Basics of cybersecurityLaajuus (5 cr)
Code: KT00DN42
Credits
5 op
Teaching language
- Finnish
Objective
You are able to define cybersecurity.
Your understand the importance of managing cyber security.
You understand the concept of control-based information governance.
You are familiar with the most common cybersecurity vulnerabilities, risks and controls.
You are able to describe the function of selected important tools in defensive and offensive cybersecurity.
You are able to implement some basic security policies with selected security controls.
You understand the importance of cybersecurity in different business areas.
Content
What is cybersecurity?
How to define cybersecurity?
What is security?
What is the target in cybersecurity?
Who is in charge of cybersecurity?
What is cyber strategy?
Why is cybersecurity management extremely important?
What are security controls and why are they important?
How to defend against global threats?
What is malware?
How are security policies and risk management related to cybersecurity?
How are computer networks and cybersecurity related?
How does a hacker think?
What tools are hackers using?
What is penetration testing?
What are Next Generation Firewalls and where to use them?
How to implement some basic security policies with firewalls?
How is cybersecurity present in different areas of business?
Enrollment
14.08.2024 - 08.09.2024
Timing
26.08.2024 - 22.12.2024
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Unit
Department of Information Technology
Campus
Kotka Campus
Teaching languages
- Finnish
Seats
20 - 40
Degree programmes
- Degree Programme in Cyber Security
Teachers
- Jaakko Nurmi
Teacher in charge
Jaakko Nurmi
Groups
-
KTKT24SPCybersecurity, full-time studies
Objective
You are able to define cybersecurity.
Your understand the importance of managing cyber security.
You understand the concept of control-based information governance.
You are familiar with the most common cybersecurity vulnerabilities, risks and controls.
You are able to describe the function of selected important tools in defensive and offensive cybersecurity.
You are able to implement some basic security policies with selected security controls.
You understand the importance of cybersecurity in different business areas.
Content
What is cybersecurity?
How to define cybersecurity?
What is security?
What is the target in cybersecurity?
Who is in charge of cybersecurity?
What is cyber strategy?
Why is cybersecurity management extremely important?
What are security controls and why are they important?
How to defend against global threats?
What is malware?
How are security policies and risk management related to cybersecurity?
How are computer networks and cybersecurity related?
How does a hacker think?
What tools are hackers using?
What is penetration testing?
What are Next Generation Firewalls and where to use them?
How to implement some basic security policies with firewalls?
How is cybersecurity present in different areas of business?
Opiskelumateriaali
Ohje riskienhallintaan, Valtiovarainministeriön julkaisuja 22/2017
Will be given later.
Yksilölliset oppimisväylät
Scheduled track:
Course is implemented as blended distance learning. You participate into contact lessons as scheduled. You studies are progressing in the pace of the contact lessons and self paced learning activities.
Independent track:
If you are working in a company, organisation or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practise. You must show your skills via a demonstration, which is determined based on learning objectives.
TKI ja työelämäyhteistyö
CyberLab learning environment
Opiskelijan työmäärä
Achieving the learning outcomes requires 135 hours of work.
Toteutuksen osien kuvaus
Kurssilla tehdään mm. laaja riskienhallintaharjoitustehtävä yhdessä Datakeskusten perusteet kurssin kanssa. Riskianalyysin kohteen on CyberLab datakeskus.
Evaluation scale
1-5
Assessment methods and criteria
Arvosana kertyy Learn-alustan arviointikirjaan.
Assessment criteria, excellent (5)
a) use professional vocabulary and concepts in an expert way in different situations.
b) evaluate information sources critically.
e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.
e) use the key models, methods, software and techniques of the professional field.
Enrollment
30.08.2023 - 02.09.2023
Timing
01.08.2023 - 31.12.2023
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Unit
Department of Information Technology
Campus
Kotka Campus
Teaching languages
- Finnish
Seats
10 - 40
Degree programmes
- Degree Programme in Cyber Security
Teachers
- Jaakko Nurmi
Teacher in charge
Jaakko Nurmi
Groups
-
KTKT23SPCybersecurity, full-time studies
Objective
You are able to define cybersecurity.
Your understand the importance of managing cyber security.
You understand the concept of control-based information governance.
You are familiar with the most common cybersecurity vulnerabilities, risks and controls.
You are able to describe the function of selected important tools in defensive and offensive cybersecurity.
You are able to implement some basic security policies with selected security controls.
You understand the importance of cybersecurity in different business areas.
Content
What is cybersecurity?
