Introduction to Information SecurityLaajuus (5 cr)
Study unit code: TO00BR89
Credits
5 op
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.
Enrollment
19.05.2025 - 25.05.2025
Timing
01.08.2025 - 31.12.2025
Number of ECTS credits allocated
5 op
Virtual proportion
5 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
20 - 45
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Degree Programme in Business Information Technology, Cyber Security (NCA2), Laurea Leppävaara
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Leo Johannesberg
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
NCA224SADegree Programme in Business Information Technology, Cyber Security, virtual studies, S24, Leppävaara
-
CCN225SYComplementary competence (bachelor’s studies in English), S25, Information and Communication Technologies (ICT)
-
TON225SYTäydentävä osaaminen (amk-tutkinto), S25, Tietojenkäsittely ja tietoliikenne (ICT)
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Grading scale
H-5
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.
Enrollment
31.03.2025 - 06.04.2025
Timing
01.05.2025 - 31.08.2025
Number of ECTS credits allocated
5 op
Virtual proportion
5 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
40 - 50
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Leo Johannesberg
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
TON224SYTäydentävä osaaminen (amk-tutkinto), S24, Tietojenkäsittely ja tietoliikenne (ICT)
-
CCN224SYComplementary competence (bachelor’s studies in English), S24, Information and Communication Technologies (ICT)
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Grading scale
H-5
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.
Enrollment
25.11.2024 - 01.12.2024
Timing
13.01.2025 - 06.04.2025
Number of ECTS credits allocated
5 op
Virtual proportion
5 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
40 - 80
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Tietojenkäsittelyn koulutus, kyberturvallisuus (NKA2), Laurea Leppävaara (Finnish)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Leo Johannesberg
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
TON224SYTäydentävä osaaminen (amk-tutkinto), S24, Tietojenkäsittely ja tietoliikenne (ICT)
-
CCN224SYComplementary competence (bachelor’s studies in English), S24, Information and Communication Technologies (ICT)
-
NKA224KATietojenkäsittelyn koulutus, kyberturvallisuus, monimuotototeutus, K24, Leppävaara
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Teaching methods
- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should have finished following compulsory ICT-studies or have equivalent competence: R0240 ICT-Toimintaympäristö / R0277 The ICT Environment and Infrastructure and R0242 Tietoverkot ja tietoturva / R0280 Data Networks and Information Security)
- NOTE-3: Programming (Python) and Linux skills are beneficial but not mandatory in Capture the Flag (CTF) exercise
Location and time
- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS
Learning materials and recommended literature
- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers are available for counselling and solving study related problems
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit content equals professional Comptia Security+ certification
Important dates
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 5 cr / 137,5 hours
- Study unit will last 12 weeks
Content and scheduling
- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-10
- Integrated Capture the Flag (CTF) exercise
Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography
Further information for students
- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- The study unit is prioritized for TIKO and BIT students
- Safety, Security and Risk Management students should take the study unit TO007BN Information and Cybersecurity Management
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)
Grading scale
H-5
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, satisfactory (1-2)
– use essential professional concepts when explaining various work practices and situations
– search for information in different sources
– report
– work under guidance using the skills and methods learned
– receive guidance
– plan the progress of his/her work and use of time under guidance
– work safely and in accordance with the professional code of conduct
– follow the provided instructions and rules
Evaluation criteria, good (3-4)
– use professional concepts in a consistent manner when explaining various work practices and situations
– gather information and use his/her knowledge basis
– report in the agreed manner
– work using the skills and methods learned
– take part in guidance and utilise it
– plan and manage the progress of his/her work and use of time
– justify this/her actions in accordance with the professional code of conduct
Evaluation criteria, excellent (5)
– use professional concepts extensively
– compare and choose relevant information
– report and communicate in a professional manner
– work independently, using the skills and methods learned
– anticipate his/her need for guidance
– manage his/her time appropriately, completing the agreed tasks at the required quality level
– work responsibly, applying the skills and methods learned
– plan and evaluate their work, taking safety and/or ethical aspects into consideration
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.
Enrollment
20.05.2024 - 26.05.2024
Timing
12.08.2024 - 03.11.2024
Number of ECTS credits allocated
5 op
Virtual proportion
5 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
20 - 40
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Degree Programme in Business Information Technology, Cyber Security (NCA2), Laurea Leppävaara
Teachers
- Leo Johannesberg
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Scheduling groups
- Avoin AMK 1 (Size: 10. Open UAS: 10.)
