Course - Introduction to IT-Operations and Information Security - IMT1003
Introduction to IT-Operations and Information Security
New from the academic year 2016/2017
About
About the course
Course content
Part I: IT preliminaries
Computer principles
Network and data communications
Command line interfaces
Part II: Information security principles
Overview: history and concepts
Legal and ethical issues
Risk management
Information security planning (standards, best practice, and continuity strategies)
VPN, firewall, and intrusion detection
Authentication, identity management, privacy enhancing technologies
Database and cloud security
Cryptography
Physical security
Usability issues
Human factors (organizational and culture aspects) in deploying information security
Implementation and maintenance (software security, hardware security, system auditing and forensics, information security certifications)
Learning outcome
Knowledge:
Basic IT concepts and methodologies
History, terms, concepts, threats, attacks, and controls about information security
Legal/ethic, technical, organizational, and cultural aspects of information security
Best practices in security planning and management
Skills:
Basic practical skills for IT operations
Methodologies for information security project planning, implementation, and management
Ability to identify potential security threats and to identify the correct information resource to address the threats
Basic communications skills in explaining the problem and presenting the security plan
Basic skill in literature and status survey and report writing
General competence:
Are aware of relevant professional, legal and ethical issues
Can carry out and document work independently in keeping with academic practice
Can convey technical material both written and oral
Students should be familiar with basic methods of thinking and innovation
Learning methods and activities
Forelesninger|Gruppearbeid|Obligatoriske oppgaver
Obligatoriske arbeidskrav:
None.
Further on evaluation
Utfyllende om kontinuasjon:
Re-sit of written exam in August.If fail on the portfolio, agreement on improvement must be made with course responsible.
Vurderingsformer:
Portfolio Assessment (veight 30%) consists of 2 assignments. The assignments are to be delivered via Fronter and as a two-sided print to the exams office. Written Exam (veight 70%), 3 hours. Both parts must be passed.
Specific conditions
Admission to a programme of study is required:
IT-drift og informasjonssikkerhet (BITSEC)
Informasjonssikkerhet (BIS)
Course materials
Core reading:
Michael E. Whitman and Herbert J. Mattord: Principles of Information Security, Thomson Course Technology, 5. ed (2015)
Additional readings
William Stallings and Lawrie Brown: Computer Security: Principles and Practice, 3. ed. (2014)
Gene Kim, Kevin Behr and George Spafford: The Phoenix Project: A Novel About IT, Dev Ops and Helping your Business Win, IT Revolution Press, First edition (2013). Available as e-book on Amazon
Torgeir Daler, Roar Gulbrandsen, Tore Audun High and Torbjørn Sjølstad: Handbook for Computer Security - information technology and risk management, Tapir Academic Press, 3rd edition (2010)
Personal Data Act and the Personal Data Regulations (available online: www.lovdata.no)
Credit reductions
| Course code | Reduction | From |
|---|---|---|
| IMT1121 | 10 sp |
Subject areas
- Information Security
Contact information
Course coordinator
- Bian Yang
Department with academic responsibility
Department of Information Security and Communication Technology