Cyber Security Management (5 cr)
Code: TTC6020-3008
General information
Enrollment
18.11.2024 - 09.01.2025
Timing
13.01.2025 - 30.04.2025
Number of ECTS credits allocated
5 op
Virtual portion
5 op
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
- English
Seats
0 - 35
Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
Teachers
- Jarmo Nevala
- Heikki Järvinen
Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TIC22S1Bachelor's Degree Programme in Information and Communications Technology
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22SMTieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
-
TTV22SM2Tieto- ja viestintätekniikka (AMK)
- 15.01.2025 13:00 - 15:30, Cyber Security Management TTC6020-3008
- 22.01.2025 13:00 - 15:30, Cyber Security Management TTC6020-3008
- 29.01.2025 13:00 - 15:30, Cyber Security Management TTC6020-3008
- 05.02.2025 13:00 - 15:30, Cyber Security Management TTC6020-3008
- 12.02.2025 13:00 - 15:30, Cyber Security Management TTC6020-3008
- 19.02.2025 13:00 - 15:30, Cyber Security Management TTC6020-3008
- 05.03.2025 13:00 - 15:30, Cyber Security Management TTC6020-3008
- 12.03.2025 13:00 - 15:30, Cyber Security Management TTC6020-3008
- 19.03.2025 13:00 - 15:30, Cyber Security Management TTC6020-3008
- 26.03.2025 13:00 - 15:30, Cyber Security Management TTC6020-3008
- 02.04.2025 13:00 - 15:30, Cyber Security Management TTC6020-3008
- 09.04.2025 13:00 - 15:30, Cyber Security Management TTC6020-3008
- 16.04.2025 13:00 - 15:30, Cyber Security Management TTC6020-3008
- 23.04.2025 13:00 - 15:30, Cyber Security Management TTC6020-3008
- 30.04.2025 13:00 - 15:30, Cyber Security Management TTC6020-3008
Objectives
Course objectives
The student learns to plan and implement a cyber security management system.
You master the key parts of cyber security in practice: concepts, used technical execution and management methods as well as the general principles of service management. You are able to apply the knowledge to practical design and implementation of cyber security in services management.
EUR-ACE: Multidisciplinary competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
EUR-ACE: Communication and team-working
Content
The key topics in the course are ISO2700x standard family and the other frameworks related to it as well as their most essential management processes such as configuration management, management of the protected targets, threat management and risk management.
Learning materials and recommended literature
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
Practical training and working life connections
- visiting lecturers
- projects
Exam dates and retake possibilities
The possible date and method of the exam will be announced in the course opening.
Alternative completion methods
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 36 h
- independent study 32 h
Total 135 h
Further information for students
The course assessment methods will be presented during the first meeting.
Evaluation scale
0-5
Evaluation criteria, satisfactory (1-2)
Sufficient 1: The student is able to partly understand the significance and content of cyber security related to some service processes. The student is able to design some management processes for a data secure service when instructed in a group.
Satisfactory 2: The student is able to understand the main parts of the significance and content of cyber security in the context of some key service processes. The student is able to design some of the most essential cyber-secure service management processes in a group.
Evaluation criteria, good (3-4)
Good 3: The student is able to understand the significance and content of cyber security in the most common service management context. The student is able to design in a group the management of a cyber secure service with its most essential parts including the most important processes.
Very good 4: The student is able to understand the significance and content of cyber security in the service management context. The student is able to design the management of a cyber secure service with all necessary parts. The student reflects on their learning.
Evaluation criteria, excellent (5)
Excellent 5: The student is able to understand the significance and content of cyber security extensively in the context of service management. The student is able to with almost no guidance design a concept for cyber secure service management considering all its essential parts. The student reflects on their learning realistically.
Prerequisites
Cyber Security