Groups
-
TON224SYTäydentävä osaaminen (amk-tutkinto), S24, Tietojenkäsittely ja tietoliikenne (ICT)
-
CCN224SYComplementary competence (bachelor’s studies in English), S24, Information and Communication Technologies (ICT)
-
NCA223SADegree Programme in Business Information Technology, Cyber Security, virtual studies, S23, Leppävaara
Small groups
- Avoin AMK 1
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Teaching methods
- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should have finished following compulsory ICT-studies or have equivalent competence: R0240 ICT-Toimintaympäristö / R0277 The ICT Environment and Infrastructure and R0242 Tietoverkot ja tietoturva / R0280 Data Networks and Information Security)
- NOTE-3: Programming (Python) and Linux skills are beneficial but not mandatory in Capture the Flag (CTF) exercise
Location and time
- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS
Learning materials and recommended literature
- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers are available for counselling and solving study related problems
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit content equals professional Comptia Security+ certification
Important dates
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 5 cr / 137,5 hours
- Study unit will last 12 weeks
Content and scheduling
- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-10
- Integrated Capture the Flag (CTF) exercise
Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography
Further information for students
- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- The study unit is prioritized for TIKO and BIT students
- Safety, Security and Risk Management students should take the study unit TO007BN Information and Cybersecurity Management
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)
Grading scale
H-5
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, satisfactory (1-2)
– use essential professional concepts when explaining various work practices and situations
– search for information in different sources
– report
– work under guidance using the skills and methods learned
– receive guidance
– plan the progress of his/her work and use of time under guidance
– work safely and in accordance with the professional code of conduct
– follow the provided instructions and rules
Evaluation criteria, good (3-4)
– use professional concepts in a consistent manner when explaining various work practices and situations
– gather information and use his/her knowledge basis
– report in the agreed manner
– work using the skills and methods learned
– take part in guidance and utilise it
– plan and manage the progress of his/her work and use of time
– justify this/her actions in accordance with the professional code of conduct
Evaluation criteria, excellent (5)
– use professional concepts extensively
– compare and choose relevant information
– report and communicate in a professional manner
– work independently, using the skills and methods learned
– anticipate his/her need for guidance
– manage his/her time appropriately, completing the agreed tasks at the required quality level
– work responsibly, applying the skills and methods learned
– plan and evaluate their work, taking safety and/or ethical aspects into consideration
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.
Enrollment
01.04.2024 - 07.04.2024
Timing
06.05.2024 - 06.08.2024
Number of ECTS credits allocated
5 op
Virtual proportion
5 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
40 - 80
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Leo Johannesberg
- Paresh Rathod
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
CCN223SYComplementary competence (bachelor’s studies in English), S23, Information and Communication Technologies (ICT)
-
TON223SYTäydentävä osaaminen (amk-tutkinto), S23, Tietojenkäsittely ja tietoliikenne (ICT)
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Teaching methods
- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should have finished following compulsory ICT-studies or have equivalent competence: (R0240/R0277 The ICT Environment and Infrastructure and R0242/R0280 Data Networks and Information Security)
- NOTE-3: Programming (Python) and Linux skills are beneficial but not mandatory in Capture the Flag (CTF) exercise
Location and time
- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS
Learning materials and recommended literature
- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers are available for counselling and solving study related problems
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit content equals professional Comptia Security+ certification
Important dates
- Study unit starts on week 33 (preliminary plan)
- Study unit ends on week 43 (preliminary plan)
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 5 cr / 137,5 hours
- Study unit will last 12 weeks
Content and scheduling
- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-10
- Integrated Capture the Flag (CTF) exercise
Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography
Further information for students
- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- The study unit is prioritized for TIKO and BIT students
- Safety, Security and Risk Management students should take the study unit TO007BN Information and Cybersecurity Management
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)
Grading scale
H-5
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, satisfactory (1-2)
– use essential professional concepts when explaining various work practices and situations
– search for information in different sources
– report
– work under guidance using the skills and methods learned
– receive guidance
– plan the progress of his/her work and use of time under guidance
– work safely and in accordance with the professional code of conduct
– follow the provided instructions and rules
Evaluation criteria, good (3-4)
– use professional concepts in a consistent manner when explaining various work practices and situations
– gather information and use his/her knowledge basis
– report in the agreed manner
– work using the skills and methods learned
– take part in guidance and utilise it
– plan and manage the progress of his/her work and use of time
– justify this/her actions in accordance with the professional code of conduct
Evaluation criteria, excellent (5)
– use professional concepts extensively
– compare and choose relevant information
– report and communicate in a professional manner
– work independently, using the skills and methods learned
– anticipate his/her need for guidance
– manage his/her time appropriately, completing the agreed tasks at the required quality level
– work responsibly, applying the skills and methods learned
– plan and evaluate their work, taking safety and/or ethical aspects into consideration
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.
