Skip to main content

Security Management in Cyber DomainLaajuus (5 cr)

Course unit code: YTCP0100

General information


Credits
5 cr
Teaching language
English
Responsible person
Jari Hautamäki, IT-instituutti

Objective

The student understands terminology and principles of cyber security and he (she) knows most of important models used in cyber security management.

Course competences
EUR-ACE: Knowledge and Understanding, Master's Degree
EUR-ACE: Engineering Analysis, Master's Degree
EUR-ACE: Lifelong Learning, Master's Degree

Content

The key topics of the course are:
- Terminology in cyber domain (of Cyber security)
- Threat actors / vectors
- Cybersecurity strategy
- Security management
- Continuous Security Improvement
- Risk management
- Continuity management
- Security management models
- Information Security Management Processes and Phases
- Legislation

Qualifications

-

Assessment criteria, satisfactory (1)

Sufficient 1: The student demonstrates sufficient mastery of the theory on management of cyber security and is able to analyse existing state of enterprises cyber security. The student have sufficient understand of enterprises threats and risks that are formulated related to context. The student is able to design cyber security management system based on given requirement definition. The student reflects on his (her) own learning sufficiently.

Satisfactory 2: The student demonstrates satisfactory mastery of the theory on management of cyber security and is able to analyse existing state of enterprises cyber security. The student have satisfactory understand of enterprises threats and risks that are formulated related to context. The student is able to design a satisfactory cyber security management system based on given requirement definition. The student reflects on his (her) own learning satisfactorily.

Assessment criteria, good (3)

Good 3: The student demonstrates good mastery of the theory on management of cyber security and is able to analyze existing state of enterprises cyber security. The student has good understand of enterprises threats and risks that are formulated related to context. The student is able to design a good cyber security management system based on given requirement definition. The student reflects on his (her) own learning well.

Very good 4: The student demonstrates very good mastery of the theory on management of cyber security and is able to analyze existing state of enterprises cyber security. The student has very good understand of enterprises threats and risks that are formulated related to context. The student is able to design a very good cyber security management system based on given requirement definition. The student reflects on his (her) own learning very well.

Assessment criteria, excellent (5)

Excellent 5: The student demonstrates excellent mastery of the theory on management of cyber security and is able to analyse existing state of enterprises cyber security in a versatile manner. The student understands excellently enterprises threats and risks that are formulated related to context. The student is able to design an excellent cyber security management system based on given requirement definition. The student reflects on his (her) own learning commendably.

Go back to top of page