Skip to main content

Basics of Information Security (3 cr)

Code: HT00CF26-3001

General information


Enrollment
18.11.2024 - 09.01.2025
Registration for the implementation has ended.
Timing
13.01.2025 - 19.05.2025
Implementation is running.
Number of ECTS credits allocated
3 cr
Local portion
3 cr
Mode of delivery
Face-to-face
Unit
School of Business
Campus
Main Campus
Teaching languages
Finnish
Seats
20 - 45
Degree programmes
Bachelor's Degree Programme in Business Information Technology
Teachers
Heikki Sateila
Groups
HTK24S1
Tietojenkäsittely (AMK)
ZJAHTK24S1
Avoin AMK, Tiko, AMK-väylät, tietojenkäsittely, tradenomi amk
Course
HT00CF26

Realization has 12 reservations. Total duration of reservations is 24 h 0 min.

Time Topic Location
Mon 13.01.2025 time 13:00 - 15:00
(2 h 0 min)
Tietoturvan perusteet HT00CF26-3001
R35G301 Oppimistila
Wed 15.01.2025 time 13:00 - 15:00
(2 h 0 min)
Tietoturvan perusteet HT00CF26-3001
R35G301 Oppimistila
Mon 20.01.2025 time 13:00 - 15:00
(2 h 0 min)
Tietoturvan perusteet HT00CF26-3001
R35FP05 Valjakka Auditorio
Mon 27.01.2025 time 13:00 - 15:00
(2 h 0 min)
Tietoturvan perusteet HT00CF26-3001
R35G301 Oppimistila
Wed 29.01.2025 time 13:00 - 15:00
(2 h 0 min)
Tietoturvan perusteet HT00CF26-3001
R35G301 Oppimistila
Mon 03.02.2025 time 13:00 - 15:00
(2 h 0 min)
Tietoturvan perusteet HT00CF26-3001
R35G301 Oppimistila
Wed 05.02.2025 time 13:00 - 15:00
(2 h 0 min)
Tietoturvan perusteet HT00CF26-3001
R35G301 Oppimistila
Mon 10.02.2025 time 13:00 - 15:00
(2 h 0 min)
Tietoturvan perusteet HT00CF26-3001
R35G301 Oppimistila
Wed 12.02.2025 time 13:00 - 15:00
(2 h 0 min)
Tietoturvan perusteet HT00CF26-3001
R35G301 Oppimistila
Mon 17.02.2025 time 13:00 - 15:00
(2 h 0 min)
Tietoturvan perusteet HT00CF26-3001
R35G301 Oppimistila
Wed 19.02.2025 time 13:00 - 15:00
(2 h 0 min)
Tietoturvan perusteet HT00CF26-3001
R35G301 Oppimistila
Wed 19.03.2025 time 09:45 - 11:45
(2 h 0 min)
Tietoturvan perusteet HT00CF26-3001 - Uusintatentti
R35F205 Oppimistila (aik)
Changes to reservations may be possible.

Evaluation scale

Pass/Fail

Content scheduling

- Course contac period will last about 7 weeks after which the exam will be arranged. Assignments need to be done within one month after contact period has ended.

Objective

Purpose of the course

Information security and data privacy are part of everyday life in the workplace. Taking care of information security and data privacy is everyone's responsibility, not just those working in the ICT sector. The purpose of this course is to familiarize students with the basics of information security and data privacy in all areas of information security: How to ensure personal information security, what administrative and physical security are, and how they are supported by technical security solutions. You will also become familiar with information security practices in the ICT field and different technical security solutions in the context of web application development. You will learn to consider security in all phases of your work.

Course competences

- Learning to Learn: Is able to acquire, critically assess and appropriately apply the national and international knowledge base and practices of their field.
- Internationality and Multiculturalism: Is able to monitor and utilise the international development of their field in their work.
- ICT Specialization Competence: Is able to apply their knowledge and skills in a specific area of ICT, as well as analyze, evaluate, and develop operations in this area.
- Information System Competence: Is familiar with typical information systems and services and understands the importance of security in utilizing services.

Learning objectives of the course

You will be familiar with the basic concepts of information security and understand the importance of information security in everyday operations. You will be able to assess security risks and consider security in web application development. You have an understanding of various administrative, physical, and technical ways to ensure the availability, confidentiality, and integrity of information.

Content

In this course, you will become familiar with the three main areas of information security: availability, confidentiality, and integrity of information. You will learn the terms information security and data privacy and learn to assess security risks. You will explore the concepts of administrative and physical security and different ways to ensure the availability, confidentiality, and integrity of information from a technical perspective.

Regarding technical security, you will have a superficial understanding of different encryption methods, the use of certificates, the functioning principles of firewalls, and the design of network infrastructure from a security perspective. In addition, you will become familiar with the basic principles of secure application development and methods for monitoring the security situation. You will learn to follow national and international information security sources and react to them.

Location and time

- Lectures on Jamk main campus.

Materials

- Lecture materials and assignments prepared by the teacher.

Teaching methods

- Lessons (in-class)
- Exercises in class
- Assignments you return

Exam schedules

- The course has a final exam, and up to two more resits will be arranged if needed.

Completion alternatives

- You can apply for recognition of previous experience and knowledge through the eRPL process.

Student workload

- 1 credit corresponds to an average of 27 hours of work, which means that the load of 3 credits is on average 81 hours.

The 81 hours will divide roughly in the following:
- Lectures & exercise labs (contact lessons): 20 h
- Self-study: 61 h

Assessment criteria, approved/failed

You will be familiar with the basic concepts of information security and understand the importance of information security in everyday operations. You will be able to assess security risks and consider security in web application development. You have an understanding of various administrative, physical, and technical ways to ensure the availability, confidentiality, and integrity of information. You are able to follow and analyze national and international information security news and sources and evaluate needed tasks to adhere them.

Further information

- This course is graded on as pass or fail.
- To pass the course you need to get a passing grade on the exam and successfully complete all required assignments on the course.

Go back to top of page