Cyber security project (5 cr)
Code: TI00BI27-3004
General information
- Enrollment
-
12.04.2021 - 25.04.2021
Registration for the implementation has ended.
- Timing
-
01.09.2021 - 17.12.2021
Implementation has ended.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 5 cr
- Mode of delivery
- Contact learning
- Unit
- Department of Information Technology
- Campus
- Kotka Campus
- Teaching languages
- Finnish
- Degree programmes
- Degree Programme in Cyber Security
- Teachers
- Vesa Kankare
- Teacher in charge
- Vesa Kankare
- Groups
-
KTKT19SPCybersecurity, full-time studies
- Course
- TI00BI27
Objective
You know how to execute a cybersecurity project.
You are able to plan a project and report its progress and outcomes.
You are able to search new information and apply the information to successfully execute a project.
You gain experience in team work.
Content
How to plan a project?
How to search for and apply new information?
How to report project progress and outcomes?
How to work as a team member and work together to solve a problem?
Course material
Online resources, literature
Study forms and methods
Scheduled track:
You participate into scheduled contact lessons where you advance your project.
Independent track:
You execute the project in workplace. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills.
Blended track:
You execute the project as a self oriented project with your team member
Timing of exams and assignments
Retakes are arranged as needed in agreement with the teacher
Student workload
Achieving the learning outcomes requires 135 hours of work with the assigned project
Evaluation scale
Approved/Failed
Assessment methods and criteria
Passing the course requires accepted submission of project plan, mid-project presentation, final project report and presentation of the project outcomes and time accounting log.
Assessment criteria, good (3-4)
(a) use professional vocabulary and concepts in an expert way in different situations.
(b) evaluate information sources critically.
(c) work as team members in working life expert duties and identify and describe the problems of the professional field.
Qualifications
Data networks 3
Operating systems
Cybersecurity
Virtualization