CISSP: Certified Information System Security ProfessionalLaajuus (8 op)
Tunnus: TT00CR29
Laajuus
8 op
Osaamistavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
16.04.2024 - 31.12.2025
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Vastuuopettaja
Janne Salonen
Ryhmät
-
ATX25TV_MAKSULLINEN_JÄRJESTELMÄATX25TV MAKSULLINEN JÄRJESTELMÄ
-
ATX24TV_MAKSULLINEN_JÄRJESTELMÄATX24TV MAKSULLINEN JÄRJESTELMÄ
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2024 - 31.12.2027
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 10000
Koulutus
- Degree Programme in Information Technology
Opettaja
- Virve Prami
Ryhmät
-
IT_path_180_ectsInformation Technology, Open path 180 ECTS
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2024 - 31.12.2025
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2024 - 31.07.2025
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Vastuuopettaja
Janne Salonen
Ryhmät
-
ATX24TV_MAKSULLINEN_JÄRJESTELMÄATX24TV MAKSULLINEN JÄRJESTELMÄ
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2024 - 29.07.2026
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2024 - 31.12.2025
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2024 - 29.07.2026
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2024 - 29.07.2026
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Ryhmät
-
ATX24TVNonStop virtuaaliopinnot vuosi 2024
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi jonka voi suorittaa omaan tahtiin.
Kurssi sisältää 8 moduulia sekä lopputentin.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Arviointimenetelmät ja arvioinnin perusteet
Kurssista saa hyväksytty merkinnän sen jälkeen kun opiskelija on lukenut kaikkien moduulien sisällöt ja tehnyt niistä lyhyen esseen sekä läpäissyt lopputentin.
Lopputentti sisältää 40 monivalinta kysymystä ja aikaa sen suorittamiseen on 60 min. Tentin voi uusia 3 kertaa.
Ilmoittautumisaika
02.12.2022 - 31.12.2022
Ajoitus
01.01.2024 - 31.07.2024
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Toimipiste
Karaportti 2
Opetuskielet
- Suomi
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Janne Salonen
Vastuuopettaja
Janne Salonen
Ryhmät
-
VIOPE_NonStop6VIOPE_NonStop6
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ilmoittautumisaika
02.12.2022 - 31.12.2022
Ajoitus
01.01.2024 - 31.07.2024
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Toimipiste
Karaportti 2
Opetuskielet
- Suomi
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Janne Salonen
Vastuuopettaja
Janne Salonen
Ryhmät
-
Viope_nonstop_9Viope_nonstop_9
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ilmoittautumisaika
02.12.2022 - 31.12.2022
Ajoitus
01.01.2024 - 31.07.2024
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Suomi
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Janne Salonen
Vastuuopettaja
Janne Salonen
Ryhmät
-
Viope_nonstop_11Viope_nonstop_11
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.08.2023 - 30.07.2025
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ilmoittautumisaika
02.12.2022 - 31.12.2022
Ajoitus
01.08.2023 - 31.07.2024
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Suomi
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Janne Salonen
Vastuuopettaja
Janne Salonen
Ryhmät
-
Viope_nonstop_12Viope_nonstop_12
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ilmoittautumisaika
02.12.2022 - 31.12.2022
Ajoitus
01.08.2023 - 31.07.2024
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Suomi
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Janne Salonen
Vastuuopettaja
Janne Salonen
Ryhmät
-
Viope_nonstop_13Viope_nonstop_13
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2023 - 31.07.2024
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2023 - 31.07.2024
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2023 - 31.07.2024
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2023 - 31.07.2024
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Ryhmät
-
ATX23TV_KEVÄTATX23TV_KEVÄT
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.08.2022 - 31.07.2025
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Vastuuopettaja
Janne Salonen
Ryhmät
-
ATX24TV_MAKSULLINEN_JÄRJESTELMÄATX24TV MAKSULLINEN JÄRJESTELMÄ
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
06.01.2024 - 31.12.2023
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Ryhmät
-
ATX22_SYKSYATX22_syksy
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
05.01.2024 - 31.12.2023
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Ryhmät
-
ATX22_SYKSYATX22_syksy
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.08.2023 - 31.12.2023
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Ryhmät
-
ATX23TV_SYKSYAvoin amk TestOut ja Moodle kurssit
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
