Programplaner og emneplaner - Student
STKD6310 Introduction to Information & Network Security II Course description
- Course name in Norwegian
- Introduction to Information & Network Security II
- Study programme
-
International Summer School - Faculty of Technology, Art and Design
- Weight
- 10.0 ECTS
- Year of study
- 2017/2018
- Programme description
-
- Course history
-
Introduction
This course will introduce the concepts of information and network security. We will discuss in detail security services such as confidentiality, integrity, availability, authentication, nonrepudiation and access control. Students will be introduced to common threats and attacks to systems and networks whether they are intentional or unintentional. Lastly, we will discuss mitigations to common threats and attacks and how we can defend against them.
Required preliminary courses
No additional requirements to the general requirements for the summer-school.
Learning outcomes
After completing this course the student should have the following learning outcome:
Knowledge
On successful completion of this course the student has knowledge:
- of the pertinent issues in information and network security
- of the principles of confidentiality, integrity, availability, authentication, nonrepudiation and access control
- of the common forms of information security threats and attacks
- of biometrics and other statistical analyses of biological data to ensure security
- of the methods for preventing data leaks and other unauthorized transfer of secured information
Skills
On successful completion of this course the student has the progressive ability to:
- evaluate network security protocols
- identify mechanisms for ensuring information and network security
- analyse security incidents to produce security improvements
- detect and prevent network intrusion
- develop secure code
General competence
On successful completion of this course the student is proficient and can master:
- ensuring information and network security
- techniques for ensuring confidentiality, integrity, availability, authentication, nonrepudiation and access control to network systems
- processes for regulatory compliance, audit and monitoring.
Teaching and learning methods
The course is structured to provide lectures and discussions. Real-world vulnerabilities and exploits will be discussed and shown how they apply to us in our day to day lives.
This course is a blended learning course that combines four weeks full time in-person instruction with eight weeks independent study, with online supervision when required. The four week in-person module culminates in an oral exam. Feedback from the oral exam acts as a basis for independent study, which then again culminates in a submission of the final report.
Course requirements
None.
Assessment
Project-examination. One individual 6,000 to 8,000 word term paper.
Exams can be appealed.
Grading scale
The final assessment, the group project, will be graded on a grading scale from A to E (A is the highest grade and E the lowest) and F for fail.
Examiners
Two internal examiners will be used.