EPN-V2

ACIT4290 Practical cybersecurity Course description

Course name in Norwegian
Practical cybersecurity
Weight
10.0 ECTS
Year of study
2024/2025
Course history
Curriculum
SPRING 2025
Schedule
  • Introduction

    I emnet drøftes følgende tema:

    • Førstegangsledelse
    • Ledelse av personalgrupper, barn og barnehage
    • Organisasjonskunnskap
    • Utviklings- og fornyingsarbeid i barnehagen
    • Veiledning
    • Dokumentasjon for refleksjon
    • Konfliktstyring og konflikthåndtering
    • Profesjonsutvikling med vekt på mestring av barnehagelærerrollen
    • Samarbeid med foreldregruppen og andre samarbeidspartnere

  • Recommended preliminary courses

    ACIT4280 Privacy by Design

    ACIT4050 Applied Computer and Networks Security

  • Required preliminary courses

    No formal requirements over and above the admission requirements.

  • Learning outcomes

    After completing this course, the students have the following learning outcomes, defined in terms of knowledge, skills and general competence:

    Knowledge

    On successful completion of this course the student has:

    • an understanding of the theoretical foundations of operative cybersecurity
    • knowledge of offensive and defensive cybersecurity measures
    • awareness of reference databases for vulnerabilities, exploits and information security advisories
    • knowledge of professional ethics in cybersecurity and penetration testing
    • knowledge of legal limitations for cybersecurity activities
    • familiarity with international, national and sectorial crisis response and cybersecurity authorities

    Skills

    On successful completion of this course the student can:

    • gather information (reconnaissance) about target systems and target organizations, identify vulnerabilities and choose targets for penetration testing
    • run penetration testing with practical attacks against systems, software and users
    • detect and identify intrusion to systems and execute countermeasures
    • retrieve current intelligence about vulnerabilities, security patches and attack methods
    • distinguish risk-based approach to cybersecurity operations from ad hoc cybersecurity operations
    • configure intrusion detection or endpoint detection and response (EDR) agents
    • configure and collect logs
    • detect and monitor intrusions
    • recover and secure evidence from log files and other resources for analysis of events
    • find, exploit and mitigate vulnerabilities in networked information systems.

    General competence

    On successful completion of this course the student can:

    • organize cybersecurity operations
    • use relevant tools for cybersecurity operations
    • use relevant tools for passive and active cybersecurity operations
    • apply their knowledge of general incident management
  • Teaching and learning methods

    • Online course material for preparatory reading (flipped classroom approach)
    • Lectures
    • Group tutorials with live demonstrations
    • Group exercises applying tools and techniques for attack, testing and defense
    • Home assignments (written and practical, e.g. attacking or securing virtual machines)
    • Blue-Red-team competitions in defender and attacker roles

  • Course requirements

    The following required coursework must be approved before the student can take the exam:

    • Five assignments composed of the following: search for information, find vulnerabilities in virtual servers, scan/attack virtual machines, find attack patterns, competitive exercises (capture the flag, red-blue-teaming). Assignments may need presence or collaboration with other students on campus.
    • Participation in a round of hacking or defense-attack competition and a written report based on the activity
  • Assessment

    An individual written portfolio consisting of five assignments based on activities undertaken in the course. Each of the assignments has a word limit of 1000 words (+/- 10%), or 7 minutes (+/- 1 minute) for video or audio submissions.

    The portfolio is assessed as a whole and given one single grade, but all assignments must be passed in order for the portfolio to receive a grade E or higher.

    All assignments in the portfolio must be written in either English or a Scandinavian language.

    The exam can be appealed.

  • Permitted exam materials and equipment

    All aids are permitted, provided the rules for plagiarism and source referencing are complied with.

  • Grading scale

    A-F

  • Examiners

    Two internal examiners. External examiners are used regularly.

  • Course contact person

    Lothar Fritsch