Skip to main content

Basics of cybersecurityLaajuus (5 cr)

Code: KT00DN42

Credits

5 op

Teaching language

  • Finnish

Objective

You are able to define cybersecurity.
Your understand the importance of managing cyber security.
You understand the concept of control-based information governance.
You are familiar with the most common cybersecurity vulnerabilities, risks and controls.
You are able to describe the function of selected important tools in defensive and offensive cybersecurity.
You are able to implement some basic security policies with selected security controls.
You understand the importance of cybersecurity in different business areas.

Content

What is cybersecurity?
How to define cybersecurity?
What is security?
What is the target in cybersecurity?
Who is in charge of cybersecurity?
What is cyber strategy?
Why is cybersecurity management extremely important?
What are security controls and why are they important?
How to defend against global threats?
What is malware?
How are security policies and risk management related to cybersecurity?
How are computer networks and cybersecurity related?
How does a hacker think?
What tools are hackers using?
What is penetration testing?
What are Next Generation Firewalls and where to use them?
How to implement some basic security policies with firewalls?
How is cybersecurity present in different areas of business?

Enrollment

14.08.2024 - 08.09.2024

Timing

26.08.2024 - 22.12.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Department of Information Technology

Campus

Kotka Campus

Teaching languages
  • Finnish
Seats

20 - 40

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Jaakko Nurmi
Teacher in charge

Jaakko Nurmi

Groups
  • KTKT24SP
    Cybersecurity, full-time studies

Objective

You are able to define cybersecurity.
Your understand the importance of managing cyber security.
You understand the concept of control-based information governance.
You are familiar with the most common cybersecurity vulnerabilities, risks and controls.
You are able to describe the function of selected important tools in defensive and offensive cybersecurity.
You are able to implement some basic security policies with selected security controls.
You understand the importance of cybersecurity in different business areas.

Content

What is cybersecurity?
How to define cybersecurity?
What is security?
What is the target in cybersecurity?
Who is in charge of cybersecurity?
What is cyber strategy?
Why is cybersecurity management extremely important?
What are security controls and why are they important?
How to defend against global threats?
What is malware?
How are security policies and risk management related to cybersecurity?
How are computer networks and cybersecurity related?
How does a hacker think?
What tools are hackers using?
What is penetration testing?
What are Next Generation Firewalls and where to use them?
How to implement some basic security policies with firewalls?
How is cybersecurity present in different areas of business?

Opiskelumateriaali

Ohje riskienhallintaan, Valtiovarainministeriön julkaisuja 22/2017
Will be given later.

Yksilölliset oppimisväylät

Scheduled track:
Course is implemented as blended distance learning. You participate into contact lessons as scheduled. You studies are progressing in the pace of the contact lessons and self paced learning activities.

Independent track:
If you are working in a company, organisation or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practise. You must show your skills via a demonstration, which is determined based on learning objectives.

TKI ja työelämäyhteistyö

CyberLab learning environment

Opiskelijan työmäärä

Achieving the learning outcomes requires 135 hours of work.

Toteutuksen osien kuvaus

Kurssilla tehdään mm. laaja riskienhallintaharjoitustehtävä yhdessä Datakeskusten perusteet kurssin kanssa. Riskianalyysin kohteen on CyberLab datakeskus.

Evaluation scale

1-5

Assessment methods and criteria

Arvosana kertyy Learn-alustan arviointikirjaan.

Assessment criteria, excellent (5)

a) use professional vocabulary and concepts in an expert way in different situations.
b) evaluate information sources critically.
e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.
e) use the key models, methods, software and techniques of the professional field.

Enrollment

30.08.2023 - 02.09.2023

Timing

01.08.2023 - 31.12.2023

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Department of Information Technology

Campus

Kotka Campus

Teaching languages
  • Finnish
Seats

10 - 40

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Jaakko Nurmi
Teacher in charge

Jaakko Nurmi

Groups
  • KTKT23SP
    Cybersecurity, full-time studies

Objective

You are able to define cybersecurity.
Your understand the importance of managing cyber security.
You understand the concept of control-based information governance.
You are familiar with the most common cybersecurity vulnerabilities, risks and controls.
You are able to describe the function of selected important tools in defensive and offensive cybersecurity.
You are able to implement some basic security policies with selected security controls.
You understand the importance of cybersecurity in different business areas.

