Cyber Security - 2025 late autumn
ICB705AS3YE-1 +cy

Learn cyber security. Understand high level management view.

Tie it to grass roots level with some simple hands-on exercises.

Watch this page for updates! The first realization of this course is 2025 autumn. I'm planning this course, and there could be major changes.

Course name and codeCyber Security - ICB705AS3YE-1 (study guide)
Timing2025 period 2 late autumn, w43-w50
ECTS Credits5 credits
Degree programmeLITEM Degree Programme in Business Technologies (master's level)
ClassesOne evening a week, online, mandatory participation
Max students30
LanguageEnglish
RemoteYes
FeedbackFirst realization. Replaces my "Trust to Blockchain", which has reached 4.9 / 5 excellent feedback.
ServicesMoodle: Cyber Security, Jitsi, Laksu. Voluntary extra: Tero's list.
First classNot decided yet, likely on the week starting 2025-10-20 w43 Monday. Jitsi video conference.

This is a master's level course. You can only enroll if you're studying master's degree (YAMK).

Learning objectives

In this course, you will

  • Get an overview of cyber security
  • Use threat modeling to identify and priorize key risks for your own organization
  • Try some aspects of security with simple hands on exercises

Contents

  • Threat modeling
  • Overview of current security scene
  • Standards and models
  • Security maturity
  • Business continuity
  • Encryption
  • Authentication
  • Student presentations

Use of Feedback from Previous Courses

Feedback from other security courses have been used when creating "Cyber Security" course. This includes feedback from "Tunkeutumistestaus" (Penetration Testing, has reached 5.0/5), "ICT Security Basics - from Trust to Blockchain" (has reached 4.9/5), "Information Security" (has reached 4.8/5) and others. Based on feedback, an attempt is made to: discuss in the class; link theory to practical exercises (that are not highly demanding technically); have homework with both varied reading and applied tasks. Both numeric and free form feedback for these courses is available on https://terokarvinen.com/

Other Infosec Courses

Emphasis of this course, Cyber Security, is to give a bird's eye, management view to information security.

This course gives you grand overview of cyber security and some practice with tools implementing these principles. Even though you're expected to be able to install and configure programs and troubleshoot some errors, this is not my most technical course.

For demanding technical, non-masters level offensive courses, you should consider other courses such as

Adminstrivia

Updates to this page could happen before, during and after the course. First realization of the course, there could be major changes before committing to course description. Picture of Mika's cryptomining rig by Mika Hirvelä.