15.06.2023 - 10.07.2023
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Ryhmät
-
ATX23TV_KESÄLOMAKesälomatuuraajan toteutukset
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2023 - 31.12.2023
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Ryhmät
-
ATX23TVNonStop virtuaaliopinnot vuosi 2023
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2023 - 31.07.2023
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Ryhmät
-
ATX23TVNonStop virtuaaliopinnot vuosi 2023
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2023 - 31.12.2023
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2023 - 31.12.2023
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2023 - 31.12.2023
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Vastuuopettaja
Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2023 - 31.12.2023
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Vastuuopettaja
Janne Salonen
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2023 - 31.12.2022
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2023 - 31.12.2022
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
31.12.2022 - 31.12.2023
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Ryhmät
-
ATX22TVSAvoin amk: NonStop kevät 2022
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
31.12.2022 - 31.12.2023
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Ryhmät
-
ATX22TVSAvoin amk: NonStop kevät 2022
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.08.2022 - 31.12.2022
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Vastuuopettaja
Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.08.2022 - 31.12.2022
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Vastuuopettaja
Janne Salonen
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.08.2022 - 31.12.2022
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Vastuuopettaja
Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.08.2022 - 31.12.2022
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Vastuuopettaja
Janne Salonen
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.08.2022 - 31.12.2022
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Vastuuopettaja
Virve Prami
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.08.2022 - 31.12.2022
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Vastuuopettaja
Janne Salonen
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2022 - 31.12.2022
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Ryhmät
-
ATX22TVNonStop virtuaaliopinnot vuosi 2022
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2022 - 31.12.2022
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Ryhmät
-
ATX22TVNonStop virtuaaliopinnot vuosi 2022
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2022 - 31.12.2022
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Ryhmät
-
ATX22TVKAvoin amk: NonStop kevät 2022
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.01.2022 - 31.12.2022
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 5000
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Ryhmät
-
ATX22TVKAvoin amk: NonStop kevät 2022
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
01.08.2021 - 31.07.2022
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 100
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Vastuuopettaja
Janne Salonen
Ryhmät
-
DiplomaCSDiploma in Cyber Security
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
100% online (Self-Study) course which can be study in own pace. Study environment is Metropolia's Moodle.
Oppimateriaalit
Online.
Opetusmenetelmät
100% online (Self-Study) course which can be study in own pace.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Online.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Depends on the student's baseline.
Sisällön jaksotus
Up to student her-/himself.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.
Ajoitus
15.03.2021 - 31.12.2023
Opintopistemäärä
8 op
Virtuaaliosuus
8 op
Toteutustapa
Etäopetus
Yksikkö
ICT ja tuotantotalous
Toimipiste
Karaportti 2
Opetuskielet
- Englanti
Paikat
0 - 500
Koulutus
- Tieto- ja viestintätekniikan tutkinto-ohjelma
Opettaja
- Virve Prami
Vastuuopettaja
Janne Salonen
Ryhmät
-
CareerBoost_TXK_21Career Boost 21 (Tivi)
-
CareerBoost_TXK_22Career Boost 22 (TiVi)
Tavoitteet
This course is an review course that contains information security concepts and industry best practices, covering the 8 domains of the CISSP Common Body of Knowledge (CBK)®:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
This course will expand upon your knowledge by addressing the essential elements of those eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process and will prepare you to pass the 2015 version of the CISSP® exam.
Sisältö
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.
