Skip to main content

Data Security Controls (5cr)

Code: TTC6010-3010

General information


Enrollment
17.11.2025 - 08.01.2026
Registration for introductions has not started yet.
Timing
12.01.2026 - 30.04.2026
The implementation has not yet started.
Number of ECTS credits allocated
5 cr
Local portion
0 cr
Virtual portion
5 cr
Mode of delivery
Distance learning
Unit
School of Technology
Teaching languages
English
Seats
0 - 45
Degree programmes
Bachelor's Degree Programme in Information and Communications Technology
Bachelor's Degree Programme in Information and Communications Technology
Teachers
Jarmo Viinikanoja
Groups
TTV23S2
Tieto- ja viestintätekniikka (AMK)
TTV23S3
Tieto- ja viestintätekniikka (AMK)
TTV23S5
Tieto- ja viestintätekniikka (AMK)
TTV23SM
Tieto- ja viestintätekniikka (AMK)
TIC23S1
Bachelor's Degree Programme in Information and Communications Technology
TTV23S1
Tieto- ja viestintätekniikka (AMK)
Course
TTC6010

Materials

Kuvataan toteutuksen yhteydessä.

Evaluation scale

0-5

Virtual portion

5

Assessment criteria, satisfactory (1)

Sufficient 1: The student shows sufficient command of the theory on designing and implementing security controls and can design various sufficient data security controls as part of a broader target environment based on given requirement definition. The student reflects his (her) own learning sufficiently.

Satisfactory 2: The student shows satisfactory command of the theory on designing and implementing security controls and can design various satisfactory data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning satisfactorily.

Assessment criteria, good (3)

Good 3: The student shows good command of the theory on designing and implementing security controls and can design various good data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning well.

Very good 4: The student shows very good command of the theory on designing and implementing security controls and can very well design various data security controls as part of a broader targer environment based on given requirement definition. The student reflects on his (her) own learning very well.

Assessment criteria, excellent (5)

Excellent 5: The student shows excellent mastery of the theory on designing and implementing security controls and can excellently design various data security controls as part of a broader target environment based on given requirement definition. The student reflects on his (her) own learning outstandingly.

Teaching language

en

Number of ECTS credits allocated

5

Qualifications

Data Networks
Linux
Cyber Security

Content

The course includes an overview of security controls in the perspective of designing and implementing. The course utilizes existing security control frameworks.

Objective

You learn to know the main categories of security controls and to understand their significance in security perspective. You learn perspectives of securing based on security controls. You know how to implement security controls in order to protect company's critical ICT-systems.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

The learning objectives of the course
Once you have completed the course you can implement security controls and you understand their significance in the perspective of securing an company.

Go back to top of page