Curriculum 1 (5) GENERAL INFORMATION DEGREE PROGRAMME PERIOD OF EXECUTION 2014-2016 SCOPE DESCRIPTION LANGUAGE OF STUDY CODE DEGREE Master s Degree Programme in Information Technology The recommended period for studies is two years. The study period is the recommended period of study, plus two semesters. In the 60 ECTS credit degree programme, the study period is three years. 60 ECTS credits After completing the studies, the student will have gained a general overview of cyber security and he (she) will know the essential technologies related to cyber security. The student will know the legislation and regulations of cyber security and he (she) will be able to audit a cyber security system. The student will know the technical methods of security testing and he (she) can implement his (her) knowledge for real-life test cases. The student will know the methods used in implement cyber security and he (she) will be able to apply his (her) knowledge to information systems. English YII14S1 Master of Engineering DEGREE LEVEL National Qualifications Framework level 7 THE TARGET GROUP AND THE ADMISSION CRITERIA STUDIES KEY LEARNING OUTCOMES PROFILE The requirements for eligibility are a bachelor's level degree in Information Technology or an equivalent degree, and at least three years of relevant work experience within the field of the degree after having achieved the bachelor's degree. Student selection is based on a personal interview, the grade of his (her) bachelor's thesis, and the work experience. English language skills are assessed in the interview on a pass or fail basis. The students have an understanding of legislation in cyber security, standardisation and the function of authorities. They are familiar with the most important theories, protocols and applications in information security. They can design and implement technical, organisational and software solutions concerning maintenance and the development of cyber security as it is needed by companies. The degree programme focuses on cyber security. Cyber security can briefly be defined as data network security. The term in general refers to security objectives to protect networks and services from attacks over networks. Cyber security is a central ICT strategy of the Finnish Government (Finnish Government, Cyber Strategy, June 2011). In the strategy the government emphasises the reliability of functional security of networks for a modern information society. The aim of the strategy is to highlight Finland worldwide as one of the leading countries in the development of cyber security. This goal also requires in education and training significant investments in cyber security. The Master s Degree Programme in Cyber Security meets the challenges of cyber security in business and public sector by focusing on the further training of professionals with a Bachelor s Degree in ICT.
Curriculum 2 (5) COURSE STRUCTURE COURSE CONTENT AND PERFORMANCE The key method of studies is Project Based Learning, in which students complete study modules in accordance with the learning objectives by doing and learning. The knowledge is founded on real-life information security projects at JAMK University of Applied Sciences (in the first phase JYVSECTEC and SkyNest projects) in which the assignments are completed in sub-projects. The studies in the degree programme are part of a project undertaking in tight connection with projects. The studies are implemented as sub-projects, research, research papers, theses, lectures/exams based on literature/web studies, lectures by specialists in the field, and seminars. Study attainments are carried out as research on the course s subject field and as sub-projects, as well as through implementation and documentation in the form of research papers and/or new security applications. Studies include advanced vocational studies, elective studies, as well as the master s thesis or a working life development assignment. The studies consist of courses and the wider competence areas. Courses are described in detail in the ASIO student management system. The course must be completed in no more than two full semesters from the start thereof. The exception is for the thesis and practice, as well as for extensive courses completed in a number of semesters. If a course is not completed, the student shall re-start it. In the first contact lesson of a course, the learning outcomes and the content of the course are reviewed, along with the various procedures and evaluation criteria. In addition, a potential examination date is agreed upon (the immediate performance time) and the course
Curriculum 3 (5) LEARNING ASSESSMENT ACCREDITATION AND RECOGNITION OF PRIOR LEARNING (RPL) MODE OF STUDY completion date is announced, after which attempts are no longer accepted. Students have the opportunity to try the completion of a course a total of three times: during the immediate performance time for the course or in two specially determined re-examination times. Learning outcomes are assessed in relation to the learning objectives of the course. Assessment decisions are based on the assessment criteria provided in the course descriptions. Courses are assessed on the assessment scale specified in the course description. According to its purpose, the scale may be either of five steps: 5 (excellent), 4 (very good), 3 (good), 2 (satisfactory) and 1 (adequate) or a pass (P)/fail (0). Completion of the course has been failed (fail (0)) if the student does not achieve the minimum outcomes set for completion of the course. The student has the right to know how the criteria apply him or her. Course performance is recorded in the transcript of records no later than one month after the declared time of completion of the course and always before the end of the school year. The procedures for accreditation are described in the Degree Regulations and in the Study Guide. The principle methods of carrying out studies are as follows: contact and distance studies independent study PROFESSIONAL GROWTH AND KNOW- HOW QUALIFICATION REQUIREMENTS AND REGULATIONS ADDITIONAL INFORMATION GRADUATION Education will be delivered as multiform teaching in which the contact hours will take place during the weekends. Delivery is designed in such a way that it is possible to pass the examination alongside full-time work within two years. JAMK University of Applied Sciences has adopted competence-based curricula in its degree programmes. The student learning process occupies a central role in these programmes. The development of competence during the programme is closely supported by study guidance and the assessment of competence development. The master s degree programmes conducted in English have tuition for NON-EU/EEA -citizens. NON-EU/EEA-citizens have an opportunity to apply for JAMK s scholarship. Read more: www.jamk.fi/en/education. Students may be charged separately for the material cost corresponding to real acquisition or production costs of study material, tools, equipment, or supplies that remain in the student's possession after the education has been completed. If a student obtains similar material from other sources, he or she is not charged the material costs (Government Decree 1230/2009 2). Master's degree programme is free for the students from EU countries. For NON-EU citizens it will be cost 8000 / study year. The prerequisite for receiving the certificate of Master's degree is that students complete the studies of their degree programme during the study period in accordance with the personal learning plan (PLP). JAMK University of Applied Sciences provides students with a certificate of completion of the Master's degree (60 ECTS credits). To the certificate are attached the academic transcripts.
