Skip to main content

Cyber SecurityLaajuus (5 cr)

Code: R504D74

Credits

5 op

Teaching language

  • English

Objective

The student understands what cyber security consists of and how security affects the process of ICT development. The student can apply common cyber security design methods.

Content

- Cyber security main components
- Methods how to secure your software
- Methods how to secure your IoT-systems
- The human factor
- Organisational security

Assessment criteria, satisfactory (1)

The student can explain what the main aspects of cyber security.

Assessment criteria, good (3)

The student can plan and write secure programs and design secure IoT-systems.

Assessment criteria, excellent (5)

The student can plan and write secure programs and design IoT-systems that are secure and also assess how the designed system affect the operating environment.

Enrollment

03.10.2022 - 08.01.2023

Timing

09.01.2023 - 21.04.2023

Credits

5 op

Virtual proportion (cr)

3 op

Mode of delivery

40 % Contact teaching, 60 % Distance learning

Teaching languages
  • English
Seats

0 - 30

Degree programmes
  • Machine Learning and Data Engineering
Teachers
  • Kenneth Karlsson
Responsible person

Kenneth Karlsson

Student groups
  • R54D21S
    Bachelor of Engineering, Machine Learning and Data Engineering (full time studies), 2021

Objective

The student understands what cyber security consists of and how security affects the process of ICT development. The student can apply common cyber security design methods.

Content

- Cyber security main components
- Methods how to secure your software
- Methods how to secure your IoT-systems
- The human factor
- Organisational security

Location and time

9.1.2023 - 31.3.2023
On Campus in Jokiväylä

Materials

Materials will be presented in Moodle Workspace

Teaching methods

Lessons and seminars and groupwork.

Evaluation scale

H-5

Assessment criteria, satisfactory (1)

The student can explain what the main aspects of cyber security.

Assessment criteria, good (3)

The student can plan and write secure programs and design secure IoT-systems.

Assessment criteria, excellent (5)

The student can plan and write secure programs and design IoT-systems that are secure and also assess how the designed system affect the operating environment.

Assessment methods and criteria

Grading will be based on active partisipating in lectures and groupwork and excersies.
Submitting papers and delivering persentations.

Assessment criteria, fail (0)

No partisipating and no completed tasks or excersises

Assessment criteria, satisfactory (1-2)

The student gains a good view of Cyber security in the field of Machine learning and has good abilities to further his/ her expertise. The majority of tasks given are completed

Assessment criteria, good (3-4)

The student gains a great view of Cyber security in the field of Machine learning and has great abilities to further his/ her expertise. The majority of tasks given are completed

Assessment criteria, excellent (5)

The student gains a excellent view of Cyber security n the field of Machine learning and has excellent abilities to further his/ her expertise. All tasks given are completed