Skip to main content

Degree Programme in Cyber Security

Degree:
Bachelor of Engineering

Degree title:
Insinööri (AMK), Bachelor of Engineering

Credits:
240 ects

Objectives

The core of the engineer education in the cybersecurity is in the skills of the functional cybersecurity, in the form of action learning. You will have skills for preventing, detecting, responding, and in case of attack, mitigating the consequences. New kinds of skills and competences are needed in the working life of the future. The objective of the education is to produce modern high-level competences in the area of cybersecurity.

Disruptions in the operations of our internet-based society may be fatal. You also become familiar with cybersecurity frameworks, standards, security management and can classify the vulnerabilities and the principles of protection. After the studies, students can apply security solutions for discovering security threats and for protecting against them. You are also able to manage countermeasures against denial-of-service attacks.

Degree programme description

The extent of the studies is 240 ects.
The curriculum consists of programme-specific core studies 180 ects, supplementary studies 60 ects. Internship is 30 ects and of Bachelor’s thesis is 15 ects.

Studies concentrating especially in cybersecurity are 60 ects.
• Applied Cybersecurity
• Advanced Cybersecurity
• Secure Datacenter Technology
• Advanced Secure Networking


Implementation of studies and flexible learning tracks

Scheduled track

You participate into scheduled contact lessons. Your studies are progressing in the pace of the group schedule and self-paced learning activities. Studies of cybersecurity are mostly scheduled contact lessons on the Kotka campus.

Fast track

You study the topics by yourself and execute required learning activities. You can accelerate your studies having online studies from summer portal or for example having MOOC-studies from other universities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities.

Integrated track

You study the topics by yourself and execute required learning activities by carrying out them in addition to your work. You can also demonstrate the required skills via demonstration of prior learning of the topic. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.

Career opportunities

After you have completed the Bachelor’s Degree Programme in Cybersecurity you are able to work for cybersecurity or information security companies or IT departments of companies, for Internet service providers, network operators, datacenters or military.

• Cybersecurity analyst
• Information Security Manager
• Cybersecurity expert
• Penetration Tester
• IT Manager
• Security Tester
• Ethical hacker
• Security Consultant
• IT Engineer
• System Engineer
• Communication Designer
• Networking Expert
• Project manager
• System expert

RDI and cooperation with world of work

Education in cybersecurity participates eagerly in RDI activities. CyberELITE project focuses on business opportunities and cybersecurity threats due to the digitalization of manufacturing industry. Starting point for the project is EU-level preparation for Cybersecurity act, which aims to improve and guarantee the cybersecurity and reliability of SME companies. Another starting point are cybersecurity testing needs reported by companies. The strategies of Councils of South-West and South-East Finland emphasize digitalization, renewal of manufacturing industry and cybersecurity as main goals.

The project will develop regional innovation platforms, which consist of IoT cybersecurity laboratory activities, processes, and connections to external actors. The focus for the innovation platform is manufacturing industry and secure IoT devices as a part of service production. The goal is to create ecosystem able to support IoT business development especially for SME sector.

Virtual laboratory hosted on Kotka CyberLab datacenter is used in CyberELITE as important remote laboratory for IoT devices. The project has given working or internship place so far for about ten students of cybersecurity.

Learning environments

For cybersecurity education, XAMK Virtual Laboratory is so far the most important result for South-Eastern Finland University of Applied Sciences. The platform of the service is located at the CyberLab datacenter in Kotka.

CyberLab is the datacenter of the Degree Programme in Cybersecurity of the South-Eastern Finland University of Applied Sciences. A few years ago, a modern CyberLab datacenter was built at South-Eastern University of Applied Sciences for training and project purposes. The datacenter works as an important part of datacenter technology education. The datacenter is highly used by XAMK Virtual Laboratory. XAMK Virtual Laboratory is a cloud service, which only requires users to have a modern web browser with support for HTML5.

VirtualLab is a virtual laboratory service running on the CyberLab datacenter. VirtualLab is now widely used in cybersecurity- and information networks education, as well as in RDI activities (Research, Development, Innovation). It replaces almost all laboratory work done with physical devices. For example, before a three-person student group had only a few devices to use, but now one student can have a multiple complete virtual ”worlds” each including over 20 virtual devices. These are called ”laboratories” or ”scenarios”. VirtualLab is in heavy use: at the best, the system has had simultaneously nearly 100 users, 250 laboratories, about 3200 active virtual machines and approximately 4900 virtual cables.

The VirtuaLab can be used from XAMK’s own computers as well as from any device that has a modern HTML5 capable web browser. For example, a student logs into the system from https://virtual.ictlab.fi. Then they can reserve up to ten simultaneous scenarios. Each scenario can contain multiple virtual machines, and all virtual machines come with all the cables required for connecting them. Now the student selects which scenario he/she wants to interact with. After that, they is greeted with a network topology image containing all the devices included in the scenario. The student can select any device from the topology image by clicking it, and then he/she is taken to a screen that resembles a remote desktop view of the virtual machine.

