Data Security Controls (5 cr)
Code: TTC6010-3007
General information
- Enrollment
-
01.08.2024 - 22.08.2024
Registration for the implementation has ended.
- Timing
-
26.08.2024 - 18.12.2024
Implementation has ended.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 0 cr
- Virtual portion
- 5 cr
- Mode of delivery
- Online learning
- Unit
- School of Technology
- Teaching languages
- Finnish
- Seats
- 0 - 35
- Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Teachers
- Pasi Hyytiäinen
- Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
-
ZJA24STIKY1Avoin amk, Kyberturvallisuus 1, Verkko
- Course
- TTC6010
Realization has 13 reservations. Total duration of reservations is 51 h 0 min.
Time | Topic | Location |
---|---|---|
Tue 27.08.2024 time 13:00 - 17:00 (4 h 0 min) |
Tietoturvakontrollit TTC6010-3007 |
Verkko
|
Tue 10.09.2024 time 13:00 - 17:00 (4 h 0 min) |
Tietoturvakontrollit TTC6010-3007 |
Verkko
|
Tue 17.09.2024 time 13:00 - 17:00 (4 h 0 min) |
Tietoturvakontrollit TTC6010-3007 |
Verkko
|
Tue 24.09.2024 time 13:00 - 17:00 (4 h 0 min) |
Tietoturvakontrollit TTC6010-3007 |
Verkko
|
Tue 01.10.2024 time 13:00 - 17:00 (4 h 0 min) |
Tietoturvakontrollit TTC6010-3007 |
Verkko
|
Tue 08.10.2024 time 13:00 - 17:00 (4 h 0 min) |
Tietoturvakontrollit TTC6010-3007 |
Verkko
|
Tue 22.10.2024 time 13:00 - 16:00 (3 h 0 min) |
Tietoturvakontrollit TTC6010-3007 |
Verkko
|
Tue 29.10.2024 time 13:00 - 17:00 (4 h 0 min) |
Tietoturvakontrollit TTC6010-3007 |
Verkko
|
Tue 05.11.2024 time 13:00 - 17:00 (4 h 0 min) |
Tietoturvakontrollit TTC6010-3007 |
Verkko
|
Tue 12.11.2024 time 13:00 - 17:00 (4 h 0 min) |
Tietoturvakontrollit TTC6010-3007 |
Verkko
|
Tue 19.11.2024 time 13:00 - 17:00 (4 h 0 min) |
Tietoturvakontrollit TTC6010-3007 |
Verkko
|
Tue 26.11.2024 time 13:00 - 17:00 (4 h 0 min) |
Tietoturvakontrollit TTC6010-3007 |
Verkko
|
Tue 03.12.2024 time 13:00 - 17:00 (4 h 0 min) |
Tietoturvakontrollit TTC6010-3007 |
Verkko - itsenäistä ryhmätyötä
|
Evaluation scale
0-5
Objective
You learn to know the main categories of security controls and to understand their significance in security perspective. You learn perspectives of securing based on security controls. You know how to implement security controls in order to protect company's critical ICT-systems.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
Once you have completed the course you can implement security controls and you understand their significance in the perspective of securing an company.
Content
The course includes an overview of security controls in the perspective of designing and implementing. The course utilizes existing security control frameworks.
Materials
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
Employer connections
- excursions
- visiting lecturers
- projects
Exam schedules
The possible date and method of the exam will be announced in the course opening.
Completion alternatives
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 15 h
- Laboratory exercises/hands-on labs 120h
Total 135 h
Assessment criteria, satisfactory (1)
Sufficient 1: The student shows sufficient command of the theory on designing and implementing security controls and can design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects his (her) own learning sufficiently.
Satisfactory 2: The student shows satisfactory command of the theory on designing and implementing security controls and can design various satisfactory data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning satisfactorily.
Assessment criteria, good (3)
Good 3: The student shows good command of the theory on designing and implementing security controls and can design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning well.
Very good 4: The student shows very good command of the theory on designing and implementing security controls and can very well design various data security controls as part of a broader targer environment based on given requirement definition. The student reflects on his (her) own learning very well.
Assessment criteria, excellent (5)
Excellent 5: The student shows excellent mastery of the theory on designing and implementing security controls and can excellently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning outstandingly.
Qualifications
Data Networks
Linux
Cyber Security