course-details-portlet

TTM4175

Introduction to Cyber Security and Data Communication

Credits 7.5
Level Foundation courses, level I
Course start Autumn 2025
Duration 1 semester
Language of instruction Norwegian
Location Trondheim
Examination arrangement Portfolio assessment

About

About the course

Course content

This is an introductory course to cyber security and data communication. The course focuses on practical work and general skills, and goes through selected topics around cybersecurity, networks, communication and protocols, use of computers and operating systems, application development and programming.

Learning outcome

A. Knowledge:

  1. Basic knowledge of network protocols at different levels, such as TCP / IP, HTTP and MQTT.
  2. Basic concepts within network structure and routing.
  3. Basic architecture of systems within the Internet of Things.
  4. Programming in Python, including access to communication and hardware.
  5. Basic understanding of security and cryptography mechanisms.
  6. Basic understanding of IT system vulnerabilities.
  7. Basic knowledge of selected economic and human aspects of cybersecurity and data communication.

B. Skills:

  1. Build and configure an IP network.
  2. Using an operating system via the command line.
  3. Develop applications in Python, including access to networks and hardware and use of external libraries.
  4. Use web services via a programming interface (API).
  5. Develop an architecture for a single system that contains communication.
  6. Use of development tools.
  7. Use of security tools.
  8. Analyze selected, basic economic and human aspects of cybersecurity and data communication.

C. General competence:

  1. Find relevant information online and use resources for developers independently.
  2. Organize work in small teams.
  3. Learn with others; teach others and receive information.
  4. Learn about your own learning habits, and organize own learning.
  5. Work focused on a problem.
  6. Reflect about own work.
  7. Think about ethics related to information systems.

The two labs in this course cover several sustainability goals and targets. The lab on Ethical hacking provides an introduction to information security, which is directly connected to target 9.1 in SG9 (Industry, Innovation and Infrastructure) for reliable and resilient infrastructure. The second lab, Internet of things, covers enabling technology critical for several sustainability goals, and especially SG9 (Industry, Innovation and Infrastructure), SG14 (Life on Land) through sensor technology. It has a potential impact on SG12 (Responsible Consumption and Production) and SG11 (Sustainable Cities and Communities). We also discuss ethical dilemmas of IoT, like short-lived products and electronic waste, privacy concerns and safety issues.

Learning methods and activities

The course is structured into several units that focus on different problems. Each unit uses team-based learning and practical work. Much of learning happens in groups. Attendance to the lectures and the lab hours is compulsory (>80%) . For each unit, there is a compulsory quiz - Readiness Assurance Test (RAT) - and practical work, which forms the basis for the reports.

Compulsory assignments

  • Attendance at lectures and lab sessions (>80%)
  • Readiness Assurance Tests (RATs)

Further on evaluation

The course is graded as passed / not passed, based on the submission of an individual portfolio at the end of the semester. The portfolio consists of individual reflection notes and lab reports. The lab reports must be submitted as a group during the semester. All students in the group normally receive the same grade based on the lab reports. In exceptional cases where a student has not contributed sufficiently, the student may be given an individual grade based on documented lack of effort and/or participation. Lab reports should be revised based on feedback before their final submission as part of the individual portfolio. A report that is not delivered on time is considered as not passed. Detailed requirements for the individual portfolio, requirements for the reports and the submission deadlines for all the reports will be announced at the beginning of the semester. If the portfolio is not approved, there is a continuation already in January of the following semester where an improved portfolio is to be handed in. If the portfolio is not approved then either, the course must be taken again in the following academic year.

Specific conditions

Admission to a programme of study is required:
Cyber Security and Data Communication (MTKOM)

Course materials

To be announced at the beginning of the term.

Subject areas

  • Safety and Reliability
  • Telematics
  • Information Security
  • Communication Technology
  • Technological subjects

Examination

Examination

Examination arrangement: Portfolio assessment
Grade: Passed / Not Passed

Ordinary examination - Autumn 2025

Portfolio assessment
Weighting 100/100 Exam system Inspera Assessment