Programplaner og emneplaner - Student
ACIT4290 Practical cybersecurity Course description
- Course name in Norwegian
- Practical cybersecurity
- Weight
- 10.0 ECTS
- Year of study
- 2024/2025
- Course history
-
- Curriculum
-
SPRING 2025
- Schedule
- Programme description
-
Introduction
I emnet drøftes følgende tema:
- Førstegangsledelse
- Ledelse av personalgrupper, barn og barnehage
- Organisasjonskunnskap
- Utviklings- og fornyingsarbeid i barnehagen
- Veiledning
- Dokumentasjon for refleksjon
- Konfliktstyring og konflikthåndtering
- Profesjonsutvikling med vekt på mestring av barnehagelærerrollen
- Samarbeid med foreldregruppen og andre samarbeidspartnere
-
Recommended preliminary courses
ACIT4280 Privacy by Design
ACIT4050 Applied Computer and Networks Security
-
Required preliminary courses
No formal requirements over and above the admission requirements.
-
Learning outcomes
After completing this course, the students have the following learning outcomes, defined in terms of knowledge, skills and general competence:
Knowledge
On successful completion of this course the student has:
- an understanding of the theoretical foundations of operative cybersecurity
- knowledge of offensive and defensive cybersecurity measures
- awareness of reference databases for vulnerabilities, exploits and information security advisories
- knowledge of professional ethics in cybersecurity and penetration testing
- knowledge of legal limitations for cybersecurity activities
- familiarity with international, national and sectorial crisis response and cybersecurity authorities
Skills
On successful completion of this course the student can:
- gather information (reconnaissance) about target systems and target organizations, identify vulnerabilities and choose targets for penetration testing
- run penetration testing with practical attacks against systems, software and users
- detect and identify intrusion to systems and execute countermeasures
- retrieve current intelligence about vulnerabilities, security patches and attack methods
- distinguish risk-based approach to cybersecurity operations from ad hoc cybersecurity operations
- configure intrusion detection or endpoint detection and response (EDR) agents
- configure and collect logs
- detect and monitor intrusions
- recover and secure evidence from log files and other resources for analysis of events
- find, exploit and mitigate vulnerabilities in networked information systems.
General competence
On successful completion of this course the student can:
- organize cybersecurity operations
- use relevant tools for cybersecurity operations
- use relevant tools for passive and active cybersecurity operations
- apply their knowledge of general incident management
-
Teaching and learning methods
- Online course material for preparatory reading (flipped classroom approach)
- Lectures
- Group tutorials with live demonstrations
- Group exercises applying tools and techniques for attack, testing and defense
- Home assignments (written and practical, e.g. attacking or securing virtual machines)
- Blue-Red-team competitions in defender and attacker roles
-
Course requirements
The following required coursework must be approved before the student can take the exam:
- Five assignments composed of the following: search for information, find vulnerabilities in virtual servers, scan/attack virtual machines, find attack patterns, competitive exercises (capture the flag, red-blue-teaming). Assignments may need presence or collaboration with other students on campus.
- Participation in a round of hacking or defense-attack competition and a written report based on the activity
-
Assessment
An individual written portfolio consisting of five assignments based on activities undertaken in the course. Each of the assignments has a word limit of 1000 words (+/- 10%), or 7 minutes (+/- 1 minute) for video or audio submissions.
The portfolio is assessed as a whole and given one single grade, but all assignments must be passed in order for the portfolio to receive a grade E or higher.
All assignments in the portfolio must be written in either English or a Scandinavian language.
The exam can be appealed.
-
Permitted exam materials and equipment
All aids are permitted, provided the rules for plagiarism and source referencing are complied with.
-
Grading scale
A-F
-
Examiners
Two internal examiners. External examiners are used regularly.
-
Course contact person
Lothar Fritsch