Course Content
Module 1: Security and Risk Management
Module 1.1: Security Governance Principles
Module 1.2: Compliance
Module 1.3: Professional Ethics
Module 1.4: Security Documentation
Module 1.5: Risk Management
Module 1.6: Threat Modeling
Module 1.7: Business Continuity Plan Fundamentals
Module 1.8: Acquisition Strategy and Practice
Module 1.9: Personnel Security Policies
Module 1.10: Security Awareness and Training
Module 2: Asset Security
Module 2.1: Asset Classification
Module 2.2: Privacy Protection
Module 2.3: Asset Retention
Module 2.4: Data Security Controls
Module 2.5: Secure Data Handling
Module 3: Security Engineering
Module 3.1: Security in the Engineering Lifecycle
Module 3.2: System Component Security
Module 3.3: Security Models
Module 3.4: Controls and Countermeasures in Enterprise Security
Module 3.5: Information System Security Capabilities
Module 3.6: Design and Architecture Vulnerability Mitigation
Module 3.7: Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Module 3.8: Cryptography Concepts
Module 3.9: Cryptography Techniques
Module 3.10: Site and Facility Design for Physical Security
Module 3.11: Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
Module 4.1: Network Protocol Security
Module 4.2: Network Components Security
Module 4.3: Communication Channel Security
Module 4.4: Network Attack Mitigation
Module 5: Identity and Access Management
Module 5.1: Physical and Logical Access Control
Module 5.2: Identification, Authentication, and Authorization
Module 5.3: Identity as a Service
Module 5.4: Authorization Mechanisms
Module 5.5: Access Control Attack Mitigation
Module 6: Security Assessment and Testing
Module 6.1: System Security Control Testing
Module 6.2: Software Security Control Testing
Module 6.3: Security Process Data Collection
Module 6.4: Audits
Module 7: Security Operations
Module 7.1: Security Operations Concepts
Module 7.2: Physical Security
Module 7.3: Personnel Security
Module 7.4: Logging and Monitoring
Module 7.5: Preventative Measures
Module 7.6: Resource Provisioning and Protection
Module 7.7: Patch and Vulnerability Management
Module 7.8: Change Management
Module 7.9: Incident Response
Module 7.10: Investigations
Module 7.11: Disaster Recovery Planning
Module 7.12: Disaster Recovery Strategies
Module 7.13: Disaster Recovery Implementation
Module 8: Software Development Security
Module 8.1: Security Principles in the System Lifecycle
Module 8.2: Security Principles in the Software Development Lifecycle
Module 8.3: Database Security in Software Development
Module 8.4: Security Controls in the Development Environment
Module 8.5: Software Security Effectiveness Assessment
Aika ja paikka
Riippuu opiskelijasta itsestään koska kyseessä on itseopiskeltava verkkokurssi.
Oppimateriaalit
Löytyy oppimisympäristöstä.
Opetusmenetelmät
100% netin kautta itsenäisesti suoritettava verkkokurssi.
Harjoittelu- ja työelämäyhteistyö
N/A
Tenttien ajankohdat ja uusintamahdollisuudet
Tiedot löytyvät kurssin oppimisympäristöstä.
Kansainvälisyys
N/A
Toteutuksen valinnaiset suoritustavat
N/A
Opiskelijan ajankäyttö ja kuormitus
Riippuu opiskelijasta itsestään.
Sisällön jaksotus
Riippuu opiskelijasta itsestään.
Lisätietoja opiskelijoille
ILMOITTAUTUMINEN
Avoimen AMK:n sekä CampusOnline opiskelijat: e-lomake
Metropolian tutkinto-opiskelijat:
- Go to https://moodle.metropolia.fi/course/view.php?id=144
- Enrollment key for the course: cissp
- Password for final exam: cissp
Please review the course modules 1-8 material and then do the Final exam.
Arviointiasteikko
Hyväksytty/Hylätty
Arviointikriteeri, hyväksytty/hylätty
Kurssin hyväksytty suorittaminen vaatii kurssikokeesta yli 70% vastauksista oikein. Kurssikoe koostuu monivalintatehtävistä.