Official course description, subject to change:
Preliminary info last published 18/06-19

Applied information Security

Course info
Language:
English
ECTS points:
7.5
Course code:
KSAPINS1KU
Offered to guest students:
yes
Offered as a single subject:
yes
Price (single subject):
10625 DKK (incl. vat)
Programme
Level:
MSc. Master
Programme:
Master of Science in Information Technology (Software Design)
Staff
Course semester
Semester
Efterår 2020
Start
24 August 2020
End
31 January 2021
Abbreviation
20202
Exam
Abstract

This is a hands-on course that teaches the basic principles of computer security. You will get in-depth experience with cyberattacks, and how to prevent them. The course projects enable you to personalize the course to match your unique background.

Description

In this course, you learn how to determine security requirements, and how to identify risks to these requirements. You get hands-on experience with concrete cyberattacks that realize these risks. You learn how to audit a system to determine that an attack has taken place. Most importantly, you get experience with many methods and tools that prevent cyberattacks, including cryptography, authentication, authorization, and isolation. Finally, you learn how to design a user experience such that users can conform to security requirements.

The projects in this course give you the opportunity to immerse yourself in your choice of the many disciplines that underpin computer security, including social sciences, computer systems, programming languages, and mathematics. 

This course provides a window into the activities of security analysts, penetration testers, forensic analysts, security architects, and security engineers. This course can thus function as a starting point for pursuing such careers.

Ultimately, the goal is to enable you to make appropriate security-related decisions. The course does so by teaching you how to think clearly about security, by focusing on basic principles.

Intended learning outcomes

After the course, the student should be able to:

  • Determine security requirements for a system, and analyze a system for security risks
  • Identify, list, and explain standard cyberattacks on systems.
  • Identify, list, and discuss major principles of computer security.
  • Identify, list, and explain Lampson’s “gold standard” mechanisms for computer security (authentication, authorization, audit).
  • Identify, explain, and apply isolation in computer security.
  • Identify, explain, and apply cryptography in computer security.
  • Describe basic computer forensics techniques.
  • Design and discuss usability in computer security.
Ordinary exam
Exam type:
D: Submission of written work with following oral, external (7-trinsskala)
Exam variation:
D2G: Submission of written work for groups with following oral exam supplemented by the work submitted. The group has a shared responsibility for the content of the report.
Exam description:

Mixed 2

The submission documents a project that you do in a group. The topic of the project can be tailored to your unique background.

Duration: 30 minutes per student including assessment and feedback.

The exam consists of a short group-presentation of the project, followed by a 20-minute individual oral exam. The topic of the oral exam is the whole syllabus, supplemented by your project submission.

Group size: 1-4 (2-3 is recommended)