Skip to main content

Security devicesLaajuus (5 cr)

Course unit code: KT00FE06

General information


Credits
5 cr
Responsible person
Kimmo Kääriäinen

Objective

You are able to implement effective information security solutions using various security devices.
You are able to implement technical information security controls based on information security policies.
You are able to design and implement virtual private networks.
You are able to identify and combat various threats posed on data networks and end points.

Content

How are information security solutions implemented with different security devices?
How are technical information security controls derived from information security policies?
How are virtual private networks designed and implemented?
How do you identify and prepare for various threats targeted at information networks?

Accomplishment methods

a. use professional vocabulary systematically.
c. identify interrelated tasks.
e. use the key models, methods, software and techniques of the professional field.

Go back to top of page