The VirtualLab system enables the construction of complex virtualized environments that include multiple virtual machines, each with their own operating system. These machines can be servers, workstations, switches, routers, firewalls, and so on. All of these machines can be interacted with and external software can be installed to them. One can create any type of scenario they want, whether it is an offensive- or defensive cybersecurity laboratory or a practice laboratory for datacenter networking.

Cyber security, full-time studies
Cyber security, full-time studies
Cyber security, full-time studies
Cyber security, full-time studies
Cyber security, full-time studies
Enrolment

22.08.2022 - 28.08.2022

Timing

29.08.2022 - 18.12.2022

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

10 - 35

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Tomi Pahula
  • Kimmo Kääriäinen
Responsible person

Tomi Pahula

Student groups
  • KTKT22SP
    Cybersecurity, full-time studies

Objective

You understand the importance of cyber security
You are able to configure different network and security devices
You are able to co-operate in a group

Content

How to implement cybersecurity ?

Employer connections

-

Evaluation scale

1-5

Enrolment

07.11.2022 - 18.11.2022

Timing

01.01.2023 - 01.05.2023

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • English
  • Finnish
Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Tarmo Ahvenainen
Responsible person

Tarmo Ahvenainen

Student groups
  • KTKT22SP
    Cybersecurity, full-time studies

Objective

You are able to actively use the basic professional vocabulary of your field.
You are able to look for information in English in professional sources and apply it in different study and work related communication situations.
You are able to communicate in English in various spoken and written situations in your professional field at the European level B2.

Content

What professional vocabulary is essential in your professional field?
How to look for information in professional sources in English and how to apply this information?
How to interact in spoken communication situations in English and how to draw up texts in English for professional purposes?
How to communicate in study-related situations and work communities in English?

Materials

Provided by the teacher.

Teaching methods

If you have gained competence to work in an international environment in cybersecurity thru work experience, contact the teacher if you want to demonstrate your skills instead of participating in the course.

Employer connections

None.

Exam schedules

Writing exam in Exam aquarium 1 April to 30 April or manually in the last class.
Applied written home exam and oral exam in Learn 24 April to 7 May.
Required assignments must be submitted before written home exam.

International connections

Open.

Student workload

Classes 12 x 2 hrs = 28 hrs.
Independent wokt 110 hrs.

Evaluation scale

1-5

Assessment criteria, satisfactory (1)

Ability to communicate in English orally and in writing in various situations in the professional field mainly at the European (CEFR) level B1.

Assessment criteria, good (3)

Ability to communicate in English orally and in writing in various situations in the professional field mainly at the European (CEFR) level B2.

Assessment criteria, excellent (5)

Ability to communicate in English orally and in writing in various situations in the professional field mainly at the European (CEFR) level C1.

Assessment methods and criteria

Course grade based on presentation, oral exam, writing exam, applied home exam. Each has 25% emphasis. Each part must be passed. Assessment is based on CERF levels: C1 = 5, B2 = 3-4, B1 = 1-2.

Qualifications

If you have been instructed to participate in the Intensive course in English, you must complete it or independently acquire the equivalent knowledge and skills before you can participate in this course.

Enrolment

07.11.2022 - 18.11.2022

Timing

09.01.2023 - 31.03.2023

Credits

5 op

Virtual proportion (cr)

1 op

Mode of delivery

80 % Contact teaching, 20 % Distance learning

Teaching languages
  • Finnish
  • roo.sv
Seats

20 - 40

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Marie Laaksonen
Responsible person

Marie Laaksonen

Student groups
  • KTKT21SP
    Cybersecurity, full-time studies

Objective

You are able to communicate in spoken and written situations in your own field.
You are familiar with the terminology of your field and able to communicate in Swedish in professional situations.

The objectives are based on the Common European Framework of Languages, level B1 and Government Decree 1129/2014.

After completing the course with the grade of 3, you are able to:
- understand clear standard and work-related speech.
- use basic structures reasonably well both in spoken and written situations.
- speak relatively fluently so that occasional mistakes in pronunciation or prosody do not lead to misunderstanding.
- describe your education and work experience for example when applying for a job.
- describe and discuss key issues of your professional field (eg. the operation, products, processes or services of companies and/or organizations).

Content

How do you use Swedish vocabulary related to education, work environment and workplace duties?
How do you use Swedish in different communicative situations of working life, for example in emails, telephoning and meetings?
How do you use the basic professional vocabulary required in your field and operational environment?

Evaluation scale

1-5

Qualifications

If you have been instructed to participate in the Intensive course in Swedish, you must complete it or independently acquire the equivalent knowledge and skills before you can participate in this course.

