Course - Applied cyber- and information security - IIK6521
IIK6521 - Applied cyber- and information security
About
Lessons are not given in the academic year 2024/2025
Course content
The course IIK6521 in Applied cyber- and information security for Teachers is divided into 5 themes/modules as following:
Module 1: Introduction to cybersecurity,
Digitization, trends and the need for cyber security in the future workforce.
Module 2: Cyber threats and social manipulation
Module 3: Digital safety culture
Module 4: Introduction to modern cryptography and encryption analysis
Module 5: Information security, ethical hacking and digital judgment
Each module consists of lectures, group assignments, exercises, and exchange of experience.
- The course participant will learn about the basic principles of cyber security and how to respond to these threats and teach students to be cyber secure.
- Develop a training package for teachers to increase awareness of Cyber-security inspired by the American GenCyber program.
Learning outcome
In this course, the participant will learn about the need for cyber and information security in the future workforce, get more insight into digital security culture, and using various encryption and decryption techniques. This course delves more in depth (compared to IIK6520) into the management of robots, using Raspberry PI, Micro:bit, Lego Mindstorm, and explains various hacking methods to promote digital judgment. This course will demonstrate with practical examples the ability to reflect in order to avoid unwanted incidents online and in social media, and how they can use a variety of security initiatives when it comes to protection to alleviate these problems.
Knowledge
- explain the basic principles and best practices for responding to cybersecurity incidents.
- explain simple attack methodology and suspicious attempts at connection to gain unauthorized access to a computer and its resources.
- discuss the impact of digitization on individuals - organization and society
- describe the necessity of an interdisciplinary approach to cybersecurity and privacy in schools
- discuss the human factor in cyber security with emphasis on ethics, vulnerabilities with social manipulation and training and how it affects students.
- discuss cyber defense and attack techniques, technologies and tools to explain appropriate solutions to be able to prepare for, defend against cyber intrusion.
- explain the importance of information and technology and how they change modern society.
- describe various tools that protect data and websites. These include strong passwords, biometrics, two-factor authentication and firewalls.
Skills
- demonstrate the ability to solve simple problems in cyber and information security by proposing solutions.
- learn different types of cyberattacks, and how these can be protected from or reduced.
- share best practices in the use of social media and pass on to their students.
- expand their field of knowledge in cybersecurity that is relevant in schools in line with new curricula.
General competence
- plan and implement a cybersecurity week in basic cybersecurity in cooperation with students and colleagues.
- describe typical threats to modern digital systems, and outline techniques of resistance to them.
- reflect and teach how attackers gain unauthorized access to systems and data.
Learning methods and activities
The teaching is based and emphasis is placed on task solving both individually and in groups. Mandatory submissions of work requirements along the way. This program is divided into 5 digital modules based on the curriculum consisting of textbooks and online resources. Real-time online attendance through Webconference in Blackboard (LMS).
In teaching we will use various digital tools such as Sphero, drones, as well as various encryption techniques. The principle is from simple drawing programming to more block-based programming tools where insights into Python are used as a programming language.
Further on evaluation
Portefolio
Details see Norw.
Specific conditions
Admission to a programme of study is required:
- (IEIIKEVUH)
Recommended previous knowledge
The course build upon IIK6520. For more details see Norw version.
Required previous knowledge
Admission requirements
- Approved teacher education and employed in schools during the study period.
Course materials
The participant must dispose their own computer.
Håkon Bergsjø, Ronny Windvik, Lasse Øverlier: Digital sikkerhet en innføring. Universitetsforlaget 2020, EAN nummer: 9788 215 034255/ISBN 978-82-15-03422-5
Version: 1
Credits:
7.5 SP
Study level: Further education, higher degree level
No
Language of instruction: Norwegian
Location: Gjøvik
- Information Security
Department with academic responsibility
Department of Information Security and Communication Technology
Department with administrative responsibility
Section for quality in education and learning environment
Examination
- * The location (room) for a written examination is published 3 days before examination date. If more than one room is listed, you will find your room at Studentweb.
For more information regarding registration for examination and examination procedures, see "Innsida - Exams"