Skip to main content

Cyber Security ManagementLaajuus (5 cr)

Code: TTC6020

Credits

5 op

Teaching language

  • Finnish
  • English

Responsible person

  • Jarmo Nevala

Objective

Course objectives
The student learns to plan and implement a cyber security management system.

You master the key parts of cyber security in practice: concepts, used technical execution and management methods as well as the general principles of service management. You are able to apply the knowledge to practical design and implementation of cyber security in services management.

EUR-ACE: Multidisciplinary competences 
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 
EUR-ACE: Communication and team-working 

Content

The key topics in the course are ISO2700x standard family and the other frameworks related to it as well as their most essential management processes such as configuration management, management of the protected targets, threat management and risk management.

Qualifications

Cyber Security

Assessment criteria, satisfactory (1)

Sufficient 1: The student is able to partly understand the significance and content of cyber security related to some service processes. The student is able to design some management processes for a data secure service when instructed in a group.

Satisfactory 2: The student is able to understand the main parts of the significance and content of cyber security in the context of some key service processes. The student is able to design some of the most essential cyber-secure service management processes in a group.

Assessment criteria, good (3)

Good 3: The student is able to understand the significance and content of cyber security in the most common service management context. The student is able to design in a group the management of a cyber secure service with its most essential parts including the most important processes.

Very good 4: The student is able to understand the significance and content of cyber security in the service management context. The student is able to design the management of a cyber secure service with all necessary parts. The student reflects on their learning.

Assessment criteria, excellent (5)

Excellent 5: The student is able to understand the significance and content of cyber security extensively in the context of service management. The student is able to with almost no guidance design a concept for cyber secure service management considering all its essential parts. The student reflects on their learning realistically.

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • English
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
  • Heikki Järvinen
Groups
  • TTV22S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S2
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S3
    Tieto- ja viestintätekniikka (AMK)
  • TIC22S1
    Bachelor's Degree Programme in Information and Communications Technology
  • TTV22S1
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S4
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM2
    Tieto- ja viestintätekniikka (AMK)

Objectives

Course objectives
The student learns to plan and implement a cyber security management system.

You master the key parts of cyber security in practice: concepts, used technical execution and management methods as well as the general principles of service management. You are able to apply the knowledge to practical design and implementation of cyber security in services management.

EUR-ACE: Multidisciplinary competences 
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 
EUR-ACE: Communication and team-working 

Content

The key topics in the course are ISO2700x standard family and the other frameworks related to it as well as their most essential management processes such as configuration management, management of the protected targets, threat management and risk management.

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 36 h
- independent study 32 h
Total 135 h

Further information for students

The course assessment methods will be presented during the first meeting.

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student is able to partly understand the significance and content of cyber security related to some service processes. The student is able to design some management processes for a data secure service when instructed in a group.

Satisfactory 2: The student is able to understand the main parts of the significance and content of cyber security in the context of some key service processes. The student is able to design some of the most essential cyber-secure service management processes in a group.

Evaluation criteria, good (3-4)

Good 3: The student is able to understand the significance and content of cyber security in the most common service management context. The student is able to design in a group the management of a cyber secure service with its most essential parts including the most important processes.

Very good 4: The student is able to understand the significance and content of cyber security in the service management context. The student is able to design the management of a cyber secure service with all necessary parts. The student reflects on their learning.

Evaluation criteria, excellent (5)

Excellent 5: The student is able to understand the significance and content of cyber security extensively in the context of service management. The student is able to with almost no guidance design a concept for cyber secure service management considering all its essential parts. The student reflects on their learning realistically.

Prerequisites

Cyber Security

Enrollment

01.08.2024 - 22.08.2024

Timing

26.08.2024 - 18.12.2024

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
  • Heikki Järvinen
Groups
  • TTV22S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S2
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S3
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S1
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S4
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM2
    Tieto- ja viestintätekniikka (AMK)
  • ZJA24STIKY1
    Avoin amk, Kyberturvallisuus 1, Verkko

Objectives

Course objectives
The student learns to plan and implement a cyber security management system.

You master the key parts of cyber security in practice: concepts, used technical execution and management methods as well as the general principles of service management. You are able to apply the knowledge to practical design and implementation of cyber security in services management.

EUR-ACE: Multidisciplinary competences 
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 
EUR-ACE: Communication and team-working 

Content

The key topics in the course are ISO2700x standard family and the other frameworks related to it as well as their most essential management processes such as configuration management, management of the protected targets, threat management and risk management.

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Further information for students

The evaluation methods of the course will be explained at the first contact

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student is able to partly understand the significance and content of cyber security related to some service processes. The student is able to design some management processes for a data secure service when instructed in a group.

Satisfactory 2: The student is able to understand the main parts of the significance and content of cyber security in the context of some key service processes. The student is able to design some of the most essential cyber-secure service management processes in a group.

Evaluation criteria, good (3-4)

Good 3: The student is able to understand the significance and content of cyber security in the most common service management context. The student is able to design in a group the management of a cyber secure service with its most essential parts including the most important processes.