Enrolment

07.11.2022 - 18.11.2022

Timing

09.01.2023 - 02.05.2023

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

20 - 30

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Vesa Kankare
Responsible person

Vesa Kankare

Student groups
  • KTKT20SP
    Cybersecurity, full-time studies

Objective

You know the basics of datacenter application delivery.
You understand application delivery architecture and methods of ensuring application availability and security.
You are able to implement a basic application delivery system and improve the performance and security of the system.

Content

What design architectures are used in datacenter application delivery?
How to ensure high availability and security in application delivery?
How to improve the performance of an application using application delivery controllers?

Materials

Online self-study material, online resources and remote laboratory exercises

Teaching methods

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.

Independent track:
You study the topics by yourself and execute required learning activities. You can also demonstrate the required skills via demonstration of prior learning of the topic. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.

Blended track:
You study the topics by yourself and execute required learning activities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.

Employer connections

-

Exam schedules

Retakes are arranged as needed in agreement with the responsible teacher

Student workload

Achieving the learning outcomes requires 135 hours of work of which about a third is contact lessons and laboratory exercises and the rest self study, practise exams and remote laboratory exercises.

Evaluation scale

1-5

Assessment criteria, good (3)

Students are able to
(a) use professional vocabulary and concepts in an expert way in different situations.
(e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.

Assessment methods and criteria

Assessment is based on learning activities and exams

Enrolment

22.08.2022 - 28.08.2022

Timing

29.08.2022 - 18.12.2022

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

20 - 50

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Tomi Pahula
  • Martti Kettunen
  • Jaakko Nurmi
Responsible person

Martti Kettunen

Student groups
  • KTKT22SP
    Cybersecurity, full-time studies

Objective

You know the principles for the location and construction of data centers.
You are able to describe the building blocks and architectures of secure data centers.
You know the principles of physical security in data centers.
You are able to perform a simple risk analysis of a data center.
You are able to calculate the availability of a data center.
You know the basics of ups-systems.
You know the principles of data center cooling systems.
You know the basics of data center networks.
You are able to design a simple CLOS-fabric.
You know the basics of storaging data in a data center.
You know the components and construction of servers.
You are familiar with the most important server technologies used in datacenters.
You are able to assemble a X86 architecture computer.
You are able to use a computer's firmware tools and test the condition of a computer's hardware.

Content

Where to locate new data centers?
What facility and space requirements must be met when building a data center?
How to evaluate the physical security of a data center?
How to evaluate the availability of a data center?
How to design data center networks?
How to select an ups system for a data center?
How to arrange cooling in a data center?
How to build redundant compute server systems?
How to build redundant disk systems?
What components are required to build a datacenter?
How to protect a data center from fire, flood or intrusion?
Why is it important to know the compatibility of server components?

Materials

Learn learning platform

Teaching methods

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.

Employer connections

If you are working in a company, organisation or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practise. You must show your skills via a demonstration, which is determined based on learning objectives.

Student workload

Achieving the learning outcomes requires 135 hours of work.

Evaluation scale

1-5

Assessment criteria, good (3-4)

a. use professional vocabulary systematically
b. look for information in the key information sources of the field.
c. identify interrelated tasks
e. use the key models, methods, software and techniques of the professional fiel

Enrolment

06.04.2022 - 22.04.2022

Timing

29.08.2022 - 09.12.2022

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

12 - 60

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Henry Lähteenmäki
Responsible person

Henry Lähteenmäki

Student groups
  • KTKT21SP
    Cybersecurity, full-time studies

Objective

You know the basic concepts of calculus.
You are able to differentiate and integrate different kinds of functions using various methods.
You are able to apply calculus in engineering tasks.

Content

How are real numbers defined and equations and inequalities solved?
How are plane curves determined, and what are the basic elementary (real) functions and their properties?
What does the convergence of (real) sequences and series mean and how are sequences and series applied in engineering tasks?
How are the derivative, integral function and definite integral defined and what differentiation and integration methods are there?
How are functions of multiple variables differentiated?
How are differentiation and integration applied in engineering tasks?

Materials

Lecture notes and calculations.

Teaching methods

Final Exam.

Employer connections

This course does not include RDI and work-related cooperation.

Evaluation scale

1-5

Qualifications

A basic knowledge of number systems, logic, sets and Boolean algebras are required.

Enrolment

07.11.2022 - 18.11.2022

Timing

01.01.2023 - 01.05.2023

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

20 - 40

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Kimmo Kääriäinen
  • Teemu Saarelainen
  • ITY Tietotekniikka_Kotka
Responsible person

Kimmo Kääriäinen

Student groups
  • KTKT22SP
    Cybersecurity, full-time studies

Objective

You are able to solve equations related to electrical circuits.
You are able to dimension electronics circuits.
You are able to use simulation software for observing electronics circuits.
You are able to identify the components and architecture of electronic equipment.
You are able to use measuring instruments to measure the basic quantities of electrical circuits.

