Skip to main content

Computer security (3 cr)

Code: KL00CQ36-3002

General information


Enrollment

17.04.2023 - 06.09.2023

Timing

28.08.2023 - 15.10.2023

Credits

3 op

RD proportion (cr)

1 op

Teaching languages

  • Finnish

Degree programmes

  • Bachelor of Engineering, Information Technology

Teachers

  • Alpo Anttonen

Student groups

  • TITE21

Objective

The student knows the basic concepts of information security and is able to protect against information security threats that affect users, information networks and information systems.

Content

The course covers security methods such as user authentication, secure passwords, data encryption, security protocols, firewalls, anti-virus. Other topics include e.g.
- basic concepts of information security
- mobile phone security
- cyber security
- scams
- malware
- ransomware
- backup
- security of wireless networks.

Materials

- Lecture notes

Teaching methods

Lectures and class exercises.

Exam schedules

Retake in EXAM

Student workload

Total amount: 80 h
- 28 h of face-to-face teaching in class
- Independent study: 52 h

Content scheduling

The course covers security methods such as user authentication, secure passwords, data encryption, security protocols, firewalls, anti-virus. Other topics include e.g.
- basic concepts of information security
- mobile phone security
- cyber security
- scams
- malware
- ransomware
- backup
- security of wireless networks.

Evaluation scale

1-5

Assessment criteria, satisfactory (1)

The student knows the basic concepts of information security and is able to protect against information security threats that affect users, information networks and information systems.

Assessment criteria, good (3)

The student masters the basics of information security well and is able to protect against information security threats that affect users, information networks and information systems.

Assessment criteria, excellent (5)

The student masters the basics of information security well and is able to protect against information security threats that affect users, information networks and information systems. Student masters the theory of the course excellently.

Assessment methods and criteria

Exam