Academic year
2024-25
Is found in:
- Associate Degree of System and Network Administration, programme stage 1
This is a single course unit.
Study load:
3 credits
It is not possible to enrol in this course unit under
- credit contract.
- exam contract (to obtain a credit).
- exam contract (to obtain a degree).
Co-ordinator: de Magtige Ernie
Other teaching staff: Rosseau Marc, Vermonden David
Languages: Dutch
Scheduled for: Semester 2
This course unit is marked out of 20 (rounded to an integer).
Prerequisites
There are no prerequisites for this course.
Re-sit exam: is possible.
Possibility of tolerance: This course unit is eligible for tolerance according to the criteria as determined by the degree programme you are enrolled in.
Total study time: 78,00 hours
Learning outcomes (list)
You configure and manage network components and services to work together correctly, taking into account the impact of changes.
The student investigates certificates and certification authorities in secure connections.
|
You recognise security risks within the network environment and act correctly and deontologically to address them to stakeholders and mitigate them.
The student explains how identity providers can be attacked.
|
The student uses available end-point security tools correctly according to a given scenario.
|
The student researches and evaluates end-point security and draws decisions.
|
You inform, advise and support the organisation or its users regarding the correct and safe use of the network environment.
The student explains the techniques by which end users can be redirected to phishing sites.
|
The student understands the most common cryptographic applications. He explains the terms symmetric, asymmetric encryption, hashing and random numbers.
|
The student applies applicable guidelines for the proper use of passwords.
|
The student explains segmentation and trust domains.
|
The student explains the terms Risk, Threat, Vulnerability, Malware, Red team, Blue team, Purple team, Penetration Tester.
|
The student will research and describe the impact of the dangers of unsecured network components.
|
The student describes what the terms Role-based Access Control (RBAC), Access Control Lists (ACL) and Multi-factor Authentication (MFA) stand for.
|
The student explains the difference between authentication, authorisation, confidentiality and integrity.
|
You apply the standards, best practices and applicable procedures within an organisation regarding installation, configuration, automation, management and security.
The student frames various firewalling mechanisms in the OSI model.
|
You adopt a deontological attitude and apply the standards and applicable procedures within an organisation regarding privacy and information security.
The student uses the security frameworks DREAD, STRIDE and OSINT.
|
The student understands who does what in a security organization and explains the terms Chief Information Security Officer (CISO), Security Operation Center (SOC) team, Risk team, Protect and Prevent team.
|
The student explains what information security entails.
|
Study material (list)
Online Learning material on DigitapMandatory
Study guideMandatoryEducational organisation (list)
Evaluation (list)
Evaluation(s) for first exam chance
Moment | Form | % | Remark |
1st examination period | Knowledge and comprehension test during the examination series | 35,00 | Mondeling.
|
1st examination period | Knowledge and comprehension test once during class weeks | 15,00 | Digitaal. Georganiseerd tijdens de toetsweek.
|
1st examination period | Project assignment | 35,00 | Digitaal en mondeling. |
Evaluation(s) for re-sit exam
Moment | Form | % | Remark |
2nd examination period | Knowledge and comprehension test during the examination series | 50,00 | Mondeling. |
2nd examination period | Project assignment | 35,00 | Digitaal en mondeling. |
Evaluation(s) for both exam chances, not reproducible in re-sit exam
Moment | Form | % | Remark |
1st examination period | Skills assessment permanently during class weeks (Permanent evaluation) | 15,00 | |