How to define cybersecurity?
What is security?
What is the target in cybersecurity?
Who is in charge of cybersecurity?
What is cyber strategy?
Why is cybersecurity management extremely important?
What are security controls and why are they important?
How to defend against global threats?
What is malware?
How are security policies and risk management related to cybersecurity?
How are computer networks and cybersecurity related?
How does a hacker think?
What tools are hackers using?
What is penetration testing?
What are Next Generation Firewalls and where to use them?
How to implement some basic security policies with firewalls?
How is cybersecurity present in different areas of business?
Opiskelumateriaali
Ohje riskienhallintaan, Valtiovarainministeriön julkaisuja 22/2017
Will be given later.
Yksilölliset oppimisväylät
Scheduled track:
Course is implemented as blended distance learning. You participate into contact lessons as scheduled. You studies are progressing in the pace of the contact lessons and self paced learning activities.
Independent track:
If you are working in a company, organisation or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practise. You must show your skills via a demonstration, which is determined based on learning objectives.
TKI ja työelämäyhteistyö
CyberLab learning environment
Opiskelijan työmäärä
Achieving the learning outcomes requires 135 hours of work.
Toteutuksen osien kuvaus
Kurssilla tehdään mm. laaja riskienhallintaharjoitustehtävä yhdessä Datakeskusten perusteet kurssin kanssa. Riskianalyysin kohteen on CyberLab datakeskus.
Evaluation scale
1-5
Assessment methods and criteria
Arvosana kertyy Learn-alustan arviointikirjaan.
Assessment criteria, excellent (5)
a) use professional vocabulary and concepts in an expert way in different situations.
b) evaluate information sources critically.
e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.
e) use the key models, methods, software and techniques of the professional field.
Enrollment
22.08.2022 - 28.08.2022
Timing
01.08.2022 - 18.12.2022
Number of ECTS credits allocated
5 op
Virtual portion
2 op
Mode of delivery
60 % Contact teaching, 40 % Distance learning
Unit
Department of Information Technology
Campus
Kotka Campus
Teaching languages
- Finnish
Seats
20 - 50
Degree programmes
- Degree Programme in Cyber Security
Teachers
- Kimmo Kääriäinen
- Martti Kettunen
- Jaakko Nurmi
Teacher in charge
Kimmo Kääriäinen
Groups
-
KTKT22SPCybersecurity, full-time studies
Objective
You are able to define cybersecurity.
Your understand the importance of managing cyber security.
You understand the concept of control-based information governance.
You are familiar with the most common cybersecurity vulnerabilities, risks and controls.
You are able to describe the function of selected important tools in defensive and offensive cybersecurity.
You are able to implement some basic security policies with selected security controls.
You understand the importance of cybersecurity in different business areas.
Content
What is cybersecurity?
How to define cybersecurity?
What is security?
What is the target in cybersecurity?
Who is in charge of cybersecurity?
What is cyber strategy?
Why is cybersecurity management extremely important?
What are security controls and why are they important?
How to defend against global threats?
What is malware?
How are security policies and risk management related to cybersecurity?
How are computer networks and cybersecurity related?
How does a hacker think?
What tools are hackers using?
What is penetration testing?
What are Next Generation Firewalls and where to use them?
How to implement some basic security policies with firewalls?
How is cybersecurity present in different areas of business?
Opiskelumateriaali
Ohje riskienhallintaan, Valtiovarainministeriön julkaisuja 22/2017
Will be given later.
Yksilölliset oppimisväylät
Scheduled track:
Course is implemented as blended distance learning. You participate into contact lessons as scheduled. You studies are progressing in the pace of the contact lessons and self paced learning activities.
Independent track:
If you are working in a company, organisation or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practise. You must show your skills via a demonstration, which is determined based on learning objectives.
TKI ja työelämäyhteistyö
CyberLab learning environment
Opiskelijan työmäärä
Achieving the learning outcomes requires 135 hours of work.
Toteutuksen osien kuvaus
Kurssilla tehdään mm. laaja riskienhallintaharjoitustehtävä yhdessä Datakeskusten perusteet kurssin kanssa. Riskianalyysin kohteen on CyberLab datakeskus.
Evaluation scale
1-5
Assessment methods and criteria
Arvosana kertyy Learn-alustan arviointikirjaan.
Assessment criteria, excellent (5)
a) use professional vocabulary and concepts in an expert way in different situations.
b) evaluate information sources critically.
e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.
e) use the key models, methods, software and techniques of the professional field.