Timing
18.03.2024 - 20.05.2024
Number of ECTS credits allocated
5 op
Virtual proportion
5 op
RDI proportion
5 op
Mode of delivery
Distance learning
Campus
Laurea Virtual Campus
Teaching languages
- English
Teachers
- Lassi Virtanen
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Teaching methods
- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should have finished following compulsory ICT-studies or have equivalent competence: (R0240/R0277 The ICT Environment and Infrastructure and R0242/R0280 Data Networks and Information Security)
- NOTE-3: Programming (Python) and Linux skills are beneficial but not mandatory in Capture the Flag (CTF) exercise
Location and time
- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS
Learning materials and recommended literature
- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers are available for counselling and solving study related problems
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit content equals professional Comptia Security+ certification
Important dates
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 5 cr / 137,5 hours
- Study unit will last 12 weeks
Content and scheduling
- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-10
- Integrated Capture the Flag (CTF) exercise
Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography
Further information for students
- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)
Grading scale
H-5
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, satisfactory (1-2)
– use essential professional concepts when explaining various work practices and situations
– search for information in different sources
– report
– work under guidance using the skills and methods learned
– receive guidance
– plan the progress of his/her work and use of time under guidance
– work safely and in accordance with the professional code of conduct
– follow the provided instructions and rules
Evaluation criteria, good (3-4)
– use professional concepts in a consistent manner when explaining various work practices and situations
– gather information and use his/her knowledge basis
– report in the agreed manner
– work using the skills and methods learned
– take part in guidance and utilise it
– plan and manage the progress of his/her work and use of time
– justify this/her actions in accordance with the professional code of conduct
Evaluation criteria, excellent (5)
– use professional concepts extensively
– compare and choose relevant information
– report and communicate in a professional manner
– work independently, using the skills and methods learned
– anticipate his/her need for guidance
– manage his/her time appropriately, completing the agreed tasks at the required quality level
– work responsibly, applying the skills and methods learned
– plan and evaluate their work, taking safety and/or ethical aspects into consideration
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.
Timing
22.01.2024 - 01.04.2024
Number of ECTS credits allocated
5 op
Virtual proportion
5 op
RDI proportion
5 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Teachers
- Lassi Virtanen
Scheduling groups
- Koskee vain Avoimen AMK:n asiakkaita, tutkinto-opiskelija älä ilmoittaudu tähän pienryhmään, voit olla välittämättä tästä. 1 (Size: 100. Open UAS: 100.)
Small groups
- Koskee vain Avoimen AMK:n asiakkaita, tutkinto-opiskelija älä ilmoittaudu tähän pienryhmään, voit olla välittämättä tästä. 1
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Teaching methods
- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should have finished following compulsory ICT-studies or have equivalent competence: (R0240/R0277 The ICT Environment and Infrastructure and R0242/R0280 Data Networks and Information Security)
- NOTE-3: Programming (Python) and Linux skills are beneficial but not mandatory in Capture the Flag (CTF) exercise
Location and time
- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS
Learning materials and recommended literature
- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers are available for counselling and solving study related problems
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit content equals professional Comptia Security+ certification
Important dates
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 5 cr / 137,5 hours
- Study unit will last 12 weeks
Content and scheduling
- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-10
- Integrated Capture the Flag (CTF) exercise
Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography
Further information for students
- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)
Grading scale
H-5
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, satisfactory (1-2)
– use essential professional concepts when explaining various work practices and situations
– search for information in different sources
– report
– work under guidance using the skills and methods learned
– receive guidance
– plan the progress of his/her work and use of time under guidance
– work safely and in accordance with the professional code of conduct
– follow the provided instructions and rules
Evaluation criteria, good (3-4)
– use professional concepts in a consistent manner when explaining various work practices and situations
– gather information and use his/her knowledge basis
– report in the agreed manner
– work using the skills and methods learned
– take part in guidance and utilise it
– plan and manage the progress of his/her work and use of time
– justify this/her actions in accordance with the professional code of conduct
Evaluation criteria, excellent (5)
– use professional concepts extensively
– compare and choose relevant information
– report and communicate in a professional manner
– work independently, using the skills and methods learned
– anticipate his/her need for guidance
– manage his/her time appropriately, completing the agreed tasks at the required quality level
– work responsibly, applying the skills and methods learned
– plan and evaluate their work, taking safety and/or ethical aspects into consideration
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.
