Please select the curriculum by the start year of studies and track.
English
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Materials in the e-learning environment.
Jarmo Nevala, Joonatan Ovaska
- visiting lecturers
- projects
The possible date and method of the exam will be announced in the course opening.
29.08.2022 - 16.12.2022
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
01.08.2022 - 04.09.2022
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
0 - 35
Master's Degree Programme in Information Technology, Cyber Security
Face-to-face
School of Technology
English
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Materials in the e-learning environment (will be announced at the beginning of the course).
Pasi Hyytiäinen, Jarmo Viinikanoja, Heli Ciszek, Joonatan Ovaska
- visiting lecturers
- projects
The possible date and method of the exam will be announced in the course opening.
09.01.2023 - 31.05.2023
One credit (1 Cr) corresponds to an average of 27 hours of work.
01.11.2022 - 05.01.2023
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
0 - 70
Note: Limitations of the COVID-19 situation
Master's Degree Programme in Information Technology, Cyber Security
Face-to-face
School of Technology
English
Individual learning tasks
Small group work online
Webinars
Online Discussions
Recorded online lectures, podcasts
Dodd, S-J. & Epstein, I. 2012. Practice-based research in social work: a guide for reluctant researchers. London; New York: Routledge.
OR
Bryman, A. 2012. Social research methods. Oxford: Oxford University Press cop.
OR
Burns, N. & Grove, S. K. 2001. The practice of nursing research. Conduct, Critique, and Utilization. 5th edition or the latest. Philadelphia : Elsevier/Saunders cop.
OR
Polit, D. F. & Beck, C.T. 2014. Essentials of nursing research: appraising evidence for nursing practice. Philadelphia : Wolters Kluwer Health/Lippincott Williams & Wilkins cop.
OR
Yin, R. K. 2018. Case study research and applications : design and methods. Los Angeles: Sage.
Ben Waller, Kaisa Lällä
29.08.2022 - 21.12.2022
webinars 16 h
- learning tasks 80 h
- studying the course material 40 h
Total 135 hours.
01.08.2022 - 04.09.2022
0 - 20
Master's Degree Programme in Sport and Exercise Physiotherapy, Master's Degree Programme in Artificial Intelligence and Data Analytics, Master's Degree Programme in Information Technology, Full Stack Software Development, Master's Degree Programme in Professional Project Management, Master's Degree Programme in International Business Management, Master's Degree Programme in Information Technology, Cyber Security
Face-to-face
School of Health and Social Studies
English
WEBINAR & WORKSHOP days are planned to happen on ZOOM platform
The teacher zoom classroom link will be given close to the start of the course via Peppi's e-mail
This course is ONLINE on ZOOM
Please note seminar & workshop days are:
Friday 07.10.2022 from 14.30 pm to 19.30
Saturday 08.10.2022 from 10.00 am to 15.00
and
Friday 11.11.2022 from 14.30 pm to 19.30
Saturday 12.11.2022 from 10.00 am to 15.00
The course is meant as an intensive seminar/workshop journey where the student experience:
1. Experiential learning
2. Individual & Collective Coaching
3. Network activation
4. Executive process and follow up
5. Awareness-based leadership & decision making
As guiding books:
- Daft, R. 2015-2018. The Leadership Experience, 6h or 7th Edition – CENGAGE Learning 2015-2018
- Northouse, P. 2016. Leadership: Theory and Practice. Sage Publications.
A topical non-fiction book on human leadership.
Other:
Teacher's publications & material
Marcella Zoccoli
01.09.2022 - 31.12.2022
The passing of the course requires active participation on seminar & workshop days
- Individual work 30%
- Project-base collective work or workshop training 70%
01.08.2022 - 02.09.2022
Leadership Dynamics
Overview & ''Polaroid'' on Leadership theories & styles
Leadership Total Awareness
Emotional intelligence & other human intelligences
Communication & Intra- and Interdependent relational skills
Leading in the present Change towards a transformative Future
0 - 30
Master's Degree Programme in Artificial Intelligence and Data Analytics, Master's Degree Programme in Information Technology, Full Stack Software Development, Master's Degree Programme in Professional Project Management, Master's Degree Programme in International Business Management, Master's Degree Programme in Information Technology, Cyber Security
Face-to-face
School of Technology
English
Lectures
Literature
Video material
Exercises and assignments
Guidance and feedback
Aki Laaksonen
The course does not include an exam.
