Status message

The course description for the semester you wanted is not published yet. Showing you instead the latest version available.

UC2ISM10 Information Security Management

UC2ISM10 Information Security Management

  • Course description
    • NQF Level
      Bachelor's degree (Level 6 1. Cycle)
    • Area of Study
      Computing
    • Program of Study
      Cyber Security
    • ECTS
      10
    • Campus
      Kristiansand, OnlinePLUS - Oslo, Online
    • Course Leader
      Piet Delport
Introduction

Language of Instruction and assessment: English
May be offered on Campus and Online.
May be offered as a separate course.

Included in the following bachelor's degrees:

  • Digital Forensics
  • Cyber Security
Course Aim(s)

The course aims to provide students the opportunity to develop their understanding of issues relating to information security management and information governance, with particular emphasis on risk management, threats and vulnerabilities, plus national and international laws relating to data protection and the use of computer systems and communication networks.

Course Learning Outcomes
Knowledge

The student has knowledge of

K1 information security management models and approaches.
K2 the relationship between risks, threats and vulnerabilities.
K3 methods of risk management, including reduction and mitigation.
K4 information Governance Law.
K5 standards, policies and procedures.
Skills

The student gain skills in

S1 to be able to adapt and apply risk assessment methodologies and standards.
S2 to assess the legal implication of actions on a computer network.
S3 identifying relevant stakeholders in the InfoSec management process.
General Competence

The student can demonstrate

G1 having a mature approach to risk management.
G2 understanding the legal implications of certain actions.
G3 communicating InfoSec management concepts, theories and practices to relevant stakeholders.
Course Topics
  • Governance
  • Information Security Management
  • Risk Management
  • Business Continuity and Disaster Recovery
  • Information Security-related Laws and Regulations
Teaching Methods
  1. Teaching will be based on a hybrid-flexible approach. Instructor-led face-to-face learning is combined with online learning in a flexible course structure that gives students the option of attending sessions in the classroom, participating online, or doing both.
  2. All activities require active student participation in their own learning.
  3. Learning delivery methods and available resources will be selected to ensure constructive alignment with course content, learning outcomes and assessment criteria.
  4. Students will be taught using a mixture of guidance, self-study, and lecture material. Topics will be introduced in a series of weekly lectures. The guidance sessions will be directed practical exercises and reading in which students can explore topics with support from a teacher. This material will also require students to self-manage their time to ensure tasks are completed and the theory is fully understood. This will allow the students to fully engage with lectures and with their peers.
Resources and Equipment
  1. Learning resources are available in the LMS and include, but is not limited to:
    • literature and online reading material (essential and recommended)
    • streams, recordings and other digital resources, where applicable
    • video conferencing and communication platforms, if applicable
    • tools, software and libraries, where applicable
  2. Students must have access to an internet connection, and suitable hardware.
    • Accessing live streams and virtual laboratories requires a minimum broadband connection of 2Mbps (4Mbps recommended).
  3. Students working on their own laptop/computer are required to acquire appropriate communications software, e.g., webcam, microphone, headphones.
Prerequisite Knowledge

UC1IIS05 Introduction to Information Security, or equivalent course(s).

Reading List

The reading list for this course and any additional electronic resources will be provided in the LMS.

Study Workload

250 nominal hours.
Study workload applies to both Campus and Online students.

ActivityDuration
Teacher-led activity
24
Teacher-supported work
48
Self-study
178
Work Requirements

Mandatory Assignments are assessed as Approved or Not Approved.

NameRequirementScopeRequirement typeComment
Mandatory Assignment
Course requirement
Assessment Strategy

All mandatory assignments must be passed in order to attempt the exam.
This course has two (2) exams contributing towards the overall and final grade of the course.

All exams must be assessed as passed to receive the final Course Grade.

Form of assessmentGrading scaleGroupingDuration of assessment
Online Exam
A-F
Online Exam
A-F