Bachelor in Cyber Security
Bachelor in Cyber Security
- Study Facts
- Area of StudyComputing
- ECTS180
- NQF LevelBachelor's degree (Level 6 1. Cycle)
- CampusKristiansand, Online, Oslo
- Study ModeFull-time, Online
- Entry Requirements
- Study Programme LeaderJohan Van Niekerk
Noroff University College (NUC) offers awards that specialise in the utilisation of digital technology. The objective of the Bachelor in Cyber Security to provide you with a background in the dynamic field of computer and information security; developing the knowledge needed as a computer security professional along with enabling you to explore and expand your knowledge within the cybersecurity domain. Cyber Security is a growing concern for all organisations – with cyber-crime and other disruptive activities having a significant impact across a wide range of industries. Recent examples of this are the ‘Revil ransomware attack’ exploiting Kaseya software; the ‘Solarwinds attacks’; and the ‘Colonial pipeline attack’ in early 2021. Defending industries against cyber-attacks is a complex task, balancing security requirements with many other issues.
Malicious organisations are connected, not just in terms of networks and technology, but also information and services. An attack on a single element of an infrastructure has the potential to affect the whole infrastructure. It can be difficult to distinguish between civilian and what may be considered legitimate military targets in a cyber-attack. At the organisational and planning level, a security specialist needs to be aware not just of the ways in which the network can be compromised, but to understand the possible source, cause, and motivation of the attack.
This degree programme recognises the interconnected nature of technology. With many companies now forming critical parts of a national infrastructure, exposing themselves to a broader range of threats. The programme therefore explores issues relating to cyber-attacks and cyber warfare including Computer Network Operations; composed of the two broad domains of Computer Network Attack (CNA) and Computer Network Defence (CND). As a result, graduates obtain the knowledge of how malicious attacks are launched at networked systems and consequently be prepared and effective in a variety of system defence approaches and tactics.
The degree programme also prepare you for a professional career within Cyber Security, working with small consultancies or large organisations, both in the public and private sectors. Upon graduation, students will have developed a high level of competency in a variety of specific tools and techniques, along with a solid foundation of knowledge, skills, and competence to support them in lifelong learning throughout their careers.
This degree programme aims to develop a holistic approach to key principles and procedures of computer compromise and computer security practices. The programme provides students with a blend of knowledge and skills in securing computer systems and networks with a holistic understanding of key best practice, principles and procedures within the cyber security domain, and their interaction with each other. Throughout the programme there is a strong emphasis on the technology and tools as well as legal and ethical requirements relevant to this fast-moving, technically challenging domain. The Cyber Security domain is very broad, and therefore students are prepared for further specialisation and entry into a range of potential career fields and job roles. A solid knowledge and skills foundation is provided to enable students to pursue further postgraduate study -- both in Cyber Security specific degrees, as well as several closely related disciplines. The subject material will enable graduates to go on to postgraduate study in the area and will also enable them to fulfil several distinct employment titles.
The core concepts addressed in the degree programme are:
- Computer Network Operations: Tools, techniques and approaches for network and system security.
- Security Vulnerabilities: Identification, development, and remediation
- Penetration Testing: Methodologies, tools, techniques, practice, and procedures.
- Information Security Management: Policies, procedures, risk management, legal, ethical, and social issues of security.
Graduates will have a high level of proficiency in a wide range of skills in problem-solving, network infrastructures, system design, operating systems, vulnerability assessment and penetration testing. The programme has been specifically designed to equip students with the conceptual understanding and principles of computer security, to produce a well-rounded, employment ready, graduate.
A Programme Learning Outcome (PLO) is essentially a statement that describes what the student has achieved upon successfully completing the degree. Each course description has its own set of learning outcomes, which contribute to the achievement of Programme Learning Outcomes. The PLOs for this degree are based on the Norwegian Qualifications Framework for Lifelong Learning (NQF) at bachelor level. The NQF levels are formulated on the basis of what a person know, can do and is capable of doing as a result of a learning process. The outcomes of the completed learning process are described in the categories: “knowledge”, “skills” and “general competences”.
Knowledge: Understanding of theories, facts, principles, procedures in subject areas and/or occupations.
Skills: Ability to utilise knowledge to solve problems or tasks (cognitive, practical, creative and communication skills).
General Competence: Ability to utilise knowledge and skills in an independent manner in different situations.
