Cyber Security (5 cr)
Code: TT00CD86-3003
General information
- Enrollment
-
18.11.2024 - 09.01.2025
Registration for the implementation has ended.
- Timing
-
13.01.2025 - 30.04.2025
Implementation is running.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 5 cr
- Mode of delivery
- Face-to-face
- Unit
- School of Technology
- Campus
- Lutakko Campus
- Teaching languages
- English
- Seats
- 0 - 35
- Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Teachers
- Erno Vienonen
- Groups
-
TIC24S2Bachelor's Degree Programme in Information and Communications Technology
- Course
- TT00CD86
Realization has 14 reservations. Total duration of reservations is 31 h 30 min.
Time | Topic | Location |
---|---|---|
Thu 16.01.2025 time 13:15 - 15:30 (2 h 15 min) |
Cyber Security TT00CD86-3003 |
P2_D436
Tietoliikennelaboratorio
|
Thu 23.01.2025 time 13:15 - 15:30 (2 h 15 min) |
Cyber Security TT00CD86-3003 |
P2_D436
Tietoliikennelaboratorio
|
Thu 30.01.2025 time 13:15 - 15:30 (2 h 15 min) |
Cyber Security TT00CD86-3003 |
Verkko/Online (KYHA)
|
Thu 06.02.2025 time 13:15 - 15:30 (2 h 15 min) |
Cyber Security TT00CD86-3003 |
Verkko/Online (KYHA)
|
Thu 13.02.2025 time 13:15 - 15:30 (2 h 15 min) |
Cyber Security TT00CD86-3003 |
P2_D436
Tietoliikennelaboratorio
|
Thu 20.02.2025 time 13:15 - 15:30 (2 h 15 min) |
Cyber Security TT00CD86-3003 |
P2_D436
Tietoliikennelaboratorio
|
Thu 06.03.2025 time 13:15 - 15:30 (2 h 15 min) |
Cyber Security TT00CD86-3003 |
P2_D436
Tietoliikennelaboratorio
|
Thu 13.03.2025 time 13:15 - 15:30 (2 h 15 min) |
Cyber Security TT00CD86-3003 |
P2_D436
Tietoliikennelaboratorio
|
Thu 20.03.2025 time 13:15 - 15:30 (2 h 15 min) |
Cyber Security TT00CD86-3003 |
P2_D436
Tietoliikennelaboratorio
|
Thu 27.03.2025 time 13:15 - 15:30 (2 h 15 min) |
Cyber Security TT00CD86-3003 |
P2_D331
Tietoverkkolaboratorio
|
Thu 03.04.2025 time 13:15 - 15:30 (2 h 15 min) |
Cyber Security TT00CD86-3003 |
P2_D436
Tietoliikennelaboratorio
|
Thu 10.04.2025 time 13:15 - 15:30 (2 h 15 min) |
Cyber Security TT00CD86-3003 |
P2_D436
Tietoliikennelaboratorio
|
Thu 17.04.2025 time 13:15 - 15:30 (2 h 15 min) |
Cyber Security TT00CD86-3003 |
P2_D436
Tietoliikennelaboratorio
|
Thu 24.04.2025 time 13:15 - 15:30 (2 h 15 min) |
Cyber Security TT00CD86-3003 |
P2_D436
Tietoliikennelaboratorio
|
Evaluation scale
0-5
Objective
You will master the most central areas related to cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g. data protection, protection levels). You understand how these are applicable in personal, social and organizational cyber security. You will get to know technical methods that can be used to protect systems, detect flaws and ensure data integrity, for example. You know the security mechanisms used in data transfer in relation to reliability and availability, as well as the operating principles and effects of malware and vulnerabilities.
EUR-ACE Knowledge and understanding
You know the basic principles of cyber security and information security. You understand the importance of these in personal, social and organizational cyber security and how to protect yourself, detect flaws and ensure data integrity
EUR-ACE Engineering practice
You can analyze threats related to cyber security by applying practice and theory and identifying these
Content
In this course, you will learn the key concepts, standards and legislation of cybersecurity and how to apply them to personal, societal and organisational cybersecurity. You will learn technical methods to protect systems, detect vulnerabilities and ensure data integrity. You will learn about the security mechanisms used in data transmission, the principles and effects of malware and vulnerabilities. This course will equip you to analyse and manage cyber security threats effectively.
Introduction to Cyber Security
Social cyber security
Legislation, data protection
Personal cyber security
Risk management
Malware, threats and vulnerabilities
Organizational cyber security
Materials
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
Employer connections
- visiting lecturers
- projects
Exam schedules
The possible date and method of the exam will be announced in the course opening.
Completion alternatives
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 36 h
- independent study 32 h
Total 135 h
Assessment criteria, satisfactory (1)
Sufficient (1)
The student knows and understands the basic concepts of cyber security and related theory. The student knows how to use cyber security tools with assistance.
Satisfactory (2)
The student knows and understands the basic concepts of cyber security and the related theory. The student knows how to use cyber security tools in a controlled manner.
Assessment criteria, good (3)
Good (3)
The student knows and understands the basic concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools.
Very good (4)
The student knows and understands the concepts of cyber security and the related theory in a versatile way. The student knows how to use cyber security tools in an advanced manner.
Assessment criteria, excellent (5)
Excellent (5)
The student knows and understands the concepts of cyber security and the related theory excellently. The student knows how to use and select suitable cyber security tools in an advanced manner, and is able to use new tools independently.
Qualifications
Linux basics
Data networks
Further information
The course assessment methods will be presented during the first meeting.