Basics of Information Security (3 cr)
Code: HT00CF26-3001
General information
- Enrollment
-
18.11.2024 - 09.01.2025
Registration for the implementation has ended.
- Timing
-
13.01.2025 - 19.05.2025
Implementation is running.
- Number of ECTS credits allocated
- 3 cr
- Local portion
- 3 cr
- Mode of delivery
- Face-to-face
- Unit
- School of Business
- Campus
- Main Campus
- Teaching languages
- Finnish
- Seats
- 20 - 45
- Degree programmes
- Bachelor's Degree Programme in Business Information Technology
- Teachers
- Heikki Sateila
- Groups
-
HTK24S1Tietojenkäsittely (AMK)
-
ZJAHTK24S1Avoin AMK, Tiko, AMK-väylät, tietojenkäsittely, tradenomi amk
- Course
- HT00CF26
Realization has 12 reservations. Total duration of reservations is 24 h 0 min.
Time | Topic | Location |
---|---|---|
Mon 13.01.2025 time 13:00 - 15:00 (2 h 0 min) |
Tietoturvan perusteet HT00CF26-3001 |
R35G301
Oppimistila
|
Wed 15.01.2025 time 13:00 - 15:00 (2 h 0 min) |
Tietoturvan perusteet HT00CF26-3001 |
R35G301
Oppimistila
|
Mon 20.01.2025 time 13:00 - 15:00 (2 h 0 min) |
Tietoturvan perusteet HT00CF26-3001 |
R35FP05
Valjakka Auditorio
|
Mon 27.01.2025 time 13:00 - 15:00 (2 h 0 min) |
Tietoturvan perusteet HT00CF26-3001 |
R35G301
Oppimistila
|
Wed 29.01.2025 time 13:00 - 15:00 (2 h 0 min) |
Tietoturvan perusteet HT00CF26-3001 |
R35G301
Oppimistila
|
Mon 03.02.2025 time 13:00 - 15:00 (2 h 0 min) |
Tietoturvan perusteet HT00CF26-3001 |
R35G301
Oppimistila
|
Wed 05.02.2025 time 13:00 - 15:00 (2 h 0 min) |
Tietoturvan perusteet HT00CF26-3001 |
R35G301
Oppimistila
|
Mon 10.02.2025 time 13:00 - 15:00 (2 h 0 min) |
Tietoturvan perusteet HT00CF26-3001 |
R35G301
Oppimistila
|
Wed 12.02.2025 time 13:00 - 15:00 (2 h 0 min) |
Tietoturvan perusteet HT00CF26-3001 |
R35G301
Oppimistila
|
Mon 17.02.2025 time 13:00 - 15:00 (2 h 0 min) |
Tietoturvan perusteet HT00CF26-3001 |
R35G301
Oppimistila
|
Wed 19.02.2025 time 13:00 - 15:00 (2 h 0 min) |
Tietoturvan perusteet HT00CF26-3001 |
R35G301
Oppimistila
|
Wed 19.03.2025 time 09:45 - 11:45 (2 h 0 min) |
Tietoturvan perusteet HT00CF26-3001 - Uusintatentti |
R35F205
Oppimistila (aik)
|
Evaluation scale
Pass/Fail
Content scheduling
- Course contac period will last about 7 weeks after which the exam will be arranged. Assignments need to be done within one month after contact period has ended.
Objective
Purpose of the course
Information security and data privacy are part of everyday life in the workplace. Taking care of information security and data privacy is everyone's responsibility, not just those working in the ICT sector. The purpose of this course is to familiarize students with the basics of information security and data privacy in all areas of information security: How to ensure personal information security, what administrative and physical security are, and how they are supported by technical security solutions. You will also become familiar with information security practices in the ICT field and different technical security solutions in the context of web application development. You will learn to consider security in all phases of your work.
Course competences
- Learning to Learn: Is able to acquire, critically assess and appropriately apply the national and international knowledge base and practices of their field.
- Internationality and Multiculturalism: Is able to monitor and utilise the international development of their field in their work.
- ICT Specialization Competence: Is able to apply their knowledge and skills in a specific area of ICT, as well as analyze, evaluate, and develop operations in this area.
- Information System Competence: Is familiar with typical information systems and services and understands the importance of security in utilizing services.
Learning objectives of the course
You will be familiar with the basic concepts of information security and understand the importance of information security in everyday operations. You will be able to assess security risks and consider security in web application development. You have an understanding of various administrative, physical, and technical ways to ensure the availability, confidentiality, and integrity of information.
Content
In this course, you will become familiar with the three main areas of information security: availability, confidentiality, and integrity of information. You will learn the terms information security and data privacy and learn to assess security risks. You will explore the concepts of administrative and physical security and different ways to ensure the availability, confidentiality, and integrity of information from a technical perspective.
Regarding technical security, you will have a superficial understanding of different encryption methods, the use of certificates, the functioning principles of firewalls, and the design of network infrastructure from a security perspective. In addition, you will become familiar with the basic principles of secure application development and methods for monitoring the security situation. You will learn to follow national and international information security sources and react to them.
Location and time
- Lectures on Jamk main campus.
Materials
- Lecture materials and assignments prepared by the teacher.
Teaching methods
- Lessons (in-class)
- Exercises in class
- Assignments you return
Exam schedules
- The course has a final exam, and up to two more resits will be arranged if needed.
Completion alternatives
- You can apply for recognition of previous experience and knowledge through the eRPL process.
Student workload
- 1 credit corresponds to an average of 27 hours of work, which means that the load of 3 credits is on average 81 hours.
The 81 hours will divide roughly in the following:
- Lectures & exercise labs (contact lessons): 20 h
- Self-study: 61 h
Assessment criteria, approved/failed
You will be familiar with the basic concepts of information security and understand the importance of information security in everyday operations. You will be able to assess security risks and consider security in web application development. You have an understanding of various administrative, physical, and technical ways to ensure the availability, confidentiality, and integrity of information. You are able to follow and analyze national and international information security news and sources and evaluate needed tasks to adhere them.
Further information
- This course is graded on as pass or fail.
- To pass the course you need to get a passing grade on the exam and successfully complete all required assignments on the course.