Data Security Technologies (6 cr)
Code: TTKS0800-3001
General information
- Enrollment
-
02.11.2020 - 30.11.2020
Registration for the implementation has ended.
- Timing
-
11.01.2021 - 30.04.2021
Implementation has ended.
- Number of ECTS credits allocated
- 6 cr
- Local portion
- 0 cr
- Virtual portion
- 6 cr
- Mode of delivery
- Online learning
- Unit
- School of Technology
- Campus
- Lutakko Campus
- Teaching languages
- Finnish
- Seats
- 0 - 32
- Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Evaluation scale
0-5
Objective
The student is able to apply various data security technologies and implements the practices based on company data security policy.
Content
The course contains various parts and commonly used techniques and devices in data security technologies as well as their roles in securing continuity of IT infrastructure and business .
Location and time
Vapaavalintainen/IT-Dynamo laboratorioluokat
Materials
Material distributed during the course
Technology providers' official documentation
Teaching methods
Virtuaaliopetus
Laboratoriotyöt yksittäin ja pienryhmissä
Itsenäiset harjoitteet
Student workload
Opiskelija oppii tuntemaan tietoturvateknologioihin liittyvät osa-alueet, komponentit ja tekniikat sekä teoriassa että käytännössä. Lisäksi opiskelija hallitsee tietoturvan suunnitteluun liittyvät vaatimukset ja parhaat käytänteet.
Assessment criteria, satisfactory (1)
The assessment is based on lab exercises and exams.
Excellent 5: The student is able to apply various technlogies to solving demanding data security problems effectively. The student is able to implement these solutions independently generating an extensive end result based on a comprehensive security policy using versatile tools.
Very good 4: The student is able to apply data security controls to solve various data security problems. The student is able to implement a data security policy based end result lwith common tools.
Good 3: The student is able to implement basic data security controls to solve general problems expanding a company’s data security policy with them.
Satisfactory 2: The student understands the most common problems related to data security and is able to combine technologies meant for fixing them with an existing company security policy.
Sufficient 1: The student identifies common data security problems and controls. The student understands their effect on implementation of a company’s security policy.
Fail 0: The student does not meet the minimum criteria set for the course
Qualifications
Basic technologies used in data networks.
Further information
Opintojakson arviointi tapahtuu palautettujen viikkotehtävien ja tentin perusteella.