Information Security

Course typeExchange
Course sectorIT
Course duration5 months
ECTS30
SemesterFall and Spring 2018-2019
LocationEnschede
For partners ofSchool of Creative Technology

An organization’s data is its lifeblood, now more than ever. Likewise, protecting the availability, confidentiality and integrity of those data is more important than ever.
On the other hand, attacks against the availability, confidentiality and integrity are getting more and more sophisticated and ubiquitous. Cyber criminals are no longer solitary hackers, they are well organized and well-funded.


This means information security is getting more complex. Professional information security requires both organizational policies, checks and balances and technical measures. A professional security specialist should know about policies, standards, laws and regulations, and of course should have a solid knowledge of security technologies.

In this exchange programme you will learn about the ins and outs of information security.

The exchange programme Information Security focuses on the following competences:

  • Development of knowledge of information security standards and best practices
  • Formulating information security policies and information security plans conforming to the current standards
  • Designing and implementing technical IT security measures that realize the information security plan
  • Testing the effectiveness of technical  IT security measures.

The programme  consists of 3 theoretical units (15 ECTS total) and a project of 15 ECTS:

  • Information security (5 ECTS) : Quartile 1
  • Infrastructure Security (5 ECTS) : Quartile 1
  • Operational Security (5 ECTS) : Quartile 2
  • Integral Project (15 ECTS) : Quartile 1 and 2

The first 10 weeks you will get practical and theoretical course units on:

  • Information security overview
  • Information security policies and plans
  • Standards in information security
  • Risk analysis
  • Audits
  • Theory of security technologies:
    o VLANs
    o Firewalls
    o VPN
    o Honeypots, intrusion detection and intrusion prevention
    o Cryptography
    o And others

You will also do the first part of your project:

  • Formulating a project plan
  • Researching security best practices
  • Risk analysis of the provided case

The student will take a written exam for the module Information Security, a written exam for the module Infrastructure Security and will take an assessment for the first part of the project (project plan and research)

The last 10 weeks you will continue getting practical and theoretical course units on:

  • Theory and practice of penetration testing
  • Maintaining a secure infrastructure
    o PDCA cycle
    o IT Forensics
    o Recovery
    o SIEM

You will also finish your project

  • Formulate a security plan
  • Design technical security measures
  • Realize a proof of concept
  • Testing the security measures

You will take a written exam on the theory of security technologies, including penetration testing and 2 assessments concerning your project:

  • Risk analysis and security plan (1st assessment)
  • Technical design, realization and testing (2nd assessment)
  • The student will also write a report on the legal and ethical ramifications of information security.

 

This exchange programme is meant for Erasmus IT students of partner schools of HBO-IT with at least two and a half years of IT education in IT Service Management, Business IT or Software Engineering.  Experience with and intermediate level knowledge of networking technologies is required.

Deadline to enrol for the fall semester 2018 is  1st of May.  Deadline to enrol for the spring semester 2019 is October 15th 2018. If housing is required, enrol two weeks earlier.

For more information about  the ‘Information Security’ exchange programme please contact Margriet de Vos, E: m.j.f.devos@saxion.nl

The ever increasing need for security professionals guarantees plenty of job opportunities. This program will give the student a solid basis on which a career as IT security professional can be built. There is no end of the race between cyber criminals and security professionals in sight, so the long term career prospects are excellent.