Cyber SecurityLaajuus (4 cr)
Code: TTC1020
Credits
4 op
Teaching language
- Finnish
- English
Responsible person
- Karo Saharinen
Objective
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Qualifications
Use and Command of Linux
Basics in Programming
Data Networks
Assessment criteria, satisfactory (1)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Assessment criteria, good (3)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Assessment criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Enrollment
18.11.2024 - 09.01.2025
Timing
13.01.2025 - 30.04.2025
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
TTV23S2Tieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
18.11.2024 - 09.01.2025
Timing
13.01.2025 - 30.04.2025
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Esa Hintikka
Groups
-
TTV23S3Tieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
18.11.2024 - 09.01.2025
Timing
13.01.2025 - 30.04.2025
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Esa Hintikka
Groups
-
TTV23S5Tieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
18.11.2024 - 09.01.2025
Timing
13.01.2025 - 30.04.2025
Number of ECTS credits allocated
4 op
Virtual portion
4 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
TTV23SMTieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
18.11.2024 - 09.01.2025
Timing
13.01.2025 - 30.04.2025
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- English
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
TIC23S1Bachelor's Degree Programme in Information and Communications Technology
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
18.11.2024 - 09.01.2025
Timing
13.01.2025 - 30.04.2025
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
TTV23S1Tieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Timing
31.08.2024 - 31.12.2024
Number of ECTS credits allocated
4 op
Virtual portion
4 op
Mode of delivery
Online learning
Unit
School of Technology
Teaching languages
- Finnish
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Nevala
Groups
-
ZJA24KTIDIAvoin amk, ICT Digiosaaja, Verkko
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- exercises
- learning tasks
Practical training and working life connections
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
20.11.2023 - 04.01.2024
Timing
08.01.2024 - 30.04.2024
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
20 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Joonatan Ovaska
Groups
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
20.11.2023 - 04.01.2024
Timing
08.01.2024 - 30.04.2024
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
20 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
20.11.2023 - 04.01.2024
Timing
08.01.2024 - 30.04.2024
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
20 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
20.11.2023 - 04.01.2024
Timing
08.01.2024 - 30.04.2024
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
20 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
- Joonatan Ovaska
Groups
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
20.11.2023 - 04.01.2024
Timing
08.01.2024 - 30.04.2024
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
20 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Joonatan Ovaska
Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
20.11.2023 - 04.01.2024
Timing
08.01.2024 - 30.04.2024
Number of ECTS credits allocated
4 op
Virtual portion
4 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
20 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Joonatan Ovaska
Groups
-
TTV22SMTieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
20.11.2023 - 04.01.2024
Timing
08.01.2024 - 30.04.2024
Number of ECTS credits allocated
4 op
Virtual portion
4 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
20 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Joonatan Ovaska
Groups
-
TTV22SM2Tieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
20.11.2023 - 04.01.2024
Timing
08.01.2024 - 30.04.2024
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- English
Seats
20 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
TIC22S1Bachelor's Degree Programme in Information and Communications Technology
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Timing
15.09.2023 - 31.10.2023
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
ZJA23KTIDIAvoin amk, ICT Digiosaaja, Verkko
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
01.04.2024 - 30.04.2024
Timing
30.08.2023 - 31.07.2024
Number of ECTS credits allocated
4 op
Virtual portion
4 op
Mode of delivery
Online learning
Unit
School of Technology
Teaching languages
- Finnish
Seats
0 - 20
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Nevala
Groups
-
ZJA23STINOAvoin amk, ICT,Nonstop, Verkko
-
ZJA23STIDIAvoin amk, Digiosaaja, Verkko
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Time and location
Summer studies/IT-institute students
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
01.11.2022 - 05.01.2023
Timing
09.01.2023 - 28.04.2023
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- English
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
TIC21S1Bachelor's Degree Programme in Information and Communications Technology
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
01.11.2022 - 05.01.2023
Timing
09.01.2023 - 28.04.2023
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
TTV21S1Tieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Exam dates and retake possibilities
Mahdollinen tentin ajankohta ja toteutustapa ilmoitetaan opintojakson ensimmäisellä kerralla.
Student workload
Yksi opintopiste (1 op) tarkoittaa keskimäärin 27 tunnin työtä.
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
01.11.2022 - 05.01.2023
Timing
09.01.2023 - 28.04.2023
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
TTV21S2Tieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Exam dates and retake possibilities
Mahdollinen tentin ajankohta ja toteutustapa ilmoitetaan opintojakson ensimmäisellä kerralla.
Student workload
Yksi opintopiste (1 op) tarkoittaa keskimäärin 27 tunnin työtä.
