Skip to main content

HardeningLaajuus (5 cr)

Code: TTC6050

Credits

5 op

Teaching language

  • Finnish
  • English

Responsible person

  • Jarmo Viinikanoja

Objective

The object of the course
You understand the significance of various data security controls in hardening of critical information technology environments in companies. You learn to implement various data security controls as part of a company’s information system.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

The learning objectives of the course
When you successfully complete this course, you can systematically harden an ICT environment and implement the hardening practice into the environment.

Content

The course contains design and implementation of hardening a target ICT environment. Additionally, the course discusses the dependencies and potentials of various data security controls as well as their operation.

Qualifications

Data Networks
Linux
Cyber Security

Assessment criteria, satisfactory (1)

Sufficient 1: The student shows a sufficient command of the theory on designing and implementing hardening and is able to design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects their own learning sufficiently.

Satisfactory 2: The student shows a satisfactory command of the theory on designing and implementing hardening and is able to design satisfactorily various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning satisfactorily.

Assessment criteria, good (3)

Good 3: The student shows a good command of the theory on designing and implementing hardening and is able design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning well.

Very good 4: The student shows a very good command of the theory on designing and implementing hardening and is able to very well design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning very well.

Assessment criteria, excellent (5)

Excellent 5: The student masters the theory on designing and implementing hardening excellently and is able to design various data security controls outstandingly as part of a broader target environment based on given requirement definition. The student reflects on their own learning outstandingly.

Assessment criteria, approved/failed

Sufficient 1: The student shows sufficient command of the theory on designing and implementing hardening and can sufficiently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning sufficiently.

Materials

Described in connection with implementation.

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • English
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • TTV22S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S2
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S3
    Tieto- ja viestintätekniikka (AMK)
  • TIC22S1
    Bachelor's Degree Programme in Information and Communications Technology
  • TTV22S1
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S4
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM2
    Tieto- ja viestintätekniikka (AMK)
  • ZJA25KTIKY2
    Avoin amk, Kyberturvallisuus 2, Verkko

Objectives

The object of the course
You understand the significance of various data security controls in hardening of critical information technology environments in companies. You learn to implement various data security controls as part of a company’s information system.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

The learning objectives of the course
When you successfully complete this course, you can systematically harden an ICT environment and implement the hardening practice into the environment.

Content

The course contains design and implementation of hardening a target ICT environment. Additionally, the course discusses the dependencies and potentials of various data security controls as well as their operation.

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows a sufficient command of the theory on designing and implementing hardening and is able to design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects their own learning sufficiently.

Satisfactory 2: The student shows a satisfactory command of the theory on designing and implementing hardening and is able to design satisfactorily various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning satisfactorily.

Evaluation criteria, good (3-4)

Good 3: The student shows a good command of the theory on designing and implementing hardening and is able design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning well.

Very good 4: The student shows a very good command of the theory on designing and implementing hardening and is able to very well design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning very well.

Evaluation criteria, excellent (5)

Excellent 5: The student masters the theory on designing and implementing hardening excellently and is able to design various data security controls outstandingly as part of a broader target environment based on given requirement definition. The student reflects on their own learning outstandingly.

Evaluation criteria, pass/failed

Sufficient 1: The student shows sufficient command of the theory on designing and implementing hardening and can sufficiently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning sufficiently.

Prerequisites

Data Networks
Linux
Cyber Security

Enrollment

01.08.2024 - 22.08.2024

Timing

26.08.2024 - 18.12.2024

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Pasi Hyytiäinen
Groups
  • TTV22S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S2
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S3
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S1
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S4
    Tieto- ja viestintätekniikka (AMK)
  • ZJA24STIKY2
    Avoin amk, Kyberturvallisuus 2, Verkko
  • TTV22SM2
    Tieto- ja viestintätekniikka (AMK)

Objectives

The object of the course
You understand the significance of various data security controls in hardening of critical information technology environments in companies. You learn to implement various data security controls as part of a company’s information system.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

The learning objectives of the course
When you successfully complete this course, you can systematically harden an ICT environment and implement the hardening practice into the environment.

Content

The course contains design and implementation of hardening a target ICT environment. Additionally, the course discusses the dependencies and potentials of various data security controls as well as their operation.

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises

Practical training and working life connections

- excursions
- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 15 h
- Laboratory exercises/hands-on labs 120h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows a sufficient command of the theory on designing and implementing hardening and is able to design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects their own learning sufficiently.

