Cybersecurity management (5 cr)
Code: KT00FD64-3001
General information
- Enrollment
-
07.04.2025 - 21.04.2025
Registration for the implementation has ended.
- Timing
-
01.08.2025 - 31.12.2025
The implementation has not yet started.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 5 cr
- Mode of delivery
- Contact learning
- Unit
- Department of Information Technology
- Campus
- Ecampus
- Teaching languages
- Finnish
- Seats
- 20 - 40
- Degree programmes
- Master's Degree Programme in Cybersecurity (instruction in Finnish)
- Teachers
- Kimmo Kääriäinen
- Jarkko Hänninen
- Teacher in charge
- Kimmo Kääriäinen
- Groups
-
KTKT25SVYCybersecurity, master studies
- Course
- KT00FD64
Realization has 6 reservations. Total duration of reservations is 21 h 0 min.
Time | Topic | Location |
---|---|---|
Thu 11.09.2025 time 16:30 - 20:00 (3 h 30 min) |
Kyberturvallisuuden hallinta KT00FD64-3001 |
Etäopetus lukujärjestyksen mukaan
|
Thu 25.09.2025 time 16:30 - 20:00 (3 h 30 min) |
Kyberturvallisuuden hallinta KT00FD64-3001 |
Etäopetus lukujärjestyksen mukaan
|
Thu 09.10.2025 time 16:30 - 20:00 (3 h 30 min) |
Kyberturvallisuuden hallinta KT00FD64-3001 |
Etäopetus lukujärjestyksen mukaan
|
Thu 06.11.2025 time 16:30 - 20:00 (3 h 30 min) |
Kyberturvallisuuden hallinta KT00FD64-3001 |
Etäopetus lukujärjestyksen mukaan
|
Thu 20.11.2025 time 16:30 - 20:00 (3 h 30 min) |
Kyberturvallisuuden hallinta KT00FD64-3001 |
Etäopetus lukujärjestyksen mukaan
|
Thu 04.12.2025 time 16:30 - 20:00 (3 h 30 min) |
Kyberturvallisuuden hallinta KT00FD64-3001 |
Etäopetus lukujärjestyksen mukaan
|
Objective
You know the common methods of information retrieval and can utilize them in cybersecurity.
You are familiar with the administrative methods and processes of cybersecurity and can apply them in a chosen context.
You know the most common frameworks, standards, and guidelines in the field of cybersecurity.
You are able to utilize the aforementioned in a selected context.
Content
How do you utilize academic information retrieval methods?
What different administrative methods are commonly used in cybersecurity management and how can they be applied?
What kinds of commonly applied frameworks, standards, and guidelines exists in the field of cybersecurity, and how can they be applied?
Course material
Online self-study material, online resources and exercises
The study materials will be published in the Learn environment during the course
Study forms and methods
The study is structured around group meetings according to the schedule and learning assignments completed independently or in groups. The course consists of six online lecture sessions, including individual and small group assignments to be completed both during the sessions and independently.
RDI and work-related cooperation
Not planned
Timing of exams and assignments
The course includes learning assignments that are aligned with the lecture sessions.
Student workload
Achieving the learning objectives requires 135 hours of work, which consists of online lectures, self-study, and learning assignments
Evaluation scale
1-5
Assessment methods and criteria
Assessment is based on learning activities and assignments
The assessment is based on the course's learning objectives and evaluation criteria.