Content

How to condition, solve and dimension electrical circuits?
How to use simulation software?
What are the basic components of electronic equipment?
What are the operational principles of measuring instruments and how to measure the basic quantities of electrical circuits?

Materials

Lecturing materials in Learn, www sources and references

Teaching methods

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities

Independent track:
If you are working in a company, organisation or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practise. You must show your skills via a demonstration, which is determined based on learning objectives.

Exam schedules

Achieving the learning outcomes requires 135 hours of work.
Inluding lectures, teamworking studies and independent homework and exercises.

Evaluation scale

1-5

Enrolment

06.04.2022 - 22.04.2022

Timing

05.09.2022 - 31.12.2022

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

1 - 40

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Tiina Kettunen
Responsible person

Tiina Kettunen

Student groups
  • KTKT21SP
    Cybersecurity, full-time studies

Objective

You are able to solve basic equations between quantities and convert values from one unit to another.
You are able to do basic calculations using vector quantities and determine quantities graphically.
You are able to use the basic concepts of solid, liquid, gas, heat, electricity and wave motion in physics and in the context of technology to solve problems theoretically and experimentally.

Content

How to present vectors and use vector components?
How to evaluate quantities graphically?
What are the fundamental phenomena, quantities, units, definitions and natural laws related to solids, liquids, gas, heat, electricity and wave motion?
How to solve equations between the quantities of physics?

Evaluation scale

1-5

Enrolment

22.08.2022 - 28.08.2022

Timing

29.08.2022 - 18.12.2022

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

20 - 40

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Tomi Pahula
  • Jaakko Nurmi
Responsible person

Tomi Pahula

Student groups
  • KTKT22SP
    Cybersecurity, full-time studies

Objective

You are able to efficiently use Xamk ICT learning environments, such as laboratories and network services.
You know the personnel of information technology department and their responsibilities.
You are able to name the basic technologies of the ICT system and describe their purpose.
You can utilize the necessary software, methods and terminology in your field/studies.
You know the basic command line tools and understand their significance in supporting your work.

Content

What learning environments are used in Cyber Security studies and how to use them?
What are the technologies used in ICT systems and what is their purpose?
Who can you contact with questions about your learning environment?
Why are command line tools important?

Evaluation scale

Approved/Failed

Enrolment

07.11.2022 - 18.11.2022

Timing

01.01.2023 - 03.05.2023

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

20 - 30

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Kimmo Kääriäinen
Responsible person

Kimmo Kääriäinen

Student groups
  • KTKT20SP
    Cybersecurity, full-time studies

Objective

You know how to design and implement cybersecurity solutions for companies and individual users.
You understand the importance of cybersecurity to society and companies.
You are able to improve your personal cyberhygiene and identify and prevent threats which may compromise a company's information systems.
You understand more profoundly the practices of information risk management and know the related essential standards and regulations.
You know how to follow the essential information sources in the field.

Content

Cybersecurity on a large scale
Threat and vulnerability analysis
Information risk management
ISO 27000 series
ISO 31000
Information sources

Materials

Lecturing materials in Learn, www sources and references

Teaching methods

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities

Independent track:
If you are working in a company, organisation or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practise. You must show your skills via a demonstration, which is determined based on learning objectives.

Employer connections

Cybersecurity subjects covered in course relate closely to topical subjects in industry and working life organizations

Student workload

Achieving the learning outcomes requires 135 hours of work.
Inluding lectures, teamworking studies and independent homework and exercises.

Evaluation scale

1-5

Enrolment

07.11.2022 - 18.11.2022

Timing

01.01.2023 - 01.05.2023

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

12 - 60

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Tiina Kettunen
Responsible person

Tiina Kettunen

Student groups
  • KTKT21SP
    Cybersecurity, full-time studies

Objective

You are able to use the concepts of numerical methods, the theory of numbers and the queueing theory.
You are able to use the concepts of information theory and coding system.
You are able to form and solve propagation equations of electromagnetic waves.
You are able to do the transformations between time and frequency scales.
You are able to use the concepts of electrical power engineering.

Content

How to form and calculate algorithms of numerical methods, the theory of numbers and the queueing theory?
How to define and solve the propagation equations of electromagnetic waves?
How to calculate frequency transformations of continuous and discrete time signals?
How to calculate and dimension DC and AC circuits?

Evaluation scale

1-5

Qualifications

Prerequisities of mathematics and physics

Enrolment

22.08.2022 - 28.08.2022

Timing

01.08.2022 - 31.12.2022

Credits

5 op

Virtual proportion (cr)

2 op

Mode of delivery

60 % Contact teaching, 40 % Distance learning

Teaching languages
  • Finnish
Seats

20 - 50

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Kimmo Kääriäinen
  • Martti Kettunen
  • Jaakko Nurmi
Responsible person

Kimmo Kääriäinen

Student groups
  • KTKT22SP
    Cybersecurity, full-time studies

Objective

You are able to define cybersecurity.
Your understand the importance of managing cyber security.
You understand the concept of control-based information governance.
You are familiar with the most common cybersecurity vulnerabilities, risks and controls.
You are able to describe the function of selected important tools in defensive and offensive cybersecurity.
You are able to implement some basic security policies with selected security controls.
You understand the importance of cybersecurity in different business areas.

