Skip to main content

CISSP: Certified Information System Security ProfessionalLaajuus (8 cr)

Code: TT00CR29

Credits

8 op

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Assessment criteria, approved/failed

In order to pass the course you have to score at least 70% or more in the course exam. The course exam contains multiple choice questions.

Timing

16.04.2024 - 31.12.2025

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Teacher in charge

Janne Salonen

Groups
  • ATX25TV_MAKSULLINEN_JÄRJESTELMÄ
    Open UAS 2025
  • ATX24TV_MAKSULLINEN_JÄRJESTELMÄ
    ATX24TV Open UAS

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2024 - 31.12.2027

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 10000

Degree programmes
  • Degree Programme in Information Technology
Teachers
  • Virve Prami
Groups
  • IT_path_180_ects
    Information Technology, Open path 180 ECTS

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2024 - 31.12.2025

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2024 - 31.07.2025

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Teacher in charge

Janne Salonen

Groups
  • ATX24TV_MAKSULLINEN_JÄRJESTELMÄ
    ATX24TV Open UAS

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2024 - 29.07.2026

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2024 - 31.12.2025

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2024 - 29.07.2026

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2024 - 29.07.2026

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Groups
  • ATX24TV
    NonStop virtual studies year 2024

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi jonka voi suorittaa omaan tahtiin.

Kurssi sisältää 8 moduulia sekä lopputentin.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Assessment methods and criteria

Kurssista saa hyväksytty merkinnän sen jälkeen kun opiskelija on lukenut kaikkien moduulien sisällöt ja tehnyt niistä lyhyen esseen sekä läpäissyt lopputentin.

Lopputentti sisältää 40 monivalinta kysymystä ja aikaa sen suorittamiseen on 60 min. Tentin voi uusia 3 kertaa.

Enrollment

02.12.2022 - 31.12.2022

Timing

01.01.2024 - 31.07.2024

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Campus

Karaportti 2

Teaching languages
  • Finnish
Degree programmes
  • Information and Communication Technology
Teachers
  • Janne Salonen
Teacher in charge

Janne Salonen

Groups
  • VIOPE_NonStop6
    VIOPE_NonStop6

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Enrollment

02.12.2022 - 31.12.2022

Timing

01.01.2024 - 31.07.2024

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Campus

Karaportti 2

Teaching languages
  • Finnish
Degree programmes
  • Information and Communication Technology
Teachers
  • Janne Salonen
Teacher in charge

Janne Salonen

Groups
  • Viope_nonstop_9
    Viope_nonstop_9

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Enrollment

02.12.2022 - 31.12.2022

Timing

01.01.2024 - 31.07.2024

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • Finnish
Degree programmes
  • Information and Communication Technology
Teachers
  • Janne Salonen
Teacher in charge

Janne Salonen

Groups
  • Viope_nonstop_11
    Viope_nonstop_11

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.08.2023 - 30.07.2025

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Enrollment

02.12.2022 - 31.12.2022

Timing

01.08.2023 - 31.07.2024

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • Finnish
Degree programmes
  • Information and Communication Technology
Teachers
  • Janne Salonen
Teacher in charge

Janne Salonen

Groups
  • Viope_nonstop_12
    Viope_nonstop_12

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Enrollment

02.12.2022 - 31.12.2022

Timing

01.08.2023 - 31.07.2024

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • Finnish
Degree programmes
  • Information and Communication Technology
Teachers
  • Janne Salonen
Teacher in charge

Janne Salonen

Groups
  • Viope_nonstop_13
    Viope_nonstop_13

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2023 - 31.07.2024

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2023 - 31.07.2024

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2023 - 31.07.2024

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2023 - 31.07.2024

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Groups
  • ATX23TV_KEVÄT
    ATX23TV_KEVÄT

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.08.2022 - 31.07.2025

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Teacher in charge

Janne Salonen

Groups
  • ATX24TV_MAKSULLINEN_JÄRJESTELMÄ
    ATX24TV Open UAS

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

06.01.2024 - 31.12.2023

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Groups
  • ATX22_SYKSY
    ATX22_Autumn

