UC2WAR10 Criminality and Warfare in the Digital Domain
UC2WAR10 Criminality and Warfare in the Digital Domain
- Course description
- NQF LevelBachelor's degree (Level 6 1. Cycle)
- Area of StudyComputing
- Program of StudyCyber Security
- ECTS10
- CampusKristiansand, OnlinePLUS - Bergen, OnlinePLUS - Oslo, Online
- Course LeaderProf. Barry Irwin
Language of Instruction and assessment: English
May be offered on Campus and Online.
May be offered as a separate course.
Included in the following bachelor's degrees:
- Cyber Security
The course aims to introduce students to the way in which digital systems can be misused both from individual criminals and organised crime to state sponsored attacks.
The student has knowledge of
K1 | to display a systematic understanding of the current types of information conflict. |
---|---|
K2 | to have a detailed knowledge of the latest tools and techniques for Cyber-attack investigation. |
The student gain skills in
S1 | to correctly identify the variables involved in specific cyber-attack. |
---|---|
S2 | to effectively investigate a cyber-attack securing vital evidence. |
The student can demonstrate
G1 | ethical issues relating to the handling of cyber-attacks. |
---|---|
G2 | communicating possible forms of cyber-attack to stakeholders. |
- Techniques and Processes within a Cyber Attacks
- Investigation of Cyber Crime
- Forms of Cybercrime
- Criminality in cyberspace
- Conflicts in Cyberspace
- Teaching will be based on a hybrid-flexible approach. Instructor-led face-to-face learning is combined with online learning in a flexible course structure that gives students the option of attending sessions in the classroom, participating online, or doing both.
- All activities require active student participation in their own learning.
- Learning delivery methods and available resources will be selected to ensure constructive alignment with course content, learning outcomes and assessment criteria.
- Students will be taught using a mixture of guidance, self-study, and lecture material. Topics will be introduced in a series of weekly lectures. The guidance sessions will be directed practical exercises and reading in which students can explore topics with support from a teacher. This material will also require students to self-manage their time to ensure tasks are completed and the theory is fully understood. This will allow the students to fully engage with lectures and with their peers.
- Learning resources are available in the LMS and include, but is not limited to:
- literature and online reading material (essential and recommended)
- streams, recordings and other digital resources, where applicable
- video conferencing and communication platforms, if applicable
- tools, software and libraries, where applicable
- Students must have access to an internet connection, and suitable hardware.
- Accessing live streams and virtual laboratories requires a minimum broadband connection of 2Mbps (4Mbps recommended).
- Students working on their own laptop/computer are required to acquire appropriate communications software, e.g., webcam, microphone, headphones.
UC1NPR10 Network Principles, and UC1IIS05 Introduction to Information Security or equivalent course(s).
The reading list for this course and any additional electronic resources will be provided in the LMS.
Activity | Duration |
---|---|
Teacher-led activity | 24 |
Teacher-supported work | 48 |
Self-study | 178 |
Name | Requirement | Scope | Requirement type | Comment |
---|---|---|---|---|
Mandatory Assignment | Course requirement |
All mandatory assignments must be passed in order to attempt the exam.
This course has one (1) exam contributing towards the overall and final grade of the course.
The exam must be assessed as passed to receive the final Course Grade.
Form of assessment | Grading scale | Grouping | Duration of assessment |
---|---|---|---|
Online Exam | A-F |