Skip to main content

Data Security Technologies (6 cr)

Code: TTKS0800-3001

General information


Enrollment
02.11.2020 - 30.11.2020
Registration for the implementation has ended.
Timing
11.01.2021 - 30.04.2021
Implementation has ended.
Number of ECTS credits allocated
6 cr
Local portion
0 cr
Virtual portion
6 cr
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
Finnish
Seats
0 - 32
Degree programmes
Bachelor's Degree Programme in Information and Communications Technology
Teachers
Joni Gadd
Groups
TTV19S1
Tieto- ja viestintätekniikka
Course
TTKS0800
No reservations found for realization TTKS0800-3001!

Evaluation scale

0-5

Objective

The student is able to apply various data security technologies and implements the practices based on company data security policy.

Content

The course contains various parts and commonly used techniques and devices in data security technologies as well as their roles in securing continuity of IT infrastructure and business .

Location and time

Vapaavalintainen/IT-Dynamo laboratorioluokat

Materials

Material distributed during the course
Technology providers' official documentation

Teaching methods

Virtuaaliopetus
Laboratoriotyöt yksittäin ja pienryhmissä
Itsenäiset harjoitteet

Student workload

Opiskelija oppii tuntemaan tietoturvateknologioihin liittyvät osa-alueet, komponentit ja tekniikat sekä teoriassa että käytännössä. Lisäksi opiskelija hallitsee tietoturvan suunnitteluun liittyvät vaatimukset ja parhaat käytänteet.

Assessment criteria, satisfactory (1)

The assessment is based on lab exercises and exams.

Excellent 5: The student is able to apply various technlogies to solving demanding data security problems effectively. The student is able to implement these solutions independently generating an extensive end result based on a comprehensive security policy using versatile tools.

Very good 4: The student is able to apply data security controls to solve various data security problems. The student is able to implement a data security policy based end result lwith common tools.

Good 3: The student is able to implement basic data security controls to solve general problems expanding a company’s data security policy with them.

Satisfactory 2: The student understands the most common problems related to data security and is able to combine technologies meant for fixing them with an existing company security policy.

Sufficient 1: The student identifies common data security problems and controls. The student understands their effect on implementation of a company’s security policy.

Fail 0: The student does not meet the minimum criteria set for the course

Qualifications

Basic technologies used in data networks.

Further information

Opintojakson arviointi tapahtuu palautettujen viikkotehtävien ja tentin perusteella.

Go back to top of page