FI2AMCO75 CyberOps

FI2AMCO75 CyberOps

  • Course description
    • Course code
      FI2AMCO75
    • Level of study
      5.2
    • Program of study
      Network and IT Security
    • Credits
      7.5
    • Course coordinator
      Justine Moodley, Benjamin Rosenlund
Teaching term(s)
2025 Spring
Authors
benjamin.rosenlund@noroff.no
About the Course

This topic aim at giving students practical experience with the fundamentals of cyber security, related to the design and implementation of secure systems and networks. The students will obtain knowledge on essential concepts, tools and techniques used in the handling of cyber security incidents. 

The course aims to empower students with the essential skills and knowledge required to mitigate cyber security risks and respond to cyber security incidents in multiple settings. Upon completion attendees should have a practical appreciation of fundamental operational concepts with refence to the preparation, detection, analysis, containment, eradication, and recovery of cyber security incidents. 

Course Learning Outcomes
Learning outcomes - Knowledge

The candidate: 

  • has knowledge of concepts, theories, models processes, and tools related to network security administration and assessments. 
  • can assess their own work within network security, relative to the applicable norms and requirements of the industry. 
  • is familiar with the history, traditions, distinctive nature of network and cyber security. 
  • has an appreciation of the trade and its place in society and is aware of the ethical and moral elements of network and cyber security. 
  • has insight into their own opportunities for development relevant to the secure administration of networks and related features. 
Learning outcomes - Skills

The candidate: 

  • can explain their vocational choices in securing networks and related features. 
  • can analyse, design, build and develop networks using secure by design networking principles. 
  • can reflect over their own vocational practice and adjust it under supervision. 
  • can understand key terms and concepts in cryptography and how it can be used to secure data at rest and data in transit. 
  • can find and refer to information and vocational material and assess its relevance to network and cyber security, vulnerabilities and exploitation. 
  • can analyse and evaluate the network and cyber security requirements and relevant correlations to related fields, such as digital forensics and information assurance. 
General Competence

The candidate: 

  • can plan and carry out vocational tasks and projects relative to network and cyber security, alone or as part of a group and in accordance with ethical requirements and principles. 
  • can contribute to organisational development in securing networks and network services. 
  • understand the detrimental effect of unsecured network applications, ports and services and contribute to improving security based on this. 
  • can identify attacks on network systems and devices and take the appropriate actions to mitigate and stop such attacks. 
Teaching and Learning

In this course, the following teaching and learning methods can be applied, but are not limited to:

  • Lecture: Educator-led presentations or activities providing knowledge, skills, or general competencies in the subject area.
  • Group work: Collaborative activities where students work together to solve problems or complete tasks.
  • Tutoring: One-on-one or small group sessions with an instructor for personalized guidance and support.
  • Student presentations: Opportunities for students to demonstrate their understanding of course material by presenting to peers.
  • Online lessons: Digital content delivered via an online learning platform.
  • Guidance: Individualized advice and direction from instructors to support students in their learning journey.
  • Workshops: Practical sessions focused on hands-on application of theoretical concepts or skills.
  • Self-study: Independent study where students engage with course material on their own without any teacher support.
Reading list

Teaching materials, reading lists, and essential resources will be shared in the learning platform and software user manuals where applicable.

Assessments
EksamensformKarakterskalaGrupperingVarighet
Course Assignment
Grade A-F
Individual
5 Hour(s)
Test
Grade A-F
Individual
45 Minute(s)