FI2AMP210 Exam Project 2
FI2AMP210 Exam Project 2
- Course description
- Course codeFI2AMP210
- Level of study5.2
- Program of studyNetwork and IT Security
- Credits10
- Course coordinatorJustine Moodley, Benjamin Rosenlund
The study programme concludes with a major project that reflects competence the candidates have acquired during the academic year. The candidate must solve the assignment independently, from a given practical problem. The candidate is responsible for all aspects of the project. The course builds on competence from all courses during the academic year.
The aim of the course is to provide candidates with the opportunity to present their preferred field in a major project. The candidates must use their acquired competence in a project with professional implementation. The candidates must demonstrate their ability to make reasonable and efficient choices though the use of technology, software and detailed documentation, in addition to communicating with professional terminology and expressions during a project.
The candidate:
- has knowledge of common concepts, theories, security models, processes and tools used to manage ICT systems.
- has knowledge of processes and tools to research and document projects.
- has insight into relevant rules and regulations, standards, agreements and quality requirements in monitoring and securing computer networks and systems.
- can update their own vocational knowledge within ICT.
The candidate:
- can apply vocational knowledge to problems related to implementing, configuring and managing different components in ICT security.
- can apply knowledge of material found in supporting choices made and reference the sources properly.
- masters tools and techniques to document a project in a professional manner.
- masters relevant tools to create and manage common services in an ICT security environment.
- can find and refer to information and material and assess its relevance to different vocational issues in ICT security.
- can study their own projects and identify issues and measures that need to be implemented for optimal solutions.
The candidate:
- understand the ethical principles that apply to the ICT security industry.
- can carry out work with installations and implementations of different security services in accordance with project specifications.
- can develop work methods, products and/or services of relevance to ICT security.
In this course, the following teaching and learning methods can be applied, but are not limited to:
- Lecture: Educator-led presentations or activities providing knowledge, skills, or general competencies in the subject area.
- Group work: Collaborative activities where students work together to solve problems or complete tasks.
- Tutoring: One-on-one or small group sessions with an instructor for personalized guidance and support.
- Student presentations: Opportunities for students to demonstrate their understanding of course material by presenting to peers.
- Online lessons: Digital content delivered via an online learning platform.
- Guidance: Individualized advice and direction from instructors to support students in their learning journey.
- Workshops: Practical sessions focused on hands-on application of theoretical concepts or skills.
- Self-study: Independent study where students engage with course material on their own without any teacher support.
Teaching materials, reading lists, and essential resources will be shared in the learning platform and software user manuals where applicable.