jamk.fi

Degree level and field of study

Master’s degree (EQF 7), Engineering, manufacturing and construction

Starting group code

​YTC19S1

Forms of study

Part-time studies. Please, see the further information below.

Structure of studies

Individual courses

Intended competence

Contact information

Saharinen Karo

Saharinen Karo

Lehtori, Senior Lecturer
IT, Institute of Information Technology
Teknologia, School of Technology
+358 50 410 4415

Description

​After completing the studies, the student will have gained a general overview of cyber security. He (she) will know the essential technology solutions related to cyber security. The student will know the legislation and regulations of cyber security and he (she) will be able to audit a cyber security of an information system. The student will know the technical methods of security testing and he (she) can implement his (her) knowledge for real-life test cases. The student will know the methods used in the implementation of cyber security and he (she) will able to apply his (her) knowledge to different information systems.

Key learning outcomes

The students have an understanding of legislation in cyber security, standardization and the function of authorities. They are familiar with the most important theories, protocols and applications in information security. They can design and implement technical, organizational and software solutions concerning maintenance and development of cyber security in companies.

Professional growth and know-how

YTC structure 2019

Figure 1. Master's Degree in Information Technology, Cyber Security, Degree programme 60 ECTS

The professional growth of students is led by a tutoring process which starts at the very beginning of the studies and continues until graduation. In this process students complete personal learning plans and discuss with their tutors about their needs for developing their target competences.

The 60 ECTS programme is designed as obligatory core studies and optional studies. The tutoring discussion leads to making appropriate choices in optional studies.

The core studies include the:

  • 5 ECTS Shared Master module
    • Research and Development course (preferred)
    • or Management course
  • 20 ECTS Expert Core module
  • 5 ECTS Complementary module,
  • and the 30 ECTS Master's Thesis.

Courses in the management module and research and development module aim to develop students' shared master competences, while courses in the Expert Core module develop students' Cyber Security competence.

As optional studies, students can take 5 ECTS of elective studies from available master level courses, and they can choose their topics for their obligatory 30 ECTS master thesis. Students are provided with personal supervision and guidance at master thesis seminars in making their theses.

Forms of study

The key method of studies is Project Based Learning, in which students complete study modules in accordance with the learning objectives by doing and learning. The knowledge is founded on real-life information security projects of JAMK University of Applied Sciences. The studies in the degree programme are tightly connected throughout the courses. The studies are implemented as assignments, research papers, theses, lectures/exams based on literature/web studies, lectures by specialists in the field and seminars. Study attainments are carried out as research on the course's subject field and as sub-projects, as well as through implementation and documentation in the form of research papers and/or new security applications.

Working life cooperation and learning

Assignments on the courses can be done to the industry. Master's Thesis topic in particular should be designed to develope the working life.

Course contents are updated according to development of the industry.

Accreditation

The Prior Learning Recognition Procedures are described in the Degree Regulations and the Study Guide. Students also have alternative study options available to them in partner universities (e.g. other universities of applied sciences and universities as well as EduFutura) and in open online study portals (CampusOnline).

Graduation

Being awarded a Master’s degree certificate requires the student to complete the studies of the degree programme within his/her study period in accordance with his/her Personal Learning Plan. Further information in the Degree Regulations.

Degree-related qualifications

There are no specific degree-related or statutory qualification requirements in the field.

Professional profiles of graduates with examples

Past students of the degree programme work with following titles in public/private sector:

  • Chief Security Officer
  • Chief Information Security Officer
  • Information Security Manager
  • Security Professional
  • Security Architect
  • Solution Architect
  • Information Security Specialist
  • Cloud Security Architect

Further studies

The master's degree of the university of applied sciences is a Master's degree of a University. The graduate may get the opportunity to continue their studies in the scientific or artistic studies of universities (§ 37/558/2009). Students can also continue for example by applying for the corresponding follow-up training programs at foreign universities. A university of applied sciences also provides opportunities for continuing education in the form of specialisation studies, open studies, online study portal (CampusOnline) and working life-based continuing education.

Planning

​The degree programme teacher's have an annual meeting on the performances of the degree programme during that year. Feedback from the students during the year is also handled during this meeting. Improvement plans are set for the upcoming year.

The degree programme had an internal quality audit in 2018 which involved guests from the public and private sector to give a statement on the contents of the degree programme.

Read more