Security devicesLaajuus (5 cr)
Course unit code: KT00FE06
General information
- Credits
- 5 cr
- Responsible person
- Kimmo Kääriäinen
Objective
You are able to implement effective information security solutions using various security devices.
You are able to implement technical information security controls based on information security policies.
You are able to design and implement virtual private networks.
You are able to identify and combat various threats posed on data networks and end points.
Content
How are information security solutions implemented with different security devices?
How are technical information security controls derived from information security policies?
How are virtual private networks designed and implemented?
How do you identify and prepare for various threats targeted at information networks?
Accomplishment methods
a. use professional vocabulary systematically.
c. identify interrelated tasks.
e. use the key models, methods, software and techniques of the professional field.