Enrollment
27.11.2023 - 03.12.2023
Timing
15.01.2024 - 07.04.2024
Number of ECTS credits allocated
5 op
Virtual proportion
5 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
40 - 60
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Tietojenkäsittelyn koulutus, kyberturvallisuus (NKA2), Laurea Leppävaara (Finnish)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Leo Johannesberg
- Paresh Rathod
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
CCN223SYComplementary competence (bachelor’s studies in English), S23, Information and Communication Technologies (ICT)
-
TON223SYTäydentävä osaaminen (amk-tutkinto), S23, Tietojenkäsittely ja tietoliikenne (ICT)
-
NKA223KATietojenkäsittelyn koulutus, kyberturvallisuus, monimuotototeutus, K23, Leppävaara
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Teaching methods
- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should have finished following compulsory ICT-studies or have equivalent competence: (R0240/R0277 The ICT Environment and Infrastructure and R0242/R0280 Data Networks and Information Security)
- NOTE-3: Programming (Python) and Linux skills are beneficial but not mandatory in Capture the Flag (CTF) exercise
Location and time
- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS
Learning materials and recommended literature
- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers are available for counselling and solving study related problems
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit content equals professional Comptia Security+ certification
Important dates
- Study unit starts on week 33 (preliminary plan)
- Study unit ends on week 43 (preliminary plan)
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 5 cr / 137,5 hours
- Study unit will last 12 weeks
Content and scheduling
- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-10
- Integrated Capture the Flag (CTF) exercise
Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography
Further information for students
- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- The study unit is prioritized for TIKO and BIT students
- Safety, Security and Risk Management students should take the study unit TO007BN Information and Cybersecurity Management
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)
Grading scale
H-5
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, satisfactory (1-2)
– use essential professional concepts when explaining various work practices and situations
– search for information in different sources
– report
– work under guidance using the skills and methods learned
– receive guidance
– plan the progress of his/her work and use of time under guidance
– work safely and in accordance with the professional code of conduct
– follow the provided instructions and rules
Evaluation criteria, good (3-4)
– use professional concepts in a consistent manner when explaining various work practices and situations
– gather information and use his/her knowledge basis
– report in the agreed manner
– work using the skills and methods learned
– take part in guidance and utilise it
– plan and manage the progress of his/her work and use of time
– justify this/her actions in accordance with the professional code of conduct
Evaluation criteria, excellent (5)
– use professional concepts extensively
– compare and choose relevant information
– report and communicate in a professional manner
– work independently, using the skills and methods learned
– anticipate his/her need for guidance
– manage his/her time appropriately, completing the agreed tasks at the required quality level
– work responsibly, applying the skills and methods learned
– plan and evaluate their work, taking safety and/or ethical aspects into consideration
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.