01.09.2022 - 31.12.2022
Allocation of time on various tasks and student work load in total 135h
Lectures 14h
Independent familiarization with literature and videos 40h
Independent exercises and assignments 81h
01.08.2022 - 25.08.2022
Accreditation (replacement and inclusion)
Recognition of informal learning
Studification
Further instructions can be found in the Degree Regulations and in the Master's Degree study guide.
The assessment of the course is based on the following credits:
1) exercises and assignments (100%, 5 ECTS)
Master's Degree Programme in Artificial Intelligence and Data Analytics, Master's Degree Programme in Information Technology, Full Stack Software Development, Master's Degree Programme in Professional Project Management, Master's Degree Programme in International Business Management, Master's Degree Programme in Information Technology, Cyber Security
Online learning
5 cr
School of Business
English
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Materials in the e-learning environment.
Jarmo Nevala, Joonatan Ovaska
- visiting lecturers
- projects
Lutakko Campus
The possible date and method of the exam will be announced in the course opening.
29.08.2022 - 16.12.2022
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
01.08.2022 - 04.09.2022
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
0 - 35
Master's Degree Programme in Information Technology, Cyber Security
Face-to-face
School of Technology
English
Contact lessons:
9/21 , 10/21, 11/21 and 12/21
Location:
Piippukatu 2, Jyväskylä
Room:
D504 (Koivuluokka)
Contact lessons one time per month (Friday-Saturday)
Remote studies
* Home assignments
CSM exercise
* Seminar
Cyber Security Management: A Governance, Risk and Compliance Framework
* Peter Trim and Yang-Im Lee
* Gower Publishing Limited © 2014 (263 pages)
* ISBN:9781472432094
* By simplifying complex material, this book provides a multi-disciplinary perspective, and an explanation and interpretation of how managers can manage cyber threats in a proactive manner and work towards counteracting cyber threats both now and in the future.
Cyber Security : analytics, technology and automation
* Electronic publication
* Lehto, Martti, toimittaja. ; Neittaanmäki, Pekka, toimittaja.
* Springer 2015.
* Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers.
Practical Information Security Management: A Complete Guide to Planning and Implementation
* Books24x7
* https://janet.finna.fi/Record/nelli27_jamk.3710000000965191
Jari Hautamäki
Lutakko Campus
29.08.2022 - 16.12.2022
Workload per students 135 hour
01.08.2022 - 04.09.2022
0 - 35
Master's Degree Programme in Information Technology, Cyber Security
Face-to-face
School of Technology
English
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Materials in the e-learning environment.
Heli Ciszek
- excursions
- visiting lecturers
- projects
Lutakko Campus
The possible date and method of the exam will be announced in the course opening.
09.01.2023 - 28.04.2023
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
01.11.2022 - 05.01.2023
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
0 - 35
Master's Degree Programme in Information Technology, Cyber Security
Face-to-face
School of Technology
English
Online implementation.
Sessions in Tuula's Zoom.
THIS IS AN ONLINE IMPLEMENTATION with webinars approx. one per month.
Individual learning tasks: e.g. Elevator speech, essays, small reports, videos
Small group work online
Webinars
Online Discussions
Recorded lectures or lectures in webinars
Recommended publications in English:
Bryman, A. 2012. Social research methods. Oxford: Oxford University Press cop.
Ethical principles and ethical review in human sciences. 2020. Finnish National Board on Research Integrity. www.tenk.fi/en
Kananen, J. 2011. Rafting through the Thesis Process. Jyväskylä: Jyväskylä University of Applied Sciences.
Responsible conduct of research and procedures for handling allegations of misconduct in Finland. 2012. Finnish National Board on Research Integrity. www.tenk.fi/en
Tang, H. (2021). Engineering Research. Design, Methods, and Publication. John Wiley and Sons Inc.
