Cyber Security in Networks (5 cr)
Code: TX00CO65-3008
General information
- Enrollment
-
01.01.2020
Registration for the implementation has ended.
- Timing
-
15.01.2024 - 17.03.2024
Implementation has ended.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 5 cr
- Mode of delivery
- On-campus
- Unit
- (2019-2024) School of ICT
- Campus
- Karaportti 2
- Teaching languages
- Finnish
- Seats
- 0 - 24
- Degree programmes
- Professional Specialisation Studies in Cyber Security
Implementation has 8 reservations. Total duration of reservations is 30 h 0 min.
Time | Topic | Location |
---|---|---|
Tue 16.01.2024 time 17:00 - 20:45 (3 h 45 min) |
Tietoverkkojen kyberturvallisuus TX00CO65-3008 |
Distance Learning/Online
|
Tue 23.01.2024 time 17:00 - 20:45 (3 h 45 min) |
Tietoverkkojen kyberturvallisuus TX00CO65-3008 |
Distance Learning/Online
|
Tue 30.01.2024 time 17:00 - 20:45 (3 h 45 min) |
Tietoverkkojen kyberturvallisuus TX00CO65-3008 |
Distance Learning/Online
|
Tue 06.02.2024 time 17:00 - 20:45 (3 h 45 min) |
Tietoverkkojen kyberturvallisuus TX00CO65-3008 |
Distance Learning/Online
|
Tue 13.02.2024 time 17:00 - 20:45 (3 h 45 min) |
Tietoverkkojen kyberturvallisuus TX00CO65-3008 |
Distance Learning/Online
|
Tue 27.02.2024 time 17:00 - 20:45 (3 h 45 min) |
Tietoverkkojen kyberturvallisuus TX00CO65-3008 |
Distance Learning/Online
|
Tue 05.03.2024 time 17:00 - 20:45 (3 h 45 min) |
Tietoverkkojen kyberturvallisuus TX00CO65-3008 |
Distance Learning/Online
|
Tue 12.03.2024 time 17:00 - 20:45 (3 h 45 min) |
Tietoverkkojen kyberturvallisuus TX00CO65-3008 |
Distance Learning/Online
|
Objective
After completing this course the learner has knowledge of cyber security threats in data communication networks and can apply countermeasures in the network infrastructure. The learner understands how to deploy intrusion detection and harden communication networks, how to detect denial service and other cyber threats from the internet and apply counter measures.
Content
The course consists of studies about security measures and intrusion detection in data communication networks, methods of cyber-attacks in networks and overall principles of mitigation techniques.
Location and time
Distance learning in the evenings
Evaluation scale
0-5
Assessment criteria, satisfactory (1)
The student has achieved the course objectives fairly. The student is able to identify, define and use the course subject area’s concepts and models. The student has completed the required learning exercises in minimum required level. His/her competences have developed in a way that he/she may increase his/her knowledge in the given field of technology and finally work in job positions related to this field of technology.
Assessment criteria, good (3)
The student has achieved the course objectives well, even though the knowledge and skills need to be enhanced on some areas. The student has completed the required learning exercises in good or satisfactory level. The student is able to define the course concepts and models and is able to justify the analysis. The student is able to apply the knowledge of the course in study and work situations.
Assessment criteria, excellent (5)
The student has achieved the objectives of the course with excellent marks. The student master commendably the course subject area’s concepts and models. The student has completed the required learning exercises in good or excellent level. The student is able to make justified and fluent analysis and to present concrete development measures. The student is well prepared to apply the knowledge of the course in the study and work situations.
Assessment criteria, approved/failed
The student has achieved the course objectives fairly. The student is able to identify, define and use the course subject area’s concepts and models. The student has completed the required learning exercises in minimum required level. His/her competences have developed in a way that he/she may increase his/her knowledge in the given field of technology and finally work in job positions related to this field of technology.