Content

What is cybersecurity?
How to define cybersecurity?
What is security?
What is the target in cybersecurity?
Who is in charge of cybersecurity?
What is cyber strategy?
Why is cybersecurity management extremely important?
What are security controls and why are they important?
How to defend against global threats?
What is malware?
How are security policies and risk management related to cybersecurity?
How are computer networks and cybersecurity related?
How does a hacker think?
What tools are hackers using?
What is penetration testing?
What are Next Generation Firewalls and where to use them?
How to implement some basic security policies with firewalls?
How is cybersecurity present in different areas of business?

Opiskelumateriaali

Ohje riskienhallintaan, Valtiovarainministeriön julkaisuja 22/2017
Will be given later.

Yksilölliset oppimisväylät

Scheduled track:
Course is implemented as blended distance learning. You participate into contact lessons as scheduled. You studies are progressing in the pace of the contact lessons and self paced learning activities.

Independent track:
If you are working in a company, organisation or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practise. You must show your skills via a demonstration, which is determined based on learning objectives.

TKI ja työelämäyhteistyö

CyberLab learning environment

Opiskelijan työmäärä

Achieving the learning outcomes requires 135 hours of work.

Toteutuksen osien kuvaus

Kurssilla tehdään mm. laaja riskienhallintaharjoitustehtävä yhdessä Datakeskusten perusteet kurssin kanssa. Riskianalyysin kohteen on CyberLab datakeskus.

Evaluation scale

1-5

Assessment methods and criteria

Arvosana kertyy Learn-alustan arviointikirjaan.

Assessment criteria, excellent (5)

a) use professional vocabulary and concepts in an expert way in different situations.
b) evaluate information sources critically.
e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.
e) use the key models, methods, software and techniques of the professional field.

Enrollment

22.08.2022 - 28.08.2022

Timing

01.08.2022 - 18.12.2022

Number of ECTS credits allocated

5 op

Virtual portion

2 op

Mode of delivery

60 % Contact teaching, 40 % Distance learning

Unit

Department of Information Technology

Campus

Kotka Campus

Teaching languages
  • Finnish
Seats

20 - 50

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Kimmo Kääriäinen
  • Martti Kettunen
  • Jaakko Nurmi
Teacher in charge

Kimmo Kääriäinen

Groups
  • KTKT22SP
    Cybersecurity, full-time studies

Objective

You are able to define cybersecurity.
Your understand the importance of managing cyber security.
You understand the concept of control-based information governance.
You are familiar with the most common cybersecurity vulnerabilities, risks and controls.
You are able to describe the function of selected important tools in defensive and offensive cybersecurity.
You are able to implement some basic security policies with selected security controls.
You understand the importance of cybersecurity in different business areas.

Content

What is cybersecurity?
How to define cybersecurity?
What is security?
What is the target in cybersecurity?
Who is in charge of cybersecurity?
What is cyber strategy?
Why is cybersecurity management extremely important?
What are security controls and why are they important?
How to defend against global threats?
What is malware?
How are security policies and risk management related to cybersecurity?
How are computer networks and cybersecurity related?
How does a hacker think?
What tools are hackers using?
What is penetration testing?
What are Next Generation Firewalls and where to use them?
How to implement some basic security policies with firewalls?
How is cybersecurity present in different areas of business?

Opiskelumateriaali

Ohje riskienhallintaan, Valtiovarainministeriön julkaisuja 22/2017
Will be given later.

Yksilölliset oppimisväylät

Scheduled track:
Course is implemented as blended distance learning. You participate into contact lessons as scheduled. You studies are progressing in the pace of the contact lessons and self paced learning activities.

Independent track:
If you are working in a company, organisation or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practise. You must show your skills via a demonstration, which is determined based on learning objectives.

TKI ja työelämäyhteistyö

CyberLab learning environment

Opiskelijan työmäärä

Achieving the learning outcomes requires 135 hours of work.

Toteutuksen osien kuvaus

Kurssilla tehdään mm. laaja riskienhallintaharjoitustehtävä yhdessä Datakeskusten perusteet kurssin kanssa. Riskianalyysin kohteen on CyberLab datakeskus.

Evaluation scale

1-5

Assessment methods and criteria

Arvosana kertyy Learn-alustan arviointikirjaan.

Assessment criteria, excellent (5)

a) use professional vocabulary and concepts in an expert way in different situations.
b) evaluate information sources critically.
e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.
e) use the key models, methods, software and techniques of the professional field.