Programplaner og emneplaner - Student
ACIT4050 Applied Computer and Network Security Course description
- Course name in Norwegian
- Applied Computer and Network Security
- Weight
- 10.0 ECTS
- Year of study
- 2025/2026
- Course history
-
- Curriculum
-
FALL 2025
- Schedule
- Programme description
-
Introduction
The following required coursework must be completed and approved before the student is eligible to take the exam:
- Individual: Submission of a written case report, policy, strategy document, or essay (1,500-2,000 words)
- Participation: Active involvement in three in-course group activities, such as case analyses, presentations, or role-playing exercises
- Group-based: Deliver one group presentation on assigned topics (groups of up to three students) and serve as a discussant for one presentation by another group.
-
Recommended preliminary courses
Specification for students’ laptop
It is recommended that students come with laptops that can support the lab sessions during lectures.
Laptops should have enough hard disk, memory and CPUs to run at least one Kali Linux and one Ubuntu or Windows virtual machines at the same time.
Minimum laptop specification
PC
4 cores CPU
8GB of RAM
100-120 GB of free hard disk space
MacBook
M1 or 4 cores CPU
8GB of RAM
100-120 GB of free hard disk space
In addition, students are expected to be familiar with Linux operating system. For example, they should be able to install packages and run basic Linux commands.
-
Learning outcomes
The student should have the following outcomes upon completing the course:
Knowledge
Upon successful completion of the course, the student has:
- thorough knowledge of cyber security
- advanced knowledge of mechanisms for cyber defense, and how they are used in practice
- a thorough understanding of societal aspects of cyber security
- a thorough understanding of the relation between security and privacy
Skills
Upon successful completion of the course, the student can:
- describe the main aspects of the relation between security and privacy
- describe central problems related to cyber security governance
- plan and describe the structure of cyber defense for an organization
General competence
Upon successful completion of the course, the student:
- understands the role of, and mechanisms that are used in penetration testing
- understands the role of, and mechanisms that are used for cyber defence
- can explain and discuss security challenges related to cyber security to experts and non-experts alike
- can explain and discuss societal aspects of cyber security with experts and non-experts alike.
-
Teaching and learning methods
This course features weekly lectures and workshops to provide both theoretical content and hands-on experience. Students work individually or in groups to complete assignments. The students supplement the lectures and workshops with their own reading. Compulsory assignments are given throughout the semester.
-
Course requirements
Grade scale A-F.
-
Assessment
Professor Lothar Fritsch and Assistant Professor Nuno Marques
-
Permitted exam materials and equipment
No aids are permitted
-
Grading scale
Students should be proficient in using literature reference mangers (e.g. Zotero, EndNote, Refworks, Mendeley) in both literature search and referencing in written work. OsloMet’s library offers introduction courses to literature search and to reference management tools, providing students with the skills necessary to efficiently organize and cite their sources. Taking advantage of these resources will help students adhere to academic integrity standards and enhance the quality of their scholarly work.
-
Examiners
One internal examiner. External examiners are used periodically.