Content

What is cybersecurity?
How to define cybersecurity?
What is security?
What is the target in cybersecurity?
Who is in charge of cybersecurity?
What is cyber strategy?
Why is cybersecurity management extremely important?
What are security controls and why are they important?
How to defend against global threats?
What is malware?
How are security policies and risk management related to cybersecurity?
How are computer networks and cybersecurity related?
How does a hacker think?
What tools are hackers using?
What is penetration testing?
What are Next Generation Firewalls and where to use them?
How to implement some basic security policies with firewalls?
How is cybersecurity present in different areas of business?

Materials

Ohje riskienhallintaan, Valtiovarainministeriön julkaisuja 22/2017
Will be given later.

Teaching methods

Scheduled track:
Course is implemented as blended distance learning. You participate into contact lessons as scheduled. You studies are progressing in the pace of the contact lessons and self paced learning activities.

Independent track:
If you are working in a company, organisation or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practise. You must show your skills via a demonstration, which is determined based on learning objectives.

Employer connections

CyberLab learning environment

Student workload

Achieving the learning outcomes requires 135 hours of work.

Evaluation scale

1-5

Assessment criteria, excellent (5)

a) use professional vocabulary and concepts in an expert way in different situations.
b) evaluate information sources critically.
e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.
e) use the key models, methods, software and techniques of the professional field.

Enrolment

07.11.2022 - 18.11.2022

Timing

09.01.2023 - 17.12.2023

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Vesa Kankare
  • Kimmo Kääriäinen
Responsible person

Vesa Kankare

Student groups
  • KTKT21SP
    Cybersecurity, full-time studies

Objective

You know how to execute a cybersecurity project.
You are able to plan a project and report its progress and outcomes.
You are able to search new information and apply the information to successfully execute a project.
You gain experience in team work.

Content

How to plan a project?
How to search for and apply new information?
How to report project progress and outcomes?
How to work as a team member and work together to solve a problem?

Materials

Online resources, literature

Teaching methods

Scheduled track:
You participate into scheduled contact lessons where you advance your project.

Independent track:
You execute the project in workplace. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.

Blended track:
You execute the project as a self oriented project with your team member

Exam schedules

Retakes are arranged as needed in agreement with the teacher

Student workload

Achieving the learning outcomes requires 135 hours of work with the assigned project

Evaluation scale

1-5

Assessment methods and criteria

Assessment is based on project plan, mid-project presentation and final project report and presentation of the project outcomes

Qualifications

Operating systems
Cybersecurity

Enrolment

06.04.2022 - 22.04.2022

Timing

29.08.2022 - 18.12.2022

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

10 - 35

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Tomi Pahula
  • Kimmo Kääriäinen
Responsible person

Tomi Pahula

Student groups
  • KTKT21SP
    Cybersecurity, full-time studies

Objective

You know the properties and most important roles of the newest Windows servers.
You understand the roles of services and how to implement in a cost-effective and safe manner the information system of a small or medium-sized company.
You know how to use the Linux command line and graphical user interface.
You understand how to the Linux operating systems works.
You know how to install a web server in Linux.

Content

What is an Operating System?
Why to study and use Windows?
What is AD?
What is Linux and what are Linux possibilities?
How to use Linux command line and GUI?

Employer connections

-

Evaluation scale

1-5

Qualifications

ICT environment
Basics of networking

Enrolment

07.11.2022 - 18.11.2022

Timing

10.04.2023 - 11.06.2023

Credits

5 op

Virtual proportion (cr)

5 op

Mode of delivery

Distance learning

Teaching languages
  • Finnish
Seats

1 - 30

Degree programmes
  • Degree Programme in Cyber Security
  • Open University of Applied Sciences
Teachers
  • Tomi Pahula
Student groups
  • VV2022-2023
    Optional studies 2022-2023

Objective

The course is divided into two parts.
By the end of the first part, students will be able to perform installation, establish network connectivity, manage physical storage, and perform basic security administration.
By the end of the second part, students will be able to administer and troubleshoot file systems and partitioning, logical volume management, access control, package management.

Content

Course based on Red Hat System Administration I ja II (RH124 and RH134) materials.

Evaluation scale

1-5

Enrolment

06.04.2022 - 22.04.2022

Timing

29.08.2022 - 18.12.2022

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

10 - 35

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Kimmo Kääriäinen
Responsible person

Kimmo Kääriäinen

Student groups
  • KTKT21SP
    Cybersecurity, full-time studies

Objective

You understand the basics of programming.
You know how to use different data types.
You undertand the necessity and importance of different programming structures (conditions, loops) and the benefits of using functions.
You know how to independently design and implement simple programs.
You are able to identify basic structures and functions in different programming languages.