Tuula Kotikoski
If possible, also webinars with R&D experts from the working life
Lutakko Campus
09.01.2023 - 28.04.2023
- six online lectures 12 h
- webinars with guest speakers (if available) 0-4h
- learning tasks 50 h
- studying the course material 73 h
Total 135 hours of student work.
01.11.2022 - 05.01.2023
Online Implementation:
Presenting on the online discussion platform is a sign of your participation in the course and it can be confirmed by completing the Ethics task.
The course is modular, which means it takes 2-3 weeks to complete the materials and learning tasks of each of the five modules.
The course has 2-3 webinars in modules 1 and 2 if guest speakers can be arranged.
You can complete the course by combining study and work, by studification. Agree on studification of the course with the lecturer in charge of the course. For more information on studification, see the degree regulations and study guide. If you have previous studies on the same topic (e.g., from your previous Master's degree studies at a university), accreditation is possible.
0 - 35
Avoin AMK 5 (not translated)
Master's Degree Programme in Information Technology, Cyber Security
Face-to-face
School of Technology
There is no implementations attached to this degree programme.
Student knowledge profile is dictated through his personal learning plan.
Cyber Security Master’s Degree programme student knows how about management, technical implementations, auditing, legislation and regulations of cyber security. The student will know how to plan, develop, implement and control different technological solutions in realistic company environments. The student will also learn how to test and audit these solutions. Student has the knowledge and skills to defend cyber security attacks in a realistic environment.
The student will have the ability for life-long learning professionally, make decisions and communicate effectively as part of a multinational team. The student knows how to conduct research ethically.
The professional growth of students is carried out with a tutoring process which starts at the very beginning of the studies and continues until graduation. In this process students complete their personal learning plans and discuss their needs for developing their target competences with their designated teacher tutors. The 60-ECTS programme is designed as obligatory core studies and optional studies. The discussions with the teacher tutor lead to selecting appropriate courses in students’ optional studies. The core studies icnludes 20 ECTS Cyber security module and 30 ECTS Master thesis. Cyber security module develop students' expertise in the Cyber security and the students can choose their topics for their 30-ECTS master thesis. The students are provided with personal supervision and guidance in master thesis seminars when writing their theses. The courses in the management module and the research and development module aim to develop students' shared master competences. In addition, students can take 5 ECTS of elective studies from management electives or other available master level courses and develop their complementary competence.
Students can take the studies part-time (in 3 years) based on their preference. Most of the courses are implemented by blending in-class activities with learning in virtual environments. Students can also choose their electives from master level courses of other degree programmes or from CampusOnline, Edufutura, Yritystehdas, and Future Factory. Prior learning can be recognized via other master level studies or through work experience based on discussions with course instructors.
Higher level studies completed elsewhere may be accredited as part of your degree. The student must have a certificate or some other document to prove that they have completed the studies. Skills acquired elsewhere can also be described and demonstrated to enable accreditation. Further information is available in the Study Guide.
The development assignments included in the study modules and courses are integrated with working life. The studies make use of the competencies and expertise of the study group members. The thesis focuses on working life research and development.
Past students of the degree programme work with following titles in public/private sector:
- Chief Security Officer
- Chief Information Security Officer
- Information Security Manager
- Security Professional
- Security Architect
- Solution Architect
- Information Security Specialist
- Cloud Security Architect
There are no specific degree-related or statutory qualification requirements in the field.
The graduate may apply to continue on to postgraduate studies in science or arts at universities (Act 558/2009, Section 37) and in the school of professional teacher education. Studies can be continued by applying for corresponding post-degree education at universities abroad, for example. A university of applied sciences also provides opportunities for continuing education in the form of specialisation studies, open studies, an online study portal (CampusOnline) and working life based continuing education.
The learning outcomes laid down in the curriculum of the degree programme have been derived from the analysis of the operating environment , JAMK's own strategy, and the school's core competence areas. The planning has been carried out in cooperation with representatives from regional working life. The development proposals and course feedback submitted by the students of the degree programme have been considered in the development of the curriculum. International expertise takes place by comparing the contents of the educational offerings of partner universities and with the expertise of the visiting lecturers. Representatives of the degree programme are closely involved in the activities of regional and international industirial networks.