Curriculum of the Degree Programme in Business Information Technology 2007 - 2008

Advanced Professional Studies

2B6309 Information Security - Management and Strategy, 6 cu

Objective: This course is an overview of principles and issues in business and organizational information security management.

Content:

  • security management concepts
  • information security in an organization
  • risk analysis and management
  • identifying security needs of an organization
  • general security policies and practices
  • documentation
  • conducting investigations
  • types
  • rules
  • admissibility of evidence

Learning and teaching methods: lectures, assignments, course project, group and individual work

Literature and other materials: Class materials. Literature will be suggested at the beginning of the course.

Assessment: There will be a final examination at the end of the course. Students are expected to do the course project (group work) and several individual assignments. Attendance is required.

More information: The course gives the basic understanding of information security management principles and strategies. The course is good for anyone studying information technology, since information security is an important and relevant issue nowadays.

2B6301 Scientific Writing and Research Work, 6 cu

Objective: The students will learn to prepare professional papers with the aim to coach them to prepare and write their own bachelors thesis and other professional documents in their working life. They will also get familiarized with professional publications written for their field of studies with particular focus on terminologies. The students learn these skills by reading and discussing field specific publications, writing reports on such publications. They will also familiarize themselves with instructions for preparing professional papers will be provided.

Learning and teaching methods: Normal lectures and several self supervised studies with the help of information retrieved from databases using network facilities. Students are required to write a scientific paper and present it in class.

Literature and other materials: handouts during lectures, the Internet and other materials written for the students field of studies

Assessment: Mandatory 80 % attendance (25 %), active participation of sessions (25 %), satisfactory completion of home assignments by the due dates (25 %) and preparation and submission of a mini thesis by the end of the course (25 %). The evaluation scale is 0-5.

More information: This course is prerequisite to write a bachelors thesis and the students develop their reading comprehension skills and updating their professional skills.

2B6311 Windows and Linux Server Security, 6 cu

Objective: To learn the security functions in Windows and Linux Server operating systems. To implement security and use configuration tools.

Learning and teaching methods: Lectures for theoretical parts. Practical training in laboratory for installations, configurations and operating practices. Presentations of security tools and writing report of practical work.

Literature and other materials: lecture materials, Windows Server book, Internet and database sources

Assessment: written examination, participation in lectures and exercises

More information: This course is learning security implementations in Windows and Linux Server operating systems.

2B6304 Data Security of Workstations, 3 cu

Objective: The objective of the course is to learn to install and configure a safe workstation for an end user use. Installing and configuring Windows workstation. Virus Protection and firewall. Data security of e-mail Internet security and web surfing. Spyware and sniffer tools. Backups.

Learning and teaching methods: Lectures for theoretical parts. Practical training in laboratory for installations, configurations and operating practices.

Literature and other materials: lecture materials, Internet and database sources

Assessment: written examination, participation in lectures and exercises

More information: This course is learning fundamental workstation security.

2B6312 Data Security of Network Devices, 6 cu

Objective: The objective of the course is to learn the student how to install and configure network devices and how to protect them from attacks. The course gives practical knowledge of network devices and their security configurations and weak points.

Learning and teaching methods: Lectures for theoretical parts. Practical training in laboratory for installations, configurations and testing practices. Presentations of security tools and results from the practical work.

Literature and other materials: Manuals and instruction books for network devices and tools. Internet and database sources.

Assessment: Written examination. Participation in lectures, exercises and presentations of exercise results.

More information: The course is learning how to install and implement security in network devices.

2B6313 Information Technology Law, 3 cu

Objective: The purpose of the course is to provide a basis for understanding the legal environment related to the processing of information and the use of ICT. Students will get acquainted with the ICT from the legal perspective and the interplay of information, technology and law. The basic ICT related issues of several areas of law are introduced. In order to be able to comprehend the multitude of legal topics related to information technology and the processing of information, the general principles developed in legal informatics are necessary. The student must be able to apply theoretical knowledge in practical situations at working life and (s)he must be able to understand what law is applied in different situations and what are the ways to handle the situation.

Learning and teaching methods: Lectures, self-supervised works, reading of literature, using of databases and Internet. Case study method is essential approach in studying.

Literature and other materials: Internet material and handout. Other material will be submitted at the beginning of the course.

Assessment: The evaluation is based on the result of exam, reports and attendance. The scale is 0 - 5. The required attendance to the lectures is 80 %.

More information: This course is helping students who are going to start an own enterprise.

2B6314 Data Protection & Methods of Secure Information Systems Design, 6 cu

Objective: The course extends the students’ knowledge obtained in the basic software engineering and information systems courses. The main goal of this course is to study the methods of secure information systems design and development. The course includes at least the following topics: data security management standards in software engineering, risk management, technical control methods, secure design in the waterfall, spiral models and object-oriented modelling. Each method topic will include the relevant notation, discussion on strengths and weaknesses, application area and principles, and possible problems with the method.

Learning and teaching methods: lectures and several group and individual assignments

Literature and other materials: Class materials. Literature will be suggested at the beginning of the course.

Assessment: There will be a final examination at the end of the course. Also, students are expected to do several assignments. Attendance is required.

More information: The course is good for students intending to be software engineers. The course is also suitable for anyone interested in methods of secure software and information systems design.

Our website uses cookies, read more. By continuing to browse the site, you are agreeing to our use of cookies. [I Agree]
OK