Data Security ControlsLaajuus (5 cr)
Code: TTC6010
Credits
5 op
Teaching language
- Finnish
- English
Responsible person
- Jarmo Viinikanoja
Objective
You learn to know the main categories of security controls and to understand their significance in security perspective. You learn perspectives of securing based on security controls. You know how to implement security controls in order to protect company's critical ICT-systems.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
Once you have completed the course you can implement security controls and you understand their significance in the perspective of securing an company.
Content
The course includes an overview of security controls in the perspective of designing and implementing. The course utilizes existing security control frameworks.
Qualifications
Data Networks
Linux
Cyber Security
Assessment criteria, satisfactory (1)
Sufficient 1: The student shows sufficient command of the theory on designing and implementing security controls and can design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects his (her) own learning sufficiently.
Satisfactory 2: The student shows satisfactory command of the theory on designing and implementing security controls and can design various satisfactory data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning satisfactorily.
Assessment criteria, good (3)
Good 3: The student shows good command of the theory on designing and implementing security controls and can design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning well.
Very good 4: The student shows very good command of the theory on designing and implementing security controls and can very well design various data security controls as part of a broader targer environment based on given requirement definition. The student reflects on his (her) own learning very well.
Assessment criteria, excellent (5)
Excellent 5: The student shows excellent mastery of the theory on designing and implementing security controls and can excellently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning outstandingly.
Materials
Kuvataan toteutuksen yhteydessä.
Enrollment
18.11.2024 - 09.01.2025
Timing
13.01.2025 - 30.04.2025
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- English
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TIC22S1Bachelor's Degree Programme in Information and Communications Technology
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22SMTieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
-
TTV22SM2Tieto- ja viestintätekniikka (AMK)
Objectives
You learn to know the main categories of security controls and to understand their significance in security perspective. You learn perspectives of securing based on security controls. You know how to implement security controls in order to protect company's critical ICT-systems.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
Once you have completed the course you can implement security controls and you understand their significance in the perspective of securing an company.
Content
The course includes an overview of security controls in the perspective of designing and implementing. The course utilizes existing security control frameworks.
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows sufficient command of the theory on designing and implementing security controls and can design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects his (her) own learning sufficiently.
Satisfactory 2: The student shows satisfactory command of the theory on designing and implementing security controls and can design various satisfactory data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning satisfactorily.
Evaluation criteria, good (3-4)
Good 3: The student shows good command of the theory on designing and implementing security controls and can design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning well.
Very good 4: The student shows very good command of the theory on designing and implementing security controls and can very well design various data security controls as part of a broader targer environment based on given requirement definition. The student reflects on his (her) own learning very well.
Evaluation criteria, excellent (5)
Excellent 5: The student shows excellent mastery of the theory on designing and implementing security controls and can excellently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning outstandingly.
Prerequisites
Data Networks
Linux
Cyber Security
Enrollment
01.08.2024 - 22.08.2024
Timing
26.08.2024 - 18.12.2024
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Teaching languages
- Finnish
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Pasi Hyytiäinen
Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22SMTieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
-
TTV22SM2Tieto- ja viestintätekniikka (AMK)
-
ZJA24STIKY1Avoin amk, Kyberturvallisuus 1, Verkko
Objectives
You learn to know the main categories of security controls and to understand their significance in security perspective. You learn perspectives of securing based on security controls. You know how to implement security controls in order to protect company's critical ICT-systems.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
Once you have completed the course you can implement security controls and you understand their significance in the perspective of securing an company.
Content
The course includes an overview of security controls in the perspective of designing and implementing. The course utilizes existing security control frameworks.
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
Practical training and working life connections
- excursions
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 15 h
- Laboratory exercises/hands-on labs 120h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows sufficient command of the theory on designing and implementing security controls and can design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects his (her) own learning sufficiently.
Satisfactory 2: The student shows satisfactory command of the theory on designing and implementing security controls and can design various satisfactory data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning satisfactorily.
Evaluation criteria, good (3-4)
Good 3: The student shows good command of the theory on designing and implementing security controls and can design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning well.
Very good 4: The student shows very good command of the theory on designing and implementing security controls and can very well design various data security controls as part of a broader targer environment based on given requirement definition. The student reflects on his (her) own learning very well.
