Skip to main content

Cyber SecurityLaajuus (5 cr)

Code: TT00CD86

Credits

5 op

Teaching language

  • Finnish
  • English

Responsible person

  • Jarmo Viinikanoja
  • Jarmo Nevala

Objective

You will master the most central areas related to cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g. data protection, protection levels). You understand how these are applicable in personal, social and organizational cyber security. You will get to know technical methods that can be used to protect systems, detect flaws and ensure data integrity, for example. You know the security mechanisms used in data transfer in relation to reliability and availability, as well as the operating principles and effects of malware and vulnerabilities.

EUR-ACE Knowledge and understanding
You know the basic principles of cyber security and information security. You understand the importance of these in personal, social and organizational cyber security and how to protect yourself, detect flaws and ensure data integrity

EUR-ACE Engineering practice
You can analyze threats related to cyber security by applying practice and theory and identifying these

Content

In this course, you will learn the key concepts, standards and legislation of cybersecurity and how to apply them to personal, societal and organisational cybersecurity. You will learn technical methods to protect systems, detect vulnerabilities and ensure data integrity. You will learn about the security mechanisms used in data transmission, the principles and effects of malware and vulnerabilities. This course will equip you to analyse and manage cyber security threats effectively.

Introduction to Cyber Security
Social cyber security
Legislation, data protection
Personal cyber security
Risk management
Malware, threats and vulnerabilities
Organizational cyber security

Qualifications

Linux basics
Data networks

Assessment criteria, satisfactory (1)

Sufficient (1)
The student knows and understands the basic concepts of cyber security and related theory. The student knows how to use cyber security tools with assistance.

Satisfactory (2)
The student knows and understands the basic concepts of cyber security and the related theory. The student knows how to use cyber security tools in a controlled manner.

Assessment criteria, good (3)

Good (3)
The student knows and understands the basic concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools.

Very good (4)
The student knows and understands the concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools in an advanced manner.

Assessment criteria, excellent (5)

Excellent (5)
The student knows and understands the concepts of cyber security and the related theory excellently. The student knows how to use and select suitable cyber security tools in an advanced manner, and is able to use new tools independently.

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

5 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • English
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Erno Vienonen
Groups
  • TIC24S2
    Bachelor's Degree Programme in Information and Communications Technology

Objectives

You will master the most central areas related to cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g. data protection, protection levels). You understand how these are applicable in personal, social and organizational cyber security. You will get to know technical methods that can be used to protect systems, detect flaws and ensure data integrity, for example. You know the security mechanisms used in data transfer in relation to reliability and availability, as well as the operating principles and effects of malware and vulnerabilities.

EUR-ACE Knowledge and understanding
You know the basic principles of cyber security and information security. You understand the importance of these in personal, social and organizational cyber security and how to protect yourself, detect flaws and ensure data integrity

EUR-ACE Engineering practice
You can analyze threats related to cyber security by applying practice and theory and identifying these

Content

In this course, you will learn the key concepts, standards and legislation of cybersecurity and how to apply them to personal, societal and organisational cybersecurity. You will learn technical methods to protect systems, detect vulnerabilities and ensure data integrity. You will learn about the security mechanisms used in data transmission, the principles and effects of malware and vulnerabilities. This course will equip you to analyse and manage cyber security threats effectively.

Introduction to Cyber Security
Social cyber security
Legislation, data protection
Personal cyber security
Risk management
Malware, threats and vulnerabilities
Organizational cyber security

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 36 h
- independent study 32 h
Total 135 h

Further information for students

The course assessment methods will be presented during the first meeting.

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient (1)
The student knows and understands the basic concepts of cyber security and related theory. The student knows how to use cyber security tools with assistance.

Satisfactory (2)
The student knows and understands the basic concepts of cyber security and the related theory. The student knows how to use cyber security tools in a controlled manner.

Evaluation criteria, good (3-4)

Good (3)
The student knows and understands the basic concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools.

Very good (4)
The student knows and understands the concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools in an advanced manner.

Evaluation criteria, excellent (5)

Excellent (5)
The student knows and understands the concepts of cyber security and the related theory excellently. The student knows how to use and select suitable cyber security tools in an advanced manner, and is able to use new tools independently.

Prerequisites

Linux basics
Data networks

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Erno Vienonen
Groups
  • ZJATTV24SM
    Avoin amk, Tieto- ja viestintätekniikka, Monimuoto
  • TTV24SM
    Tieto- ja viestintätekniikka (AMK)

Objectives

You will master the most central areas related to cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g. data protection, protection levels). You understand how these are applicable in personal, social and organizational cyber security. You will get to know technical methods that can be used to protect systems, detect flaws and ensure data integrity, for example. You know the security mechanisms used in data transfer in relation to reliability and availability, as well as the operating principles and effects of malware and vulnerabilities.

