Expected learning outcomes
- The candidate possess knowledge on both societal and technological aspects of cyerdomain
- The candidate possess advanced knowledge of how to control the cyber domain
- The candidate possess basic knowledge of areas of information management, network centric business and information/cyber warfare
- The candidate possess advanced knowledge of cyber tactics
- The candidate possess advanced knowledge of the role of cyber security teams (CSIRT, SOC)
- The candidate possess advanced knowledge of cyber warfare defensive techniques.
- The candidate is capable of understanding the societal, organizational and technical aspects of cyber domain
- The candidate is able to understand the importance of and the role of information management, network centric business and information/cyber warfare
- The candidate is capable of applying advanced cyber tactics
- The candidate is able to lead and operate a cyber security team (CSIRT, SOC)
- The candidate apply advanced cyber warfare defensive techniques
- The candidate is capable of analyzing relevant professional and research problems in the field of cyber warfare and tactics
- The candidate is capable of applying their knowledge and skills in new fields, in order to accomplish advanced task and projects
- The candidate is capable of leading and running a cyber security team, such as a CSIRT or SOC.
- The candidate is capable of discussing professional problems, analysis and conclusions in the field of cyber warfare, defence and tactics, both with professionals and with general audience
- The candidate has the learning skills to continue acquiring new knowledge and skills in a largely self-directed manner
- The candidate is capable of contributing to innovation and innovation processes
- Cyber domain, social and technological aspects
- Controlling the Cyber Domain
- Introduction to Information Management
- Introduction to Network Centric Business
- Introduction to Information/cyber Warfare
- Cyber tactics
- The role of cyber security teams (CSIRT, SOC,)
- Cyber warfare defences
Net Support Learning
Teaching Methods (additional text)
The course will be made accessible for both campus and remote students. Students are free to choose the pedagogic arrangement that is best fitted for their own requirement. The lectures in the course will be given on campus and are recorded.
Form(s) of Assessment
Written exam, 3 hours
Evaluation of Project(s)
Form(s) of Assessment (additional text)
An overall evaluation based on 100 point scale, where project work counts 40 points, oral presentation counts 20 points, and final, written exam (3 hours) counts 40 points. Conversion from 100 point scale to A-F scale according to recommended conversion table.In specificcircumstances, the course responsible can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale.
Alphabetical Scale, A(best) – F (fail)
Evaluated by internal examiner, external examiner is used periodically (every four years)
For the final, written exam: Ordinary re-sit exam in August.
Announced fall 2017
Books/standards, conference/journal papers and web resources, such as
- A.Jones, G.L.Kovacich, P. G. Luzwick: Global Information Warfare: How businesses, Governments and others achieve objectives and attain competitive advantages.
- C.Zimmermann: 10 Strategies for a World Class Cybersecurity Operations Center, Mitre
- Selection of articles, to be announces at startup
First time Spring 2018