Skip to main content

Cyber Security for EngineersLaajuus (3 cr)

Code: TT00CQ80

Credits

3 op

Teaching language

  • Finnish
  • English

Responsible person

  • Jarmo Nevala

Objective

You will have a good understanding of the key aspects of cybersecurity and information security and how to apply them in practice. You will understand how these apply to personal, societal and organisational cyber and information security. You will be familiar with technical methods to protect systems, detect vulnerabilities and ensure data integrity, for example. You will be familiar with the security mechanisms used in the transmission of information in terms of reliability and availability, as well as the principles and effects of malware and vulnerabilities.

EUR-ACE Knowledge and understanding
You know the basic principles of cyber security and information security. You understand the importance of these in personal, social and organizational cyber security and how to protect yourself, detect flaws and ensure data integrity

EUR-ACE Engineering practice
You can analyze threats related to cyber security by applying practice and theory and identifying these

Content

Upon completion of this course, you will have mastered the key areas of cybersecurity and information security and be able to apply them in practice. You will understand how these principles apply to personal, societal and organisational cyber and information security. You will learn about technical methods to protect systems, detect vulnerabilities and ensure data integrity. You will be familiar with the security mechanisms used in data transmission, related to reliability and availability, and the principles and effects of malware and vulnerabilities. The course will equip you with the skills to analyse cybersecurity threats, applying both practice and theory, and identify potential risks.

Malware, threats and vulnerabilities
Cryptology and access management
Personal cyber and information security
Social cyber and information security
Organisational cyber and information security

Qualifications

Linux basics
Data networks

Assessment criteria, satisfactory (1)

Sufficient (1)
The student knows and understands the basic concepts of cyber security and related theory. The student knows how to use cyber security tools with assistance.

Satisfactory (2)
The student knows and understands the basic concepts of cyber security and the related theory. The student knows how to use cyber security tools in a controlled manner.

Assessment criteria, good (3)

Good (3)
The student knows and understands the basic concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools.

Very good (4)
The student knows and understands the concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools in an advanced manner.

Assessment criteria, excellent (5)

Excellent (5)
The student knows and understands the concepts of cyber security and the related theory excellently. The student knows how to use and select suitable cyber security tools in an advanced manner, and is able to use new tools independently.

Further information

Cybersecurity 5cr course is divided into smaller parts and the contents are exactly the same.

Basics of Cyber Security 1cr
Basics of Information Security 1cr
Cyber Security for Engineers 3cr