Very good 4: The student is able to understand the significance and content of cyber security in the service management context. The student is able to design the management of a cyber secure service with all necessary parts. The student reflects on their learning.

Evaluation criteria, excellent (5)

Excellent 5: The student is able to understand the significance and content of cyber security extensively in the context of service management. The student is able to with almost no guidance design a concept for cyber secure service management considering all its essential parts. The student reflects on their learning realistically.

Prerequisites

Cyber Security

Enrollment

20.11.2023 - 04.01.2024

Timing

08.01.2024 - 30.04.2024

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Teaching languages
  • Finnish
Seats

0 - 30

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
Groups
  • TTV21S3
    Tieto- ja viestintätekniikka (AMK)
  • TTV21S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV21SM
    Tieto- ja viestintätekniikka (AMK)
  • ZJA24KTIKY1
    Avoin amk, Kyberturvallisuus 1, Verkko
  • TTV21S2
    Tieto- ja viestintätekniikka (AMK)
  • TTV21S1
    Tieto- ja viestintätekniikka (AMK)

Objectives

Course objectives
The student learns to plan and implement a cyber security management system.

You master the key parts of cyber security in practice: concepts, used technical execution and management methods as well as the general principles of service management. You are able to apply the knowledge to practical design and implementation of cyber security in services management.

EUR-ACE: Multidisciplinary competences 
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 
EUR-ACE: Communication and team-working 

Content

The key topics in the course are ISO2700x standard family and the other frameworks related to it as well as their most essential management processes such as configuration management, management of the protected targets, threat management and risk management.

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student is able to partly understand the significance and content of cyber security related to some service processes. The student is able to design some management processes for a data secure service when instructed in a group.

Satisfactory 2: The student is able to understand the main parts of the significance and content of cyber security in the context of some key service processes. The student is able to design some of the most essential cyber-secure service management processes in a group.

Evaluation criteria, good (3-4)

Good 3: The student is able to understand the significance and content of cyber security in the most common service management context. The student is able to design in a group the management of a cyber secure service with its most essential parts including the most important processes.

Very good 4: The student is able to understand the significance and content of cyber security in the service management context. The student is able to design the management of a cyber secure service with all necessary parts. The student reflects on their learning.

Evaluation criteria, excellent (5)

Excellent 5: The student is able to understand the significance and content of cyber security extensively in the context of service management. The student is able to with almost no guidance design a concept for cyber secure service management considering all its essential parts. The student reflects on their learning realistically.

Prerequisites

Cyber Security

Enrollment

01.08.2023 - 24.08.2023

Timing

28.08.2023 - 19.12.2023

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Teaching languages
  • Finnish
Seats

0 - 30

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
Groups
  • TTV21S3
    Tieto- ja viestintätekniikka (AMK)
  • TTV21S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV21SM
    Tieto- ja viestintätekniikka (AMK)
  • TTV21S2
    Tieto- ja viestintätekniikka (AMK)
  • ZJA23STIKY1
    Avoin amk, Kyberturvallisuus 1, Verkko
  • TTV21S1
    Tieto- ja viestintätekniikka (AMK)

Objectives

Course objectives
The student learns to plan and implement a cyber security management system.

You master the key parts of cyber security in practice: concepts, used technical execution and management methods as well as the general principles of service management. You are able to apply the knowledge to practical design and implementation of cyber security in services management.

EUR-ACE: Multidisciplinary competences 
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 
EUR-ACE: Communication and team-working 

Content

The key topics in the course are ISO2700x standard family and the other frameworks related to it as well as their most essential management processes such as configuration management, management of the protected targets, threat management and risk management.

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student is able to partly understand the significance and content of cyber security related to some service processes. The student is able to design some management processes for a data secure service when instructed in a group.

Satisfactory 2: The student is able to understand the main parts of the significance and content of cyber security in the context of some key service processes. The student is able to design some of the most essential cyber-secure service management processes in a group.

Evaluation criteria, good (3-4)

Good 3: The student is able to understand the significance and content of cyber security in the most common service management context. The student is able to design in a group the management of a cyber secure service with its most essential parts including the most important processes.

Very good 4: The student is able to understand the significance and content of cyber security in the service management context. The student is able to design the management of a cyber secure service with all necessary parts. The student reflects on their learning.

Evaluation criteria, excellent (5)

Excellent 5: The student is able to understand the significance and content of cyber security extensively in the context of service management. The student is able to with almost no guidance design a concept for cyber secure service management considering all its essential parts. The student reflects on their learning realistically.

Prerequisites

Cyber Security

Enrollment

01.11.2022 - 05.01.2023

Timing

09.01.2023 - 28.04.2023

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 30

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
Groups
  • ZJA23KTIKY1
    Avoin amk, Kyberturvallisuus 1, Verkko

Objectives

Course objectives
The student learns to plan and implement a cyber security management system.

You master the key parts of cyber security in practice: concepts, used technical execution and management methods as well as the general principles of service management. You are able to apply the knowledge to practical design and implementation of cyber security in services management.

