Bachelor in Cyber Security

This IT bachelor program teaches you to secure digital systems from cyber attacks, cyber crime and digital warfare. The program enables you to reduce digital vulnerability and work practically with IT security.

Securing our Digital Lives

We are living in a world controlled by digital systems. Smart houses contain smart meters, digital locks and home assistants. Self driving cars are being tested on our roads and the ‘Internet of Things’ continues to expand.

The digitalisation of the world around us brings a number of challenges, not just in adapting to the amazing pace of change, but how to secure those systems that are so vital to our everyday lives. The critical infrastructure that underpins our society - power, water, food supplies and now information all relies on some form of digital system.

This means cyber security experts are needed to work across all subject domains including science, industry and government, working to secure and protect virtual digital assets. This is the domain of the Cyber Security Specialist.

Online activities do not come without risk and most individuals are not equipped to protect themselves, their families, or their workplaces. Johan Van Niekerk, professor in Cyber Security

Throughout the bachelor program, students will learn the theoretical foundations required for working in this domain, and the practical application of tools and techniques used to create a secure digital environment. This includes information security, Computer Network Operations, programming and penetration testing.

Bachelor in Cyber Security. Study online.

Program Structure

The first year of the program has been designed to develop a breadth of foundation skills required by Cyber Security Specialists. During this year of study students will develop programming, mathematical, networking and data management skills alongside research and project management.

During the second year of study, students will further develop their network security skills and an understanding of digital systems and devices. They will also explore issues of criminality and warfare in the digital domain along with penetration testing practice and procedures.

In their final year students, will gain practical experience in exploiting vulnerabilities on digital systems and both computer network attack and computer network defence. This year also includes the opportunity to work on a related project in a dedicated laboratory.

After completing the degree, graduates will have the theoretical and practical competence required to work across a variety of industries within numerous types of organisations. Graduates will also be qualified to continue developing their expertise through further study.

Year 1:

  • Problem Based Learning and Research Methodologies
  • Introduction to Information Security
  • Professional Aspects of Computing
  • Introduction to Programming
  • Discrete Mathematics
  • Network Principles
  • Programming and Databases

Year 2:

  • Criminality and Warfare in the Digital Domain
  • Operating File Systems
  • Penetration Testing Practice and Procedure
  • Network Security
  • Wireless and Mobile Devices
  • Information Security Management

Year 3:

  • Computer Network Attack
  • Vulnerabilities: Exploration and Exploitation
  • Computer Network Defence
  • Elective
  • Elective


  • Cryptography and Steganography
  • Incident Management
  • Further Discrete Mathematics
  • Data Recovery
  • HoneyPots
  • Pure Mathematics for Computing


  • Has a broad knowledge of cyber defence and attack techniques, technologies and tools in order to implement appropriate technical and non-technical solutions to prepare for, defend against and recover from cyber intrusion.
  • Is familiar with appropriate and current procedures and standards for managing cyber risks and threats, undertaking penetration testing and ensuring network security.
  • Has knowledge of the legal and ethical issues and responsibilities pertaining to cyber security activities with regard to the impact of the cyber intrusion on society, industry, national infrastructure and national security.
  • Is familiar with current and emerging research and development in the field of Cyber Security and related disciplines.
  • Is able to update their knowledge in the area of cyber security through academic study, research and professional development.
  • Is familiar with the current and developing state of cyber criminality and cyber warfare threats, vulnerabilities and defensive tools and techniques.
  • Has knowledge of the history and development of cyber security, cybercrime and cyber warfare, its impact on safety and security of digital environments and infrastructures, alongside the resulting effects on society.
  • Is familiar with various computational tools, techniques and practices that underpin secure computing.


  • Is able to critically assess the threat level to a digital environment and select and apply appropriate computer system security and penetration tools and techniques in order to secure a computer network.
  • Can critically select and apply a range of analytical and methodological problem solving and investigative techniques including system profiling and vulnerability analysis, based on research and to be able to interpret the solutions and present results appropriately.
  • Is able to reflect on their own academic practice and development as a security professional, identify areas for improvement and adapt to future cyber security tools, techniques, technology and threats.
  • Is able to find, distil and evaluate relevant academic, commercial and non-commercial information assets then apply this information in resolving digital security problems.
  • Is able to identify stakeholders of cyber security and defence-related issues and communicate, network and collaborate with these stakeholders according to their individual requirements.
  • Can apply mathematical and software development theories, tools and techniques to computational challenges.

