Information Security Technologies (5 cr)
Code: TT00CD87-3005
General information
- Timing
-
25.08.2025 - 19.12.2025
The implementation has not yet started.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 5 cr
- Mode of delivery
- Face-to-face
- Unit
- School of Technology
- Campus
- Lutakko Campus
- Teaching languages
- English
- Seats
- 0 - 35
- Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Teachers
- Jarmo Viinikanoja
- Groups
-
TIC24S1Bachelor's Degree Programme in Information and Communications Technology
- Course
- TT00CD87
Evaluation scale
0-5
Objective
The student knows different information security techniques and is able to apply them. The student knows and understands the uses of various information security technologies, as well as the opportunities they bring.
EUR-ACE Knowledge and understanding
You will know the basic methods of protection by applying theory and practice. You understand the importance of these in ensuring IT infrastructure and business continuity.
EUR-ACE Engineering practice
You can analyze methods related to information security technologies applying practice and theory and identifying them.
Content
In this course, you will learn to know and apply different security technologies and understand their uses and potential. You will master basic security techniques and understand their importance in ensuring IT infrastructure and business continuity. You will be able to analyse security technologies and apply them in practice. This course will equip you to ensure effective and proactive security.
The course includes the different areas of information security technologies and commonly used techniques and equipment as well as their roles in ensuring IT infrastructure and business continuity.
Communication management and monitoring
Identifying vulnerabilities
Securing data transmission
Materials
Electronic material to be published in the online learning environment.
Teaching methods
- Lectures
- Self-study
- group work
- Practical assignments
- Learning tasks
Exam schedules
The possible exam date and method of implementation will be announced during the first session of the course.
Completion alternatives
The procedures for credit transfer are described in the degree regulations and the study guide. The course instructor provides additional information on any specific practices related to the course.
Student workload
One credit (1 ECTS) corresponds to an average of 27 hours of work.
- Lectures: 24 hours
- Practical assignments: 35 hours
- Tasks: 55 hours
- Independent work: 40 hours
Total: 135 hours
Assessment criteria, satisfactory (1)
Sufficient (1)
The student knows and understands the basic concepts of information security technologies and related theory. The student knows how to use the tools used in information security technology with assistance.
Satisfactory (2)
The student knows and understands the basic concepts of information security technologies and the related theory. The student knows how to use the tools used in information security technology in a controlled manner.
Assessment criteria, good (3)
Good (3)
The student knows and understands the basic concepts of information security technologies and the related theory in a versatile way. The student knows how to use the tools used in information security technology.
Very good (4)
The student knows and understands the concepts of information security technologies and the related theory in a versatile way. The student knows how to use the tools used in information security technology in an advanced manner.
Assessment criteria, excellent (5)
Excellent (5)
Excellent 5: The student knows and understands the concepts of information security technologies and the related theory excellently. The student knows how to use and select appropriate tools used in information security technology in an advanced manner and is able to use new tools independently.
Qualifications
Data networks
Cyber security
Linux Basics