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
01.11.2022 - 05.01.2023
Timing
09.01.2023 - 28.04.2023
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
TTV21S3Tieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Exam dates and retake possibilities
Mahdollinen tentin ajankohta ja toteutustapa ilmoitetaan opintojakson ensimmäisellä kerralla.
Student workload
Yksi opintopiste (1 op) tarkoittaa keskimäärin 27 tunnin työtä.
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
01.11.2022 - 05.01.2023
Timing
09.01.2023 - 28.04.2023
Number of ECTS credits allocated
4 op
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Nevala
- Joonatan Ovaska
Groups
-
TTV21S5Tieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
01.11.2022 - 05.01.2023
Timing
09.01.2023 - 28.04.2023
Number of ECTS credits allocated
4 op
Virtual portion
4 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Joonatan Ovaska
Groups
-
TTV21SMTieto- ja viestintätekniikka (AMK)
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Timing
01.12.2022 - 31.01.2023
Number of ECTS credits allocated
4 op
Virtual portion
4 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
ZJA22STIDIAvoin amk, Digiosaaja, Verkko
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Timing
30.08.2022 - 31.07.2023
Number of ECTS credits allocated
4 op
Virtual portion
4 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Nevala
Groups
-
TTK23KOHJOhjelmistoalan osaajaksi
-
ZJA22STINO1Avoin amk, Nonstop 1, Verkko
-
ZJA22STINO2Avoin amk, Nonstop 2, Verkko
-
ZJA23KTINO3Avoin amk, Nonstop 3, Verkko
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- independent study
- distance learning
- webinars
- exercises
- learning tasks
Practical training and working life connections
-
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 33 h
Total 135 h
Further information for students
AVOIN AMK 144
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Timing
04.04.2022 - 25.05.2022
Number of ECTS credits allocated
4 op
Virtual portion
4 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Nevala
Groups
-
ZJA22KTIDIAvoin AMK, tekniikka, ICT, Digiosaaja
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- exercises
- learning tasks
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Further information for students
Online course
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Timing
07.03.2022 - 31.07.2022
Number of ECTS credits allocated
4 op
Virtual portion
4 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Nevala
Groups
-
TTK22KOHJOhjelmistoalan osaaja
-
ZJA21STGTAvoin amk, Korkeakoulupolkuopinnot, Gradia, Tieto- ja viestintätekniikka
-
ZJA22KTIAvoin AMK, tekniikka, ICT
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- exercises
- learning tasks
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Further information for students
Online course
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
01.11.2021 - 09.01.2022
Timing
10.01.2022 - 29.04.2022
Number of ECTS credits allocated
4 op
Virtual portion
4 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jani Immonen
Groups
-
TTV20S1Tieto- ja viestintätekniikka
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- independent study
- distance learning
- webinars
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
01.11.2021 - 09.01.2022
Timing
10.01.2022 - 29.04.2022
Number of ECTS credits allocated
4 op
Virtual portion
4 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jani Immonen
Groups
-
TTV20S2Tieto- ja viestintätekniikka
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- independent study
- distance learning
- webinars
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
01.11.2021 - 09.01.2022
Timing
10.01.2022 - 29.04.2022
Number of ECTS credits allocated
4 op
Virtual portion
2 op
Mode of delivery
50 % Face-to-face, 50 % Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jani Immonen
Groups
-
TTV20S3Tieto- ja viestintätekniikka
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Further information for students
Note: Limitations of the COVID-19 situation
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
01.11.2021 - 09.01.2022
Timing
10.01.2022 - 29.04.2022
Number of ECTS credits allocated
4 op
Virtual portion
2 op
Mode of delivery
50 % Face-to-face, 50 % Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Joonatan Ovaska
Groups
-
TTV20S5Tieto- ja viestintätekniikka
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Further information for students
Note: Limitations of the COVID-19 situation
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks
Enrollment
01.11.2021 - 09.01.2022
Timing
10.01.2022 - 29.04.2022
Number of ECTS credits allocated
4 op
Virtual portion
2 op
Mode of delivery
50 % Face-to-face, 50 % Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Joonatan Ovaska
Groups
-
TTV20SMTieto- ja viestintätekniikka
Objectives
The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.
EUR-ACE competences:
Knowledge and Understanding
Engineering Practice
Content
Introduction to cyber security
- Current situation and phenomena
- Terminology
Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)
Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)
Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 42 h
- exercises 12 h
- assignment 28 h
- independent study 27 h
Total 109 h
Further information for students
Note: Limitations of the COVID-19 situation
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.
Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.
Evaluation criteria, good (3-4)
Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.
Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.
Evaluation criteria, excellent (5)
Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.
Prerequisites
Use and Command of Linux
Basics in Programming
Data Networks