General Competence:

  • Is able to identify and appropriately act on complex ethical and social issues arising within academic and professional practice as a cyber security professional, whilst being aware of the greater implications of their actions and decisions.
  • Is able to plan, execute and manage a variety of activities and cyber security-related projects over time, alone or as part of a collaborative team to successful conclusion and in accordance with relevant legal and ethical requirements and principles.
  • Can distil and communicate cyber security-related theories, concepts, problems and solutions, with a variety of relevant stakeholders, through the selection and application of appropriate methods of communication.
  • Can exchange opinions, experiences and ideas with others with background and/or experience in cyber security and defence, through the selection and application of appropriate methods of communication, thereby contributing to the development of good practice within the cyber security community of practice.
  • Is familiar with, and can critically evaluate, current and evolving processes and disruptive technologies within the field of cyber security.
  • Is able to identify appropriate stakeholders and communicate, network and collaborate with these stakeholders at an appropriate level while considering security and confidentiality.
  • Is able to engage in critical self-reflection, and reflect upon relevant ethical and professional issues, as part of the lifelong learning strategy required of a cyber security professional.

Career Opportunities

The expertise and skills of this bachelor program are sought after as cyber security issues continue to become increasingly significant across all sectors. This has been driven over recent years by the development and adoption of new technology in the race to exploit the digitalisation of commercial and domestic products and systems.

According to Abelia there is a worrying deficit of people with strong technology skills in Norway. The distance between needs and available expertise ranges from 24 to 113 percent. The best-case scenario suggests that by 2030, one in four ICT positions will be vacant.

Cyber Security skills are in high demand yet in short supply.Cisco

A recent Capgemini Study predicts the shortfall of cyber security specialists will increase to 3.5 million by 2021.

Most large businesses that rely on information technology have the need for people with expertise in cyber security to secure their digital assets. This bachelor's degree provides a unique qualification for handling challenges across a variety of organisations and industry sectors.

Further Studies

Students who wish for further training in the area of Cyber Security can apply for Masters level studies related to computing, Cyber Security or Network Security at a variety of higher education institutions both within Norway and internationally. Graduates who wish to pursue doctoral level studies would then be able to apply for such study opportunities in Norway or beyond.

Apply now

Course information

Next startup:

August 14, 2023.
Read more about semester start.

Locations: Kristiansand,
Online and
Online PLUS Oslo
Duration: 3 years
Price Online:

EUR 4.900,- per semester.
EUR 190,- admission fee.

Price Online PLUS Oslo:

EUR 5.700,- per semester.
EUR 190,- admission fee.

Price Campus Kristiansand:

EUR 6.100,- per semester.
EUR 190,- admission fee.

Admission requirements: Three-year upper secondary education. You may also apply for admission by prior learning.
In addition there is a special requirement of Math R1, or S1 and S2, or international equivalent. Other documented knowledge or education can be accepted as equivalent. Read more.
Approvals: Approved for loans and grants from the State Educational Loan Fund. Accredited by NOKUT.
Degree: Bachelor
Credits: 180 ECTS

Lecturing staff

Dr. Isah A. Lawal

Dr. Isah A. Lawal

Associate Professor
Dr. Rayne Reid

Dr. Rayne Reid

Associate professor

Prof. Fabricio Bortoluzzi

Associate professor
Piet Delport

Piet Delport

Assistant Professor
Ruan Koen

Ruan Koen

Assistant Professor
Emlyn Butterfield

Emlyn Butterfield

Associate Professor
Veronica Schmitt

Veronica Schmitt

Associate Professor
Tom Drange

Tom Drange

Konstantin Lenchik

Konstantin Lenchik

Tutor and teacher
Mariya Chirchenkova

Mariya Chirchenkova

Tutor and teacher

Related News