Status message

The course description for the semester you wanted is not published yet. Showing you instead the latest version available.

FI2BEIS25 Information Security

FI2BEIS25 Information Security

  • Course description
    • Course code
      FI2BEIS25
    • Level of study
      5.2
    • Program of study
      Back-End Development 2
    • Credits
      2.5
    • Course coordinator
      Frederick Johannes Botha, Joshua Wiggill
Teaching term(s)
2025 Spring
Authors
Joshua Wiggill
About the Course

This course provides candidates insight into the concepts, risks and regulations of information security. An overview of the various aspects of information security that concern Back-end development, together with an explanation of common risks and how to prevent them from being exploited, is provided. Privacy regulations, such as GDPR, are also covered in terms of their impact on secure and ethical Back-end solutions. 

Information is a precious resource which needs to be protected effectively for strategic, ethical and regulatory reasons. There are considerable security risks involved in the building of software projects which need to be understood in order to prevent breaches. Candidates will have the relevant knowledge to practice due diligence against potential security threats. 

Course Learning Outcomes
Learning outcomes - Knowledge

The candidate: 

  • has knowledge of the concepts and principles of information security 
  • has knowledge of the regulations, such as GDPR, governing data privacy 
  • has knowledge of the common security risks associated with Back-end applications 
  • is familiar with the importance of information security, GDPR and governing data privacy in the field of software and Back-end development 
Learning outcomes - Skills

The candidate: 

  • can find and refer to information related to security-oriented project topics 
  • can reflect on own technical practices as a Back-end developer in terms of potential security risks and adjust it under supervision 
  • can find and refer to GDPR regulations and assess its relevance to a vocational software development project 
General Competence

The candidate: 

  • can exchange points of view with others with a background in the trade/discipline and participate in discussions about compliance to information security concepts, best practices, and regulations 
  • can contribute to implementing the best practices for data governing in software development projects 
Teaching and Learning

In this course, the following teaching and learning methods can be applied, but are not limited to:

  • Lecture: Educator-led presentations or activities providing knowledge, skills, or general competencies in the subject area.
  • Group work: Collaborative activities where students work together to solve problems or complete tasks.
  • Tutoring: One-on-one or small group sessions with an instructor for personalized guidance and support.
  • Student presentations: Opportunities for students to demonstrate their understanding of course material by presenting to peers.
  • Online lessons: Digital content delivered via an online learning platform.
  • Guidance: Individualized advice and direction from instructors to support students in their learning journey.
  • Workshops: Practical sessions focused on hands-on application of theoretical concepts or skills.
  • Self-study: Independent study where students engage with course material on their own without any teacher support.
Reading list

Teaching materials, reading lists, and essential resources will be shared in the learning platform and software user manuals where applicable.

Assessments
Form of assessmentGrading scaleGroupingDuration of assessment
Course Assignment
Pass / Fail
Individual
1 Week(s)