Objectives

After having completed the course, the student:
• is equipped with a set of theoretical and conceptual tools to analyze information security management systems
• has an advanced-level understanding of information security policies and the role of user in information security as well as business continuity management

  • Opettaja
    Samuli Laato