Content

How do you program simple applications?
What functions and concepts act almost identically in many popular programming languages?
What are variables, inputs, outputs, conditions, loops, strings, arrays and functions?

Materials

Online self-study material, online resources and exercises

Teaching methods

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.

Independent track:
If you are working in a company, organization or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practice. You must show your skills via a demonstration, which is determined based on learning objectives.

Blended track:
You study the topics by yourself and execute required learning activities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills

Employer connections

Not planned

Exam schedules

Retakes are arranged as needed in agreement with the teacher

Student workload

Achieving the learning outcomes requires 135 hours of work of which about third are contact lessons and laboratory exercises and the rest are self study, practice exams and remote exercises

Evaluation scale

1-5

Assessment methods and criteria

Assessment is based on learning activities and assignments

Enrolment

22.08.2022 - 28.08.2022

Timing

01.08.2022 - 31.07.2024

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Tomi Pahula
Responsible person

Tomi Pahula

Student groups
  • KTKT22SP
    Cybersecurity, full-time studies

Objective

You act responsibly as a student and a member of the university community.
You are able to set learning objectives, plan your study and career path, follow your progress in studies and assess your learning.
You are able to improve your working life competencies.
You know how to act according to the ethical principles of your field.
You are able to promote your skills and competencies.

Content

What is Xamk like as a study community and learning environment?
How do you create a personal study and career plan?
How do you identify your skills and competences?
How do you improve your general competences?
What are your profession and line of work like?
What ethical principles are relevant to your field?
How do you promote your competences and strengthen your skills with respect to applying for jobs?
How do you enhance continuous learning?

Evaluation scale

1-5

Enrolment

07.11.2022 - 18.11.2022

Timing

02.01.2023 - 01.05.2023

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

20 - 30

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Kimmo Kääriäinen
Responsible person

Kimmo Kääriäinen

Student groups
  • KTKT20SP
    Cybersecurity, full-time studies

Objective

You are able to define cloud services.
You understand how cloud services are used in companies.
You know the most important cloud service suppliers and the services they are offering.
You are able to use cloud services in accordance with security requirements.
You are able to design databases.
You are able to create the concept model of a database.
You are able to implement practical databases using cloud services.
You are able to do SQL inquiries to databases.

Content

What services are cloud service suppliers offering?
Why to use cloud services?
Who are the intended users of cloud services?
What is the benefit of using cloud services?
How do cloud services differ from traditional services?
Are cloud services secure?
How to design databases?
What is a database and how to implement it in practice?
How to implement a database using the most important cloud services?

Materials

Lecturing materials in Learn, www sources and references

Teaching methods

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities

Independent track:
If you are working in a company, organisation or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practise. You must show your skills via a demonstration, which is determined based on learning objectives.

Employer connections

Possible guest lecturer

Student workload

Achieving the learning outcomes requires 135 hours of work.
Inluding lectures, teamworking studies and independent homework and exercises.

Evaluation scale

1-5

Enrolment

14.03.2023 - 31.03.2023

Timing

08.05.2023 - 18.06.2023

Credits

2 op

Virtual proportion (cr)

2 op

Mode of delivery

Distance learning

Teaching languages
  • Finnish
Seats

1 - 20

Degree programmes
  • Degree Programme in Cyber Security
  • Open University of Applied Sciences
Teachers
  • Tomi Pahula
Student groups
  • VV2022-2023
    Optional studies 2022-2023

Evaluation scale

1-5

Enrolment

07.11.2022 - 18.11.2022

Timing

04.01.2023 - 03.05.2023

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

20 - 30

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • ITY Tietotekniikka_Kotka
Responsible person

Kimmo Kääriäinen

Student groups
  • KTKT20SP
    Cybersecurity, full-time studies

Objective

You are able to create simple yet effective scripts to perform repeated task.
You understand application programming interfaces and are able to use them to acquire data and perform modifications to the system configuration.
You know how scripts can be used to automate systems using programming interfaces.

Content

What is scripting?
What kinds of tools do scripting languages offer and how to utlilise them?
What are application programming interfaces and how to implement scripts that make use of them?
How to automate repeated tasks using scripting?

Materials

Lecturing materials in Learn, www sources and references

Teaching methods

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities

Independent track:
If you are working in a company, organisation or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practise. You must show your skills via a demonstration, which is determined based on learning objectives.

Student workload

Achieving the learning outcomes requires 135 hours of work.
Inluding lectures, teamworking studies and independent homework and exercises.

Evaluation scale

1-5

Assessment criteria, good (3)

Students are able to
(a) use professional vocabulary and concepts in an expert way in different situations.
(e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.

