Introduction to Cyber and Information Security Technology
Study plans 2016-2017 - IMT4113 - 7.5 ECTS

Expected learning outcomes


  • The candidate will have a thorough knowledge in the core concepts of cyber and information security technologies
  • The candidate possesses thorough knowledge in the primitives of cryptology
  • The candidate possesses knowledge about theory and scientific methods relevant to cryptology
  • The candidate possesses basic knowledge in the theory and application of network security
  • The candidate has thorough knowledge in the theory and methods in authentication and identification as well as general access control mechanisms
  • The candidate will possess knowledge in the area of vulnerabilities and attack mechanisms and methods against cyber and information security systems
  • The candidate possesses basic knowledge about integrated system security


  • The candidate is capable of finding and performing critical analysis of various literature sources and applying them in structuring and formulating scientific reasoning in any of the topics of this course
  • The candidate is capable of analyzing existing theories, methods, and interpretations in any of the fields in this course, and work independently on solving theoretical and practical problems.
  • The candidate can plan and conduct a limited guided research exercise based on primary literature

General competence:

  • The candidate is capable of independent working and are familiar with core concepts and problems in the area of cyber and information security technology
  • The candidate is capable of discussing issues in the field of cyber and information security technology with specialists, decision makers and a general audience
  • The candidate is capable to translate the concepts and ideas of cyber and information security technology to other fields, both inside and outside of general information security
  • The candidate is able to identify advanced information security technology related problems and to contribute with approaches to solve these


  • Bases of Crypto
  • Bases of Network Security
  • Authentication and Identification
  • Access Control Models
  • Attack / Defend Scenarios
  • Bases of Integrated System Security

Teaching Methods

Mandatory assignments

Teaching Methods (additional text)

The course will be made accessible for both campus and remote students. Every student is free to choose the pedagogic arrangement form that is best fitted for her/his own requirement. The lectures in the course will be given on campus and are open for both categories of students. All the lectures will also be available on Internet through the university’s learning management system.

Form(s) of Assessment

Portfolio Assessment

Form(s) of Assessment (additional text)

The overall grade is based on a grade for a final, written exam (3 hrs) as well as a grade for mandatory exercises.

The final, written exam will count for 60% while the exercises count for 40% of the final grade.

Both parts will be graded on a 0-100 scale and must be passed with at least 40 out of 100 points in order to pass the course. The final grade is the weighted average of the part scores and the 0-100 scale score of the final grade will be converted to the A-F scale according to recommended conversion table. In specific circumstances, can the course responsible slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale.

Grading Scale

Alphabetical Scale, A(best) – F (fail)

External/internal examiner

Evaluated by internal examiner, external examiner is used periodically every fifth year, first time fall 2018.

Re-sit examination

Re-sit only possible the next time the course is running.

Tillatte hjelpemidler

Code D: No printed or hand-written support material is allowed. A specific basic calculator is allowed.
Read more about permitted examination aids.

Teaching Materials

Books/standards, conference/journal papers and web resources, such as:

  • W. Stallings & L. Brown: "Computer Security - Principles and practice", 3. edition (Global edition): Picture of cover page attached (ISBN-10:1-292-06617-2, ISBN-13: 978-1-292-06617-2)
  • A. Menezes: “Handbook of Applied Cryptography”,
  • D. Gollmann: “Computer Security”, 3rd edition Wiley, 2011
  • M. Bishop: ”Computer Security: Art and Science”. Addison-Wesley, 2003
  • R. Anderson: “Security Engineering: A Guide to Building Dependable Distributed Systems (2nd edition)”, John Wiley & Sons, 2008

Other recommended reading material will be made available to the students during the course.

Replacement course for

IMT4561 Applied information security