Skip to main content

Introduction to Information Security (5 cr)

Code: TO00BR89-3016

General information


Timing
22.01.2024 - 01.04.2024
Implementation has ended.
Number of ECTS credits allocated
5 cr
Local portion
0 cr
Virtual proportion
5 cr
RDI proportion
5 cr
Mode of delivery
Distance learning
Campus
Laurea Virtual Campus
Teaching languages
English
Teachers
Lassi Virtanen
Scheduling groups
Koskee vain Avoimen AMK:n asiakkaita, tutkinto-opiskelija älä ilmoittaudu tähän pienryhmään, voit olla välittämättä tästä. 1 (Size: 100 . Open UAS : 100.)
Small groups
Koskee vain Avoimen AMK:n asiakkaita, tutkinto-opiskelija älä ilmoittaudu tähän pienryhmään, voit olla välittämättä tästä. 1
Study unit
TO00BR89

Learning outcomes

The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process

Location and time

- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS

Materials

- Learning material is based on Comptia Security+ SY0-501 certification training material
- Video material
- Course book (Comptia Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for Comptia Security+ but not certification exam
- NOTE: There is no scheduled lecturers given by a teacher but the teachers are available for counselling and solving study related problems

Teaching methods

- This study unit is fully automated self paced online learning (MOOC) with the possibilities of volunteer tutoring meetings with the teachers
- The tutoring meetings are not compulsory. Any student can participate tutoring meeting if they need any help from teachers
- Virtual studies, weekly basis virtual learning and assignments
- This is introduction level study unit and it gives good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE-1: There are no scheduled lecturers given by a teacher but the teachers is available for counselling and solving study related problems
- NOTE-2: Student should have finished following compulsory ICT-studies or have equivalent competence: (R0240/R0277 The ICT Environment and Infrastructure and R0242/R0280 Data Networks and Information Security)
- NOTE-3: Programming (Python) and Linux skills are beneficial but not mandatory in Capture the Flag (CTF) exercise

Employer connections

- The study unit content equals professional Comptia Security+ certification

Exam schedules

- Detailed schedule is released at the beginning of the study unit
- NOTE: There can be scheduling changes

Completion alternatives

- If a student has existing domain specific competence he/she can request a process for recognition of existing competence before or during the Orientation-module

Student workload

- 5 cr / 137,5 hours
- Study unit will last 12 weeks

Content scheduling

- Weekly base schedule and one (1) module per week
- A student can be proceed in his/her own pace from Module-1 to Module-10
- Integrated Capture the Flag (CTF) exercise

Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography

Evaluation scale

H-5

Qualifications

Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.

Further information

- STUDY UNIT IS FULLY AUTOMATED (MOOC) AND TEACHERS ARE AVAILABLE FOR COUNSELLING PURPOSES
- This is introduction level study unit and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit weekly based studies
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)

Go back to top of page