Skip to main content

Cyber SecurityLaajuus (4 cr)

Code: TTC1020

Credits

4 op

Teaching language

  • Finnish
  • English

Responsible person

  • Karo Saharinen

Objective

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Qualifications

Use and Command of Linux
Basics in Programming
Data Networks

Assessment criteria, satisfactory (1)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Assessment criteria, good (3)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Assessment criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • TTV23S2
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Esa Hintikka
Groups
  • TTV23S3
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Esa Hintikka
Groups
  • TTV23S5
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

4 op

Virtual portion

4 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • TTV23SM
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • English
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • TIC23S1
    Bachelor's Degree Programme in Information and Communications Technology

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • TTV23S1
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Timing

31.08.2024 - 31.12.2024

Number of ECTS credits allocated

4 op

Virtual portion

4 op

Mode of delivery

Online learning

Unit

School of Technology

Teaching languages
  • Finnish
Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
Groups
  • ZJA24KTIDI
    Avoin amk, ICT Digiosaaja, Verkko

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- exercises
- learning tasks

Practical training and working life connections

- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

20.11.2023 - 04.01.2024

Timing

08.01.2024 - 30.04.2024

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

20 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Joonatan Ovaska
Groups
  • TTV22S1
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

20.11.2023 - 04.01.2024

Timing

08.01.2024 - 30.04.2024

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

20 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • TTV22S2
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

20.11.2023 - 04.01.2024

Timing

08.01.2024 - 30.04.2024

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

20 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • TTV22S3
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

20.11.2023 - 04.01.2024

Timing

08.01.2024 - 30.04.2024

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

20 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
  • Joonatan Ovaska
Groups
  • TTV22S4
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

20.11.2023 - 04.01.2024

Timing

08.01.2024 - 30.04.2024

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

20 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Joonatan Ovaska
Groups
  • TTV22S5
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

20.11.2023 - 04.01.2024

Timing

08.01.2024 - 30.04.2024

Number of ECTS credits allocated

4 op

Virtual portion

4 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

20 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Joonatan Ovaska
Groups
  • TTV22SM
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

20.11.2023 - 04.01.2024

Timing

08.01.2024 - 30.04.2024

Number of ECTS credits allocated

4 op

Virtual portion

4 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

20 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Joonatan Ovaska
Groups
  • TTV22SM2
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

20.11.2023 - 04.01.2024

Timing

08.01.2024 - 30.04.2024

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • English
Seats

20 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • TIC22S1
    Bachelor's Degree Programme in Information and Communications Technology

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Timing

15.09.2023 - 31.10.2023

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • ZJA23KTIDI
    Avoin amk, ICT Digiosaaja, Verkko

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

01.04.2024 - 30.04.2024

Timing

30.08.2023 - 31.07.2024

Number of ECTS credits allocated

4 op

Virtual portion

4 op

Mode of delivery

Online learning

Unit

School of Technology

Teaching languages
  • Finnish
Seats

0 - 20

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
Groups
  • ZJA23STINO
    Avoin amk, ICT,Nonstop, Verkko
  • ZJA23STIDI
    Avoin amk, Digiosaaja, Verkko

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Time and location

Summer studies/IT-institute students

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

01.11.2022 - 05.01.2023

Timing

09.01.2023 - 28.04.2023

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • English
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • TIC21S1
    Bachelor's Degree Programme in Information and Communications Technology

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

01.11.2022 - 05.01.2023

Timing

09.01.2023 - 28.04.2023

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • TTV21S1
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Exam dates and retake possibilities

Mahdollinen tentin ajankohta ja toteutustapa ilmoitetaan opintojakson ensimmäisellä kerralla.

Student workload

Yksi opintopiste (1 op) tarkoittaa keskimäärin 27 tunnin työtä.

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

01.11.2022 - 05.01.2023

Timing

09.01.2023 - 28.04.2023

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • TTV21S2
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Exam dates and retake possibilities

Mahdollinen tentin ajankohta ja toteutustapa ilmoitetaan opintojakson ensimmäisellä kerralla.

Student workload

Yksi opintopiste (1 op) tarkoittaa keskimäärin 27 tunnin työtä.