Students who are awarded a Bachelor in Cyber Security have attained:
The candidate ...
K1 | has a broad knowledge of cyber defence and attack techniques, technologies and tools in order to implement appropriate technical and non-technical solutions to prepare for, defend against, and recover from cyber intrusion. |
---|---|
K2 | is familiar with appropriate and current procedures and standards for managing cyber risks and threats, undertaking penetration testing and ensuring network security. |
K3 | has knowledge of the legal and ethical issues and responsibilities pertaining to cyber security activities with regard to the impact of the cyber intrusion on society, industry, national infrastructure and national security. |
K4 | is familiar with current and emerging research and development in the field of cyber security and related disciplines. |
K5 | is able to update their knowledge in the area of cyber security through academic study, research and professional development. |
K6 | is familiar with the current and developing state of cyber criminality and cyber warfare threats, vulnerabilities and defensive tools and techniques. |
K7 | has knowledge of the history and development of cyber security, cybercrime and cyber warfare, its impact on safety and security of digital environments and infrastructures, alongside the resulting effects on society. |
K8 | is familiar with various computational tools, techniques and practices that underpin secure computing. |
The candidate ...
S1 | is able to critically assess the threat level to a digital environment and select and apply appropriate computer system security and penetration tools and techniques in order to secure a computer network. |
---|---|
S2 | can critically select and apply a range of analytical and methodological problem solving and investigative techniques including system profiling and vulnerability analysis, based on research and to be able to interpret the solutions and present results appropriately. |
S3 | is able to reflect on their own academic practice and development as a security professional, identify areas for improvement and adapt to future cyber security tools, techniques, technology and threats. |
S4 | is able to find, distil and evaluate relevant academic, commercial and non-commercial information assets then apply this information in resolving digital security problems. |
S5 | is able to identify stakeholders of cyber security and defence-related issues and communicate, network and collaborate with these stakeholders according to their individual requirements. |
S6 | can apply mathematical and software development theories, tools and techniques to computational challenges. |
The candidate ...
G1 | is able to identify and appropriately act on complex ethical and social issues arising within academic and professional practice as a cyber security professional, whilst being aware of the greater implications of their actions and decisions. |
---|---|
G2 | is able to plan, execute and manage a variety of activities and cyber security-related projects over time, alone or as part of a collaborative team to successful conclusion and in accordance with relevant legal and ethical requirements and principles. |
G3 | can distil and communicate cyber security-related theories, concepts, problems and solutions, with a variety of relevant stakeholders, through the selection and application of appropriate methods of communication. |
G4 | can exchange opinions, experiences and ideas with others with background and/or experience in cyber security and defence, through the selection and application of appropriate methods of communication, thereby contributing to the development of good practice within the cyber security community of practice. |
G5 | is familiar with, and can critically evaluate, current and evolving processes and disruptive technologies within the field of cyber security. |
G6 | is able to identify appropriate stakeholders and communicate, network and collaborate with these stakeholders at an appropriate level while considering security and confidentiality. |
G7 | is able to engage in critical self-reflection, and reflect upon relevant ethical and professional issues, as part of the lifelong learning strategy required of a cyber security professional. |
All study programmes use a variety of teaching and learning activities to encourage students to actively explore and apply new knowledge, along with developing skills and competencies. Each course will incorporate a range of teaching and learning methods according to which are most appropriate for that course – determined through a process of constructive alignment. The primary aim of these methods is to support the students’ learning process and facilitate the achievement of the learning outcomes. The applicable teaching and learning methods include, but are not limited to, the following:
Teacher-Led Activities (TLA) | |
---|---|
|
|
Teacher-Supported Work (TSW) | |
---|---|
|
|
Self-Study (SST) | |
---|---|
|
|
Key information for the degree is delivered in lectures, normally in one of the Campus auditoriums and as a live stream. Tutorials and supported study are delivered through laboratory-based sessions. All educational material is accessible through the LMS, which forms part of the Virtual Learning Environment (VLE), illustrated in Figure 1.
The LMS provides a central location for the distribution of all educational content and learning resources related to all courses throughout the program of study:
|
|
The dates and times for all educational sessions for every course, including lectures and tutorials, can be found in the online timetabling system (TimeEdit).
The student workload has been carefully considered for each course to include an appropriate combination of activities suitable for the subject area.
