UC3VUL05 Vulnerabilities
UC3VUL05 Vulnerabilities
- Course description
- NQF LevelBachelor's degree (Level 6 1. Cycle)
- Area of StudyComputing
- Program of StudyCyber Security
- ECTS05
- CampusKristiansand, OnlinePLUS - Bergen, OnlinePLUS - Oslo, Online
- Course LeaderFabricio Bortoluzzi
anguage of Instruction and assessment: English
May be offered on Campus and Online.
May be offered as a separate course.
Included in the following bachelor's degrees:
- Cyber Security
The course aims to explore the way in which software is exploited. It examines the ways in which vulnerabilities are identified and then explores how these can be exploited by a possible attacker. Discussion of approaches to mitigating vulnerabilities is also discussed.
The student has knowledge of
K1 | to possess applicable knowledge of a wide range of vulnerability types. |
---|---|
K2 | to understand the ways in which vulnerabilities can be detected. |
The student gain skills in
S1 | to be able to critically evaluate the security stance of a system using appropriate vulnerability scanning techniques. |
---|---|
S2 | to apply possible vulnerability exploitation tools and processes and explain results to stakeholders. |
The student can demonstrate
G1 | ability to communicate abstract vulnerability concepts to non-specialist audiences. |
---|
- Code Components and Software Development
- Security Architectures
- Vulnerabilities
- Vulnerabilities Detection
- Vulnerability Management and Testing
- Teaching will be based on a hybrid-flexible approach. Instructor-led face-to-face learning is combined with online learning in a flexible course structure that gives students the option of attending sessions in the classroom, participating online, or doing both.
- All activities require active student participation in their own learning.
- Learning delivery methods and available resources will be selected to ensure constructive alignment with course content, learning outcomes and assessment criteria.
- Students will be taught using a mixture of guidance, self-study, and lecture material. Topics will be introduced in a series of weekly lectures. The guidance sessions will be directed practical exercises and reading in which students can explore topics with support from a teacher. This material will also require students to self-manage their time to ensure tasks are completed and the theory is fully understood. This will allow the students to fully engage with lectures and with their peers.
- Learning resources are available in the LMS and include, but is not limited to:
- literature and online reading material (essential and recommended)
- streams, recordings and other digital resources, where applicable
- video conferencing and communication platforms, if applicable
- tools, software and libraries, where applicable
- Students must have access to an internet connection, and suitable hardware.
- Accessing live streams and virtual laboratories requires a minimum broadband connection of 2Mbps (4Mbps recommended).
- Students working on their own laptop/computer are required to acquire appropriate communications software, e.g., webcam, microphone, headphones.
UC2OPS10 Operating Systems, and UC2PEN10 Penetration Testing: Practice and Procedure, or equivalent course(s).
The reading list for this course and any additional electronic resources will be provided in the LMS.
Activity | Duration |
---|---|
Teacher-led activity | 12 |
Teacher-supported work | 24 |
Self-study | 78 |
This course has two (2) exams contributing towards the overall and final grade of the course.
All exams must be assessed as passed to receive the final Course Grade.
Form of assessment | Grading scale | Grouping | Duration of assessment |
---|---|---|---|
Online Exam | A-F | ||
Term Paper | A-F |