Information Security TechnologiesLaajuus (5 cr)
Code: TT00CD87
Credits
5 op
Teaching language
- Finnish
- English
Responsible person
- Jarmo Nevala
- Jarmo Viinikanoja
Objective
The student knows different information security techniques and is able to apply them. The student knows and understands the uses of various information security technologies, as well as the opportunities they bring.
EUR-ACE Knowledge and understanding
You will know the basic methods of protection by applying theory and practice. You understand the importance of these in ensuring IT infrastructure and business continuity.
EUR-ACE Engineering practice
You can analyze methods related to information security technologies applying practice and theory and identifying them.
Content
In this course, you will learn to know and apply different security technologies and understand their uses and potential. You will master basic security techniques and understand their importance in ensuring IT infrastructure and business continuity. You will be able to analyse security technologies and apply them in practice. This course will equip you to ensure effective and proactive security.
The course includes the different areas of information security technologies and commonly used techniques and equipment as well as their roles in ensuring IT infrastructure and business continuity.
Communication management and monitoring
Identifying vulnerabilities
Securing data transmission
Qualifications
Data networks
Cyber security
Linux Basics
Assessment criteria, satisfactory (1)
Sufficient (1)
The student knows and understands the basic concepts of information security technologies and related theory. The student knows how to use the tools used in information security technology with assistance.
Satisfactory (2)
The student knows and understands the basic concepts of information security technologies and the related theory. The student knows how to use the tools used in information security technology in a controlled manner.
Assessment criteria, good (3)
Good (3)
The student knows and understands the basic concepts of information security technologies and the related theory in a versatile way. The student knows how to use the tools used in information security technology.
Very good (4)
The student knows and understands the concepts of information security technologies and the related theory in a versatile way. The student knows how to use the tools used in information security technology in an advanced manner.
Assessment criteria, excellent (5)
Excellent (5)
Excellent 5: The student knows and understands the concepts of information security technologies and the related theory excellently. The student knows how to use and select appropriate tools used in information security technology in an advanced manner and is able to use new tools independently.