Timing
02.10.2023 - 18.12.2023
Number of ECTS credits allocated
5 op
Virtual proportion
5 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
40 - 80
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Lassi Virtanen
Teacher in charge
Lassi Virtanen
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Teaching methods
- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should have finished following compulsory ICT-studies or have equivalent competence: (R0240/R0277 The ICT Environment and Infrastructure and R0242/R0280 Data Networks and Information Security)
- NOTE-3: Programming (Python) and Linux skills are beneficial but not mandatory in Capture the Flag (CTF) exercise
Location and time
- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS
Learning materials and recommended literature
- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers are available for counselling and solving study related problems
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit content equals professional Comptia Security+ certification
Important dates
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 5 cr / 137,5 hours
- Study unit will last 12 weeks
Content and scheduling
- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-10
- Integrated Capture the Flag (CTF) exercise
Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography
Further information for students
- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)
Grading scale
H-5
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, satisfactory (1-2)
– use essential professional concepts when explaining various work practices and situations
– search for information in different sources
– report
– work under guidance using the skills and methods learned
– receive guidance
– plan the progress of his/her work and use of time under guidance
– work safely and in accordance with the professional code of conduct
– follow the provided instructions and rules
Evaluation criteria, good (3-4)
– use professional concepts in a consistent manner when explaining various work practices and situations
– gather information and use his/her knowledge basis
– report in the agreed manner
– work using the skills and methods learned
– take part in guidance and utilise it
– plan and manage the progress of his/her work and use of time
– justify this/her actions in accordance with the professional code of conduct
Evaluation criteria, excellent (5)
– use professional concepts extensively
– compare and choose relevant information
– report and communicate in a professional manner
– work independently, using the skills and methods learned
– anticipate his/her need for guidance
– manage his/her time appropriately, completing the agreed tasks at the required quality level
– work responsibly, applying the skills and methods learned
– plan and evaluate their work, taking safety and/or ethical aspects into consideration
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.
Enrollment
22.05.2023 - 28.05.2023
Timing
14.08.2023 - 05.11.2023
Number of ECTS credits allocated
5 op
Virtual proportion
5 op
RDI proportion
2 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
40 - 80
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Leo Johannesberg
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Scheduling groups
- Avoin AMK 1 (Size: 10. Open UAS: 10.)
Groups
-
CCN223SYComplementary competence (bachelor’s studies in English), S23, Information and Communication Technologies (ICT)
-
NKA222SATietojenkäsittelyn koulutus, kyberturvallisuus, monimuotototeutus, S22, Leppävaara
-
TON223SYTäydentävä osaaminen (amk-tutkinto), S23, Tietojenkäsittely ja tietoliikenne (ICT)
-
NCA222SADegree Programme in Business Information Technology, Cyber Security, blended learning, S22, Leppävaara
Small groups
- Avoin AMK 1
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Teaching methods
- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should have finished following compulsory ICT-studies or have equivalent competence: (R0240/R0277 The ICT Environment and Infrastructure and R0242/R0280 Data Networks and Information Security)
- NOTE-3: Programming (Python) and Linux skills are beneficial but not mandatory in Capture the Flag (CTF) exercise
Location and time
- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS
Learning materials and recommended literature
- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers are available for counselling and solving study related problems
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit content equals professional Comptia Security+ certification
Important dates
- Study unit starts on week 33 (preliminary plan)
- Study unit ends on week 43 (preliminary plan)
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 5 cr / 137,5 hours
- Study unit will last 12 weeks
Content and scheduling
- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-10
- Integrated Capture the Flag (CTF) exercise
Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography
Further information for students
- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- The study unit is prioritized for TIKO and BIT students
- Safety, Security and Risk Management students should take the study unit TO007BN Information and Cybersecurity Management
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)
Grading scale
H-5
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, satisfactory (1-2)
– use essential professional concepts when explaining various work practices and situations
– search for information in different sources
– report
– work under guidance using the skills and methods learned
– receive guidance
– plan the progress of his/her work and use of time under guidance
– work safely and in accordance with the professional code of conduct
– follow the provided instructions and rules
Evaluation criteria, good (3-4)
– use professional concepts in a consistent manner when explaining various work practices and situations
– gather information and use his/her knowledge basis
– report in the agreed manner
– work using the skills and methods learned
– take part in guidance and utilise it
– plan and manage the progress of his/her work and use of time
– justify this/her actions in accordance with the professional code of conduct
Evaluation criteria, excellent (5)
– use professional concepts extensively
– compare and choose relevant information
– report and communicate in a professional manner
– work independently, using the skills and methods learned
– anticipate his/her need for guidance
– manage his/her time appropriately, completing the agreed tasks at the required quality level
– work responsibly, applying the skills and methods learned
– plan and evaluate their work, taking safety and/or ethical aspects into consideration
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.
Enrollment
03.04.2023 - 09.04.2023
Timing
08.05.2023 - 06.08.2023
Number of ECTS credits allocated
5 op
Virtual proportion
5 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
40 - 80
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Paresh Rathod
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Scheduling groups
- Avoin AMK 1 (Size: 10. Open UAS: 10.)
