Security equipment (5 cr)
Code: TI00BI24-3004
General information
Enrollment
08.11.2021 - 21.11.2021
Timing
01.01.2022 - 01.05.2022
Number of ECTS credits allocated
5 op
Mode of delivery
Contact teaching
Unit
Department of Information Technology
Campus
Kotka Campus
Teaching languages
- Finnish
Seats
15 - 35
Degree programmes
- Degree Programme in Information Technology
Teachers
- Martti Kettunen
Teacher in charge
Martti Kettunen
Groups
-
KTKT20SPCybersecurity, full-time studies
Objective
You are able to implement data security solutions using data security equipment.
You are able to configure and maintain a modern firewall.
You are able to implement virtual private networks using routers and firewalls.
You are able to harden routers and switches against the most common attacks.
Content
How do you implement firewall rules from a security policy?
How do you implement secure access to a local network for remote users?
How do you validate the identity of networks users?
How do you discover an intruder in the network?
Opiskelumateriaali
Luentomateriaali pdf-muodossa
Yksilölliset oppimisväylät
Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities
Independent track:
If you are working in a company, organisation or a higher education project aligned with the study unit learning outcomes, you are able to complete the study unit in your workplace. In this case contact your responsible teacher in the beginning of the studies to agree with a development project you can execute in your work. Successful completion requires you study the topics in theory and practise. You must show your skills via a demonstration, which is determined based on learning objectives.
TKI ja työelämäyhteistyö
Paloalto NGFW academy
Cisco academy
Opiskelijan työmäärä
Achieving the learning outcomes requires 135 hours of work.
Evaluation scale
1-5
Assessment criteria, good (3-4)
a) use professional vocabulary and concepts in an expert way in different situations.
b) evaluate information sources critically.
e) choose appropriate models, methods, software and techniques according to the purpose and justify these choices.
e) use the key models, methods, software and techniques of the professional field.
Qualifications
Basics of networking
Data networks 1
Data networks 2