Skip to main content

Information Security Technologies (5 cr)

Code: TT00CD87-3003

General information


Timing
25.08.2025 - 19.12.2025
The implementation has not yet started.
Number of ECTS credits allocated
5 cr
Local portion
5 cr
Mode of delivery
Face-to-face
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
Finnish
Seats
0 - 35
Degree programmes
Bachelor's Degree Programme in Information and Communications Technology
Teachers
Jarmo Viinikanoja
Groups
TTV24S3
Tieto- ja viestintätekniikka (AMK)
Course
TT00CD87
No reservations found for realization TT00CD87-3003!

Evaluation scale

0-5

Objective

The student knows different information security techniques and is able to apply them. The student knows and understands the uses of various information security technologies, as well as the opportunities they bring.

EUR-ACE Knowledge and understanding
You will know the basic methods of protection by applying theory and practice. You understand the importance of these in ensuring IT infrastructure and business continuity.

EUR-ACE Engineering practice
You can analyze methods related to information security technologies applying practice and theory and identifying them.

Content

In this course, you will learn to know and apply different security technologies and understand their uses and potential. You will master basic security techniques and understand their importance in ensuring IT infrastructure and business continuity. You will be able to analyse security technologies and apply them in practice. This course will equip you to ensure effective and proactive security.

The course includes the different areas of information security technologies and commonly used techniques and equipment as well as their roles in ensuring IT infrastructure and business continuity.

Communication management and monitoring
Identifying vulnerabilities
Securing data transmission

Materials

Electronic material to be published in the online learning environment.

Teaching methods

- Lectures
- Self-study
- group work
- Practical assignments
- Learning tasks

Exam schedules

The possible exam date and method of implementation will be announced during the first session of the course.

Completion alternatives

The procedures for credit transfer are described in the degree regulations and the study guide. The course instructor provides additional information on any specific practices related to the course.

Student workload

One credit (1 ECTS) corresponds to an average of 27 hours of work.
- Lectures: 24 hours
- Practical assignments: 35 hours
- Tasks: 55 hours
- Independent work: 40 hours
Total: 135 hours

Assessment criteria, satisfactory (1)

Sufficient (1)
The student knows and understands the basic concepts of information security technologies and related theory. The student knows how to use the tools used in information security technology with assistance.

Satisfactory (2)
The student knows and understands the basic concepts of information security technologies and the related theory. The student knows how to use the tools used in information security technology in a controlled manner.

Assessment criteria, good (3)

Good (3)
The student knows and understands the basic concepts of information security technologies and the related theory in a versatile way. The student knows how to use the tools used in information security technology.

Very good (4)
The student knows and understands the concepts of information security technologies and the related theory in a versatile way. The student knows how to use the tools used in information security technology in an advanced manner.

Assessment criteria, excellent (5)

Excellent (5)
Excellent 5: The student knows and understands the concepts of information security technologies and the related theory excellently. The student knows how to use and select appropriate tools used in information security technology in an advanced manner and is able to use new tools independently.

Qualifications

Data networks
Cyber security
Linux Basics

Go back to top of page