Satisfactory 2: The student shows a satisfactory command of the theory on designing and implementing hardening and is able to design satisfactorily various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning satisfactorily.

Evaluation criteria, good (3-4)

Good 3: The student shows a good command of the theory on designing and implementing hardening and is able design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning well.

Very good 4: The student shows a very good command of the theory on designing and implementing hardening and is able to very well design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning very well.

Evaluation criteria, excellent (5)

Excellent 5: The student masters the theory on designing and implementing hardening excellently and is able to design various data security controls outstandingly as part of a broader target environment based on given requirement definition. The student reflects on their own learning outstandingly.

Evaluation criteria, pass/failed

Sufficient 1: The student shows sufficient command of the theory on designing and implementing hardening and can sufficiently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning sufficiently.

Prerequisites

Data Networks
Linux
Cyber Security

Enrollment

20.11.2023 - 04.01.2024

Timing

08.01.2024 - 30.04.2024

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Teaching languages
  • Finnish
Seats

0 - 30

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • TTV21S3
    Tieto- ja viestintätekniikka (AMK)
  • TTV21S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV21SM
    Tieto- ja viestintätekniikka (AMK)
  • ZJA24KTIKY2
    Avoin amk, Kyberturvallisuus 2, Verkko
  • TTV21S2
    Tieto- ja viestintätekniikka (AMK)
  • TTV21S1
    Tieto- ja viestintätekniikka (AMK)

Objectives

The object of the course
You understand the significance of various data security controls in hardening of critical information technology environments in companies. You learn to implement various data security controls as part of a company’s information system.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

The learning objectives of the course
When you successfully complete this course, you can systematically harden an ICT environment and implement the hardening practice into the environment.

Content

The course contains design and implementation of hardening a target ICT environment. Additionally, the course discusses the dependencies and potentials of various data security controls as well as their operation.

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises

Practical training and working life connections

- excursions
- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 10 h
- Laboratory exercises/hands-on labs 120h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows a sufficient command of the theory on designing and implementing hardening and is able to design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects their own learning sufficiently.

Satisfactory 2: The student shows a satisfactory command of the theory on designing and implementing hardening and is able to design satisfactorily various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning satisfactorily.

Evaluation criteria, good (3-4)

Good 3: The student shows a good command of the theory on designing and implementing hardening and is able design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning well.

Very good 4: The student shows a very good command of the theory on designing and implementing hardening and is able to very well design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning very well.

Evaluation criteria, excellent (5)

Excellent 5: The student masters the theory on designing and implementing hardening excellently and is able to design various data security controls outstandingly as part of a broader target environment based on given requirement definition. The student reflects on their own learning outstandingly.

Evaluation criteria, pass/failed

Sufficient 1: The student shows sufficient command of the theory on designing and implementing hardening and can sufficiently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning sufficiently.

Prerequisites

Data Networks
Linux
Cyber Security

Enrollment

01.08.2023 - 24.08.2023

Timing

28.08.2023 - 19.12.2023

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Teaching languages
  • Finnish
Seats

0 - 30

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • TTV21S3
    Tieto- ja viestintätekniikka (AMK)
  • TTV21S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV21SM
    Tieto- ja viestintätekniikka (AMK)
  • TTV21S2
    Tieto- ja viestintätekniikka (AMK)
  • ZJA23STIKY2
    Avoin amk, Kyberturvallisuus 2, Verkko
  • TTV21S1
    Tieto- ja viestintätekniikka (AMK)

Objectives

The object of the course
You understand the significance of various data security controls in hardening of critical information technology environments in companies. You learn to implement various data security controls as part of a company’s information system.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

The learning objectives of the course
When you successfully complete this course, you can systematically harden an ICT environment and implement the hardening practice into the environment.

Content

The course contains design and implementation of hardening a target ICT environment. Additionally, the course discusses the dependencies and potentials of various data security controls as well as their operation.

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises

Practical training and working life connections

- excursions
- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 10 h
- Laboratory exercises/hands-on labs 120h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows a sufficient command of the theory on designing and implementing hardening and is able to design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects their own learning sufficiently.

Satisfactory 2: The student shows a satisfactory command of the theory on designing and implementing hardening and is able to design satisfactorily various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning satisfactorily.

