FI1AMIS75-SC Introduction to Information Security
FI1AMIS75-SC Introduction to Information Security
- Course description
- Course codeFI1AMIS75-SC
- Level of study5.1
- Program of studyNetwork and Systems Administration
- Credits7.5
- Course coordinatorJustine Moodley
The course provides an introduction to Information Security and knowledge about important elements, in addition to skills to identify potential risks. The course provides knowledge of security models, cryptography, authentication, physical security, malware, firewall technologies and incident management. The course builds on competence Linux, Microsoft Server Technologies, and Cloud Computing Foundations.
The aim of the course is to provide fundamental competence to working with and around Information Security. A broad introduction to Information Security is necessary to provide a good overview in this section of the ICT discipline. As business demand a better focus on security, it becomes increasingly more important to create an awareness about security risks and measures. The course is important for further education and candidates’ future career.
Learning outcomes - Knowledge
- has knowledge of the concepts and processes that are relevant to Information Security
- has knowledge of cryptography, authentication and different types of malwares that are used to secure computer systems
- has insight into relevant regulations, standards, agreements, and quality requirements in Information Security
- has a knowledge of the ICT industry and is familiar with the need for Information Security and basic risk assessment
- can update their own knowledge of Information Security, risk management and preventive actions
- understands the importance of Information Security in a social and value-creation perspective
Learning outcomes - Skills
- can apply knowledge to practical and theoretical problems in ICT security
- masters relevant tools, materials, techniques and styles to identify possible security risks
- can find information and material that is relevant to evaluating and identifying possible security issues
- can study an ICT environment and identify IT security related issues and what measures need to be implemented
General Competence
- understands the ethical principles that apply to IT and Information Security
- has developed an ethical attitude in relation to data access and working in the ICT security industry
- can carry out work with general ICT security based on project specifications and requirements
- can develop work methods, products and/or services relevant to Information Security in the ICT industry
In this course, the following teaching and learning methods can be applied, but are not limited to:
- Lecture: Educator-led presentations or activities providing knowledge, skills, or general competencies in the subject area.
- Group work: Collaborative activities where students work together to solve problems or complete tasks.
- Tutoring: One-on-one or small group sessions with an instructor for personalized guidance and support.
- Student presentations: Opportunities for students to demonstrate their understanding of course material by presenting to peers.
- Online lessons: Digital content delivered via an online learning platform.
- Guidance: Individualized advice and direction from instructors to support students in their learning journey.
- Workshops: Practical sessions focused on hands-on application of theoretical concepts or skills.
- Self-study: Independent study where students engage with course material on their own without any teacher support.
Teaching materials, reading lists, and essential resources will be shared in the learning platform and software user manuals where applicable.