Skip to main content

Introduction to CybersecurityLaajuus (5 cr)

Code: 5G00DM21

Credits

5 op

Objectives

Student is able to:

- understand the importance of safety, data security and privacy
- use password manager
- describe common cybersecurity threads and how organizations mitigate attacks
- be safe using social media
- understand the business aspects related to the importance of cybersecurity
- explain why credentials, firewalls, virus protection and updates are crucial to computer security

Content

- the need for cybersecurity
- basics of risk management
- threads, vulnerabilities and attacks
- protecting data and privacy
- confidentiality, integrity and availability
- importance of credentials

Enrolment period

30.07.2022 - 28.08.2022

Timing

29.08.2022 - 23.12.2022

Credits

5 op

Mode of delivery

Contact teaching

Unit

Software Engineering

Campus

TAMK Main Campus

Teaching languages
  • English
Seats

0 - 60

Degree programmes
  • Bachelor's Degree Programme in Software Engineering
Teachers
  • Petteri Jekunen
Person in charge

Petteri Jekunen

Groups
  • 22I260EA
  • 22I260EB
    Degree Programme in Software Engineering

Objectives (course unit)

Student is able to:

- understand the importance of safety, data security and privacy
- use password manager
- describe common cybersecurity threads and how organizations mitigate attacks
- be safe using social media
- understand the business aspects related to the importance of cybersecurity
- explain why credentials, firewalls, virus protection and updates are crucial to computer security

Content (course unit)

- the need for cybersecurity
- basics of risk management
- threads, vulnerabilities and attacks
- protecting data and privacy
- confidentiality, integrity and availability
- importance of credentials

Location and time

Hybrid course - combined online and on TAMK campus
Tools required: Microsoft Teams. Zoom. Installation of native clients highly recommended.

Online learning sessions on Wednesdays 8:30-10 (EEST).
Contact learning on Thursdays 14:15 - 17

Exam schedules

Two exams: in the middle and in the end of the course.
Exact dates will be given later.

Assessment methods and criteria

Presence - 20%
Exams - 40%
Activities - 40%
Max 100 points. Min points for the grades:
5 - 88.0
4 - 71.0
3 - 54.0
2 - 37.0
1 - 20.0

Assessment scale

0-5

Teaching methods

Contact sessions and activities: labs, exercises, reports, group work, case studies

Learning materials

CompTIA security+ certification study guide (exam SY0-501) - book
https://andor.tuni.fi/permalink/358FIN_TAMPO/1p7d0a7/alma9910689885805973

Other materials provided during the course.

Student workload

The size of the course is 5 ECTS meaning appr. 135 hours of work.
Estimate of hours spent:
- Lessons and instructed labs and exercises: 45
- Assignments and case studies: 45
- Preparing for exams: 45

Content scheduling

- Introduction
- Threats, vulnerabilities and attacks
- Introduction to Cryptography
- Introduction to Authentication and Identity Management
- Introduction to Network Security
- Introduction to Risk Management
- Securing Hosts and Data
- Business Continuity
- Operational Security and Privacy

Completion alternatives

Consult the instructor

Practical training and working life cooperation

n/a

International connections

n/a

Further information

n/a

Assessment criteria - fail (0) (Not in use, Look at the Assessment criteria above)

The student is not capable of describing the basic cyber security terminology.

Assessment criteria - satisfactory (1-2) (Not in use, Look at the Assessment criteria above)

The student is capable of describing the basic cyber security terminology.

Assessment criteria - good (3-4) (Not in use, Look at the Assessment criteria above)

The student is capable of describing the basic cyber security terminology in a structured way. Understands the areas of security. Understands the characteristics of safety, security and privacy.

Assessment criteria - excellent (5) (Not in use, Look at the Assessment criteria above)

The student is capable of describing the basic cyber security terminology in a structured way. Understands the areas of security. Understands the characteristics of safety, security and privacy.

The student is capable of conducting a basic security analysis.