Skip to main content

Data Security Controls (5 cr)

Code: TTC6010-3008

General information


Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages

  • English

Seats

0 - 35

Degree programmes

  • Bachelor's Degree Programme in Information and Communications Technology

Teachers

  • Jarmo Viinikanoja

Groups

  • TTV22S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S2
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S3
    Tieto- ja viestintätekniikka (AMK)
  • TIC22S1
    Bachelor's Degree Programme in Information and Communications Technology
  • TTV22S1
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S4
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM2
    Tieto- ja viestintätekniikka (AMK)
  • 14.01.2025 08:00 - 10:45, Data Security Controls TTC6010-3008
  • 21.01.2025 08:00 - 10:45, Data Security Controls TTC6010-3008
  • 28.01.2025 08:00 - 10:45, Data Security Controls TTC6010-3008
  • 04.02.2025 08:00 - 10:45, Data Security Controls TTC6010-3008
  • 11.02.2025 08:00 - 10:45, Data Security Controls TTC6010-3008
  • 18.02.2025 08:00 - 10:45, Data Security Controls TTC6010-3008
  • 04.03.2025 08:00 - 10:45, Data Security Controls TTC6010-3008
  • 11.03.2025 08:00 - 10:45, Data Security Controls TTC6010-3008
  • 18.03.2025 08:00 - 10:45, Data Security Controls TTC6010-3008
  • 25.03.2025 08:00 - 10:45, Data Security Controls TTC6010-3008
  • 01.04.2025 08:00 - 10:45, Data Security Controls TTC6010-3008
  • 08.04.2025 08:00 - 10:45, Data Security Controls TTC6010-3008
  • 15.04.2025 08:00 - 10:45, Data Security Controls TTC6010-3008
  • 22.04.2025 08:00 - 10:45, Data Security Controls TTC6010-3008
  • 29.04.2025 08:00 - 10:45, Data Security Controls TTC6010-3008

Objectives

You learn to know the main categories of security controls and to understand their significance in security perspective. You learn perspectives of securing based on security controls. You know how to implement security controls in order to protect company's critical ICT-systems.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

The learning objectives of the course
Once you have completed the course you can implement security controls and you understand their significance in the perspective of securing an company.

Content

The course includes an overview of security controls in the perspective of designing and implementing. The course utilizes existing security control frameworks.

Learning materials and recommended literature

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars

Practical training and working life connections

- visiting lecturers
- projects

Exam dates and retake possibilities

The possible date and method of the exam will be announced in the course opening.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Sufficient 1: The student shows sufficient command of the theory on designing and implementing security controls and can design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects his (her) own learning sufficiently.

Satisfactory 2: The student shows satisfactory command of the theory on designing and implementing security controls and can design various satisfactory data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning satisfactorily.

Evaluation criteria, good (3-4)

Good 3: The student shows good command of the theory on designing and implementing security controls and can design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning well.

Very good 4: The student shows very good command of the theory on designing and implementing security controls and can very well design various data security controls as part of a broader targer environment based on given requirement definition. The student reflects on his (her) own learning very well.

Evaluation criteria, excellent (5)

Excellent 5: The student shows excellent mastery of the theory on designing and implementing security controls and can excellently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning outstandingly.

Prerequisites

Data Networks
Linux
Cyber Security