Evaluation criteria, excellent (5)
Excellent 5: The student shows excellent mastery of the theory on designing and implementing security controls and can excellently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning outstandingly.
Prerequisites
Data Networks
Linux
Cyber Security
Enrollment
20.11.2023 - 04.01.2024
Timing
08.01.2024 - 30.04.2024
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Teaching languages
- Finnish
Seats
0 - 30
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
TTV21S3Tieto- ja viestintätekniikka (AMK)
-
TTV21S5Tieto- ja viestintätekniikka (AMK)
-
TTV21SMTieto- ja viestintätekniikka (AMK)
-
ZJA24KTIKY1Avoin amk, Kyberturvallisuus 1, Verkko
-
TTV21S2Tieto- ja viestintätekniikka (AMK)
-
TTV21S1Tieto- ja viestintätekniikka (AMK)
Objectives
You learn to know the main categories of security controls and to understand their significance in security perspective. You learn perspectives of securing based on security controls. You know how to implement security controls in order to protect company's critical ICT-systems.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
Once you have completed the course you can implement security controls and you understand their significance in the perspective of securing an company.
Content
The course includes an overview of security controls in the perspective of designing and implementing. The course utilizes existing security control frameworks.
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
Practical training and working life connections
- excursions
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 10 h
- Laboratory exercises/hands-on labs 120h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows sufficient command of the theory on designing and implementing security controls and can design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects his (her) own learning sufficiently.
Satisfactory 2: The student shows satisfactory command of the theory on designing and implementing security controls and can design various satisfactory data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning satisfactorily.
Evaluation criteria, good (3-4)
Good 3: The student shows good command of the theory on designing and implementing security controls and can design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning well.
Very good 4: The student shows very good command of the theory on designing and implementing security controls and can very well design various data security controls as part of a broader targer environment based on given requirement definition. The student reflects on his (her) own learning very well.
Evaluation criteria, excellent (5)
Excellent 5: The student shows excellent mastery of the theory on designing and implementing security controls and can excellently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning outstandingly.
Prerequisites
Data Networks
Linux
Cyber Security
Enrollment
01.08.2023 - 24.08.2023
Timing
28.08.2023 - 19.12.2023
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Teaching languages
- Finnish
Seats
0 - 30
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
TTV21S3Tieto- ja viestintätekniikka (AMK)
-
TTV21S5Tieto- ja viestintätekniikka (AMK)
-
TTV21SMTieto- ja viestintätekniikka (AMK)
-
TTV21S2Tieto- ja viestintätekniikka (AMK)
-
ZJA23STIKY1Avoin amk, Kyberturvallisuus 1, Verkko
-
TTV21S1Tieto- ja viestintätekniikka (AMK)
Objectives
You learn to know the main categories of security controls and to understand their significance in security perspective. You learn perspectives of securing based on security controls. You know how to implement security controls in order to protect company's critical ICT-systems.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
Once you have completed the course you can implement security controls and you understand their significance in the perspective of securing an company.
Content
The course includes an overview of security controls in the perspective of designing and implementing. The course utilizes existing security control frameworks.
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
Practical training and working life connections
- excursions
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 10 h
- Laboratory exercises/hands-on labs 120h
Total 135 h
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows sufficient command of the theory on designing and implementing security controls and can design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects his (her) own learning sufficiently.
Satisfactory 2: The student shows satisfactory command of the theory on designing and implementing security controls and can design various satisfactory data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning satisfactorily.
Evaluation criteria, good (3-4)
Good 3: The student shows good command of the theory on designing and implementing security controls and can design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning well.
Very good 4: The student shows very good command of the theory on designing and implementing security controls and can very well design various data security controls as part of a broader targer environment based on given requirement definition. The student reflects on his (her) own learning very well.
Evaluation criteria, excellent (5)
Excellent 5: The student shows excellent mastery of the theory on designing and implementing security controls and can excellently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning outstandingly.
