Course - Cybersecurity and computer networks - IIKG1001
Cybersecurity and computer networks
This course is no longer taught and is only available for examination.
About
About the course
Course content
- Command line interface
- Introduction to computer networks
- TCP/IP model
- Addressing in networks
- Use of cryptography
- Secure network connections
- Cyber security terminology and history
- Vulnerability in digital infrastructures
- Basic threat profiling and risk analysis
- Organizational aspects
- Identities, authentication and authorization
- Human aspects of cybersecurity
- Legal and ethical issues in cyber security
- Future visions for a more secure digital society
Learning outcome
Knowledge
The candidate is familiar with TCP/IP models with protocols, and understands their role in modern computer networks.
The candidate can explain the principles behind network addressing and the data flow in modern computer networks.
The candidate can explain the most commonly used concepts in cyber security as well as the subject's most important historical development.
Candidates can explain how vulnerabilities in digital infrastructures can arise and how the most common vulnerabilities can be counteracted.
Skills
The candidate can establish a secure connection with cryptographic mechanisms and computer networks.
The candidate can use the most common command line tools for communication and network security.
Candidates can perform basic threat profiling and risk analysis
Candidates can use tools to protect identities from common security measures.
General competence
The candidate is able to familiarize himself with new material that deals with cyber security and computer networks.
The candidate can explain societal vulnerabilities as a consequence of cybersecurity challenges
Sustainability
The course teaches fundamental knowledge regarding cybersecurity and computer networks and practical skills for managing digital infrastructure. Hence, the course contributes to the following United Nations Sustainable Development Goals (SDGs):
SDG 8 "Decent work and economic growth" by preparing students to acquire practical skills for decent work in the future.
SDG 9 "Industry, Innovation, and Infrastructure" by preparing students to build and manage resilient digital infrastructures.
Learning methods and activities
- Lectures
- Labs
- Problem-solving, individually and group-based
- Tutorials
Compulsory assignments
- Group assignment
Further on evaluation
Re-sit exam in August: Written exam, but it can be changed to oral exam.
A student who gets his/her group assignment not approved, will not be allowed to take the final exam.
Specific conditions
Admission to a programme of study is required:
Programming (BPROG)
Recommended previous knowledge
None
Required previous knowledge
Needs attendance in the following study programs:
Bachelor in Programming (BPROG)
Course materials
1. The Linux Command Line, Fifth Internet Edition, William Shotts.
2. Introduction to Networking to Networking+, Timothy Pintello
3. Digital sikkerhet - En innføring, H. Bergsjø, R. Windvik & L. Øverlier, 2020
Credit reductions
Course code | Reduction | From |
---|---|---|
DCSG1002 | 2.5 sp | Autumn 2019 |
DCST1002 | 2.5 sp | Autumn 2019 |
DCSG1006 | 2.5 sp | Autumn 2019 |
DCST1006 | 2.5 sp | Autumn 2019 |
Subject areas
- Information Security
Contact information
Course coordinator
Lecturers
Department with academic responsibility
Department of Information Security and Communication Technology
Examination
Examination
Ordinary examination - Autumn 2025
School exam
The specified room can be changed and the final location will be ready no later than 3 days before the exam. You can find your room location on Studentweb.