Skip to main content

Hardening (5 cr)

Code: TTC6050-3006

General information


Enrollment
01.08.2024 - 22.08.2024
Registration for the implementation has ended.
Timing
26.08.2024 - 18.12.2024
Implementation has ended.
Number of ECTS credits allocated
5 cr
Local portion
0 cr
Virtual portion
5 cr
Mode of delivery
Online learning
Unit
School of Technology
Teaching languages
Finnish
Seats
0 - 35
Degree programmes
Bachelor's Degree Programme in Information and Communications Technology
Teachers
Pasi Hyytiäinen
Groups
TTV22S5
Tieto- ja viestintätekniikka (AMK)
TTV22S2
Tieto- ja viestintätekniikka (AMK)
TTV22S3
Tieto- ja viestintätekniikka (AMK)
TTV22S1
Tieto- ja viestintätekniikka (AMK)
TTV22S4
Tieto- ja viestintätekniikka (AMK)
ZJA24STIKY2
Avoin amk, Kyberturvallisuus 2, Verkko
Course
TTC6050

Realization has 13 reservations. Total duration of reservations is 51 h 30 min.

Time Topic Location
Thu 05.09.2024 time 14:00 - 18:00
(4 h 0 min)
Koventaminen TTC6050-3006
Verkko
Thu 12.09.2024 time 14:00 - 18:00
(4 h 0 min)
Koventaminen TTC6050-3006
Verkko
Thu 19.09.2024 time 14:00 - 18:00
(4 h 0 min)
Koventaminen TTC6050-3006
Verkko - itsenäistä ryhmätyötä
Thu 26.09.2024 time 14:00 - 18:00
(4 h 0 min)
Koventaminen TTC6050-3006
Verkko - itsenäistä ryhmätyötä
Thu 03.10.2024 time 14:00 - 18:00
(4 h 0 min)
Koventaminen TTC6050-3006
Verkko
Thu 10.10.2024 time 14:00 - 18:00
(4 h 0 min)
Koventaminen TTC6050-3006
Verkko
Thu 24.10.2024 time 14:00 - 18:00
(4 h 0 min)
Koventaminen TTC6050-3006
Verkko
Thu 31.10.2024 time 14:00 - 18:00
(4 h 0 min)
Koventaminen TTC6050-3006
Verkko
Thu 07.11.2024 time 14:00 - 18:00
(4 h 0 min)
Koventaminen TTC6050-3006
Verkko
Thu 14.11.2024 time 14:00 - 18:00
(4 h 0 min)
Koventaminen TTC6050-3006
Verkko
Thu 21.11.2024 time 14:00 - 18:00
(4 h 0 min)
Koventaminen TTC6050-3006
Verkko
Thu 28.11.2024 time 14:30 - 18:00
(3 h 30 min)
Koventaminen TTC6050-3006
Verkko
Thu 05.12.2024 time 14:00 - 18:00
(4 h 0 min)
Koventaminen TTC6050-3006
Verkko
Changes to reservations may be possible.

Evaluation scale

0-5

Objective

The object of the course
You understand the significance of various data security controls in hardening of critical information technology environments in companies. You learn to implement various data security controls as part of a company’s information system.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

The learning objectives of the course
When you successfully complete this course, you can systematically harden an ICT environment and implement the hardening practice into the environment.

Content

The course contains design and implementation of hardening a target ICT environment. Additionally, the course discusses the dependencies and potentials of various data security controls as well as their operation.

Materials

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises

Employer connections

- excursions
- visiting lecturers
- projects

Exam schedules

The possible date and method of the exam will be announced in the course opening.

Completion alternatives

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 15 h
- Laboratory exercises/hands-on labs 120h
Total 135 h

Assessment criteria, satisfactory (1)

Sufficient 1: The student shows a sufficient command of the theory on designing and implementing hardening and is able to design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects their own learning sufficiently.

Satisfactory 2: The student shows a satisfactory command of the theory on designing and implementing hardening and is able to design satisfactorily various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning satisfactorily.

Assessment criteria, good (3)

Good 3: The student shows a good command of the theory on designing and implementing hardening and is able design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning well.

Very good 4: The student shows a very good command of the theory on designing and implementing hardening and is able to very well design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning very well.

Assessment criteria, excellent (5)

Excellent 5: The student masters the theory on designing and implementing hardening excellently and is able to design various data security controls outstandingly as part of a broader target environment based on given requirement definition. The student reflects on their own learning outstandingly.

Assessment criteria, approved/failed

Sufficient 1: The student shows sufficient command of the theory on designing and implementing hardening and can sufficiently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning sufficiently.

Qualifications

Data Networks
Linux
Cyber Security

Go back to top of page