Computer Networks and Cybersecurity (5 cr)
Code: 4A00HH77-3001
General information
Enrolment period
09.06.2025 - 07.09.2025
Timing
01.08.2025 - 31.12.2025
Credits
5 op
Mode of delivery
Contact teaching
Unit
Business Information Systems
Campus
TAMK Main Campus
Teaching languages
- Finnish
Degree programmes
- Degree Programme in Business Information Systems
Teachers
- Harri Saarinen
Person in charge
Harri Saarinen
Groups
-
25TIKOVE
Objectives (course unit)
After completing the course, the student will master the basic structure and key concepts of the company's networks. Student knows the division of networks into LAN and WAN networks and understands the structure of key protocols and the OSI model. Student knows how to plan and document the local area network of a small company, knows the active devices of the local area network and manages the basics of their configuration.
After completing the course, student knows the importance of cybersecurity. Student masters the basic concepts of cybersecurity, knows the central standards of cybersecurity and knows how to apply them to the development of the company's cybersecurity. Student knows how to plan the basic structure of the company's cybersecurity, knows the risks of key cybersecurity threats and how to prepare for them.
Content (course unit)
• Basic structure of data networks.
• Basic structure of a local area network, active devices and network documentation.
• Communication protocols.
• OSI model.
• The importance of cybersecurity in business operations.
• Cybersecurity threats and preparedness.
• Key cybersecurity standards.
• Practical exercises.
Assessment criteria, satisfactory (1-2) (course unit)
The student is familiar with the basic concepts of computer networks and cybersecurity and is able to use them.
Assessment criteria, good (3-4) (course unit)
The student is able to perform installations and testing related to computer networks and cybersecurity.
Assessment criteria, excellent (5) (course unit)
The student is able to identify faults in computer network connections and determine cybersecurity threats targeting their own endpoint device, as well as conduct related investigations.
Assessment scale
0-5