Course - Introduction to IT-Operations and Information Security - IMT1003
Introduction to IT-Operations and Information Security
About
About the course
Course content
Part I: IT preliminaries
-Computer principles
-Network and data communications
-Command line interfaces
Part II: Information security principles
-Overview: history and concepts
-Legal and ethical issues
-Risk management
-Information security planning (standards, best practice, and continuity strategies)
-VPN, firewall, and intrusion detection
-Authentication, identity management, privacy enhancing technologies
-Database and cloud security
-Cryptography
-Physical security
-Usability issues
-Human factors (organizational and culture aspects) in deploying information security
-Implementation and maintenance (software security, hardware security, system auditing and forensics, information security certifications)
Learning outcome
Knowledge:
-Basic IT concepts and methodologies
-History, terms, concepts, threats, attacks, and controls about information security
-Legal/ethic, technical, organizational, and cultural aspects of information security
-Best practices in security planning and management
Skills:
-Basic practical skills for IT operations
-Methodologies for information security project planning, implementation, and management
-Ability to identify potential security threats and to identify the correct information resource to address the threats
-Basic communications skills in explaining the problem and presenting the security plan
-Basic skill in literature and status survey and report writing
General competence:
-Are aware of relevant professional, legal and ethical issues
-Can carry out and document work independently in keeping with academic practice
-Can convey technical material both written and oral
-Students should be familiar with basic methods of thinking and innovation
Learning methods and activities
-Lectures
-Group work
Further on evaluation
Forms of assessment:
-Written Exam (veight 70%), 3 hours.
-Portfolio Assessment (veight 30%) consists of 2 assignments. The assignments are to be delivered via Blackboard as a two-sided print.
-Both parts must be passed.
Resit examination:
Re-sit of written exam in August. If the student fail on the portfolio, agreement on improvement must be made with course responsible.
Specific conditions
Admission to a programme of study is required:
Computer Science (ÅRINF)
IT Operations and Information Security (BITSEC)
Course materials
Core reading:
-Michael E. Whitman and Herbert J. Mattord: Principles of Information Security, Thomson Course Technology, 5. ed (2015)
Additional readings
-William Stallings and Lawrie Brown: Computer Security: Principles and Practice, 3. ed. (2014)
-Gene Kim, Kevin Behr and George Spafford: The Phoenix Project: A Novel About IT, Dev Ops and Helping your Business Win, IT Revolution Press, First edition (2013). Available as e-book on Amazon
-Torgeir Daler, Roar Gulbrandsen, Tore Audun High and Torbjørn Sjølstad: Handbook for Computer Security - information technology and risk management, Tapir Academic Press, 3rd edition (2010)
-Personal Data Act and the Personal Data Regulations (available online: www.lovdata.no)
Credit reductions
| Course code | Reduction | From |
|---|---|---|
| IMT1121 | 10 sp | |
| DCSG1002 | 3.7 sp | |
| DCST1002 | 3.7 sp |
Subject areas
- Information Security
Contact information
Course coordinator
Department with academic responsibility
Department of Information Security and Communication Technology
Examination
Examination
Ordinary examination - Autumn 2018
Written examination
The specified room can be changed and the final location will be ready no later than 3 days before the exam. You can find your room location on Studentweb.
Portfolio
Re-sit examination - Spring 2019
Written examination
The specified room can be changed and the final location will be ready no later than 3 days before the exam. You can find your room location on Studentweb.