course-details-portlet

IIKG3000

Introduction to informations security and privacy

Credits 7.5
Level Second degree level
Course start Autumn 2025
Duration 1 semester
Language of instruction Norwegian
Location Gjøvik, Ålesund and Trondheim
Examination arrangement Portfolio

About

About the course

Course content

The way systems are developed and operated is changing. Professionals who, in the past, might have been regarded as conventional end-users, now play a role in the development and operation of information systems. Contemporary engineers and scientists are now expected to possess a range of information technology skills. For example, they are expected to use these skills to build a web-based front end for their application, to interact with and control IoT devices, to integrate with third-party services and infrastructure, or to leverage data as a commodity. With these everyday skills comes a responsibility to ensure that security and privacy concerns are adequately considered in the systems that they build and work with. However, we see many public examples of where this does not happen: security and privacy breaches are reported for information systems, medical devices, industrial control systems, and more.

The objective of this introductory course is to provide a basic competence in a selection of contemporary information security and privacy topics. It is intended for students who expect to play a role in the development and operation of information systems.     

Learning outcome

After having completed the course the student will have have aquired the following learing outcomes in terms of knowledge, skills and general competence:

Knowledge:

  • Has broad knowledge of important topics, theories, issues, processes, tools and methods within information security and privacy
  • Is familiar with research and development work in information security and privacy
  • Can update his/her knowledge in information security and privacy
  • Has knowledge of the history, traditions, distinctive character and place in society of the academic field.

Skills:

  • Can apply academic knowledge and relevant results of research and development work in information security and privacy to practical and theoretical problems within other domains and make well-founded choices
  • Can reflect upon his/her own academic practice and adjust it under supervision
  • Can find, evaluate and refer to information and scholarly subject matter and present it in a manner that sheds light on the problem
  • Masters relevant scholarly tools, techniques and forms of communication

General Competence

  • Can analyse relevant academic, professional and research ethical problems
  • Can apply his/her knowledge and skills in new areas in order to carry out advanced assignments and projects
  • Can communicate extensive independent work and masters language and terminology of the academic field
  • Can communicate about academic issues, analyses and conclusions in the field, both with specialists and the general public
  • Can evaluate and respond to peers' ideas and opinions, actively engaging in discussions with team members in a constructive manner to foster a shared understanding or collective viewpoint
  • Can contribute with perspectives related to information security and privacy in new thinking and innovation processes

Learning methods and activities

The course is based on a combination of lectures, team work, and self-defined project work. The students are encouraged to work on topics related to their primary interest field with a focus on technological and non-technological challenges related to information security and privacy. Students must create a digital presentation and a written report on information security topics, as well as conduct a peer review of their classmates' work.

The course is based on Blackboard as the digital learning platform, combined with physical gatherings. Participants will be divided into teams, with real-time team participation expected. When feasible, the Team-Based Learning (TBL) approach will be implemented to encourage active learning and team discussions. The coursework can be completed individually or in groups (separate from the structured teams mentioned above) and must be documented as a portfolio, focusing on self-selected topics within information security and privacy.

The learning activities include:

  • Team-Based Learning (TBL) (individual learning, team learning, instructor’s feedback, lectures)
  • One plenary coursework presentation (individual or in groups)
  • Experience exchange in plenary settings
  • Written course report (individual or in groups)

This is a multi-campus course. TBL and lectures will be partially organized on all NTNU campus with active student in the course, and partially online.

Further on evaluation

The portfolio consists of

  • Presentation for coursework topic I (individual or in groups, assessed by course teachers) (30%)
  • Written report for coursework topic II (individual or in groups, assessed by course teachers) (70%)

Portfolio assessment failure implies a course retake.

Course materials

  • M. Whitman og H. Mattord: Principles of Information Security, CENGAGE, 7. Utgave, 2021
  • Distributed material

Credit reductions

Course code Reduction From
TDT4237 2.5 sp Autumn 2021
IMT4113 2.5 sp Autumn 2021
DCSG1002 5 sp Autumn 2021
DCST1002 5 sp Autumn 2021
This course has academic overlap with the courses in the table above. If you take overlapping courses, you will receive a credit reduction in the course where you have the lowest grade. If the grades are the same, the reduction will be applied to the course completed most recently.

Subject areas

  • Information Security

Contact information

Course coordinator

Lecturers

Department with academic responsibility

Department of Information Security and Communication Technology

Examination

Examination

Examination arrangement: Portfolio
Grade: Letter grades

Ordinary examination - Autumn 2025

Portfolio
Weighting 100/100 Date Submission 2025-12-15 Time Submission 23:59 Exam system Inspera Assessment