Skip to main content

Data Security TechnologiesLaajuus (6 cr)

Code: TTKS0800

Credits

6 op

Teaching language

  • Finnish

Responsible person

  • Joni Gadd

Objective

The student is able to apply various data security technologies and implements the practices based on company data security policy.

Content

The course contains various parts and commonly used techniques and devices in data security technologies as well as their roles in securing continuity of IT infrastructure and business .

Qualifications

Basic technologies used in data networks.

Assessment criteria, satisfactory (1)

The assessment is based on lab exercises and exams.

Excellent 5: The student is able to apply various technlogies to solving demanding data security problems effectively. The student is able to implement these solutions independently generating an extensive end result based on a comprehensive security policy using versatile tools.

Very good 4: The student is able to apply data security controls to solve various data security problems. The student is able to implement a data security policy based end result lwith common tools.

Good 3: The student is able to implement basic data security controls to solve general problems expanding a company’s data security policy with them.

Satisfactory 2: The student understands the most common problems related to data security and is able to combine technologies meant for fixing them with an existing company security policy.

Sufficient 1: The student identifies common data security problems and controls. The student understands their effect on implementation of a company’s security policy.

Fail 0: The student does not meet the minimum criteria set for the course