Skip to main content

Cyber Security (4 cr)

Code: TTC1020-3038

General information


Enrollment
18.11.2024 - 09.01.2025
Registration for the implementation has ended.
Timing
13.01.2025 - 30.04.2025
Implementation is running.
Number of ECTS credits allocated
4 cr
Local portion
4 cr
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
Finnish
Seats
0 - 35
Degree programmes
Bachelor's Degree Programme in Information and Communications Technology
Teachers
Esa Hintikka
Groups
TTV23S3
Tieto- ja viestintätekniikka (AMK)
Course
TTC1020

Realization has 11 reservations. Total duration of reservations is 22 h 0 min.

Time Topic Location
Mon 13.01.2025 time 12:15 - 14:15
(2 h 0 min)
Kyberturvallisuus TTC1020-3038
P2_D331 Tietoverkkolaboratorio
Mon 20.01.2025 time 12:15 - 14:15
(2 h 0 min)
Kyberturvallisuus TTC1020-3038
P2_D331 Tietoverkkolaboratorio
Mon 27.01.2025 time 12:15 - 14:15
(2 h 0 min)
Kyberturvallisuus TTC1020-3038
P2_D331 Tietoverkkolaboratorio
Mon 03.02.2025 time 12:15 - 14:15
(2 h 0 min)
Kyberturvallisuus TTC1020-3038
Verkko/Online (KYHA)
Mon 10.02.2025 time 12:15 - 14:15
(2 h 0 min)
Kyberturvallisuus TTC1020-3038
P2_D331 Tietoverkkolaboratorio
Mon 17.02.2025 time 12:15 - 14:15
(2 h 0 min)
Kyberturvallisuus TTC1020-3038
P2_D331 Tietoverkkolaboratorio
Mon 03.03.2025 time 12:15 - 14:15
(2 h 0 min)
Kyberturvallisuus TTC1020-3038
P2_D331 Tietoverkkolaboratorio
Mon 10.03.2025 time 12:15 - 14:15
(2 h 0 min)
Kyberturvallisuus TTC1020-3038
P2_D331 Tietoverkkolaboratorio
Mon 17.03.2025 time 12:15 - 14:15
(2 h 0 min)
Kyberturvallisuus TTC1020-3038
P2_D331 Tietoverkkolaboratorio
Mon 24.03.2025 time 12:15 - 14:15
(2 h 0 min)
Kyberturvallisuus TTC1020-3038
P2_D331 Tietoverkkolaboratorio
Mon 31.03.2025 time 12:15 - 14:15
(2 h 0 min)
Kyberturvallisuus TTC1020-3038
P2_D331 Tietoverkkolaboratorio
Changes to reservations may be possible.

Evaluation scale

0-5

Objective

The learning objectives:
You master the key parts of cyber security: concepts (e.g. confidentiality, integrity and availability), standards and legislation (e.g.data protection, protection levels). You understand how these can be applied to personal, social and organizational cyber security. You learn about methods to e.g. protect systems, detect defects and make sure of the integrity of the information. You know the safety mechanisms in data transfer regarding confidentiality and availability as well as operational principles and effects of malware and vulnerabilities.

EUR-ACE competences:
Knowledge and Understanding
Engineering Practice

Content

Introduction to cyber security
- Current situation and phenomena
- Terminology

Social cyber security
- Legislation, standards, licences
- Information security and influencing
- GDPR and data security descriptions
- governmental actors (National Cyber Security Centre, Police)

Personal cyber security
- media literacy, reliability of information
- risk management
- access control and password
- Cryptology (check sum function, asymmetric and symmetric encryption)
- Malware, threats and vulnerabilities
- Encryption of data transfer
- Hardening of personal devices
- Classification of one's own information (private, public)

Organizational cyber security
- How does the aforementioned affect the overall security of public and private organizations

Materials

Materials in the e-learning environment.

Teaching methods

- lectures
- independent study
- small group learning
- exercises
- learning tasks
- seminars

Employer connections

- visiting lecturers
- projects

Exam schedules

The possible date and method of the exam will be announced in the course opening.

Completion alternatives

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 52 h
- exercises 15 h
- assignment 35 h
- independent study 30 h
- company visits 3 h
Total 135 h

Assessment criteria, satisfactory (1)

Sufficient 1: The student shows some command of cyber security theory. The assignment has been returned but contains deficiencies. The assignment has been presented.

Satisfactory 2: The student shows command of cyber security theory. The assignment contains required parts. The assignment has been presented.

Assessment criteria, good (3)

Good 3:The student shows versatile command of cyber security theory. The assignment is fairly extensive and the assignment has been presented.

Very good 4:The student shows in-depth command of cyber security theory. The documentation of the assignment is comprehensive and the assignment has been presented fluently.

Assessment criteria, excellent (5)

Excellent 5: The student shows out of the ordinary in-depth command of cyber security theory. The documentation of the assignment is comprehensive, understandable and flawless. The assignment has been presented fluently.

Qualifications

Use and Command of Linux
Basics in Programming
Data Networks

Go back to top of page