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

05.01.2024 - 31.12.2023

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Groups
  • ATX22_SYKSY
    ATX22_Autumn

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.08.2023 - 31.12.2023

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Groups
  • ATX23TV_SYKSY
    Open UAS TestOut and Moodle courses

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

15.06.2023 - 10.07.2023

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Groups
  • ATX23TV_KESÄLOMA
    Kesälomatuuraajan toteutukset

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2023 - 31.12.2023

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Groups
  • ATX23TV
    NonStop virtual studies year 2023

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2023 - 31.07.2023

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Groups
  • ATX23TV
    NonStop virtual studies year 2023

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2023 - 31.12.2023

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2023 - 31.12.2023

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2023 - 31.12.2023

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Teacher in charge

Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2023 - 31.12.2023

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Teacher in charge

Janne Salonen

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2023 - 31.12.2022

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2023 - 31.12.2022

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

31.12.2022 - 31.12.2023

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Groups
  • ATX22TVS
    Open UAS: NonStop Autumn 2022

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

31.12.2022 - 31.12.2023

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Groups
  • ATX22TVS
    Open UAS: NonStop Autumn 2022

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.08.2022 - 31.12.2022

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Teacher in charge

Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.08.2022 - 31.12.2022

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Teacher in charge

Janne Salonen

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.08.2022 - 31.12.2022

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Teacher in charge

Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.08.2022 - 31.12.2022

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Teacher in charge

Janne Salonen

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.08.2022 - 31.12.2022

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Teacher in charge

Virve Prami

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.08.2022 - 31.12.2022

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Teacher in charge

Janne Salonen

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2022 - 31.12.2022

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Groups
  • ATX22TV
    NonStop virtual studies year 2022

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2022 - 31.12.2022

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Groups
  • ATX22TV
    NonStop virtual studies year 2022

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2022 - 31.12.2022

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Groups
  • ATX22TVK
    Ope UAS: NonStop Spring 2022

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.01.2022 - 31.12.2022

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 5000

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Groups
  • ATX22TVK
    Ope UAS: NonStop Spring 2022

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

01.08.2021 - 31.07.2022

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 100

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Teacher in charge

Janne Salonen

Groups
  • DiplomaCS
    Diploma in Cyber Security

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

100% online (Self-Study) course which can be study in own pace. Study environment is Metropolia's Moodle.

Materials

Online.

Teaching methods

100% online (Self-Study) course which can be study in own pace.

Employer connections

N/A

Exam schedules

Online.

International connections

N/A

Completion alternatives

N/A

Student workload

Depends on the student's baseline.

Content scheduling

Up to student her-/himself.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.

Timing

15.03.2021 - 31.12.2023

Number of ECTS credits allocated

8 op

Virtual portion

8 op

Mode of delivery

Distance learning

Unit

School of ICT

Campus

Karaportti 2

Teaching languages
  • English
Seats

0 - 500

Degree programmes
  • Information and Communication Technology
Teachers
  • Virve Prami
Teacher in charge

Janne Salonen

Groups
  • CareerBoost_TXK_21
    Career Boost 21 (Tivi)
  • CareerBoost_TXK_22
    Career Boost 22 (TiVi)

Objective

This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security

This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.

Content

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.


Course Content

Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training

Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities

Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation

Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation

Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits

Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation

Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment

Location and time

Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.

Materials

Löytyy oppimisympäristöstä.

Teaching methods

100% netin kautta itsenäisesti suoritettava verkkokurssi.

Employer connections

N/A

Exam schedules

Tiedot löytyvät kurssin oppimisympäristöstä.

International connections

N/A

Completion alternatives

N/A

Student workload

Riippuu opiskelijasta itsestään.

Content scheduling

Riippuu opiskelijasta itsestään.

Further information

ILMOITTAUTUMINEN

Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake

Metropolian tutkinto-opiskelijat:

- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp

Please review the course modules 1-8 material and then do the Final exam.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, approved/failed

Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.