Evaluation criteria, good (3-4)

Good 3: The student shows a good command of the theory on designing and implementing hardening and is able design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning well.

Very good 4: The student shows a very good command of the theory on designing and implementing hardening and is able to very well design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning very well.

Evaluation criteria, excellent (5)

Excellent 5: The student masters the theory on designing and implementing hardening excellently and is able to design various data security controls outstandingly as part of a broader target environment based on given requirement definition. The student reflects on their own learning outstandingly.

Evaluation criteria, pass/failed

Sufficient 1: The student shows sufficient command of the theory on designing and implementing hardening and can sufficiently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning sufficiently.

Prerequisites

Data Networks
Linux
Cyber Security

Enrollment

01.11.2022 - 05.01.2023

Timing

09.01.2023 - 28.04.2023

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 30

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • ZJA23KTIKY2
    Avoin amk, Kyberturvallisuus 2, Verkko

Objectives

The object of the course
You understand the significance of various data security controls in hardening of critical information technology environments in companies. You learn to implement various data security controls as part of a company’s information system.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

The learning objectives of the course
When you successfully complete this course, you can systematically harden an ICT environment and implement the hardening practice into the environment.

Content

The course contains design and implementation of hardening a target ICT environment. Additionally, the course discusses the dependencies and potentials of various data security controls as well as their operation.

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- independent study
- distance learning
- webinars
- exercises
- learning tasks

Practical training and working life connections

-

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 18 h
- assignment 35 h
- independent study 30 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows a sufficient command of the theory on designing and implementing hardening and is able to design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects their own learning sufficiently.

Satisfactory 2: The student shows a satisfactory command of the theory on designing and implementing hardening and is able to design satisfactorily various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning satisfactorily.

Evaluation criteria, good (3-4)

Good 3: The student shows a good command of the theory on designing and implementing hardening and is able design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning well.

Very good 4: The student shows a very good command of the theory on designing and implementing hardening and is able to very well design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning very well.

Evaluation criteria, excellent (5)

Excellent 5: The student masters the theory on designing and implementing hardening excellently and is able to design various data security controls outstandingly as part of a broader target environment based on given requirement definition. The student reflects on their own learning outstandingly.

Evaluation criteria, pass/failed

Sufficient 1: The student shows sufficient command of the theory on designing and implementing hardening and can sufficiently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning sufficiently.

Prerequisites

Data Networks
Linux
Cyber Security

Enrollment

01.08.2022 - 25.08.2022

Timing

08.09.2022 - 16.12.2022

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Teaching languages
  • Finnish
Seats

0 - 30

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Viinikanoja
Groups
  • ZJA22STIKY2
    Avoin amk, Kyberturvallisuus 2, Verkko

Objectives

The object of the course
You understand the significance of various data security controls in hardening of critical information technology environments in companies. You learn to implement various data security controls as part of a company’s information system.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

The learning objectives of the course
When you successfully complete this course, you can systematically harden an ICT environment and implement the hardening practice into the environment.

Content

The course contains design and implementation of hardening a target ICT environment. Additionally, the course discusses the dependencies and potentials of various data security controls as well as their operation.

Time and location

Aloitus torstaina 8.9. klo 9:00 (kurssi jatkossa 9:00-11:00 teoria, 12:00-15:00 labrat & apu) kokonaan virtuaalinen kurssi

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- independent study
- distance learning
- webinars
- exercises
- learning tasks

Practical training and working life connections

-

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 20h
- exercises 50 h
- assignment 35 h
- independent study 30 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows a sufficient command of the theory on designing and implementing hardening and is able to design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects their own learning sufficiently.

Satisfactory 2: The student shows a satisfactory command of the theory on designing and implementing hardening and is able to design satisfactorily various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning satisfactorily.

Evaluation criteria, good (3-4)

Good 3: The student shows a good command of the theory on designing and implementing hardening and is able design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning well.

Very good 4: The student shows a very good command of the theory on designing and implementing hardening and is able to very well design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning very well.

Evaluation criteria, excellent (5)

Excellent 5: The student masters the theory on designing and implementing hardening excellently and is able to design various data security controls outstandingly as part of a broader target environment based on given requirement definition. The student reflects on their own learning outstandingly.

Evaluation criteria, pass/failed

Sufficient 1: The student shows sufficient command of the theory on designing and implementing hardening and can sufficiently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning sufficiently.

Prerequisites

Data Networks
Linux
Cyber Security