Antingen stödjer din webbläsare inte javascript, eller är javascript inaktiverat. Denna webbplats fungerar bäst om du aktiverar javascript.

Fem studenter som pratar med varandra inne på campus. Foto.

In this course, a number of tools and methods to improve cyber security are studied. Some of the methods are preventive and used to improve protection, and some are reactive and are used to handle suspected attacks.

Preventive methods are ethical hacking and penetration testing. Ethical hacking uses methods like vulnerability research, threat analysis, and vulnerability reporting. The market for vulnerabilities is also discussed. Penetration testing uses methods like reconnaissance, scanning for vulnerabilities, exploitation of vulnerabilities, and credentials cracking.

Reactive methods are log handling, IT incident handling, and IT forensics. Subjects in log handling are secure logging and log analysis. Subjects in IT incident handling are the different phases of incident handling, preparation, identification, containment, eradication, and recovery. Subjects in IT forensics are acquisition and preservation of digital evidence.

FACTS


CYCLE

Second cycle

ENTRY REQUIREMENTS

General entry requirements and approved result from the following course/courses: PFC600-Principles of cybersecurity or the equivalent.

PACE OF STUDY

Part-time

TYPE OF INSTRUCTION

On Campus

PROGRAMME/COURSE DATE


SPRING 2027

SPRING 2027

TEACHING HOURS

Daytime

APPLICATION DEADLINE

15 October 2026

APPLICATION CODE

HV-E3257

START/END

From v.13 2027 to v.22 2027

Do you need help?

Entry requirements, selection, admission, study counselling and other questions

Contact Servicecenter