Skip to main content

Introduction to Information Security (5cr)

Code: TO00BR89-3021

General information


Enrollment
24.11.2025 - 30.11.2025
Registration for the implementation has ended.
Timing
12.01.2026 - 29.03.2026
Implementation is running.
Number of ECTS credits allocated
5 cr
Local portion
0 cr
Virtual proportion
5 cr
Mode of delivery
Distance learning
Unit
10 Liiketalous-, tietojenkäsittely- ja palvelualat
Campus
Laurea Virtual Campus
Teaching languages
English
Seats
20 - 100
Degree programmes
Complementary competence, bachelor's studies in English (CCN2), Information and Communication Technologies (ICT)
Tietojenkäsittelyn koulutus, kyberturvallisuus (NKA2), Laurea Leppävaara (Finnish)
Teachers
Pasi Kämppi
Teacher in charge
Pasi Kämppi
Groups
CCN225SY
Complementary competence (bachelor’s studies in English), S25, Information and Communication Technologies (ICT)
NKA225KA
Tietojenkäsittelyn koulutus, kyberturvallisuus, monimuotototeutus, K25, Leppävaara
TON225SY
Täydentävä osaaminen (amk-tutkinto), S25, Tietojenkäsittely ja tietoliikenne (ICT)
Study unit
TO00BR89

Qualifications

Prerequisites:
For tiko students: study units R0240 ICT-toimintaympäristö, R0241 Tiedonhallinta ja tietokannat & R0242 Tietoverkot ja tietoturva
For BIT students: study units R0277 ICT Environment and Infrastructure, R0279 Information Management and Databases & R0280 Data Networks and Information Security
Or equivalent competence.

Learning outcomes

The student is able to
- act ethically as a member of study group and community
- recognize and comprehend the importance of confidentiality,
integrity and availability model for the information and
cybersecurity
- recognize and comprehend different threats, attacks and
vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management
approaches
- comprehend, describe and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each
other
- comprehend and explain the importance of the cybersecurity in
the modern society
- reflect and develop their own learning process

Teaching methods

- This study unit is a partially automated, self-paced online learning course complemented with applied assignments and an entry-level Capture the Flag (CTF) exercise
- The tutoring meetings are not compulsory. Any student can participate in a tutoring meeting if they need any help from teachers
- Virtual studies, on a weekly basis, virtual learning and assignments
- This is an introductory-level study unit, and it gives a good basis for more advanced study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit to weekly based studies
- NOTE-1: There are no scheduled lectures given by a teacher but the teacher is available for counselling and solving study-related problems
- NOTE-2: The Student should have basic competency in ICT environments and IT infrastructure
- NOTE-3: Programming (Python) and Linux skills are beneficial but not mandatory in the Capture the Flag (CTF) exercise

Time and location

- Not dependent on place or time (virtual studies)
- The study unit is implemented in Canvas LMS

Learning materials and recommended literature

- Learning material is based on CompTIA Security+ SY0-501 certification training material
- Video material
- Course book (CompTIA Security+ 7th Edition, Dulaney Emmett)
- The study unit provides preparatory training for CompTIA Security+ but not the certification exam
- NOTE: There are no scheduled lectures given by a teacher but the teachers are available for counselling and solving study-related problems

Alternative completion methods of implementation

- If a student has existing domain-specific competence he/they can request a process for recognition of existing competence before or during the Orientation module

Co-operation with working life and/or RDI

- The study unit content equals professional CompTIA Security+ certification

Important dates

- A detailed schedule is released at the beginning of the study unit

Student workload

- 5 cr / 137,5 hours
- The study unit will last 12 weeks

Content and scheduling

- Weekly-based schedule and one (1) module per week
- A student can proceed at his/her own pace from Module-1 to Module-10
- Integrated Capture the Flag (CTF) exercise

Modules:
- Module-0: Learning target and goal
- Module-1: Network Security Part 1
- Module-2: Network Security Part 2
- Module-3: Compliance and Operational Security Part 1
- Module-4: Compliance and Operational Security Part 2
- Module-5: Threats and Vulnerabilities Part 1
- Module-6: Threats and Vulnerabilities Part 2
- Module-7: Threats and Vulnerabilities Part 3
- Module-8: Application, Data, and Host Security
- Module-9: Access Control and Identity
- Module-10: Cryptography

Further information

- This is an introductory-level study unit, and it gives good basis for more advanced cybersecurity study units
- This study unit is suitable for any student who is willing to learn the overview of information security technologies
- Students need to commit to weekly based studies
- NOTE: Inactive students are removed from the study unit after the orientation period (the first week of the study unit)

Evaluation scale

H-5

Evaluation methods and criteria

- Weekly studies
- Students collect points for different learning activities
- Online Tests
- Learning assignments and tasks
- Possible bonus task

Assessment scale:
100-90 points equals grade 5
89-80 points equals grade 4
79-70 points equals grade 3
69-60 points equals grade 2
59-50 points equals grade 1
49-0 points equals grade 0

Assessment criteria, satisfactory (1-2)

– use essential professional concepts when explaining various work practices and situations
– search for information in different sources
– report
– work under guidance using the skills and methods learned
– receive guidance
– plan the progress of his/her work and use of time under guidance
– work safely and in accordance with the professional code of conduct
– follow the provided instructions and rules

Assessment criteria, good (3-4)

– use professional concepts in a consistent manner when explaining various work practices and situations
– gather information and use his/her knowledge basis
– report in the agreed manner
– work using the skills and methods learned
– take part in guidance and utilise it
– plan and manage the progress of his/her work and use of time
– justify this/her actions in accordance with the professional code of conduct

Assessment criteria, excellent (5)

– use professional concepts extensively
– compare and choose relevant information
– report and communicate in a professional manner
– work independently, using the skills and methods learned
– anticipate his/her need for guidance
– manage his/her time appropriately, completing the agreed tasks at the required quality level
– work responsibly, applying the skills and methods learned
– plan and evaluate their work, taking safety and/or ethical aspects into consideration

Go back to top of page