tutoring sessions will be offered throughout the course. These sessions will provide you with additional support and help you to succeed in the course.
o Note: The course is designed to be self-paced and can be completed online. However, it is important to make sure to meet the scheduled weekly deadlines and study effectively.
Teaching methods
o This study unit is fully online learning with the possibilities of volunteer tutoring meetings with the teachers.
o The tutoring meetings are not compulsory. Any student can participate in tutoring meeting if they need any help from teachers.
o Students need to commit weekly based on regular studies.
o Online studies, weekly basis distance learning and assignments:
>> Online Learning: Weekly module-based online learning activities including video training tutorials, eBook and other study materials.
>> This is an advanced level cybersecurity course. It demands analytical and competence development efforts (See EQF-NQF guidelines or Laurea Competence Based Study guideline).
>> Learning Tasks: Weekly assignments including material study, learning reflections and finishing targeted learning tasks.
>> This course is a professional online training program facilitated by world-class experts video training from an authorised professional training provider. This course is not a traditional teacher's lecture-based format
Note:
- The content is mapped with the Certified Ethical Hacker curriculum and hands-on lab work.
- The study unit provides preparatory training for Certified Ethical Hacker but not certification exam.
- Prerequisites: R0318 Introduction to Information Security & R0319 Information Security Management OR R0385 Information Infrastructure and Security & A9185 Network Applications OR equivalent competence
VERY IMPORTANT: Any students participated old study unit titled, "Enterprise Applications Security (R0323)" with Certified Ethical Hacker professional training. Please don't enrol and participate in this study unit. This study unit is an updated version of the previous curriculum's course "Enterprise Applications Security (R0323)"
Employer connections
o Time to time, we are offering events, seminars and workshop participation.
o Also offering partner's announcements of internships, working life projects and thesis opportunities for Cybersecurity Module students.
For example,
>> In the past teachers offered annual event participation including Nokia HackAthon, Digia HackAthon or Visiting our partner Nixu Corporation's Cyber Defense Center.
>> Laurea also offers EU and Finnish Research, Development and Innovation project participation.
Exam schedules
All details on the course management system for accepted students only.
--Teachers are sending welcome e-mail message (Laurea student emails only) with induction details to accepted students.
--Inactive students are removed from the study unit after orientation period (the first week of the study unit).
--Please note that the study unit is divided in two main periods that have fixed starting and ending dates. You can proceed with faster pace within a period than module based deadlines express but you need to meet module based deadlines at the minimum
International connections
The teachers and students are international (Finnish and English degree programme students).
- Study is suitable for exchange students.
- We are also cooperating with working life companies and both teachers are involved in European and International innovation projects.
Completion alternatives
o This study unit is for regular ICT & Cybersecurity students who prefer online studies.
o There is no parallel alternative method to finish this study unit.
o Any students achieved "Certified Ethical Hacker" professional training can contact teachers for AHOT (Competence Evaluation & Assessment)
Note:
>> Finishing online learning (as per requirement) is a basic requirements to consider for evaluation and grading. If student not finishing online learning as per requirements, not qualifying for evaluation and grading.
Student workload
The student puts 5 ECTS study effort.
o 5 cr / 137,5 hours are attached to the workload of a full-time study of learning and the associated learning outcomes.
Content scheduling
The content of the study unit is mapped with Certified Ethical Hacker(CEH) professional certification. The content covers professional training and hands-on lab practices on virtual lab environment. Following are listed modules:
Period-1
-----------
Module-1: Information & Cyber Security and Ethical Hacking Overview
Module-2: Reconnaissance Techniques-1
Module-2: Reconnaissance Techniques-2
Module-4: System Hacking Phases and Attack Techniques-1
Module-5: System Hacking Phases and Attack Techniques-2
Period-1
-----------
Module-6: Network and Perimeter Hacking
Module-7: Web Application Hacking-1
Module-8: Web Application Hacking-2
Module-9: Wireless Network, Mobile Platform, IoT, and OT Hacking
Module-10: Cloud Computing Hacking and Cryptography
Evaluation scale
H-5
Qualifications
Prerequisites:
R0318 Introduction to Information Security & R0319 Information
Security Management OR R0385 Information Infrastructure and
Security & A9185 Network Applications OR equivalent
competence
Further information
The study unit is an advanced cybersecurity. It is suitable for graduate level students. Considering following points:
o Student must know: how company/organization works.
o Students knows the basics of ICT-technologies and Introduction to Information Security.
o Student is able to study independently with weekly-biweekly schedule.
VERY IMPORTANT: Any students participated old study unit titled, "Enterprise Applications Security (R0323)" with Certified Ethical Hacker professional training. Please don't enrol and participate in this study unit. This study unit is an updated version of the previous curriculum's course "Enterprise Applications Security (R0323)"
Important Notes:
--Any student who is willing to learn the overview of information security technologies, we recommend to participate following study unit: Introduction to Information Security.
--This study unit is prioritized for TIKO and BIT students
--Safety, Security and Risk Management students should take the study unit TO007BN Information and Cybersecurity Management after R0186 Information and Cybersecurity before participating this study unit.
--Inactive students are removed from the study unit after orientation period (the first week of the study unit)
--------------
Cybersecurity Professional Training and Body of Knowledge (BoK): This course is part of Laurea's advanced cybersecurity study offerings and professional training. The specific modules and topics covered in this course are mapped with professional skills development focus areas. Some topics may vary and overlap depending on the context. However, the overlapping of topics is a common feature of cybersecurity courses, and it is justified by the complexity and ever-evolving nature of the field. There is also a practical reason for the overlapping of topics in cybersecurity courses. Many cybersecurity courses are offered online, and it is not always possible to offer a course that covers a single topic in sufficient depth. By offering courses that cover multiple topics, universities can ensure that students have access to the knowledge and skills they need to succeed in the cybersecurity field.
Cybersecurity is a complex and ever-evolving field, so it is important for cybersecurity professionals to have a broad understanding of the field. This can be achieved by taking courses that cover a variety of topics, even if some of the topics overlap. However, it is important to note that the depth and context of the topics may vary depending on the course.