No upcoming implementations. See the syllabus for more information.
Learning outcomes of the course
The student is able to apply various data security technologies and implements the practices based on company data security policy.
The course contains various parts and commonly used techniques and devices in data security technologies as well as their roles in securing continuity of IT infrastructure and business .
Prerequisites and co-requisites
Basic technologies used in data networks.
Assessment criteria - grade 1 and 2
The assessment is based on lab exercises and exams.
Excellent 5: The student is able to apply various technlogies to solving demanding data security problems effectively. The student is able to implement these solutions independently generating an extensive end result based on a comprehensive security policy using versatile tools.
Very good 4: The student is able to apply data security controls to solve various data security problems. The student is able to implement a data security policy based end result lwith common tools.
Good 3: The student is able to implement basic data security controls to solve general problems expanding a company’s data security policy with them.
Satisfactory 2: The student understands the most common problems related to data security and is able to combine technologies meant for fixing them with an existing company security policy.
Sufficient 1: The student identifies common data security problems and controls. The student understands their effect on implementation of a company’s security policy.
Fail 0: The student does not meet the minimum criteria set for the course