Master of Science in Information Security - MIS

Innledning

Information technology permeates all aspects of society and has become critical to industry, government, and individual well-being. Securing these vital services and structures and the availability of trustworthy information whenever and wherever it is required has become both an area of intensive research and also of burgeoning commercial activity. A master of science in information security will provide the students with the knowledge and theoretical background as well as with the requisite skills and attitudes to succeed in this challenging yet eminently rewarding field.

Go to course table 

Studiets varighet, omfang og nivå

This is a two-year master program (120 ECTS credits) which is also available part-time over three or four years. The degree awarded upon completion is “Master of Science in Information Security”.

The program has three tracks: management , technology  and digital forensics . Students have to choose which track they pursue when entering the program (see the course structure below).

The program qualifies the students to proceed to Ph.D. studies.

Forventet læringsutbytte

Knowledge

  • The candidate possesses advanced knowledge in the field of information security in general and the following particular topics: computer and network security, security management, incident response, security of critical information infrastructure and legal aspects of information security. The candidate possesses special insight and expertise in information security technology, digital forensics or security management, depending on the chosen program track.
  • The candidate possesses thorough knowledge of academic theory and methods in the field of information security.
  • The candidate is capable of applying knowledge in new areas within the field of information security.
  • The candidate is familiar with current state-of-the-art in the field of information security.
  • The candidate possesses thorough knowledge of scientific methodology, needed to plan and carry out research and development projects in the field of information security.

Skills

  • The candidate is capable of analyzing existing theories, methods and interpretations of theories within the field of information security as well as solving theoretical and practical problems independently.
  • The candidate is capable of using independently relevant methods in research and development in the field of information security. These methods include literature study, logical reasoning and performing scientific experiments together with interpreting their results.
  • The candidate is capable of performing critical analysis of different information sources and applying the results of that analysis in academic reasoning and structuring and formulating scientific problems.
  • The candidate is capable of completing an independent research and development project of moderate size under supervision (example: the master thesis), adhering to the current code of ethics in scientific research.
  • The candidate is capable of carrying out a plan of a research project under supervision.

General competence

  • The candidate is capable of analyzing academic, professional and research problems.
  • The candidate is capable of using knowledge and skills to carry out advanced tasks and projects.
  • The candidate is capable of imparting comprehensive independent work in the field of information security. The candidate also mastered the terminology in the field of information security.
  • The candidate is capable of communicating academic issues, analysis and conclusions both with experts in the field of information security and with the general audience.
  • The candidate is capable of contributing to innovation and innovation processes.

Internasjonalisering

The students are allowed to travel abroad to do their master theses. The information security group has strong links to many of the leading international academic groups within the field, and the students are encouraged to contact their instructors in the course «Research project planning» to ask for relevant travel opportunities.

Målgruppe

There are three focus groups for this study program:

  1. Undergraduate students entering the program as a continuation of their bachelor degree without any prior work experience.
  2. Industry students (or students in the private/public sector in general) looking for a full-time or part-time master program, which is flexible and can be adapted to their employers' needs and their own individual needs.
  3. International students: full-time, part-time or exchange students arriving for single semesters only.

Opptakskrav og rangering

To qualify for admission, an applicant must have a bachelor degree in computer science or a related subject. The applicant must document that he/she has at least  9 ECTS credits in mathematics/statistics and at least 60 ECTS credits in computer science subjects at the bachelor level. A grade point average (GPA) of C is required. It is expected that within the credits mentioned above the following topics have been covered:

  •  Structural and object-oriented programming
  •  Algorithms and data structures
  •  Databases and XML
  •  Software engineering
  •  Computer networks (Data communication)
  •  Operating systems and computer architecture

Students who have not had a dedicated course in each of these topics need to be prepared for some extra studying when entering topics that require background knowledge, with which they are not sufficiently familiar beforehand.

Graduate studies in information security require a somewhat different mathematical platform than the one included in most bachelor studies. To master the theoretical topics included in the master program we therefore recommend that the students attend the preparatory courses in number theory and theoretical computer science offered during the first weeks of the fall semester.

Studiets innhold, oppbygging og sammensetning

The program is offered in a flexible manner to fit well to all the three target groups of students. In general, on-campus presence is required  only three times per semester (1-3 days each time), for a start-up session, for mid-term exams/presentations (and a start-up session of the second part of the semester) and for final exams/presentations. Attendance is also strongly recommended for the initial first two weeks of the program when two preparatory intense short-courses in number theory and theoretical computer science are offered . All courses are available online, but there will also be sessions on a regular weekly or bi-weekly schedule. The presence on these sessions is not required.