Groups
-
TON222SYLaurea täydentävä osaaminen (amk-tutkinto), S22, Tietojenkäsittely ja tietoliikenne (ICT)
-
CCN222SYComplementary competence (bachelor’s studies), S22, Information and Communication Technologies (ICT)
Small groups
- Avoin AMK 1
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Teaching methods
- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should have finished following compulsory ICT-studies or have equivalent competence: (R0240/R0277 The ICT Environment and Infrastructure and R0242/R0280 Data Networks and Information Security)
- NOTE-3: Programming (Python) and Linux skills are beneficial but not mandatory in Capture the Flag (CTF) exercise
Location and time
- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS
Learning materials and recommended literature
- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers are available for counselling and solving study related problems
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit content equals professional Comptia Security+ certification
Important dates
- Study unit starts on week 19 (preliminary plan)
- Study unit ends on week 30 (preliminary plan)
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 5 cr / 137,5 hours
- Study unit will last 12 weeks
Content and scheduling
- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-10
- Integrated Capture the Flag (CTF) exercise
Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography
Further information for students
- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- The study unit is prioritized for TIKO and BIT students
- Safety, Security and Risk Management students should take the study unit TO007BN Information and Cybersecurity Management
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)
Grading scale
H-5
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, satisfactory (1-2)
– use essential professional concepts when explaining various work practices and situations
– search for information in different sources
– report
– work under guidance using the skills and methods learned
– receive guidance
– plan the progress of his/her work and use of time under guidance
– work safely and in accordance with the professional code of conduct
– follow the provided instructions and rules
Evaluation criteria, good (3-4)
– use professional concepts in a consistent manner when explaining various work practices and situations
– gather information and use his/her knowledge basis
– report in the agreed manner
– work using the skills and methods learned
– take part in guidance and utilise it
– plan and manage the progress of his/her work and use of time
– justify this/her actions in accordance with the professional code of conduct
Evaluation criteria, excellent (5)
– use professional concepts extensively
– compare and choose relevant information
– report and communicate in a professional manner
– work independently, using the skills and methods learned
– anticipate his/her need for guidance
– manage his/her time appropriately, completing the agreed tasks at the required quality level
– work responsibly, applying the skills and methods learned
– plan and evaluate their work, taking safety and/or ethical aspects into consideration
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.
Enrollment
28.11.2022 - 04.12.2022
Timing
09.01.2023 - 09.04.2023
Number of ECTS credits allocated
5 op
Virtual proportion
5 op
RDI proportion
1 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
40 - 60
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Paresh Rathod
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Scheduling groups
- Open UAS (Size: 5. Open UAS: 5.)
Groups
-
NKA222KATietojenkäsittelyn koulutus, kyberturvallisuus, monimuotototeutus, K22, Leppävaara
-
TON222SYLaurea täydentävä osaaminen (amk-tutkinto), S22, Tietojenkäsittely ja tietoliikenne (ICT)
-
CCN222SYComplementary competence (bachelor’s studies), S22, Information and Communication Technologies (ICT)
Small groups
- Open UAS
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Teaching methods
- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should have finished following compulsory ICT-studies or have equivalent competence: (R0277 The ICT Environment and Infrastructure and R0280 Data Networks and Information Security)
- NOTE-3: Programming (Python) and Linux skills are beneficial but not mandatory in Capture the Flag (CTF) exercise
Location and time
- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS
Learning materials and recommended literature
- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers are available for counselling and solving study related problems
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module
Co-operation with working life and/or RDI
- The study unit content equals professional Comptia Security+ certification
Important dates
- Study unit starts on week 2 (preliminary plan)
- Study unit ends on week 13 (preliminary plan)
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 5 cr / 137,5 hours
- Study unit will last 12 weeks
Content and scheduling
- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-10
- Integrated Capture the Flag (CTF) exercise
Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography
Further information for students
- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- The study unit is prioritized for TIKO and BIT students
- Safety, Security and Risk Management students should take the study unit TO007BN Information and Cybersecurity Management
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)
Grading scale
H-5
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, satisfactory (1-2)
– use essential professional concepts when explaining various work practices and situations
– search for information in different sources
– report
– work under guidance using the skills and methods learned
– receive guidance
– plan the progress of his/her work and use of time under guidance
– work safely and in accordance with the professional code of conduct
– follow the provided instructions and rules
Evaluation criteria, good (3-4)
– use professional concepts in a consistent manner when explaining various work practices and situations
– gather information and use his/her knowledge basis
– report in the agreed manner
– work using the skills and methods learned
– take part in guidance and utilise it
– plan and manage the progress of his/her work and use of time
– justify this/her actions in accordance with the professional code of conduct
Evaluation criteria, excellent (5)
– use professional concepts extensively
– compare and choose relevant information
– report and communicate in a professional manner
– work independently, using the skills and methods learned
– anticipate his/her need for guidance
– manage his/her time appropriately, completing the agreed tasks at the required quality level
– work responsibly, applying the skills and methods learned
– plan and evaluate their work, taking safety and/or ethical aspects into consideration
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.
