Introduction to Cyber Security (5 ECTS)
Code: TX00CO64-3010
General information
- Timing
-
25.08.2025 - 19.10.2025
The implementation has not yet started.
- Number of ECTS credits allocated
- 5 ECTS
- Mode of delivery
- On-campus
- Unit
- School of ICT and Industrial Management
- Campus
- Karaportti 2
- Teaching languages
- Finnish
- Seats
- 0 - 27
- Course
- TX00CO64
Implementation has 8 reservations. Total duration of reservations is 24 h 0 min.
Time | Topic | Location |
---|---|---|
Thu 21.08.2025 time 17:00 - 20:00 (3 h 0 min) |
Johdatus kyberturvallisuuteen TX00CO64-3010 |
KME661
Oppimistila
|
Thu 28.08.2025 time 17:00 - 20:00 (3 h 0 min) |
Johdatus kyberturvallisuuteen TX00CO64-3010 |
KME661
Oppimistila
|
Thu 04.09.2025 time 17:00 - 20:00 (3 h 0 min) |
Johdatus kyberturvallisuuteen TX00CO64-3010 |
KME661
Oppimistila
|
Thu 11.09.2025 time 17:00 - 20:00 (3 h 0 min) |
Johdatus kyberturvallisuuteen TX00CO64-3010 |
KME661
Oppimistila
|
Thu 18.09.2025 time 17:00 - 20:00 (3 h 0 min) |
Johdatus kyberturvallisuuteen TX00CO64-3010 |
KME661
Oppimistila
|
Thu 25.09.2025 time 17:00 - 20:00 (3 h 0 min) |
Johdatus kyberturvallisuuteen TX00CO64-3010 |
KME661
Oppimistila
|
Thu 02.10.2025 time 17:00 - 20:00 (3 h 0 min) |
Johdatus kyberturvallisuuteen TX00CO64-3010 |
KME661
Oppimistila
|
Thu 09.10.2025 time 17:00 - 20:00 (3 h 0 min) |
Johdatus kyberturvallisuuteen TX00CO64-3010 |
KME661
Oppimistila
|
Objective
On completion of the course the student has a basic understanding of cyber security. Having completed the course the student is familiar with cyber security strategies in different context, can create a cyber security policy and understands the classification of vulnerabilities. In addition, the student acquires the knowledge of threat analysis and cyber defence. The student learns the basic principles of producing an organized, concise and well written security policy.
Content
The course consists of theory studies about basic principle of cyber security, development of security policy for cyber defence and overall principles of security policy for internet connected networks. Course covers also threat analysis and cyber defence techniques.
Evaluation scale
0-5
Assessment criteria, satisfactory (1)
The student has achieved the course objectives fairly. The student is able to identify, define and use the course subject area’s concepts and models. The student has completed the required learning exercises in minimum required level. His/her competences have developed in a way that he/she may increase his/her knowledge in the given field of technology and finally work in job positions related to this field of technology.
Assessment criteria, good (3)
The student has achieved the course objectives well, even though the knowledge and skills need to be enhanced on some areas. The student has completed the required learning exercises in good or satisfactory level. The student is able to define the course concepts and models and is able to justify the analysis. The student is able to apply the knowledge of the course in study and work situations.
Assessment criteria, excellent (5)
The student has achieved the objectives of the course with excellent marks. The student master commendably the course subject area’s concepts and models. The student has completed the required learning exercises in good or excellent level. The student is able to make justified and fluent analysis and to present concrete development measures. The student is well prepared to apply the knowledge of the course in the study and work situations.
Assessment criteria, approved/failed
The student has achieved the course objectives fairly. The student is able to identify, define and use the course subject area’s concepts and models. The student has completed the required learning exercises in minimum required level. His/her competences have developed in a way that he/she may increase his/her knowledge in the given field of technology and finally work in job positions related to this field of technology.