Prerequisites
Data Networks
Linux
Cyber Security
Enrollment
01.11.2022 - 05.01.2023
Timing
09.01.2023 - 28.04.2023
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 30
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
ZJA23KTIKY1Avoin amk, Kyberturvallisuus 1, Verkko
Objectives
You learn to know the main categories of security controls and to understand their significance in security perspective. You learn perspectives of securing based on security controls. You know how to implement security controls in order to protect company's critical ICT-systems.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
Once you have completed the course you can implement security controls and you understand their significance in the perspective of securing an company.
Content
The course includes an overview of security controls in the perspective of designing and implementing. The course utilizes existing security control frameworks.
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows sufficient command of the theory on designing and implementing security controls and can design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects his (her) own learning sufficiently.
Satisfactory 2: The student shows satisfactory command of the theory on designing and implementing security controls and can design various satisfactory data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning satisfactorily.
Evaluation criteria, good (3-4)
Good 3: The student shows good command of the theory on designing and implementing security controls and can design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning well.
Very good 4: The student shows very good command of the theory on designing and implementing security controls and can very well design various data security controls as part of a broader targer environment based on given requirement definition. The student reflects on his (her) own learning very well.
Evaluation criteria, excellent (5)
Excellent 5: The student shows excellent mastery of the theory on designing and implementing security controls and can excellently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning outstandingly.
Prerequisites
Data Networks
Linux
Cyber Security
Enrollment
01.08.2022 - 25.08.2022
Timing
07.09.2022 - 16.12.2022
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Seats
0 - 30
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Viinikanoja
Groups
-
ZJA22STIKY1Avoin amk, Kyberturvallisuus 1, Verkko
Objectives
You learn to know the main categories of security controls and to understand their significance in security perspective. You learn perspectives of securing based on security controls. You know how to implement security controls in order to protect company's critical ICT-systems.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
Once you have completed the course you can implement security controls and you understand their significance in the perspective of securing an company.
Content
The course includes an overview of security controls in the perspective of designing and implementing. The course utilizes existing security control frameworks.
Time and location
Tietoturvakontrollit aloitetaan ke 7.9 klo 9:00 (kurssi jatkossa 9:00-11:00 teoria, 12:00-15:00 labrat & apu) kokonaan virtuaalinen kurssi.
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows sufficient command of the theory on designing and implementing security controls and can design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects his (her) own learning sufficiently.
Satisfactory 2: The student shows satisfactory command of the theory on designing and implementing security controls and can design various satisfactory data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning satisfactorily.
Evaluation criteria, good (3-4)
Good 3: The student shows good command of the theory on designing and implementing security controls and can design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning well.
Very good 4: The student shows very good command of the theory on designing and implementing security controls and can very well design various data security controls as part of a broader targer environment based on given requirement definition. The student reflects on his (her) own learning very well.
Evaluation criteria, excellent (5)
Excellent 5: The student shows excellent mastery of the theory on designing and implementing security controls and can excellently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning outstandingly.
Prerequisites
Data Networks
Linux
Cyber Security
Timing
10.01.2022 - 22.05.2022
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- Finnish
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Heli Ciszek
Groups
-
ZJA22KTIKY1Avoin AMK, tekniikka, ICT, Kyberturvallisuus 1
Objectives
You learn to know the main categories of security controls and to understand their significance in security perspective. You learn perspectives of securing based on security controls. You know how to implement security controls in order to protect company's critical ICT-systems.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
Once you have completed the course you can implement security controls and you understand their significance in the perspective of securing an company.
Content
The course includes an overview of security controls in the perspective of designing and implementing. The course utilizes existing security control frameworks.
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student shows sufficient command of the theory on designing and implementing security controls and can design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects his (her) own learning sufficiently.
Satisfactory 2: The student shows satisfactory command of the theory on designing and implementing security controls and can design various satisfactory data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning satisfactorily.
Evaluation criteria, good (3-4)
Good 3: The student shows good command of the theory on designing and implementing security controls and can design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning well.
Very good 4: The student shows very good command of the theory on designing and implementing security controls and can very well design various data security controls as part of a broader targer environment based on given requirement definition. The student reflects on his (her) own learning very well.
Evaluation criteria, excellent (5)
Excellent 5: The student shows excellent mastery of the theory on designing and implementing security controls and can excellently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning outstandingly.
Prerequisites
Data Networks
Linux
Cyber Security