Information SecurityLaajuus (5 op)
Tunnus: 3011366
Laajuus
5 op
Osaamistavoitteet
After passing the course the student can
- name and explain the basic principles of Information Security
- classify information and information systems
- identify information security threats
- give examples of information security controls and their implementations
- identify and list information security requirements in different kind of organizations taking into account juridical and regulatory requirements
- assess whether there are shortages in security controls’ implementations and give justified recommendations for their improvements
- explain the basics of information security risk management
- create, assess and improve business continuity and disaster recovery plans
- apply information security penetration testing toolkits.
Sisältö
- The importance of Information Security for different organizations (i.e. business, non-profit, societies)
- Basic principles of Information Security
- Players in the Information Security field (good guys, bad guys)
- Information Security Standards and Best Practices
- The basics of Information Security Risk Assessment and Risk Management
- The subareas of Information Security (i.a. traditional, standard based, best practices)
- Threats and attack methods facing different organizations, and protection against them
- Basic principles of encryption and firewalls
- Business Continuity and Disaster Recovery Planning
- Laboratory work
Ilmoittautumisaika
01.06.2022 - 02.10.2022
Ajoitus
29.08.2022 - 31.12.2022
Opintopistemäärä
5 op
Toteutustapa
Lähiopetus
Yksikkö
Tekniikka ja liiketoiminta
Toimipiste
Kupittaan kampus
Opetuskielet
- Englanti
Paikat
60 - 80
Koulutus
- Tietojenkäsittelyn koulutus
Opettaja
- Matti Kuikka
- Mika Koivunen
Ryhmät
-
PTIETS21swisPTIETS21 Ohjelmistojen kehittäminen ja Tietojärjestelmät
-
ICTMODictprojSemMOD ICT Projects & Cybersecurity (International Semester)
-
PTIETS21dncsPTIETS21 Tietoverkot ja Kyberturva
-
PTIETS21sepmPTIETS21 Ohjelmistotekniikka ja Projektihallinta
Tavoitteet
After passing the course the student can
- name and explain the basic principles of Information Security
- classify information and information systems
- identify information security threats
- give examples of information security controls and their implementations
- identify and list information security requirements in different kind of organizations taking into account juridical and regulatory requirements
- assess whether there are shortages in security controls’ implementations and give justified recommendations for their improvements
- explain the basics of information security risk management
- create, assess and improve business continuity and disaster recovery plans
- apply information security penetration testing toolkits.
Sisältö
- The importance of Information Security for different organizations (i.e. business, non-profit, societies)
- Basic principles of Information Security
- Players in the Information Security field (good guys, bad guys)
- Information Security Standards and Best Practices
- The basics of Information Security Risk Assessment and Risk Management
- The subareas of Information Security (i.a. traditional, standard based, best practices)
- Threats and attack methods facing different organizations, and protection against them
- Basic principles of encryption and firewalls
- Business Continuity and Disaster Recovery Planning
- Laboratory work
Arviointiasteikko
H-5