• Data Security Controls (TTC6010-3001),
         10.01.2022 – 22.05.2022,  5 cr  (ZJA22KTIKY1) — Online learning +-
    Learning outcomes of the course
    You learn to know the main categories of security controls and to understand their significance in security perspective. You learn perspectives of securing based on security controls. You know how to implement security controls in order to protect company's critical ICT-systems.

    Course competences
    EA-KN: EUR-ACE KNOWLEDGE AND UNDERSTANDING
    EA-ER: EUR-ACE ENGINEERING PRACTICE

    The learning objectives of the course
    Once you have completed the course you can implement security controls and you understand their significance in the perspective of securing an company.
    Prerequisites and co-requisites
    Data Networks
    Linux
    Cyber Security
    Course contents
    The course includes an overview of security controls in the perspective of designing and implementing. The course utilizes existing security control frameworks.
    Assessment criteria
    Assessment criteria - grade 1 and 2
    Sufficient 1: The student shows sufficient command of the theory on designing and implementing security controls and can design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects his (her) own learning sufficiently.

    Satisfactory 2: The student shows satisfactory command of the theory on designing and implementing security controls and can design various satisfactory data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning satisfactorily.
    Assessment criteria - grade 3 and 4
    Good 3: The student shows good command of the theory on designing and implementing security controls and can design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning well.

    Very good 4: The student shows very good command of the theory on designing and implementing security controls and can very well design various data security controls as part of a broader targer environment based on given requirement definition. The student reflects on his (her) own learning very well.
    Assessment criteria - grade 5
    Excellent 5: The student shows excellent mastery of the theory on designing and implementing security controls and can excellently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning outstandingly.

    Language of instruction

    Finnish

    Lecturer(s)

    Heli Ciszek

    Campus

    Lutakko Campus

    Timing

    10.01.2022 - 22.05.2022

    Groups
    • ZJA22KTIKY1
    Degree Programme

    Bachelor's Degree Programme in Information and Communications Technology, Bachelor's Degree Programme in Information and Communications Technology

    Mode of delivery

    Online learning

    Share of virtual studies

    5 cr

    Credits
    • 5 cr
    Unit

    School of Technology