EUR-ACE Knowledge and understanding
You know the basic principles of cyber security and information security. You understand the importance of these in personal, social and organizational cyber security and how to protect yourself, detect flaws and ensure data integrity

EUR-ACE Engineering practice
You can analyze threats related to cyber security by applying practice and theory and identifying these

Content

In this course, you will learn the key concepts, standards and legislation of cybersecurity and how to apply them to personal, societal and organisational cybersecurity. You will learn technical methods to protect systems, detect vulnerabilities and ensure data integrity. You will learn about the security mechanisms used in data transmission, the principles and effects of malware and vulnerabilities. This course will equip you to analyse and manage cyber security threats effectively.

Introduction to Cyber Security
Social cyber security
Legislation, data protection
Personal cyber security
Risk management
Malware, threats and vulnerabilities
Organizational cyber security

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 36 h
- independent study 32 h
Total 135 h

Further information for students

The course has an 80% attendance requirement and attendance is monitored. Absences are agreed upon with the teacher for justified reasons.
For example, cases of illness or the necessary expertise have been otherwise demonstrated.

Part of the implementation is considered online learning (about 2 credits)

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient (1)
The student knows and understands the basic concepts of cyber security and related theory. The student knows how to use cyber security tools with assistance.

Satisfactory (2)
The student knows and understands the basic concepts of cyber security and the related theory. The student knows how to use cyber security tools in a controlled manner.

Evaluation criteria, good (3-4)

Good (3)
The student knows and understands the basic concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools.

Very good (4)
The student knows and understands the concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools in an advanced manner.

Evaluation criteria, excellent (5)

Excellent (5)
The student knows and understands the concepts of cyber security and the related theory excellently. The student knows how to use and select suitable cyber security tools in an advanced manner, and is able to use new tools independently.

Prerequisites

Linux basics
Data networks

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

5 op

Virtual portion

2 op

Mode of delivery

60 % Face-to-face, 40 % Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Erno Vienonen
Groups
  • TTV24S1
    Tieto- ja viestintätekniikka (AMK)

Objectives

You will master the most central areas related to cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g. data protection, protection levels). You understand how these are applicable in personal, social and organizational cyber security. You will get to know technical methods that can be used to protect systems, detect flaws and ensure data integrity, for example. You know the security mechanisms used in data transfer in relation to reliability and availability, as well as the operating principles and effects of malware and vulnerabilities.

EUR-ACE Knowledge and understanding
You know the basic principles of cyber security and information security. You understand the importance of these in personal, social and organizational cyber security and how to protect yourself, detect flaws and ensure data integrity

EUR-ACE Engineering practice
You can analyze threats related to cyber security by applying practice and theory and identifying these

Content

In this course, you will learn the key concepts, standards and legislation of cybersecurity and how to apply them to personal, societal and organisational cybersecurity. You will learn technical methods to protect systems, detect vulnerabilities and ensure data integrity. You will learn about the security mechanisms used in data transmission, the principles and effects of malware and vulnerabilities. This course will equip you to analyse and manage cyber security threats effectively.

Introduction to Cyber Security
Social cyber security
Legislation, data protection
Personal cyber security
Risk management
Malware, threats and vulnerabilities
Organizational cyber security

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Further information for students

The course has an 80% attendance requirement and attendance is monitored. Absences are agreed upon with the teacher for justified reasons.
For example, cases of illness or the necessary expertise have been otherwise demonstrated.

Part of the implementation is considered online learning (about 2 credits)

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient (1)
The student knows and understands the basic concepts of cyber security and related theory. The student knows how to use cyber security tools with assistance.

Satisfactory (2)
The student knows and understands the basic concepts of cyber security and the related theory. The student knows how to use cyber security tools in a controlled manner.

Evaluation criteria, good (3-4)

Good (3)
The student knows and understands the basic concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools.

Very good (4)
The student knows and understands the concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools in an advanced manner.

Evaluation criteria, excellent (5)

Excellent (5)
The student knows and understands the concepts of cyber security and the related theory excellently. The student knows how to use and select suitable cyber security tools in an advanced manner, and is able to use new tools independently.

Prerequisites

Linux basics
Data networks

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

5 op

Mode of delivery

Face-to-face

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • English
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
  • Heikki Järvinen
Groups
  • TIC24S1
    Bachelor's Degree Programme in Information and Communications Technology
  • ZJATIC24S1
    Avoin amk,ICT, Information and Communication Technology, Päivä

Objectives

You will master the most central areas related to cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g. data protection, protection levels). You understand how these are applicable in personal, social and organizational cyber security. You will get to know technical methods that can be used to protect systems, detect flaws and ensure data integrity, for example. You know the security mechanisms used in data transfer in relation to reliability and availability, as well as the operating principles and effects of malware and vulnerabilities.