Curriculum 4 (5) EMPLOYMENT AND FURTHER STUDIES EMPLOYMENT OPPORTUNITIES OPPORTUNITIES FOR POST-GRADUATE STUDIES OTHER INFORMATION HEAD OF THE DEGREE PROGRAMME PROGRAMME PLANNING PROCESS Students are capable of designing and implementing ICT solutions improving the cyber security of companies and public organisations. Students can expand their knowledge by choosing elective studies on total security management. After graduation students can work as information security managers, cyber security consultants, auditors in information security and, after additional studies, also as a general security manager of organisations. Depending on their previous studies, the new training creates employers interest in students due to their special knowledge in cyber security, although their responsibilities at work are connected to a field of previous studies. Good examples of this are software engineers who gain further training in the degree programme to be able to develop secured software. The master's degree of the university of applied sciences is a University-level Master's degree. The graduate may gain the opportunity to continue their studies in the scientific or artistic studies offered by universities ( 37/558/2009). Students can also continue by applying for the corresponding follow-up training programmes at foreign universities, for example. JAMK University of Applied Sciences also offers continuing education opportunities for specialisation studies, learning agreement type in-service training as well as in working life based continuing education. All further studies must be applied for separately. Head of Department Mr. Jarmo Siltanen, +358 40 716 7282 Programme coordinator, principal lecturer Mr. Jari Hautamäki, +358 40 540 2361 firstname.lastname@jamk.fi Finland s Security Strategy approved by the Finnish Government in December 2010 emphasises the meaning of cyber threats targeted at critical networks and various information environments. They are an essential challenge for the security of the whole nation and particularly for the government and the vital operations of the society. In the new government programme cyber security became part of the security and defense policy (Source: Catharina Candolin). Information network reliability is essential to the functioning of a modern information society. The Finnish Government is drawing up a national cyber-security strategy and it actively participates in international cooperation. The aim is that Finland is one of the leading countries in the development of cyber security. The new degree programme has remarkable significance for technology. In the current situation where the annual intake is being diminished this emphasises the major turning point in ICT and the need for education in cyber security. Recently, worries about and the need for cyber security have constantly been highlighted in the media. The government s cyber security strategy raises the meaning of security to a completely new level. The defense forces have, in week 45 of 2011, published their need for soldiers who are capable of mastering network warfare. This is a clear professional description for a person with an engineering degree in cyber security. The TUVE network (the security network for government use) is a network aimed at the high command of the state and 30,000 security authorities, in the design of which the preparation for cyber attacks and their prevention are highlighted. The design is still being developed and its maintenance in the future will require a large number of experts. The main objective of the national security audit criteria (Kataktri) is to unify authority operations based on a joint set of criteria. Another major objective is to promote and evaluate the security level of companies and other organization co-operating with the authorities. Kataktri brings with it a huge level of change and advances in the development of cyber security for various organisations and authorities if deployed. Its use creates the need for
Curriculum 5 (5) engineers who are knowledgeable in development work and in the maintenance of cyber security. The composition of the ICT strategy in Jyväskylä in autumn 2010 indicated that cyber security plays a major role in the new ICT strategy. The realisation of the strategy demands measures that the JYVSECTEC project strives to meet. This project is a significant opening in Central Finland for the creation of new knowledge and business operations in the field of cyber security. It takes more than a project or a published strategy to bring about change. It also requires remarkable investment in new education. The Degree Programme in Cyber Security is a new degree programme that strives to create new knowledge and know-how in cyber security in Central Finland. The degree programme is implemented in such a way that any Bachelor of Engineering in ICT is eligible. The degree programme combines Project-Based Learning and work in projects. The students work in sub-projects of the JYVSECTEC and SkyNest projects and at the same time they learn about the topics and contents of the degree programme. SCHOOL QUALITY MANAGEMENT Based on the current situation there is no equivalent master s degree programme in Finland yet. The planned master s degree programme is a new opening in data network security education in the Universities of Applies Sciences. JAMK University of Applied Sciences School of Technology, Master's Degree Programme in Information Technology Piippukatu 2, 40100 Jyväskylä JAMK University of Applied Sciences uses the quality management system audited by the Finnish Higher Education Evaluation Council (FINHEEC). The education is developed on the basis of feedback gathered from students. PEDAGOGICAL PRINCIPLES ETHICAL PRINCIPLES LAST UPDATE 2 January 2014 CURRICULUM APPROVED The principles of the curriculum are approved by the JAMK University of Applied Sciences Board of Education and the Vice Rector of the degree programme specific curriculum. The degree programme is implemented in accordance with the pedagogical principles established by the University of Applied Sciences Academic Board. More information: http://opinto-oppaat.jamk.fi/en/study-guide-masters-degrees/studyingat-jamk/degree-regulations-pedagogical-and-ethical-principles/ The students and staff of the University of Applied Sciences operate jointly in accordance with the accepted ethical ideas (Academic Board 5.12.2007). More information: http://opinto-oppaat.jamk.fi/en/study-guide-masters-degrees/studyingat-jamk/degree-regulations-pedagogical-and-ethical-principles/ 7 January 2014 Heikki Malinen, Vice Rector