Information and details about a specific course can be found in the respective Course Description. However, each course comprises a selection of lectures, tutorials, and other appropriate sessions. These are timetabled based on a full-time study schedule of 08:00 to 16:00, Monday to Friday.
At the start of each academic year, a Study Schedule is published and made accessible. It contains the planned start and end dates for all courses in the degree. The schedule also includes dedicated study time to work on projects and extra-curricular sessions, including seminars, workshops, and guest speakers from industry. If the schedule is updated, students are promptly informed.
Reading lists for a study programme, and especially for a course within a study programme, is annually revised. In some cases, where the field is rapidly changing, the reading list may be complete closer to course start-up. The reading list will be shared close to semester start, or upon request by contacting the Study Programme Leader.
Each course in the programme of study comprises of several graded (summative) assessments, where students can demonstrate their achievements and abilities. Information about assessments for each course is provided via the course pages on the LMS. When assessments are released, students are encouraged to always read through the instructions fully and carefully, to ensure the greatest chance of success. If anything is unclear, please contact the relevant Course Leader as soon as possible.
A course is successfully completed once the student has obtained a passing grade for that course. Every assessment has a specific completion deadline comprising a date and time. Work can be submitted any time up to the stated deadline. Students must be able to clearly demonstrate the extent to which they have met the learning outcomes of that course in order to pass. Students will encounter a variety of assessments, which may be used for formative and summative purposes, to ensure that students meet or exceeded the PLOs.
Specific assessment strategies for each course, and instructions for submitting course work, are detailed in the LMS course pages. Please see the regulations available on www.noroff.no/en.
Assessment Methods | |
---|---|
Formative |
|
Summative |
|
Assessments are graded according to the standard university grading scale, described in the table below.
Grade Letter | Quality Indicator | Definition |
---|---|---|
A | Excellent | An excellent performance, clearly outstanding. Shows a highdegree of independence. |
B | Very good | A very good performance, above average. Shows a certaindegree of independence. |
C | Good | An average performance, satisfactory in most areas. |
D | Satisfactory | A performance below average, with significant shortcomings. |
E | Sufficient | A performance that meets the minimum criteria, but no more. |
F | Fail | A performance that does not meet the minimum criteria. |
For general admission it is required to document the following criteria as passed:
- Higher Education Entrance Qualification, and
- Candidates must be able to document proficiency in the English language. Language requirements by Samordna Opptak
Special admission requirements
In addition to the general admission requirements, it is required to document the following:
- Mathematics R1 (or S1+S2)
For admission on basis of prior learning and work experience:
Admission based on prior experience requires a written application for evaluation. Applicable candidates must be at least 25 years of age in the year of admission.
For candidates with foreign education the requirements for Higher Education are:
- The country must be recognized by NOKUT, specified in the GSU-list.
- Candidates must be able to document proficiency in the English language. Language requirements by Samordna Opptak
For further information, please see the admission requirements: https://www.noroff.no/en/admission/admission-requirements
All students follow the same progression according to their education plan, irrespective of whether they study online or on campus. All students study the courses at the same time, with the same delivery and workload, following identical assessment strategies for every course. At the study level no distinction is therefore made between campus and online students. All students are required to engage in live education sessions (such as lectures) and undertake all required educational activities.
Students are encouraged to interact with each other via online forums and chat systems, enabling discussions to take place involving both online and campus students. Each student cohort is therefore a single learning community, concurrently engaging in all educational activities irrespective of actual physical location. Throughout all educational sessions course staff actively encourage participation from campus and online students simultaneously, and do not focus solely on those who are physically present.
This tight integration of campus and online ensures students will be part of a cohesive learning community throughout their study. As a result, this also means that should students personal situations change during their studies, and they must change their mode of study from online to campus (or vice versa) this can be done with little to no disruption to their studies.
Undertaking some period of study at an international educational institution can result in many benefits to those who take part, including:
- Language and general competence in the destination country and culture
- Development of personal and professional networks in other parts of the world
- Personal growth and holistic development.
All students are eligible to apply to undertake a period of study at an international university. All international study opportunities are subject to the application processes and admissions requirements of the international institution, in addition to an evaluation of the suitability of the proposed study exchange within the students’ study at NUC. Full details of international study opportunities and the application process is available to all students within the LMS.