EPN-V2

ACIT4050 Applied Computer and Network Security Course description

Course name in Norwegian
Applied Computer and Network Security
Weight
10.0 ECTS
Year of study
2025/2026
Course history
Curriculum
FALL 2025
Schedule
  • Introduction

    The following required coursework must be completed and approved before the student is eligible to take the exam:

    • Individual: Submission of a written case report, policy, strategy document, or essay (1,500-2,000 words)
    • Participation: Active involvement in three in-course group activities, such as case analyses, presentations, or role-playing exercises
    • Group-based: Deliver one group presentation on assigned topics (groups of up to three students) and serve as a discussant for one presentation by another group.
  • Recommended preliminary courses

    Specification for students’ laptop

    It is recommended that students come with laptops that can support the lab sessions during lectures.

    Laptops should have enough hard disk, memory and CPUs to run at least one Kali Linux and one Ubuntu or Windows virtual machines at the same time.

    Minimum laptop specification

    PC

    4 cores CPU

    8GB of RAM

    100-120 GB of free hard disk space

    MacBook

    M1 or 4 cores CPU

    8GB of RAM

    100-120 GB of free hard disk space

    In addition, students are expected to be familiar with Linux operating system. For example, they should be able to install packages and run basic Linux commands.

  • Learning outcomes

    The student should have the following outcomes upon completing the course:

    Knowledge

    Upon successful completion of the course, the student has:

    • thorough knowledge of cyber security
    • advanced knowledge of mechanisms for cyber defense, and how they are used in practice
    • a thorough understanding of societal aspects of cyber security
    • a thorough understanding of the relation between security and privacy

    Skills

    Upon successful completion of the course, the student can:

    • describe the main aspects of the relation between security and privacy
    • describe central problems related to cyber security governance
    • plan and describe the structure of cyber defense for an organization

    General com​petence

    Upon successful completion of the course, the student:

    • understands the role of, and mechanisms that are used in penetration testing
    • understands the role of, and mechanisms that are used for cyber defence
    • can explain and discuss security challenges related to cyber security to experts and non-experts alike
    • can explain and discuss societal aspects of cyber security with experts and non-experts alike.
  • Teaching and learning methods

    This course features weekly lectures and workshops to provide both theoretical content and hands-on experience. Students work individually or in groups to complete assignments. The students supplement the lectures and workshops with their own reading. Compulsory assignments are given throughout the semester.

  • Course requirements

    Grade scale A-F.

  • Assessment

    Professor Lothar Fritsch and Assistant Professor Nuno Marques

  • Permitted exam materials and equipment

    No aids are permitted

  • Grading scale

    Students should be proficient in using literature reference mangers (e.g. Zotero, EndNote, Refworks, Mendeley) in both literature search and referencing in written work. OsloMet’s library offers introduction courses to literature search and to reference management tools, providing students with the skills necessary to efficiently organize and cite their sources. Taking advantage of these resources will help students adhere to academic integrity standards and enhance the quality of their scholarly work.

  • Examiners

    One internal examiner. External examiners are used periodically.