EUR-ACE Knowledge and understanding
You know the basic principles of cyber security and information security. You understand the importance of these in personal, social and organizational cyber security and how to protect yourself, detect flaws and ensure data integrity

EUR-ACE Engineering practice
You can analyze threats related to cyber security by applying practice and theory and identifying these

Content

In this course, you will learn the key concepts, standards and legislation of cybersecurity and how to apply them to personal, societal and organisational cybersecurity. You will learn technical methods to protect systems, detect vulnerabilities and ensure data integrity. You will learn about the security mechanisms used in data transmission, the principles and effects of malware and vulnerabilities. This course will equip you to analyse and manage cyber security threats effectively.

Introduction to Cyber Security
Social cyber security
Legislation, data protection
Personal cyber security
Risk management
Malware, threats and vulnerabilities
Organizational cyber security

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 36 h
- independent study 32 h
Total 135 h

Further information for students

The course assessment methods will be presented during the first meeting.

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient (1)
The student knows and understands the basic concepts of cyber security and related theory. The student knows how to use cyber security tools with assistance.

Satisfactory (2)
The student knows and understands the basic concepts of cyber security and the related theory. The student knows how to use cyber security tools in a controlled manner.

Evaluation criteria, good (3-4)

Good (3)
The student knows and understands the basic concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools.

Very good (4)
The student knows and understands the concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools in an advanced manner.

Evaluation criteria, excellent (5)

Excellent (5)
The student knows and understands the concepts of cyber security and the related theory excellently. The student knows how to use and select suitable cyber security tools in an advanced manner, and is able to use new tools independently.

Prerequisites

Linux basics
Data networks

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

5 op

Virtual portion

2 op

Mode of delivery

60 % Face-to-face, 40 % Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
Groups
  • ZJATTV24S2
    Avoin amk, Tieto- ja viestintätekniikka, Päivä
  • TTV24S2
    Tieto- ja viestintätekniikka (AMK)

Objectives

You will master the most central areas related to cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g. data protection, protection levels). You understand how these are applicable in personal, social and organizational cyber security. You will get to know technical methods that can be used to protect systems, detect flaws and ensure data integrity, for example. You know the security mechanisms used in data transfer in relation to reliability and availability, as well as the operating principles and effects of malware and vulnerabilities.

EUR-ACE Knowledge and understanding
You know the basic principles of cyber security and information security. You understand the importance of these in personal, social and organizational cyber security and how to protect yourself, detect flaws and ensure data integrity

EUR-ACE Engineering practice
You can analyze threats related to cyber security by applying practice and theory and identifying these

Content

In this course, you will learn the key concepts, standards and legislation of cybersecurity and how to apply them to personal, societal and organisational cybersecurity. You will learn technical methods to protect systems, detect vulnerabilities and ensure data integrity. You will learn about the security mechanisms used in data transmission, the principles and effects of malware and vulnerabilities. This course will equip you to analyse and manage cyber security threats effectively.

Introduction to Cyber Security
Social cyber security
Legislation, data protection
Personal cyber security
Risk management
Malware, threats and vulnerabilities
Organizational cyber security

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Further information for students

The course has an 80% attendance requirement and attendance is monitored. Absences are agreed upon with the teacher for justified reasons.
For example, cases of illness or the necessary expertise have been otherwise demonstrated.

Part of the implementation is considered online learning (about 2 credits)

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient (1)
The student knows and understands the basic concepts of cyber security and related theory. The student knows how to use cyber security tools with assistance.

Satisfactory (2)
The student knows and understands the basic concepts of cyber security and the related theory. The student knows how to use cyber security tools in a controlled manner.

Evaluation criteria, good (3-4)

Good (3)
The student knows and understands the basic concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools.

Very good (4)
The student knows and understands the concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools in an advanced manner.

Evaluation criteria, excellent (5)

Excellent (5)
The student knows and understands the concepts of cyber security and the related theory excellently. The student knows how to use and select suitable cyber security tools in an advanced manner, and is able to use new tools independently.

Prerequisites

Linux basics
Data networks

Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

5 op

Virtual portion

2 op

Mode of delivery

60 % Face-to-face, 40 % Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Information and Communications Technology
Teachers
  • Jarmo Nevala
Groups
  • TTV24S3
    Tieto- ja viestintätekniikka (AMK)
  • ZJATTV24S3
    Avoin amk, Tieto- ja viestintätekniikka, Päivä

Objectives

You will master the most central areas related to cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g. data protection, protection levels). You understand how these are applicable in personal, social and organizational cyber security. You will get to know technical methods that can be used to protect systems, detect flaws and ensure data integrity, for example. You know the security mechanisms used in data transfer in relation to reliability and availability, as well as the operating principles and effects of malware and vulnerabilities.

