Skip to main content

Basics of Information Security (3 ECTS)

Code: XX00AA89-3025

General information


Enrollment
23.08.2017
Registration for the implementation has ended.
Timing
01.01.2020 - 31.12.2020
Implementation has ended.
Number of ECTS credits allocated
3 ECTS
Virtual portion
3 ECTS
Mode of delivery
Online
Unit
(2019-2024) School of ICT
Campus
Karaportti 2
Teaching languages
Finnish
Seats
0 - 99
Degree programmes
Information and Communication Technology
Teachers
Virve Prami
Teacher in charge
Virve Prami
Groups
ATX20TV
Open UAS - NonStop year 2020
Course
XX00AA89
No reservations found for implementation XX00AA89-3025!

Objective

After the course, the student has basic knowledge of information security and what is the meaning of information security for the companies. He or she knows the basic concepts and how basic security mechanisms work. He or she knows different cryptographic methods from the past to now.

Content

- basic concepts of information security
- company's Information Security Policy & Information Security Plan
- different vulnerabilities, how to find them and how to protect
- application security
- safe use of computers
- server security (backups, fault tolerance)
- authentication
- network security
- basics of cryptography, historical view, modern crpyptographic methods, symmetric & asymmetric methods, passwords, digital signatures

Materials

N/A

Teaching methods

Online (Self-Study) course in Moodle environment

Employer connections

N/A

International connections

N/A

Completion alternatives

N/A

Further information

ENROLLING
Open UAS Student: Please fill in eform
Metropolia's Degree Student
- Go to https://moodle.metropolia.fi/course/view.php?id=159
- Enrolment key: saksanhirvi
- Follow instructions
If you have problems with this course, please contact to Janne Salonen.

Evaluation scale

Hyväksytty/Hylätty

Assessment criteria, satisfactory (1)

The student knows the basic concepts of information security and what it means to companies. He/she also knows elementary threats to the information systems. He or she knows different vulnerabilities for companys database. He or she understand different user levels and why they are needed.

Assessment criteria, good (3)

The student understands application security as well as users point of view as programmes. He or she knows different backup methods and RAID-levels. He or she recognizes vulnerabilites from network, He or she knows different cryptographic methods and could estimate how strong the are.

Assessment criteria, excellent (5)

The student knows solutions for applications security. He or she knows ho different cryptographic methods are working and how to make digital signatures. He or she can estimate how different vulnerabilities affects companys database and he or she can tell solutions how to protect them.

Qualifications

Introduction to Computing,
Setting Up and Usage of Personal Computer (PC)

Go back to top of page