Cyber Security - 2025 late autumn
ICB705AS3YE-1 +cy
Learn cyber security. Understand high level management view.
Tie it to grass roots level with some simple hands-on exercises.
Watch this page for updates! The first realization of this course is 2025 autumn. I'm planning this course, and there could be major changes.
Course name and code | Cyber Security - ICB705AS3YE-1 (study guide) |
Timing | 2025 period 2 late autumn, w43-w50 |
ECTS Credits | 5 credits |
Degree programme | LITEM Degree Programme in Business Technologies (master's level) |
Classes | One evening a week, online, mandatory participation |
Max students | 30 |
Language | English |
Remote | Yes |
Feedback | First realization. Replaces my "Trust to Blockchain", which has reached 4.9 / 5 excellent feedback. |
Services | Moodle: Cyber Security, Jitsi, Laksu. Voluntary extra: Tero's list. |
First class | Not decided yet, likely on the week starting 2025-10-20 w43 Monday. Jitsi video conference. |

This is a master's level course. You can only enroll if you're studying master's degree (YAMK).
Learning objectives
In this course, you will
- Get an overview of cyber security
- Use threat modeling to identify and priorize key risks for your own organization
- Try some aspects of security with simple hands on exercises
Contents
- Threat modeling
- Overview of current security scene
- Standards and models
- Security maturity
- Business continuity
- Encryption
- Authentication
- Student presentations
Use of Feedback from Previous Courses
Feedback from other security courses have been used when creating "Cyber Security" course. This includes feedback from "Tunkeutumistestaus" (Penetration Testing, has reached 5.0/5), "ICT Security Basics - from Trust to Blockchain" (has reached 4.9/5), "Information Security" (has reached 4.8/5) and others. Based on feedback, an attempt is made to: discuss in the class; link theory to practical exercises (that are not highly demanding technically); have homework with both varied reading and applied tasks. Both numeric and free form feedback for these courses is available on https://terokarvinen.com/
Other Infosec Courses
Emphasis of this course, Cyber Security, is to give a bird's eye, management view to information security.
This course gives you grand overview of cyber security and some practice with tools implementing these principles. Even though you're expected to be able to install and configure programs and troubleshoot some errors, this is not my most technical course.
For demanding technical, non-masters level offensive courses, you should consider other courses such as
- Tunkeutumistestaus (Penetration testing)
- Sovellusten hakkerointi ja haavoittuvuudet (Application hacking and vulnerabilities)
- Verkkoon tunkeutuminen ja tiedustelu (Network attacks in reconnaissance).
Adminstrivia
Updates to this page could happen before, during and after the course. First realization of the course, there could be major changes before committing to course description. Picture of Mika's cryptomining rig by Mika Hirvelä.