Security equipment (5 cr)
Code: TI00BI24-3002
General information
- Enrollment
-
16.12.2019 - 10.01.2020
Registration for the implementation has ended.
- Timing
-
01.01.2020 - 31.07.2020
Implementation has ended.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 5 cr
- Mode of delivery
- Contact learning
- Unit
- Department of Information Technology
- Campus
- Kotka Campus
- Teaching languages
- Finnish
- Seats
- 0 - 30
- Degree programmes
- Degree Programme in Information Technology
Objective
You are able to implement data security solutions using data security equipment.
You are able to configure and maintain a modern firewall.
You are able to implement virtual private networks using routers and firewalls.
You are able to harden routers and switches against the most common attacks.
Content
How do you implement firewall rules from a security policy?
How do you implement secure access to a local network for remote users?
How do you validate the identity of networks users?
How do you discover an intruder in the network?
Study forms and methods
Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities
Independent track:
If you are working in a company, organisation or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practise. You must show your skills via a demonstration, which is determined based on learning objectives.
Student workload
Achieving the learning outcomes requires 135 hours of work.
Evaluation scale
1-5
Assessment criteria, good (3-4)
a) use professional vocabulary and concepts in an expert way in different situations.
b) evaluate information sources critically.
e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.
e) use the key models, methods, software and techniques of the professional field.
Qualifications
Basics of networking
Data networks 1
Data networks 2