•   Information Security ICI002AS2AE-3007 18.08.2025-10.10.2025  5   (CONTACT, ...) +-
    Learning objectives
    - Knows key concepts of information security, both in defense and offense
    - Can apply key concepts in uncomplicated cases
    Starting level and linkage with other courses
    Student has completed courses Orientation to ICT Infrastructures ICT1TF010 and Server Technologies ICT4TF021. Alternatively, student can show he or she has obtained the same knowledge in some other way.
    Contents
    - Key concepts and solutions in information security
    - Applications of public key encryption
    - Practical tools in encryption and cryptosystems
    - Auditing security
    Assessment criteria
    Assessment criteria - grade 1
    - Can describe key concepts in security
    - Can use learned models and tools with guidance or in cookbook fashion
    Assessment criteria - grade 3
    - Meets and exceeds criteria for lower grades
    - Can apply key security concepts in easy situations
    - Can use the tools taught in the course in easy situations
    Assessment criteria - grade 5
    - Meets and exceeds criteria for lower grades
    - Can apply key security concepts and tools in typical situations
    - Understands and is able to evaluation limitations of tools and his or knowledge
    - Can follow, find and learn new information on information security

    Teaching methods and instruction

    Classes have a mix of theory and hands-on exercises. Bring your laptop.

    Each homewok has reading material and hands-on hacking.

    You will give a presentation to your classmates. There is no exam.

    The classes are interactive and require active participation.

    Trying hacking / pententration testing tools, tactics and procedures in practice requires accepting course rules.

    Details of the course, with links to feedback from previous instances:
    https://terokarvinen.com/information-security/#agenda

    Learning material and recommended literature

    Reading material includes book chapters, white papers, frameworks and tutorials. List of reading material provided during the class.

    You can check last instances reading list on https://terokarvinen.com/information-security/#homework

    Working life connections

    Students are encouraged to bring their work related experience and insight into presentations when applicable.

    Campus

    Pasila Campus

    Exam dates and re-exam possibilities

    No exam.

    Teaching language

    English

    Internationality

    International mix of participants. Classes are interactive, so you can have discussions with fellow students from around the world.

    Timing

    18.08.2025 - 10.10.2025

    Learning assignments

    - Active participation in classes - Homework each week - Presentation

    Enrollment

    14.05.2025 - 22.05.2025

    Content scheduling

    Initial agenda:

    1. Organizing. Fundamentals. Practice environments.
    2. Threath modeling.
    3. Cyber kill chain. (Optional: a bit of ATT&CK.)
    4. Web security. OWASP 10.
    5. Encryption. Asymmetric vs symmetric. GPG. SSH.
    6. Passwords. Hashes. Cracking hashes.
    7. Applied (e.g. cryptocurrencies or darknet).
    8. Recap. Last presentations.

    There will likely be updates to the contents of the classes as the course advances.

    Updating agenda is on https://terokarvinen.com/information-security/#agenda

    Groups
    • CONTACT
    • BLENDED
    • ITE2PAICI1
    • EXCH
    Teachers

    Tero Karvinen

    Seats

    15 - 30

    Further information

    - Active participation in classes
    - Homework (66%)
    - Presentation (33%)

    No exam.

    Evaluation of the course is based on totality of the work presented.

    Degree Programme

    ITBBA Business Information Technology

    R&D proportion

    0.00 cr

    Virtual proportion

    2.50 cr

    Evaluation scale

    H-5