EUR-ACE Knowledge and understanding
You know the basic principles of cyber security and information security. You understand the importance of these in personal, social and organizational cyber security and how to protect yourself, detect flaws and ensure data integrity

EUR-ACE Engineering practice
You can analyze threats related to cyber security by applying practice and theory and identifying these

Content

In this course, you will learn the key concepts, standards and legislation of cybersecurity and how to apply them to personal, societal and organisational cybersecurity. You will learn technical methods to protect systems, detect vulnerabilities and ensure data integrity. You will learn about the security mechanisms used in data transmission, the principles and effects of malware and vulnerabilities. This course will equip you to analyse and manage cyber security threats effectively.

Introduction to Cyber Security
Social cyber security
Legislation, data protection
Personal cyber security
Risk management
Malware, threats and vulnerabilities
Organizational cyber security

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Further information for students

The course has an 80% attendance requirement and attendance is monitored. Absences are agreed upon with the teacher for justified reasons.
For example, cases of illness or the necessary expertise have been otherwise demonstrated.

Part of the implementation is considered online learning (about 2 credits)

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient (1)
The student knows and understands the basic concepts of cyber security and related theory. The student knows how to use cyber security tools with assistance.

Satisfactory (2)
The student knows and understands the basic concepts of cyber security and the related theory. The student knows how to use cyber security tools in a controlled manner.

Evaluation criteria, good (3-4)

Good (3)
The student knows and understands the basic concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools.

Very good (4)
The student knows and understands the concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools in an advanced manner.

Evaluation criteria, excellent (5)

Excellent (5)
The student knows and understands the concepts of cyber security and the related theory excellently. The student knows how to use and select suitable cyber security tools in an advanced manner, and is able to use new tools independently.

Prerequisites

Linux basics
Data networks

Timing

30.08.2024 - 31.07.2025

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Teaching languages
  • Finnish
Seats

0 - 35

Degree programmes
  • Bachelor's Degree Programme in Electrical and Automation Engineering
  • Bachelor's Degree Programme in Information and Communications Technology
  • Bachelor's Degree Programme in Automation and Robotics
Teachers
  • Jarmo Nevala
Groups
  • ZJA24STINO
    Avoin amk, ICT,Nonstop, Verkko
  • ZJA24STIDI
    Avoin amk, Digiosaaja, Verkko
  • ZJA25KTINO
    Avoin amk,ICT, Nonstop, Verkko

Objectives

You will master the most central areas related to cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g. data protection, protection levels). You understand how these are applicable in personal, social and organizational cyber security. You will get to know technical methods that can be used to protect systems, detect flaws and ensure data integrity, for example. You know the security mechanisms used in data transfer in relation to reliability and availability, as well as the operating principles and effects of malware and vulnerabilities.

EUR-ACE Knowledge and understanding
You know the basic principles of cyber security and information security. You understand the importance of these in personal, social and organizational cyber security and how to protect yourself, detect flaws and ensure data integrity

EUR-ACE Engineering practice
You can analyze threats related to cyber security by applying practice and theory and identifying these

Content

In this course, you will learn the key concepts, standards and legislation of cybersecurity and how to apply them to personal, societal and organisational cybersecurity. You will learn technical methods to protect systems, detect vulnerabilities and ensure data integrity. You will learn about the security mechanisms used in data transmission, the principles and effects of malware and vulnerabilities. This course will equip you to analyse and manage cyber security threats effectively.

Introduction to Cyber Security
Social cyber security
Legislation, data protection
Personal cyber security
Risk management
Malware, threats and vulnerabilities
Organizational cyber security

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Further information for students

The course has an 80% attendance requirement and attendance is monitored. Absences are agreed upon with the teacher for justified reasons.
For example, cases of illness or the necessary expertise have been otherwise demonstrated.

Part of the implementation is considered online learning (about 2 credits)

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient (1)
The student knows and understands the basic concepts of cyber security and related theory. The student knows how to use cyber security tools with assistance.

Satisfactory (2)
The student knows and understands the basic concepts of cyber security and the related theory. The student knows how to use cyber security tools in a controlled manner.

Evaluation criteria, good (3-4)

Good (3)
The student knows and understands the basic concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools.

Very good (4)
The student knows and understands the concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools in an advanced manner.

Evaluation criteria, excellent (5)

Excellent (5)
The student knows and understands the concepts of cyber security and the related theory excellently. The student knows how to use and select suitable cyber security tools in an advanced manner, and is able to use new tools independently.

Prerequisites

Linux basics
Data networks