Skip to main content

Systems Security (5 cr)

Code: R0322-3002

General information


Enrollment

25.11.2019 - 01.12.2019

Timing

20.01.2020 - 28.05.2020

Number of ECTS credits allocated

5 op

Virtual proportion

5 op

Mode of delivery

Distance learning

Unit

Laurea Leppävaara, tiko

Campus

Laurea common

Teaching languages

  • English

Seats

20 - 40

Degree programmes

  • Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)

Teachers

  • Paresh Rathod
  • Pasi Kämppi

Teacher in charge

Pasi Kämppi

Groups

  • TON219SY
  • CCN219SY
    Complementary competence (bachelor’s studies), S19, Information and Communication Technologies (ICT)

Learning outcomes

The student is able to
- plan and apply the concepts of risk assessment, risk analysis and risk management
- apply a comprehensive and rigorous method for organisation’s asset security
- identify threats, vulnerabilities and risks associated with organisation’s systems
- protect and control information processing assets in centralized and distributed environments
- apply the Systems Development Life Cycle (SDLC) to security controls
- protect and control workstation and server environments

Teaching methods

This is fully online study offering. The content is mapped with the Certified Information Systems Security Professional (CISSP) curriculum. This study unit offers 12 module learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Main learning activities including weekly online learning, learning tasks and group activities. Some details listed below:
¤ Online Learning: Weekly module based online learning activities.
¤ Learning Tasks: Weekly assignments including material study, writing learning reflections and finishing targeted learning tasks.

Learning materials and recommended literature

1) Online learning on professional training platform for CISSP.
2) We provide study material lists on course management system including book from Laurea online library resources.
3) Optima provide weekly module details including details on online learning, learning task and submission of task.

Alternative completion methods of implementation

This study unit is for regular students who prefer to learn every week. No alternative method to finish this study unit.
Finishing online learning (as per requirement) is basic requirements to consider for evaluation and grading. If student not finishing online learning as per requirements, not qualifying for evaluation and grading.

Co-operation with working life and/or RDI

We offer annual event participation including Nokia HackAthon, Digia HackAthon or Visiting our partner Nixu Corporation's Cyber Defense Center. Time to time, we also announce internships, working life projects and thesis opportunities for Cybersecurity Module students.

Important dates

All details on the course management system for registered students only.
- Inactive students are removed from the study unit after orientation period (the first week of the study unit).

Forms of internationality

- Teachers and students group are international (Finnish and English degree programme students).
- Study is suitable for exchange students.
- We are also cooperating with working life companies and both teachers are involved in European and International innovation projects.

Students workload

The student puts 5 ECTS study effort.
o 5 credits X 27 hours = 135 hours are attached to the workload of a full-time study of learning and the associated learning outcomes.

Content and scheduling

The study unit starts on week-4 and finishes at the end of semester.
¤ The weekly module open on every Monday at 09.00 and closes on Sunday midnight.
¤ Inactive students are removed from the study unit after orientation period (the first week of the study unit).

COURSE CONENT:
Module-0: Induction and Personal Study Plan
Module-1: (ISC)² and Security Fundamentals
Module-2: Cryptographic Client-based Systems
Module-3: Communication and Network Security
Module-4: Identity and Access Management (IAM)
Module-5: Site and Facility Security Controls
Module-6: Security and Risk Management (Part 1)
Module-7: Security and Risk Management (Part 2)

Further information for students

- The study unit is suitable for any graduate-level student. Considering following points:
o The student must know: how the company/organization works
o Students know the basics of ICT-technologies
o The student is able to study with weekly based schedule

- The study unit is prioritized for TIKO and BIT students.
- Safety, Security and Risk Management students should consider taking compulsory and intermediate cybersecurity courses before participating in this advanced course.
- Inactive students are removed from the study unit after orientation period (the first week of the study unit).

Grading scale

H-5

Evaluation methods and criteria

- The weekly study, assignment and tasks
- Students collect the points for different learning activities
- Online Tests

Important Note:
o Students are responsible to finish all tasks within schedule time to gain points.
o Learning Activities and Tasks: All Details given in respective Module Folders on the course management system.
o No points after the deadline.
o Sickness or family reasons - contact teacher for tutoring discussion. Sickness needs a doctor certificate.

Teachers will evaluate student work and post points after mid-term and end-term. There are two checkpoints.
Any student not finishing 'Module-0: Induction and Study Plan' will be removed from the study unit after first week of the course.

>> Grading scale (0 to 5):
0-49 points: 0
50-59 points: 1
60-69 points: 2
70-79 points: 3
80-89 points: 4
90-100 points: 5

Evaluation criteria, fail (0)

The student is not meeting the requirements for the grade 1 to 5, as described below.
¤ 0-49 points: 0

Evaluation criteria, satisfactory (1-2)

– use professional concepts in a consistent manner and demonstrate his/her familiarity with the knowledge basis
– report and communicate in a professional manner
– act independently taking into account the operating environment
– describe the significance of his/her actions for successful co-operation
– describe his/her competence in relation to the learning outcomes

Evaluation criteria, good (3-4)

– critically evaluate information and justify their actions with science-based knowledge
– propose creative solutions at work
– describe the development of his/her competence in relation to the learning outcomes

Evaluation criteria, excellent (5)

– analyse the acquired information, draw conclusions and combine theoretical knowledge with experiential knowledge
– evaluate the applicability of produced knowledge, skill or idea to other contexts as well as their impact
– evaluate the possibilities for utilising competence and plan his/her personal development