EUR-ACE: Multidisciplinary competences 
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 
EUR-ACE: Communication and team-working 

Content

The key topics in the course are ISO2700x standard family and the other frameworks related to it as well as their most essential management processes such as configuration management, management of the protected targets, threat management and risk management.

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student is able to partly understand the significance and content of cyber security related to some service processes. The student is able to design some management processes for a data secure service when instructed in a group.

Satisfactory 2: The student is able to understand the main parts of the significance and content of cyber security in the context of some key service processes. The student is able to design some of the most essential cyber-secure service management processes in a group.

Evaluation criteria, good (3-4)

Good 3: The student is able to understand the significance and content of cyber security in the most common service management context. The student is able to design in a group the management of a cyber secure service with its most essential parts including the most important processes.

Very good 4: The student is able to understand the significance and content of cyber security in the service management context. The student is able to design the management of a cyber secure service with all necessary parts. The student reflects on their learning.

Evaluation criteria, excellent (5)

Excellent 5: The student is able to understand the significance and content of cyber security extensively in the context of service management. The student is able to with almost no guidance design a concept for cyber secure service management considering all its essential parts. The student reflects on their learning realistically.

Prerequisites

Cyber Security

Enrollment

01.08.2022 - 25.08.2022

Timing

29.08.2022 - 16.12.2022

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 30

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
Groups
  • ZJA22STIKY1
    Avoin amk, Kyberturvallisuus 1, Verkko

Objectives

Course objectives
The student learns to plan and implement a cyber security management system.

You master the key parts of cyber security in practice: concepts, used technical execution and management methods as well as the general principles of service management. You are able to apply the knowledge to practical design and implementation of cyber security in services management.

EUR-ACE: Multidisciplinary competences 
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 
EUR-ACE: Communication and team-working 

Content

The key topics in the course are ISO2700x standard family and the other frameworks related to it as well as their most essential management processes such as configuration management, management of the protected targets, threat management and risk management.

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student is able to partly understand the significance and content of cyber security related to some service processes. The student is able to design some management processes for a data secure service when instructed in a group.

Satisfactory 2: The student is able to understand the main parts of the significance and content of cyber security in the context of some key service processes. The student is able to design some of the most essential cyber-secure service management processes in a group.

Evaluation criteria, good (3-4)

Good 3: The student is able to understand the significance and content of cyber security in the most common service management context. The student is able to design in a group the management of a cyber secure service with its most essential parts including the most important processes.

Very good 4: The student is able to understand the significance and content of cyber security in the service management context. The student is able to design the management of a cyber secure service with all necessary parts. The student reflects on their learning.

Evaluation criteria, excellent (5)

Excellent 5: The student is able to understand the significance and content of cyber security extensively in the context of service management. The student is able to with almost no guidance design a concept for cyber secure service management considering all its essential parts. The student reflects on their learning realistically.

Prerequisites

Cyber Security

Timing

10.01.2022 - 22.05.2022

Number of ECTS credits allocated

5 op

Virtual portion

5 op

RDI portion

2 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jari Hautamäki
Groups
  • ZJA22KTIKY1
    Avoin AMK, tekniikka, ICT, Kyberturvallisuus 1

Objectives

Course objectives
The student learns to plan and implement a cyber security management system.

You master the key parts of cyber security in practice: concepts, used technical execution and management methods as well as the general principles of service management. You are able to apply the knowledge to practical design and implementation of cyber security in services management.

EUR-ACE: Multidisciplinary competences 
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 
EUR-ACE: Communication and team-working 

Content

The key topics in the course are ISO2700x standard family and the other frameworks related to it as well as their most essential management processes such as configuration management, management of the protected targets, threat management and risk management.

Time and location

Online luennot ja ohjaus keskiviikkoisin 10.1 alkaen klo 10-12
Luennot nauhoitetaan

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- online lectures
- independent study
- distance learning
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- Cyber security management system's project

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 26 h
- exercises 30 h
- assignment 35 h
- independent study 44 h

Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student is able to partly understand the significance and content of cyber security related to some service processes. The student is able to design some management processes for a data secure service when instructed in a group.

Satisfactory 2: The student is able to understand the main parts of the significance and content of cyber security in the context of some key service processes. The student is able to design some of the most essential cyber-secure service management processes in a group.

Evaluation criteria, good (3-4)

Good 3: The student is able to understand the significance and content of cyber security in the most common service management context. The student is able to design in a group the management of a cyber secure service with its most essential parts including the most important processes.

Very good 4: The student is able to understand the significance and content of cyber security in the service management context. The student is able to design the management of a cyber secure service with all necessary parts. The student reflects on their learning.

Evaluation criteria, excellent (5)

Excellent 5: The student is able to understand the significance and content of cyber security extensively in the context of service management. The student is able to with almost no guidance design a concept for cyber secure service management considering all its essential parts. The student reflects on their learning realistically.

Prerequisites

Cyber Security