Skip to main content

Secure routed networksLaajuus (5 cr)

Code: KT00DN54

Credits

5 op

Objective

You know how to design and implement secure routed networks.
You know the differences between routing protocols and are able to select appropriate routing protocol to your design.
You understand the interactions between different routing protocols and are able to assess and improve routed network security and create high availability solutions.
You are able to apply advanced features of routers to improve overall network security.

Content

How do routing protocols and their advanced features function?
How are routing protocols interoperating?
How to use routers to improve overall security and network availablity?
How to implement various routing technologies?

Assessment criteria, good (3)

Students are able to
(a) use professional vocabulary and concepts in an expert way in different situations.
(e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.

Enrollment

14.08.2024 - 08.09.2024

Timing

01.09.2024 - 15.12.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Department of Information Technology

Campus

Kotka Campus

Teaching languages
  • Finnish
Seats

20 - 40

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Vesa Kankare
Teacher in charge

Vesa Kankare

Groups
  • KTKT22SP
    Cybersecurity, full-time studies

Objective

You know how to design and implement secure routed networks.
You know the differences between routing protocols and are able to select appropriate routing protocol to your design.
You understand the interactions between different routing protocols and are able to assess and improve routed network security and create high availability solutions.
You are able to apply advanced features of routers to improve overall network security.

Content

How do routing protocols and their advanced features function?
How are routing protocols interoperating?
How to use routers to improve overall security and network availablity?
How to implement various routing technologies?

Opiskelumateriaali

Online self-study material, online resources and remote laboratory exercises

Yksilölliset oppimisväylät

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.

Independent or blended track:
You study the topics by yourself and execute required learning activities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.

TKI ja työelämäyhteistyö

-

Tentit ja muut määräajat

Retakes are arranged as needed in agreement with the responsible teacher

Opiskelijan työmäärä

Achieving the learning outcomes requires 135 hours of work of which about a third is contact lessons and laboratory exercises and the rest self study, practise exams and remote laboratory exercises.

Evaluation scale

1-5

Assessment criteria, good (3)

Students are able to
(a) use professional vocabulary and concepts in an expert way in different situations.
(e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.

Assessment methods and criteria

Assessment is based on learning activities and exams

Enrollment

06.04.2023 - 21.04.2023

Timing

01.09.2023 - 15.12.2023

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Department of Information Technology

Campus

Kotka Campus

Teaching languages
  • Finnish
Seats

10 - 40

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Vesa Kankare
Teacher in charge

Vesa Kankare

Groups
  • KTKT21SP
    Cybersecurity, full-time studies

Objective

You know how to design and implement secure routed networks.
You know the differences between routing protocols and are able to select appropriate routing protocol to your design.
You understand the interactions between different routing protocols and are able to assess and improve routed network security and create high availability solutions.
You are able to apply advanced features of routers to improve overall network security.

Content

How do routing protocols and their advanced features function?
How are routing protocols interoperating?
How to use routers to improve overall security and network availablity?
How to implement various routing technologies?

Opiskelumateriaali

Online self-study material, online resources and remote laboratory exercises

Yksilölliset oppimisväylät

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.

Independent or blended track:
You study the topics by yourself and execute required learning activities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.

TKI ja työelämäyhteistyö

-

Tentit ja muut määräajat

Retakes are arranged as needed in agreement with the responsible teacher

Opiskelijan työmäärä

Achieving the learning outcomes requires 135 hours of work of which about a third is contact lessons and laboratory exercises and the rest self study, practise exams and remote laboratory exercises.

Evaluation scale

1-5

Assessment criteria, good (3)

Students are able to
(a) use professional vocabulary and concepts in an expert way in different situations.
(e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.

Assessment methods and criteria

Assessment is based on learning activities and exams

Enrollment

06.04.2022 - 22.04.2022

Timing

30.08.2022 - 16.12.2022

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Unit

Department of Information Technology

Campus

Kotka Campus

Teaching languages
  • Finnish
Seats

10 - 35

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Vesa Kankare
Teacher in charge

Vesa Kankare

Groups
  • KTKT20SP
    Cybersecurity, full-time studies

Objective

You know how to design and implement secure routed networks.
You know the differences between routing protocols and are able to select appropriate routing protocol to your design.
You understand the interactions between different routing protocols and are able to assess and improve routed network security and create high availability solutions.
You are able to apply advanced features of routers to improve overall network security.

Content

How do routing protocols and their advanced features function?
How are routing protocols interoperating?
How to use routers to improve overall security and network availablity?
How to implement various routing technologies?

Opiskelumateriaali

Online self-study material, online resources and remote laboratory exercises

Yksilölliset oppimisväylät

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.

Independent or blended track:
You study the topics by yourself and execute required learning activities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.

TKI ja työelämäyhteistyö

-

Tentit ja muut määräajat

Retakes are arranged as needed in agreement with the responsible teacher

Opiskelijan työmäärä

Achieving the learning outcomes requires 135 hours of work of which about a third is contact lessons and laboratory exercises and the rest self study, practise exams and remote laboratory exercises.

Evaluation scale

1-5

Assessment criteria, good (3)

Students are able to
(a) use professional vocabulary and concepts in an expert way in different situations.
(e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.

Assessment methods and criteria

Assessment is based on learning activities and exams