This IT bachelor program teaches you to secure digital systems from cyberattacks, cybercrime, and digital warfare. The program enables you to reduce digital vulnerability and work practically with IT security.
Securing our Digital Lives
We are living in a world controlled by digital systems. Smart houses contain smart meters, digital locks, and home assistants. Self-driving cars are being tested on our roads and the ‘Internet of Things’ continues to expand.
The digitalization of the world around us brings a number of challenges, not just in adapting to the amazing pace of change, but how to secure those systems that are so vital to our everyday lives. The critical infrastructure that underpins our society - power, water, food supplies, and now information all relies on some form of a digital system.
This means cybersecurity experts are needed to work across all subject domains including science, industry, and government, working to secure and protect virtual digital assets. This is the domain of the Cyber Security Specialist.
Throughout the bachelor program, students will learn the theoretical foundations required for working in this domain and the practical application of tools and techniques used to create a secure digital environment. This includes information security, Computer Network Operations, programming, and penetration testing.
August 10, 2020
The first year of the program has been designed to develop a breadth of foundation skills required by Cyber Security Specialists. During this year of study, students will develop programming, mathematical, networking, and data management skills alongside research and project management.
During the second year of study, students will further develop their network security skills and an understanding of digital systems and devices. They will also explore issues of criminality and warfare in the digital domain along with penetration testing practices and procedures.
In their final year students, will gain practical experience in exploiting vulnerabilities on digital systems and both computer network attack and computer network defense. This year also includes the opportunity to work on a related project in a dedicated laboratory.
After completing the degree, graduates will have the theoretical and practical competence required to work across a variety of industries within numerous types of organizations. Graduates will also be qualified to continue developing their expertise through further study.
Problem Based Learning and Research Methodologies
Introduction to Information Security
Professional Aspects of Computing
Introduction to Programming
Programming and Databases
Criminality and Warfare in the Digital Domain
Operating File Systems
Penetration Testing Practice and Procedure
Wireless and Mobile Devices
Information Security Management
Computer Network Attack
Vulnerabilities: Exploration and Exploitation
Computer Network Defence
Cryptography and Steganography
Further Discrete Mathematics
Pure Mathematics for Computing
Has a broad knowledge of the cyber defense and attack techniques, technologies, and tools in order to implement appropriate technical and non-technical solutions to prepare for, defend against, and recover from cyber intrusion.
Is familiar with appropriate and current procedures and standards for managing cyber risks and threats, undertaking penetration testing, and ensuring network security.
Has knowledge of the legal and ethical issues and responsibilities pertaining to cybersecurity activities with regard to the impact of the cyber intrusion on society, industry, national infrastructure, and national security.
Is familiar with current and emerging research and development in the field of Cyber Security and related disciplines.
Is able to update their knowledge in the area of cybersecurity through academic study, research, and professional development.
Is familiar with the current and developing state of cyber criminality and cyber warfare threats, vulnerabilities, and defensive tools and techniques.
Has knowledge of the history and development of cybersecurity, cybercrime, and cyber warfare, its impact on safety and security of digital environments and infrastructures, alongside the resulting effects on society.
Is familiar with various computational tools, techniques, and practices that underpin secure computing.
Is able to critically assess the threat level to a digital environment and select and apply appropriate computer system security and penetration tools and techniques in order to secure a computer network.
Can critically select and apply a range of analytical and methodological problem solving and investigative techniques including system profiling and vulnerability analysis, based on research and to be able to interpret the solutions and present results appropriately.
Is able to reflect on their own academic practice and development as a security professional, identify areas for improvement and adapt to future cybersecurity tools, techniques, technology, and threats.
Is able to find, distill, and evaluate relevant academic, commercial and non-commercial information assets then apply this information in resolving digital security problems.
Is able to identify stakeholders of cybersecurity and defense-related issues and communicate, network, and collaborate with these stakeholders according to their individual requirements.
Can apply mathematical and software development theories, tools, and techniques to computational challenges.
Is able to identify and appropriately act on complex ethical and social issues arising within the academic and professional practice as a cybersecurity professional, whilst being aware of the greater implications of their actions and decisions.
Is able to plan, execute and manage a variety of activities and cybersecurity-related projects over time, alone or as part of a collaborative team to a successful conclusion and in accordance with relevant legal and ethical requirements and principles.
Can distill and communicate cybersecurity-related theories, concepts, problems, and solutions, with a variety of relevant stakeholders, through the selection and application of appropriate methods of communication.
Can exchange opinions, experiences, and ideas with others with background and/or experience in cybersecurity and defense, through the selection and application of appropriate methods of communication, thereby contributing to the development of good practice within the cybersecurity community of practice.
Is familiar with, and can critically evaluate, current and evolving processes and disruptive technologies within the field of cybersecurity.
Is able to identify appropriate stakeholders and communicate, network, and collaborate with these stakeholders at an appropriate level while considering security and confidentiality.
Is able to engage in critical self-reflection, and reflect upon relevant ethical and professional issues, as part of the lifelong learning strategy required of cybersecurity professionals.
The expertise and skills of this bachelor program are sought after as cybersecurity issues continue to become increasingly significant across all sectors. This has been driven over recent years by the development and adoption of new technology in the race to exploit the digitalization of commercial and domestic products and systems.
According to Abelia, there is a worrying deficit of people with strong technical skills in Norway. The distance between needs and available expertise ranges from 24 to 113 percent. The best-case scenario suggests that by 2030, one in four ICT positions will be vacant.
A recent Capgemini study predicts the shortfall of cybersecurity specialists will increase to 3.5 million by 2021.
Most large businesses that rely on information technology have the need for people with expertise in cybersecurity to secure their digital assets. This bachelor's degree provides a unique qualification for handling challenges across a variety of organizations and industry sectors.
Students who wish for further training in the area of Cyber Security can apply for Master's level studies related to computing, Cyber Security or Network Security at a variety of higher education institutions both within Norway and internationally. Graduates who wish to pursue doctoral-level studies would then be able to apply for such study opportunities in Norway or beyond.