Skip to main content

Introduction to Information Security (5 cr)

Code: TO00BR89-3015

General information


Enrollment
01.04.2024 - 07.04.2024
Registration for the implementation has ended.
Timing
06.05.2024 - 06.08.2024
Implementation has ended.
Number of ECTS credits allocated
5 cr
Local portion
0 cr
Virtual proportion
5 cr
Mode of delivery
Distance learning
Campus
Laurea Virtual Campus
Teaching languages
English
Seats
40 - 80
Degree programmes
Laurea täydentävä osaaminen, amk-tutkinto (TON2), Tietojenkäsittely ja tietoliikenne (ICT)
Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
Teachers
Leo Johannesberg
Paresh Rathod
Pasi Kämppi
Teacher in charge
Pasi Kämppi
Study unit
TO00BR89

Learning outcomes

The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process

Location and time

- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS

Materials

- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers are available for counselling and solving study related problems

Teaching methods

- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should have finished following compulsory ICT-studies or have equivalent competence: R0240 ICT-Toimintaympäristö / R0277 The ICT Environment and Infrastructure and R0242 Tietoverkot ja tietoturva / R0280 Data Networks and Information Security)
- NOTE-3: Programming (Python) and Linux skills are beneficial but not mandatory in Capture the Flag (CTF) exercise

Employer connections

- The study unit content equals professional Comptia Security+ certification

Exam schedules

- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes

Completion alternatives

- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module

Student workload

- 5 cr / 137,5 hours
- Study unit will last 12 weeks

Content scheduling

- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-10
- Integrated Capture the Flag (CTF) exercise

Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography

Evaluation scale

H-5

Qualifications

Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.

Further information

- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- The study unit is prioritized for TIKO and BIT students
- Safety, Security and Risk Management students should take the study unit TO007BN Information and Cybersecurity Management
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)

Go back to top of page