Enrolment

07.11.2022 - 18.11.2022

Timing

01.01.2023 - 01.05.2023

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

20 - 35

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Marko Oras
Responsible person

Marko Oras

Student groups
  • KTKT22SP
    Cybersecurity, full-time studies

Objective

You understand the significance of the personal cyber hygiene to the information security of society and business.
You are familiar with the legislation related to information security and privacy.
You know the difference between cyber security and information security.
You are able to identify information security risks and make improvement proposals to avoid them.
You are able to protect your own operation in cyberspace and reduce the risk of being subjected to an attack, either as an employee or a private person.
You know the most commonly used control and theory models to build protection and maintain information security.
You understand the significance of the high-quality implementation of information security from the organisation's and society's points of view.
You know how industrial systems should be protected and are able to make knowledgable requirements and discuss matters related to information security with other professionals in the field.

Content

Basic concepts of the information security
Information security risks, their effects and rejection.
Information security generally
Laws which are related to the information security
Information security standards and certificates
Encryption methods
Osint

Evaluation scale

1-5

Enrolment

22.08.2022 - 28.08.2022

Timing

29.08.2022 - 18.12.2022

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

20 - 50

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Tomi Pahula
Responsible person

Martti Kettunen

Student groups
  • KTKT22SP
    Cybersecurity, full-time studies

Objective

You know the basics of the OSI model, generic cabling, network standards, IP addresses and LAN devices.

Content

What terminology is used with reference to different networks (LAN, MAN, WAN) and what roles do these networks have?
What are the layers of the OSI model?
How are networks cabled?
What is Ethernet technology?
Whar are LAN switches and routers?
What is the purpose of IPv4 and IPv6 addresses and IPv4 subnetting?
How is a small network tested?
What are the basics of network security?

Evaluation scale

1-5

Enrolment

06.04.2022 - 22.04.2022

Timing

30.08.2022 - 16.12.2022

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

10 - 35

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Vesa Kankare
Responsible person

Vesa Kankare

Student groups
  • KTKT20SP
    Cybersecurity, full-time studies

Objective

You know how to design and implement secure routed networks.
You know the differences between routing protocols and are able to select appropriate routing protocol to your design.
You understand the interactions between different routing protocols and are able to assess and improve routed network security and create high availability solutions.
You are able to apply advanced features of routers to improve overall network security.

Content

How do routing protocols and their advanced features function?
How are routing protocols interoperating?
How to use routers to improve overall security and network availablity?
How to implement various routing technologies?

Materials

Online self-study material, online resources and remote laboratory exercises

Teaching methods

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.

Independent or blended track:
You study the topics by yourself and execute required learning activities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.

Employer connections

-

Exam schedules

Retakes are arranged as needed in agreement with the responsible teacher

Student workload

Achieving the learning outcomes requires 135 hours of work of which about a third is contact lessons and laboratory exercises and the rest self study, practise exams and remote laboratory exercises.

Evaluation scale

1-5

Assessment criteria, good (3)

Students are able to
(a) use professional vocabulary and concepts in an expert way in different situations.
(e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.

Assessment methods and criteria

Assessment is based on learning activities and exams

Enrolment

06.04.2022 - 22.04.2022

Timing

29.08.2022 - 18.12.2022

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

10 - 35

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Kimmo Kääriäinen
Responsible person

Kimmo Kääriäinen

Student groups
  • KTKT21SP
    Cybersecurity, full-time studies

Objective

You are able develop secure webpages using modern technologies.
You understand designing principles and their importance in the development process.
You are able to take into account usability and security perspectives in your work.

Content

How to get started in the development of a webpage ?
How do browsers and secure communications between them and the server work?
How do browsers render web pages and which parts are generated where?
How to design and maintain responsive webpages?

Materials

Online self-study material, online resources and laboratory exercises

Teaching methods

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.

Independent track:
If you are working in a company, organization or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practice. You must show your skills via a demonstration, which is determined based on learning objectives.

Blended track:
You study the topics by yourself and execute required learning activities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills

Employer connections

Not planned

Exam schedules

Retakes are arranged as needed in agreement with the teacher

Student workload

Achieving the learning outcomes requires 135 hours of work of which about third are contact lessons and laboratory exercises and the rest are self study, practice exams and remote exercises

Evaluation scale

1-5

Assessment methods and criteria

Assessment is based on learning activities and assignments

Enrolment

06.04.2022 - 22.04.2022

Timing

19.09.2022 - 18.12.2022

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

20 - 35

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Tomi Pahula
Responsible person

Tomi Pahula

Student groups
  • KTKT21SP
    Cybersecurity, full-time studies

Objective

You understand the basics of redundant networks.
You understand the principles of hierarchical scalable networks.
You are able to maintain and monitor the data network of a company.
You are able to use the most important troubleshooting methods.

