Hardening (5 cr)
Code: TTC6050-3007
General information
- Enrollment
-
18.11.2024 - 09.01.2025
Registration for the implementation has ended.
- Timing
-
13.01.2025 - 30.04.2025
Implementation is running.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 0 cr
- Virtual portion
- 5 cr
- Mode of delivery
- Online learning
- Unit
- School of Technology
- Campus
- Lutakko Campus
- Teaching languages
- English
- Seats
- 0 - 35
- Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Teachers
- Jarmo Viinikanoja
- Groups
-
TTV22S5Tieto- ja viestintätekniikka (AMK)
-
TTV22S2Tieto- ja viestintätekniikka (AMK)
-
TTV22S3Tieto- ja viestintätekniikka (AMK)
-
TIC22S1Bachelor's Degree Programme in Information and Communications Technology
-
TTV22S1Tieto- ja viestintätekniikka (AMK)
-
TTV22S4Tieto- ja viestintätekniikka (AMK)
-
ZJA25KTIKY2Avoin amk, Kyberturvallisuus 2, Verkko
- Course
- TTC6050
Realization has 15 reservations. Total duration of reservations is 41 h 15 min.
Time | Topic | Location |
---|---|---|
Tue 14.01.2025 time 11:30 - 14:15 (2 h 45 min) |
Hardening TTC6050-3007 |
Online
|
Tue 21.01.2025 time 11:30 - 14:15 (2 h 45 min) |
Hardening TTC6050-3007 |
Online
|
Tue 28.01.2025 time 11:30 - 14:15 (2 h 45 min) |
Hardening TTC6050-3007 |
Online
|
Tue 04.02.2025 time 11:30 - 14:15 (2 h 45 min) |
Hardening TTC6050-3007 |
Online
|
Tue 11.02.2025 time 11:30 - 14:15 (2 h 45 min) |
Hardening TTC6050-3007 |
Online
|
Tue 18.02.2025 time 11:30 - 14:15 (2 h 45 min) |
Hardening TTC6050-3007 |
Online
|
Tue 04.03.2025 time 11:30 - 14:15 (2 h 45 min) |
Hardening TTC6050-3007 |
Online
|
Tue 11.03.2025 time 11:30 - 14:15 (2 h 45 min) |
Hardening TTC6050-3007 |
Online
|
Tue 18.03.2025 time 11:30 - 14:15 (2 h 45 min) |
Hardening TTC6050-3007 |
Online
|
Tue 25.03.2025 time 11:30 - 14:15 (2 h 45 min) |
Hardening TTC6050-3007 |
Online
|
Tue 01.04.2025 time 11:30 - 14:15 (2 h 45 min) |
Hardening TTC6050-3007 |
Online
|
Tue 08.04.2025 time 11:30 - 14:15 (2 h 45 min) |
Hardening TTC6050-3007 |
Online
|
Tue 15.04.2025 time 11:30 - 14:15 (2 h 45 min) |
Hardening TTC6050-3007 |
Online
|
Tue 22.04.2025 time 11:30 - 14:15 (2 h 45 min) |
Hardening TTC6050-3007 |
Online
|
Tue 29.04.2025 time 11:30 - 14:15 (2 h 45 min) |
Hardening TTC6050-3007 |
Online
|
Evaluation scale
0-5
Objective
The object of the course
You understand the significance of various data security controls in hardening of critical information technology environments in companies. You learn to implement various data security controls as part of a company’s information system.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
The learning objectives of the course
When you successfully complete this course, you can systematically harden an ICT environment and implement the hardening practice into the environment.
Content
The course contains design and implementation of hardening a target ICT environment. Additionally, the course discusses the dependencies and potentials of various data security controls as well as their operation.
Materials
Materials in the e-learning environment.
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- small group learning
- exercises
- learning tasks
- seminars
Employer connections
- visiting lecturers
- projects
Exam schedules
The possible date and method of the exam will be announced in the course opening.
Completion alternatives
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h
Assessment criteria, satisfactory (1)
Sufficient 1: The student shows a sufficient command of the theory on designing and implementing hardening and is able to design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects their own learning sufficiently.
Satisfactory 2: The student shows a satisfactory command of the theory on designing and implementing hardening and is able to design satisfactorily various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning satisfactorily.
Assessment criteria, good (3)
Good 3: The student shows a good command of the theory on designing and implementing hardening and is able design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning well.
Very good 4: The student shows a very good command of the theory on designing and implementing hardening and is able to very well design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning very well.
Assessment criteria, excellent (5)
Excellent 5: The student masters the theory on designing and implementing hardening excellently and is able to design various data security controls outstandingly as part of a broader target environment based on given requirement definition. The student reflects on their own learning outstandingly.
Assessment criteria, approved/failed
Sufficient 1: The student shows sufficient command of the theory on designing and implementing hardening and can sufficiently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on their own learning sufficiently.
Qualifications
Data Networks
Linux
Cyber Security