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

01.11.2022 - 05.01.2023

Timing

09.01.2023 - 28.04.2023

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • TTV21S3
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Exam dates and retake possibilities

Mahdollinen tentin ajankohta ja toteutustapa ilmoitetaan opintojakson ensimmäisellä kerralla.

Student workload

Yksi opintopiste (1 op) tarkoittaa keskimäärin 27 tunnin työtä.

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

01.11.2022 - 05.01.2023

Timing

09.01.2023 - 28.04.2023

Number of ECTS credits allocated

4 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
  • Joonatan Ovaska
Groups
  • TTV21S5
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

01.11.2022 - 05.01.2023

Timing

09.01.2023 - 28.04.2023

Number of ECTS credits allocated

4 op

Virtual portion

4 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Joonatan Ovaska
Groups
  • TTV21SM
    Tieto- ja viestintätekniikka (AMK)

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Timing

01.12.2022 - 31.01.2023

Number of ECTS credits allocated

4 op

Virtual portion

4 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • ZJA22STIDI
    Avoin amk, Digiosaaja, Verkko

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Timing

30.08.2022 - 31.07.2023

Number of ECTS credits allocated

4 op

Virtual portion

4 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
Groups
  • TTK23KOHJ
    Ohjelmistoalan osaajaksi
  • ZJA22STINO1
    Avoin amk, Nonstop 1, Verkko
  • ZJA22STINO2
    Avoin amk, Nonstop 2, Verkko
  • ZJA23KTINO3
    Avoin amk, Nonstop 3, Verkko

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- independent study
- distance learning
- webinars
- exercises
- learning tasks

Practical training and working life connections

-

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 33 h
Total 135 h

Further information for students

AVOIN AMK 144

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Timing

04.04.2022 - 25.05.2022

Number of ECTS credits allocated

4 op

Virtual portion

4 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
Groups
  • ZJA22KTIDI
    Avoin AMK, tekniikka, ICT, Digiosaaja

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- exercises
- learning tasks

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Further information for students

Online course

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Timing

07.03.2022 - 31.07.2022

Number of ECTS credits allocated

4 op

Virtual portion

4 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
Groups
  • TTK22KOHJ
    Ohjelmistoalan osaaja
  • ZJA21STGT
    Avoin amk, Korkeakoulupolkuopinnot, Gradia, Tieto- ja viestintätekniikka
  • ZJA22KTI
    Avoin AMK, tekniikka, ICT

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- exercises
- learning tasks

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Further information for students

Online course

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

01.11.2021 - 09.01.2022

Timing

10.01.2022 - 29.04.2022

Number of ECTS credits allocated

4 op

Virtual portion

4 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jani Immonen
Groups
  • TTV20S1
    Tieto- ja viestintätekniikka

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- independent study
- distance learning
- webinars
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

01.11.2021 - 09.01.2022

Timing

10.01.2022 - 29.04.2022

Number of ECTS credits allocated

4 op

Virtual portion

4 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jani Immonen
Groups
  • TTV20S2
    Tieto- ja viestintätekniikka

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- independent study
- distance learning
- webinars
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

01.11.2021 - 09.01.2022

Timing

10.01.2022 - 29.04.2022

Number of ECTS credits allocated

4 op

Virtual portion

2 op

Mode of delivery

50 % Face-to-face, 50 % Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jani Immonen
Groups
  • TTV20S3
    Tieto- ja viestintätekniikka

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Further information for students

Note: Limitations of the COVID-19 situation

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

01.11.2021 - 09.01.2022

Timing

10.01.2022 - 29.04.2022

Number of ECTS credits allocated

4 op

Virtual portion

2 op

Mode of delivery

50 % Face-to-face, 50 % Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Joonatan Ovaska
Groups
  • TTV20S5
    Tieto- ja viestintätekniikka

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Further information for students

Note: Limitations of the COVID-19 situation

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks

Enrollment

01.11.2021 - 09.01.2022

Timing

10.01.2022 - 29.04.2022

Number of ECTS credits allocated

4 op

Virtual portion

2 op

Mode of delivery

50 % Face-to-face, 50 % Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Joonatan Ovaska
Groups
  • TTV20SM
    Tieto- ja viestintätekniikka

Objectives

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h

Further information for students

Note: Limitations of the COVID-19 situation

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Evaluation criteria, good (3-4)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Evaluation criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Prerequisites

Use and Command of Linux
Basics in Programming
Data Networks