Skip to main content

Data Security ControlsLaajuus (5 cr)

Code: TT00CE11

Credits

5 op

Teaching language

  • Finnish
  • English

Responsible person

  • Jarmo Viinikanoja

Objective

The student learns to know the main categories of information security controls and to understand their importance from the security point of view. The student learns aspects of protection based on information security controls. The student implements various information security controls to protect the company's critical IT systems.

EUR-ACE Knowledge and understanding
You know the basic methods of information security controls by applying theory and practice. You understand their importance when you implement defenses for the company.

EUR-ACE Engineering practice
You can analyze methods related to information security controls applying practice and theory.

Content

After completing this course you know how to implement information security controls and understand their importance from the point of view of protecting the company.

Information security controls related to advanced firewalls
Event monitoring and logging systems
Web application layer firewalls
Utilization of threat information

Qualifications

Cyber security
Information security technology
Data networks
Linux Basics
Windows Administration

Assessment criteria, satisfactory (1)

Sufficient (1)
The student knows and understands the basic concepts of information security controls and the related theory. The student knows how to use information security control tools with assistance.

Satisfactory (2)
The student knows and understands the basic concepts of information security controls and the related theory. The student knows how to use information security control tools with guidance.

Assessment criteria, good (3)

Good (3)
The student knows and understands the basic concepts of information security controls and the related theory in a versatile way. The student knows how to use information security control tools.

Commendable (4)
The student knows and understands the concepts of information security controls and the related theory in a versatile way. The student knows how to use information security control tools in an advanced manner.

Assessment criteria, excellent (5)

Excellent (5)
The student knows and understands the concepts of information security controls and the related theory excellently. The student knows how to use and select suitable information security control tools in an advanced manner and is able to use new tools independently.