Enrollment
23.05.2022 - 29.05.2022
Timing
15.08.2022 - 06.11.2022
Number of ECTS credits allocated
5 op
Virtual proportion
5 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
40 - 80
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Degree Programme in Business Information Technology, Cyber Security (NCA2), Laurea Leppävaara
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Paresh Rathod
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
TON222SYLaurea täydentävä osaaminen (amk-tutkinto), S22, Tietojenkäsittely ja tietoliikenne (ICT)
-
NCA221SADegree Programme in Business Information Technology, Cyber Security, blended learning, S21, Leppävaara
-
CCN222SYComplementary competence (bachelor’s studies), S22, Information and Communication Technologies (ICT)
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Teaching methods
- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should have finished following compulsory ICT-studies or have equivalent competence: (R0277 The ICT Environment and Infrastructure and R0280 Data Networks and Information Security)
- NOTE-3: Programming and Linux skills are beneficial but not mandatory in Capture the Flag (CTF) exercise
Location and time
- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS
Learning materials and recommended literature
- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence
Co-operation with working life and/or RDI
- The study unit content equals professional Comptia Security+ certification
Important dates
- Study unit starts on week 33 (preliminary plan)
- Study unit ends on week 43 (preliminary plan)
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 5 cr / 137,5 hours
- Study unit will last 11 weeks
Content and scheduling
- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-5 and from Module-6 to Module-10
- Integrated Capture the Flag (CTF) exercise
Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography
Further information for students
- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- The study unit is prioritized for TIKO and BIT students
- Safety, Security and Risk Management students should take the study unit TO007BN Information and Cybersecurity Management
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)
Grading scale
H-5
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, satisfactory (1-2)
– use essential professional concepts when explaining various work practices and situations
– search for information in different sources
– report
– work under guidance using the skills and methods learned
– receive guidance
– plan the progress of his/her work and use of time under guidance
– work safely and in accordance with the professional code of conduct
– follow the provided instructions and rules
Evaluation criteria, good (3-4)
– use professional concepts in a consistent manner when explaining various work practices and situations
– gather information and use his/her knowledge basis
– report in the agreed manner
– work using the skills and methods learned
– take part in guidance and utilise it
– plan and manage the progress of his/her work and use of time
– justify this/her actions in accordance with the professional code of conduct
Evaluation criteria, excellent (5)
– use professional concepts extensively
– compare and choose relevant information
– report and communicate in a professional manner
– work independently, using the skills and methods learned
– anticipate his/her need for guidance
– manage his/her time appropriately, completing the agreed tasks at the required quality level
– work responsibly, applying the skills and methods learned
– plan and evaluate their work, taking safety and/or ethical aspects into consideration
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.
