Learning Outcomes
The overall aim of the course is to introduce students to cybersecurity trends, threats when using IT against personal and company data, and how we can detect and protect us from these threats. The course aims to provide an understanding of the various actors that exist in the world of cybersecurity and what it is that drives both cybercriminals and security experts.
Knowledge and understanding
After completing the course, students will be able to:
- Describe the characteristics of cybercriminals and specialists within the field of cybersecurity.
- Describe the techniques and methods that cybercriminals use in their attempts to gain access to an organization‘s protected assets
- Describe the technology, processes, policies and standards used within organisations to combat cybercrime to protect all the organisation’s assets
- Describe the significance of upholding the principles of confidentiality, integrity and accessibility for an organisation in its ability to combat cyber crime
- Describe the strategies and methods used to comply with systematic cyber security work
Skills and Abilities
After completing the course, students will be able to:
- Present, explain, summarise, and discuss solution methods and results
- Install and configure a virtual machine
- Analyse security needs within a home or a medium-sized corporate network and, both in theory and in practice implement suitable solutions for the protection of networks, devices, software, data, and information
Course Content
The course deals with basic terms in the field of cyber security.
This includes descriptions of the characteristics of both cybercriminals and cyber security experts, linked to the methods and techniques they use.
Furthermore, the course sheds light on the principles of the CIA triad and its connection to countermeasures against cyber security threats. Closing key concepts are legislation, ethics, and morality within the cyber security area and systematic cyber security work.
Assessment
- Labs (4 credits)
- Assignment (3.5 credits)
Forms of Study
Grades
The Swedish grades U–G.
Prerequisites
- General entry requirements
Other Information
Replaces IK1080.
This course, when taught online, uses a Windows environment. Other operating systems can be used; however, the University cannot provide assistance or support with these. Students require internet connection of at least 2Mbit/s. They also require a webcam and a headset or microphone. All activities performed via Cisco Packet Tracer assume that students have the latest version of Cisco Packet Tracer installed on their computer.