IT Security
- Degree
Exchange
- Start date
September
- Location
Enschede
- Duration
5 Months
An organization’s data is its lifeblood, now more than ever. Likewise, protecting the availability, confidentiality, and integrity of this data is more important than ever. On the other hand, attacks against the availability, confidentiality, and integrity are getting more and more sophisticated and ubiquitous. Cyber criminals are no longer solitary hackers; instead, they are members of well-organized, well-funded groups. So it is important to have the right skills and knowledge to secure your organization’s data!
Cyber security
Professional information security requires both organization policies and technical measures. In this exchange program, we are focusing on the technical aspects of cyber security.
Being a specialist
You will acquire in-depth knowledge of cyber security technologies and learn how to use this knowledge to defend a company’s IT infrastructure against cyber attacks.
Starters Information
What you need to know before you start your education.
Apply now
If you would like to apply for this exchange programme, please click on the button below.
Apply now Application deadlinesQuestions?
Course competences
- Designing and implementing technical IT security measures that implement an information security plan.
- Testing and monitoring the effectiveness of these technical measures.
- Supporting a development team so that newly developed software is inherently as secure as possible.
Course content (30 ECTS)
The exchange program IT Security consists of 3 courses and 1 project.
- During the course T.50475 Infrastructure Security (5 ECTS) you will design and partially implement technical IT security measures in a virtual network environment based on a case study.
- During the course T.50477 Operational Security (5 ECTS) you will learn how to test the effectiveness of technical IT security measures. Furthermore, you will learn how to monitor and analyze network data so you can act properly on security breaches. This means that you will build a SIEM monitoring system, and you will practice and understand hacking skills.
- During the course L.30629 DevOps Security (5 ECTS) you will learn what best practices for IT security exist in all phases of the DevOps cycle for containerized software development, how to apply them, and how to harden container host operating systems that will run the containerized application.
During the project T.50478 Project IT Security you will be working on on a case for a real client. The contents of the project results will vary, since the project assignments will cover different parts of the security cycle. Possible project results include:
- Incident response report
- Incident response plan
- Secured infrastructure design and proof-of-concept
- Advisory report based on the assignment
- DevOps security advisory report
- Combinations of the above