Enrollment
04.04.2022 - 10.04.2022
Timing
02.05.2022 - 31.07.2022
Number of ECTS credits allocated
5 op
Virtual proportion
5 op
Mode of delivery
Distance learning
Unit
Korkeakouluyksikkö D /YAMK
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
40 - 80
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Paresh Rathod
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
TON221SYLaurea täydentävä osaaminen (amk-tutkinto), S21, Tietojenkäsittely ja tietoliikenne (ICT)
-
CCN221SYComplementary competence (bachelor’s studies), S21, Information and Communication Technologies (ICT)
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Teaching methods
- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should have finished following compulsory ICT-studies or have equivalent competence: (R0277 The ICT Environment and Infrastructure and R0280 Data Networks and Information Security)
- NOTE-3: Programming and Linux skills are beneficial but not mandatory in Capture the Flag (CTF) exercise
Location and time
- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS
Learning materials and recommended literature
- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence
Co-operation with working life and/or RDI
- The study unit content equals professional Comptia Security+ certification
Important dates
- Study unit starts on week 18 (preliminary plan)
- Study unit ends on week 25 (preliminary plan)
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 5 cr / 137,5 hours
- Study unit will last 14 weeks
Content and scheduling
- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-5 and from Module-6 to Module-10
- Integrated Capture the Flag (CTF) exercise
Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography
Further information for students
- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- The study unit is prioritized for TIKO and BIT students
- Safety, Security and Risk Management students should take the study unit TO007BN Information and Cybersecurity Management
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)
Grading scale
H-5
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, satisfactory (1-2)
– use essential professional concepts when explaining various work practices and situations
– search for information in different sources
– report
– work under guidance using the skills and methods learned
– receive guidance
– plan the progress of his/her work and use of time under guidance
– work safely and in accordance with the professional code of conduct
– follow the provided instructions and rules
Evaluation criteria, good (3-4)
– use professional concepts in a consistent manner when explaining various work practices and situations
– gather information and use his/her knowledge basis
– report in the agreed manner
– work using the skills and methods learned
– take part in guidance and utilise it
– plan and manage the progress of his/her work and use of time
– justify this/her actions in accordance with the professional code of conduct
Evaluation criteria, excellent (5)
– use professional concepts extensively
– compare and choose relevant information
– report and communicate in a professional manner
– work independently, using the skills and methods learned
– anticipate his/her need for guidance
– manage his/her time appropriately, completing the agreed tasks at the required quality level
– work responsibly, applying the skills and methods learned
– plan and evaluate their work, taking safety and/or ethical aspects into consideration
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.
Enrollment
29.11.2021 - 05.12.2021
Timing
24.01.2022 - 27.05.2022
Number of ECTS credits allocated
5 op
Virtual proportion
5 op
Mode of delivery
Distance learning
Unit
Laurea Leppävaara, tiko
Campus
Laurea Virtual Campus
Teaching languages
- English
Seats
40 - 50
Degree programmes
- Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
- Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Teachers
- Paresh Rathod
- Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
-
TON221SYLaurea täydentävä osaaminen (amk-tutkinto), S21, Tietojenkäsittely ja tietoliikenne (ICT)
-
CCN221SYComplementary competence (bachelor’s studies), S21, Information and Communication Technologies (ICT)
Learning outcomes
The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process
Teaching methods
- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should finish compulsory ICT-studies (TIKO: R0240, R0241 & R0242, BIT: R0277, R0279 & R0280) before enrolling to complementary studies OR the student should have equivalent competence with the aforementioned study units
Location and time
- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS
Learning materials and recommended literature
- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
Alternative completion methods of implementation
- If a student has existing domain specific competence he/she can request a process for recognition of existing competence
Co-operation with working life and/or RDI
- The study unit may offer expert lecturers
Important dates
- Study unit starts on week 4 (preliminary plan)
- Study unit ends on week 17 (preliminary plan)
- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes
Students workload
- 5 cr / 137,5 hours
- Study unit will last 14 weeks
Content and scheduling
- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-5 and from Module-6 to Module-10
- Volunteer lab exercises
Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography
Further information for students
- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- The study unit is prioritized for TIKO and BIT students
- Safety, Security and Risk Management students should take the study unit TO007BN Information and Cybersecurity Management
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)
Grading scale
H-5
Evaluation methods and criteria
- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Possible bonus task
Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0
Evaluation criteria, satisfactory (1-2)
– use essential professional concepts when explaining various work practices and situations
– search for information in different sources
– report
– work under guidance using the skills and methods learned
– receive guidance
– plan the progress of his/her work and use of time under guidance
– work safely and in accordance with the professional code of conduct
– follow the provided instructions and rules
Evaluation criteria, good (3-4)
– use professional concepts in a consistent manner when explaining various work practices and situations
– gather information and use his/her knowledge basis
– report in the agreed manner
– work using the skills and methods learned
– take part in guidance and utilise it
– plan and manage the progress of his/her work and use of time
– justify this/her actions in accordance with the professional code of conduct
Evaluation criteria, excellent (5)
– use professional concepts extensively
– compare and choose relevant information
– report and communicate in a professional manner
– work independently, using the skills and methods learned
– anticipate his/her need for guidance
– manage his/her time appropriately, completing the agreed tasks at the required quality level
– work responsibly, applying the skills and methods learned
– plan and evaluate their work, taking safety and/or ethical aspects into consideration
Qualifications
Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.