Skip to main content

Cybersecurity management (5 cr)

Code: KT00FD64-3001

General information


Enrollment
07.04.2025 - 21.04.2025
Registration for the implementation has ended.
Timing
01.08.2025 - 31.12.2025
The implementation has not yet started.
Number of ECTS credits allocated
5 cr
Local portion
5 cr
Mode of delivery
Contact learning
Unit
Department of Information Technology
Campus
Ecampus
Teaching languages
Finnish
Seats
20 - 40
Degree programmes
Master's Degree Programme in Cybersecurity (instruction in Finnish)
Teachers
Kimmo Kääriäinen
Jarkko Hänninen
Teacher in charge
Kimmo Kääriäinen
Groups
KTKT25SVY
Cybersecurity, master studies
Course
KT00FD64

Realization has 6 reservations. Total duration of reservations is 21 h 0 min.

Time Topic Location
Thu 11.09.2025 time 16:30 - 20:00
(3 h 30 min)
Kyberturvallisuuden hallinta KT00FD64-3001
Etäopetus lukujärjestyksen mukaan
Thu 25.09.2025 time 16:30 - 20:00
(3 h 30 min)
Kyberturvallisuuden hallinta KT00FD64-3001
Etäopetus lukujärjestyksen mukaan
Thu 09.10.2025 time 16:30 - 20:00
(3 h 30 min)
Kyberturvallisuuden hallinta KT00FD64-3001
Etäopetus lukujärjestyksen mukaan
Thu 06.11.2025 time 16:30 - 20:00
(3 h 30 min)
Kyberturvallisuuden hallinta KT00FD64-3001
Etäopetus lukujärjestyksen mukaan
Thu 20.11.2025 time 16:30 - 20:00
(3 h 30 min)
Kyberturvallisuuden hallinta KT00FD64-3001
Etäopetus lukujärjestyksen mukaan
Thu 04.12.2025 time 16:30 - 20:00
(3 h 30 min)
Kyberturvallisuuden hallinta KT00FD64-3001
Etäopetus lukujärjestyksen mukaan
Changes to reservations may be possible.

Objective

You know the common methods of information retrieval and can utilize them in cybersecurity.
You are familiar with the administrative methods and processes of cybersecurity and can apply them in a chosen context.
You know the most common frameworks, standards, and guidelines in the field of cybersecurity.
You are able to utilize the aforementioned in a selected context.

Content

How do you utilize academic information retrieval methods?
What different administrative methods are commonly used in cybersecurity management and how can they be applied?
What kinds of commonly applied frameworks, standards, and guidelines exists in the field of cybersecurity, and how can they be applied?

Course material

Online self-study material, online resources and exercises
The study materials will be published in the Learn environment during the course

Study forms and methods

The study is structured around group meetings according to the schedule and learning assignments completed independently or in groups. The course consists of six online lecture sessions, including individual and small group assignments to be completed both during the sessions and independently.

RDI and work-related cooperation

Not planned

Timing of exams and assignments

The course includes learning assignments that are aligned with the lecture sessions.

Student workload

Achieving the learning objectives requires 135 hours of work, which consists of online lectures, self-study, and learning assignments

Evaluation scale

1-5

Assessment methods and criteria

Assessment is based on learning activities and assignments
The assessment is based on the course's learning objectives and evaluation criteria.

Go back to top of page