Siirry suoraan sisältöön

Introduction to Information Security (5 op)

Toteutuksen tunnus: TO00BR89-3014

Toteutuksen perustiedot


Ajoitus
02.10.2023 - 18.12.2023
Toteutus on päättynyt.
Opintopistemäärä
5 op
Lähiosuus
0 op
Virtuaaliosuus
5 op
Toteutustapa
Etäopetus
Toimipiste
Laurea Verkkokampus
Opetuskielet
englanti
Paikat
40 - 80
Koulutus
Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
Opettajat
Lassi Virtanen
Vastuuopettaja
Lassi Virtanen
Opintojakso
TO00BR89

Tavoitteet

The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop his or her own learning process

Aika ja paikka

- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS

Oppimateriaali ja suositeltava kirjallisuus

- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers are available for counselling and solving study related problems

Toteutustapa

- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should have finished following compulsory ICT-studies or have equivalent competence: (R0240/R0277 The ICT Environment and Infrastructure and R0242/R0280 Data Networks and Information Security)
- NOTE-3: Programming (Python) and Linux skills are beneficial but not mandatory in Capture the Flag (CTF) exercise

Työelämäyhteistyö ja/tai TKI

- The study unit content equals professional Comptia Security+ certification

Toteutuksen tärkeät päivämäärät

- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes

Toteutuksen valinnaiset suoritustavat

- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module

Opiskelijan ajankäyttö ja kuormitus

- 5 cr / 137,5 hours
- Study unit will last 12 weeks

Sisältö ja sen jaksotus

- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-10
- Integrated Capture the Flag (CTF) exercise

Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography

Arviointiasteikko

H-5

Esitietovaatimukset

Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.

Lisätiedot

- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)

Siirry alkuun