More details for the upcoming year of study will be given here: 

The program has three tracks (paths of study): management, technology and digital forensics. Students have to choose which track they pursue when entering the program. Common to all three tracks are the courses covering the core topics in both information security technology, forensics and management: introduction to cryptology, applied information security, network security, IT governance, information society and security, and legal aspects of information security. In addition, each track has a set of specific courses. Elective courses are freely chosen from the common pool of electives. The students have to choose their master thesis topics within their chosen tracks.

Ordinary mandatory courses from other tracks of the program and courses from the master program in media technology and the CIMET (Color in Informatics and Media Technology) master may be included as electives. Students can also use up to 20 ECTS of the courses at the 3000 level  as a part of their master program. Some of the courses listed above can also be flexible regarding time, space and teaching format upon request by the students (typically, a course may be taken in a different semester through self-study and under individual or group supervision).

Master-level courses from other institutions may be included as electives or may substitute mandatory courses at the discretion of the program director.

The course structure for the part-time students may be composed individually as long the track-specific requirements mentioned above and any course inter-dependencies are respected. The most important course inter-dependencies are the following: 1. Students should start working on their master theses in the semester following the research project planning course, 2. All previous coursework has to be completed before starting work on the master thesis (an exception of 10 missing credits may be tolerated at the discretion of the director of the study program, but only if the missing credits are not relevant for the topic of the master thesis).

 Study methods  

 Lectures
 Exercises
 Project work
 Essay/Article writing
 Independent study
 Group exercises
 Lab exercises

Tekniske forutsetninger

The students who choose to participate in the study program as distance students, need a relatively new computer and a broadband Internet connection. Software that is needed is mostly freely available on the Internet. In some courses commercial products, such as MatLab, are required.

As for the practical computer skills, it is expected that the students are capable of using any common operating system (GNU/Linux, Microsoft Windows, MacOS or Solaris) both with a graphical user interface and a command line interface.

The students who have not had a dedicated course on each of these topics should not worry. They just need to be prepared for a little bit of extra studying when entering topics that require background knowledge, with which they are not sufficiently familiar beforehand.

Graduate studies in information security require a somewhat different mathematical platform than the one included in most bachelor studies. To master the theoretical topics included in the master program we therefore recommend that the students attend the preparatory courses in number theory and theoretical computer science offered during the first two weeks of the fall semester.

Emnetabeller

Master of Science in Information Security 2011-2013 Technology full-time track

Emnekode Emnets navn O/V *) Studiepoeng pr. semester
  S1(H) S2(V) S3(H) S4(V)
IMT4421 Vitenskapelige metoder O 5      
IMT4541 Foundations of Information Security O 5      
IMT4532 Cryptology 1 O 5      
IMT4552 Cryptology 2 O 5      
IMT4571 IT Governance O 5      
IMT4561 Applied Information Security O 5      
IMT4591 Rettslige aspekter ved informasjonssikkerhet O   5    
IMT4581 Nettverkssikkerhet O   10    
IMT4481 Information Society and Security O   5    
Valgemne, 5 st.p. V   5    
Valgemne, 5 st.p. V   5    
IMT4601 Research Project Planning O     5  
Valgemne, 5 st.p. V     5  
Valgemne, 5 st.p. V     5  
Valgemne, 5 st.p. V     5  
Valgemne, 5 st.p. V     5  
Valgemne, 5 st.p. V     5  
IMT4904 Master Thesis O       30
Sum: 30 30 30 30
*) O - Obligatorisk emne, V - Valgbare emne

Master of Science in Information Security 2011-2013 Digital Forensics full-time track

Emnekode Emnets navn O/V *) Studiepoeng pr. semester
  S1(H) S2(V) S3(H) S4(V)
IMT4421 Vitenskapelige metoder O 5      
IMT4012 Digital Forensics I O 5      
IMT4532 Cryptology 1 O 5      
IMT4571 IT Governance O 5      
IMT4561 Applied Information Security O 5      
IMT4022 Digital Forensics II O   10    
IMT4581 Nettverkssikkerhet O   10    
IMT4641 Computational Forensics O   5    
IMT4612 Machine Learning and Pattern Recognition I O   5    
IMT4591 Rettslige aspekter ved informasjonssikkerhet O   5    
IMT4601 Research Project Planning O     5  
Valgemne, 5 st.p. V     5  
Valgemne, 5 st.p. V     5  
Valgemne, 5 st.p. V     5  
Valgemne, 5 st.p. V     5  
Valgemne, 5 st.p. V     5  
IMT4904 Master Thesis O       30
Sum: 25 35 30 30
*) O - Obligatorisk emne, V - Valgbare emne

