Cyber SecurityLaajuus (5 cr)
Code: R504D74
Credits
5 op
Teaching language
- English
Objective
The student understands what cyber security consists of and how security affects the process of ICT development. The student can apply common cyber security design methods.
Content
- Cyber security main components
- Methods how to secure your software
- Methods how to secure your IoT-systems
- The human factor
- Organisational security
Assessment criteria, satisfactory (1)
The student can explain what the main aspects of cyber security.
Assessment criteria, good (3)
The student can plan and write secure programs and design secure IoT-systems.
Assessment criteria, excellent (5)
The student can plan and write secure programs and design IoT-systems that are secure and also assess how the designed system affect the operating environment.
Enrollment
03.10.2022 - 08.01.2023
Timing
09.01.2023 - 21.04.2023
Credits
5 op
Virtual proportion (cr)
3 op
Mode of delivery
40 % Contact teaching, 60 % Distance learning
Teaching languages
- English
Seats
0 - 30
Degree programmes
- Machine Learning and Data Engineering
Teachers
- Kenneth Karlsson
Responsible person
Kenneth Karlsson
Student groups
-
R54D21SBachelor of Engineering, Machine Learning and Data Engineering (full time studies), 2021
Objective
The student understands what cyber security consists of and how security affects the process of ICT development. The student can apply common cyber security design methods.
Content
- Cyber security main components
- Methods how to secure your software
- Methods how to secure your IoT-systems
- The human factor
- Organisational security
Location and time
9.1.2023 - 31.3.2023
On Campus in Jokiväylä
Materials
Materials will be presented in Moodle Workspace
Teaching methods
Lessons and seminars and groupwork.
Evaluation scale
H-5
Assessment criteria, satisfactory (1)
The student can explain what the main aspects of cyber security.
Assessment criteria, good (3)
The student can plan and write secure programs and design secure IoT-systems.
Assessment criteria, excellent (5)
The student can plan and write secure programs and design IoT-systems that are secure and also assess how the designed system affect the operating environment.
Assessment methods and criteria
Grading will be based on active partisipating in lectures and groupwork and excersies.
Submitting papers and delivering persentations.
Assessment criteria, fail (0)
No partisipating and no completed tasks or excersises
Assessment criteria, satisfactory (1-2)
The student gains a good view of Cyber security in the field of Machine learning and has good abilities to further his/ her expertise. The majority of tasks given are completed
Assessment criteria, good (3-4)
The student gains a great view of Cyber security in the field of Machine learning and has great abilities to further his/ her expertise. The majority of tasks given are completed
Assessment criteria, excellent (5)
The student gains a excellent view of Cyber security n the field of Machine learning and has excellent abilities to further his/ her expertise. All tasks given are completed