Content

How do you confirm the operation of a network?
What do you do when the network should be expanded?
How do you act in the event of a failure in a network?
How do you design the IP subnetting of an enterprise network?

Evaluation scale

1-5

Qualifications

Maintaining secure networks

Enrolment

07.11.2022 - 18.11.2022

Timing

01.01.2023 - 01.05.2023

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

20 - 35

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Tomi Pahula
Responsible person

Tomi Pahula

Student groups
  • KTKT22SP
    Cybersecurity, full-time studies

Objective

You are able to build a network using routers and switches.
You are able to configure virtual LANs to switches.
You are able to configure static routes and most important routing protocols to routers.
You are able to manage the distribution of IP-addresses and access lists in networks.

Content

How do you implement a local network using virtual LANs?
How do you validate the operation and security of a network?
How do you use routing protocols?

Evaluation scale

1-5

Qualifications

Basics of networking

Enrolment

07.11.2022 - 18.11.2022

Timing

09.01.2023 - 30.04.2023

Credits

5 op

Mode of delivery

Contact teaching

Teaching languages
  • Finnish
Seats

20 - 30

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Osku Kiri
  • Vesa Kankare
Responsible person

Vesa Kankare

Student groups
  • KTKT21SP
    Cybersecurity, full-time studies

Objective

Common learning outcomes (as implemented in degree programmes) 2 ECTS credits:

You know the general stages in a research and development process.
You are able to search for information in the key information environments of your own field.
You are able to read, critically evaluate and utilize the literature and research publications of your own field.
You are familiar with and able to apply the principles of research ethics and reliability.
You are able to compose a literature review based on the materials published in your field of study and your own bachelor’s thesis following the principles of scientific communication.

Degree programme specific learning outcomes for research and development methods, 3 ECTS credits

You are familiar with the current research subjects and development needs of your own field.
You are familiar with and able to apply the key development approaches and/or research methods and ethical principles of your own field.
You are able to report on a research or development process following the principles of professional and scientific communication.

Content

Content of common learning outcomes, 2 ECTS credits:

What are the phases into which a research and development process can be divided?
How do you find, read and critically evaluate the research data of your own field?
How do you write a literature review that utilizes reliable research data and is linked to your own field and bachelor’s thesis following the principles of ethical scientific communication?

Degree programme specific content, 3 ECTS credits

What are the key research subjects and development needs in your own field?
What are the development approaches and/or research methods in your own field and how do you apply them in practice based on the development needs of your own field?
How do you report a research or development process following the principles of ethical professional and scientific communication in your own field?

Materials

Online self-study material (in Finnish), online resources and literature. Course study book (in Finnish):

Kananen, J. 2019. Opinnäytetyön ja pro gradun pikaopas: Avain opinnäytetyön ja pro gradun kirjoittamiseen. Jyväskylä: Jyväskylän ammattikorkeakoulu. E-kirja. Saatavissa: https://kaakkuri.finna.fi

Teaching methods

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.

Blended and Independent tracks:
You study the topics by yourself and execute required learning activities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.

Employer connections

No

Student workload

Achieving the learning outcomes requires 135 hours of work of which about third is contact lessons and laboratory exercises and the rest is self study, practise exams and remote laboratory exercises.

Further information

All returns in this course must be submitted in Finnish. For other languages contact your degree programme co-ordinator for alternative courses.

Evaluation scale

Approved/Failed

Assessment methods and criteria

Assessment is based on mini thesis.

Enrolment

07.11.2022 - 18.11.2022

Timing

09.01.2023 - 31.03.2023

Credits

5 op

Virtual proportion (cr)

2 op

Mode of delivery

60 % Contact teaching, 40 % Distance learning

Teaching languages
  • Finnish
Seats

20 - 40

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Osku Kiri
Responsible person

Osku Kiri

Student groups
  • KTKT22SP
    Cybersecurity, full-time studies

Objective

You understand the significance of interaction as part of your professional expertise and you can act appropriately in various communication situations.
You are familiar with Xamk's instructions for written assignments.
You are able to search reliable information and use it ethically.
You can express your views justifying them based on facts and use standard Finnish appropriate in each context.
You know how to write texts that meet the standards for layout, content and style required in your studies and in your own field, and use appropriate tools and forums.
You improve your interactive communication skills and manage fluently in different cooperation situations, such as meetings and negotiations.
You develop your presentation skills for professional purposes and acquire skills in giving and receiving feedback.

Content

What interaction skills are required in your own studies and in workplaces in your field?
How do you justify your views using standard Finnish?
How do you search reliable information from different sources and use it ethically?
Which written skills (genres, styles, tools) should you master both in your studies and in work assignments in your own professional field?
How do you utilize language regulations and tools in your studies and workplace communication?
Which skills do you need in presentations, meetings and negotiations?
How do you assess your own communication skills and ease your stage fright?
How do you give constructive feedback?
How do you utilize the feedback you received?

Evaluation scale

1-5