Master of Science in Information Security 2011-2013 Management full-time track

Emnekode Emnets navn O/V *) Studiepoeng pr. semester
  S1(H) S2(V) S3(H) S4(V)
IMT4651 Security as Continuous Improvement O 5      
IMT4661 Security Management Dynamics O 5      
IMT4421 Vitenskapelige metoder O 5      
IMT4561 Applied Information Security O 5      
IMT4532 Cryptology 1 O 5      
IMT4571 IT Governance O 5      
IMT4591 Rettslige aspekter ved informasjonssikkerhet O   5    
IMT4841 Sikkerhetsplanlegging og hendelseshåndtering O   10    
IMT4581 Nettverkssikkerhet O   10    
IMT4481 Information Society and Security O   5    
IMT4601 Research Project Planning O     5  
Valgemne, 5 st.p. V     5  
Valgemne, 5 st.p. V     5  
Valgemne, 5 st.p. V     5  
Valgemne, 5 st.p. V     5  
Valgemne, 5 st.p. V     5  
IMT4904 Master Thesis O       30
Sum: 30 30 30 30
*) O - Obligatorisk emne, V - Valgbare emne

Master of Science in Information Security 2011-2014 Technology part-time track (three years)

Emnekode Emnets navn O/V *) Studiepoeng pr. semester
  S1(H) S2(V) S3(H) S4(V) S5(H) S6(V)
IMT4532 Cryptology 1 O 5          
IMT4552 Cryptology 2 O 5          
IMT4421 Vitenskapelige metoder O 5          
IMT4571 IT Governance O 5          
IMT4591 Rettslige aspekter ved informasjonssikkerhet O   5        
IMT4481 Information Society and Security O   5        
IMT4581 Nettverkssikkerhet O   10        
IMT4601 Research Project Planning O     5      
IMT4541 Foundations of Information Security O     5      
IMT4561 Applied Information Security O     5      
Valgemne, 5 st.p. V     5      
Valgemne, 5 st.p. V       5    
Valgemne, 5 st.p. V       5    
Valgemne, 5 st.p. V       5    
Valgemne, 5 st.p. V       5    
Valgemne, 5 st.p. V         5  
Valgemne, 5 st.p. V         5  
IMT4904 Master Thesis O         10 20
Sum: 20 20 20 20 20 20
*) O - Obligatorisk emne, V - Valgbare emne

Master of Science in Information Security 2011-2014 Digital Forensics part-time track (three years)

Emnekode Emnets navn O/V *) Studiepoeng pr. semester
  S1(H) S2(V) S3(H) S4(V) S5(H) S6(V)
IMT4012 Digital Forensics I O 5          
IMT4561 Applied Information Security O 5          
IMT4532 Cryptology 1 O 5          
IMT4421 Vitenskapelige metoder O 5          
IMT4581 Nettverkssikkerhet O   10        
IMT4641 Computational Forensics O   5        
IMT4612 Machine Learning and Pattern Recognition I O   5        
IMT4571 IT Governance O     5      
IMT4601 Research Project Planning O     5      
Valgemne, 5 st.p. V     5      
Valgemne, 5 st.p. V     5      
IMT4022 Digital Forensics 2 O       10    
IMT4591 Legal Aspects of Information Security O       5    
Valgemne, 5 st.p. V       5    
Valgemne, 5 st.p. V         5  
Valgemne, 5 st.p. V         5  
IMT4904 Master Thesis O         10 20
Sum: 20 20 20 20 20 20
*) O - Obligatorisk emne, V - Valgbare emne

Master of Science in Information Security 2011-2014 Management part-time track (three years)

Emnekode Emnets navn O/V *) Studiepoeng pr. semester
  S1(H) S2(V) S3(H) S4(V) S5(H) S6(V)
IMT4661 Security Management Dynamics O 5          
IMT4651 Security as Continuous Improvement O 5          
IMT4571 IT Governance O 5          
IMT4421 Vitenskapelige metoder O 5          
IMT4591 Rettslige aspekter ved informasjonssikkerhet O   5        
IMT4481 Information Society and Security O   5        
IMT4841 Sikkerhetsplanlegging og hendelseshåndtering O   10        
IMT4601 Research Project Planning O     5      
IMT4561 Applied Information Security O     5      
IMT4532 Cryptology 1 O     5      
Valgemne, 5 st.p. V     5      
IMT4582 Network Security O       10    
Valgemne, 5 st.p. V       5    
Valgemne, 5 st.p. V       5    
Valgemne, 5 st.p. V         5  
Valgemne, 5 st.p. V         5  
IMT4904 Master Thesis O         10 20
Sum: 20 20 20 20 20 20
*) O - Obligatorisk emne, V - Valgbare emne

Electives

*) O - Obligatorisk emne, V - Valgbare emne