Skip to main content

Information Security TechnologiesLaajuus (5 cr)

Code: TT00CD87

Credits

5 op

Teaching language

  • Finnish
  • English

Responsible person

  • Jarmo Nevala
  • Jarmo Viinikanoja

Objective

The student knows different information security techniques and is able to apply them. The student knows and understands the uses of various information security technologies, as well as the opportunities they bring.

EUR-ACE Knowledge and understanding
You will know the basic methods of protection by applying theory and practice. You understand the importance of these in ensuring IT infrastructure and business continuity.

EUR-ACE Engineering practice
You can analyze methods related to information security technologies applying practice and theory and identifying them.

Content

The course includes the different areas of information security technologies and commonly used techniques and equipment as well as their roles in ensuring IT infrastructure and business continuity.

Communication management and monitoring
Identifying vulnerabilities
Securing data transmission

Qualifications

Data networks
Cyber security
Linux Basics

Assessment criteria, satisfactory (1)

Sufficient (1)
The student knows and understands the basic concepts of information security technologies and related theory. The student knows how to use the tools used in information security technology with assistance.

Satisfactory (2)
The student knows and understands the basic concepts of information security technologies and the related theory. The student knows how to use the tools used in information security technology in a controlled manner.

Assessment criteria, good (3)

Good (3)
The student knows and understands the basic concepts of information security technologies and the related theory in a versatile way. The student knows how to use the tools used in information security technology.

Very good (4)
The student knows and understands the concepts of information security technologies and the related theory in a versatile way. The student knows how to use the tools used in information security technology in an advanced manner.

Assessment criteria, excellent (5)

Excellent (5)
Excellent 5: The student knows and understands the concepts of information security technologies and the related theory excellently. The student knows how to use and select appropriate tools used in information security technology in an advanced manner and is able to use new tools independently.