University College 3 years Online Studies
Oslo Kristiansand
This IT bachelor program teaches you to secure digital systems from cyber attacks, cyber crime and digital warfare. The program enables you to reduce digital vulnerability and work practically with IT security.
Securing our Digital Lives
We are living in a world controlled by digital systems. Smart houses contain smart meters, digital locks and home assistants. Self driving cars are being tested on our roads and the ‘Internet of Things’ continues to expand.
The digitalisation of the world around us brings a number of challenges, not just in adapting to the amazing pace of change, but how to secure those systems that are so vital to our everyday lives. The critical infrastructure that underpins our society - power, water, food supplies and now information all relies on some form of digital system.
This means cyber security experts are needed to work across all subject domains including science, industry and government, working to secure and protect virtual digital assets. This is the domain of the Cyber Security Specialist.
Cyber security is an exciting field of study that is evolving rapidly and offers many opportunities. Juhi Saigal, student
It is very fun to have lecturers who can draw examples from their own experiences. Daniel Laupstad, student
Throughout the bachelor program, students will learn the theoretical foundations required for working in this domain, and the practical application of tools and techniques used to create a secure digital environment. This includes information security, Computer Network Operations, programming and penetration testing.

Program Structure
The first year of the program has been designed to develop a breadth of foundation skills required by Cyber Security Specialists. During this year of study students will develop programming, mathematical, networking and data management skills alongside research and project management.
During the second year of study, students will further develop their network security skills and an understanding of digital systems and devices. They will also explore issues of criminality and warfare in the digital domain along with penetration testing practice and procedures.
In their final year students, will gain practical experience in exploiting vulnerabilities on digital systems and both computer network attack and computer network defence. This year also includes the opportunity to work on a related project in a dedicated laboratory.
After completing the degree, graduates will have the theoretical and practical competence required to work across a variety of industries within numerous types of organisations. Graduates will also be qualified to continue developing their expertise through further study.
Year 1: 60 ECTS
- Problem Based Learning and Research Methodologies (5 ECTS)
- Introduction to Programming (10 ECTS)
- Discrete Mathematics (10 ECTS)
- Programming and Databases (10 ECTS)
- Network Principles (10 ECTS)
- Introduction to Information Security (5 ECTS)
- Studio 1 (10 ECTS)
Year 2: 60 ECTS
- Operating Systems (10 ECTS)
- Penetration Testing (10 ECTS)
- Network Security (10 ECTS)
- Information Security Management (10 ECTS)
- Criminality and Warfare in the Digital Domain (10 ECTS)
- Studio 2 (10 ECTS)
Year 3: 60 ECTS
- Computer Network Defence (10 ECTS)
- Computer Network Attack (10 ECTS)
- Elective Courses (3 x 5 ECTS)
- Vulnerabilities (5 ECTS)
- Bachelor Project (20 ECTS)
Knowledge:
- Has a broad knowledge of cyber defence and attack techniques, technologies and tools in order to implement appropriate technical and non-technical solutions to prepare for, defend against and recover from cyber intrusion.
- Is familiar with appropriate and current procedures and standards for managing cyber risks and threats, undertaking penetration testing and ensuring network security.
- Has knowledge of the legal and ethical issues and responsibilities pertaining to cyber security activities with regard to the impact of the cyber intrusion on society, industry, national infrastructure and national security.
- Is familiar with current and emerging research and development in the field of Cyber Security and related disciplines.
- Is able to update their knowledge in the area of cyber security through academic study, research and professional development.
- Is familiar with the current and developing state of cyber criminality and cyber warfare threats, vulnerabilities and defensive tools and techniques.
- Has knowledge of the history and development of cyber security, cybercrime and cyber warfare, its impact on safety and security of digital environments and infrastructures, alongside the resulting effects on society.
- Is familiar with various computational tools, techniques and practices that underpin secure computing.
Skills:
- Is able to critically assess the threat level to a digital environment and select and apply appropriate computer system security and penetration tools and techniques in order to secure a computer network.
- Can critically select and apply a range of analytical and methodological problem solving and investigative techniques including system profiling and vulnerability analysis, based on research and to be able to interpret the solutions and present results appropriately.
- Is able to reflect on their own academic practice and development as a security professional, identify areas for improvement and adapt to future cyber security tools, techniques, technology and threats.
- Is able to find, distil and evaluate relevant academic, commercial and non-commercial information assets then apply this information in resolving digital security problems.
- Is able to identify stakeholders of cyber security and defence-related issues and communicate, network and collaborate with these stakeholders according to their individual requirements.
- Can apply mathematical and software development theories, tools and techniques to computational challenges.
General Competence:
- Is able to identify and appropriately act on complex ethical and social issues arising within academic and professional practice as a cyber security professional, whilst being aware of the greater implications of their actions and decisions.
- Is able to plan, execute and manage a variety of activities and cyber security-related projects over time, alone or as part of a collaborative team to successful conclusion and in accordance with relevant legal and ethical requirements and principles.
- Can distil and communicate cyber security-related theories, concepts, problems and solutions, with a variety of relevant stakeholders, through the selection and application of appropriate methods of communication.
- Can exchange opinions, experiences and ideas with others with background and/or experience in cyber security and defence, through the selection and application of appropriate methods of communication, thereby contributing to the development of good practice within the cyber security community of practice.
- Is familiar with, and can critically evaluate, current and evolving processes and disruptive technologies within the field of cyber security.
- Is able to identify appropriate stakeholders and communicate, network and collaborate with these stakeholders at an appropriate level while considering security and confidentiality.
- Is able to engage in critical self-reflection, and reflect upon relevant ethical and professional issues, as part of the lifelong learning strategy required of a cyber security professional.
As an online student you are required to purchase the required equipment and software. As a Campus student the required equipment and software is available for use.
Required Equipment
- A reliable internet connection
- Headphones or headset – with a microphone.
- Webcam.
- 2 USB Drives with 8-16 GB storage.
- PC/Laptop with the following specifications:
- Microsoft® Windows® 10 or 11.
- CPU: Intel i5 (64-bit Intel® or AMD® multi-core processor is recommended)
- GPU: Nvidia GeForce GTX (GeForce RTX 3070 is recommended)
- RAM: 16 GB (32 GB recommended)
- Storage: 500 GB (SSD/NVMe is highly recommended)
You must have full administrative privileges to install and manipulate all aspects of your computer. The minimum requirements apply to all who purchase/use their own machine. This may not be an Apple Mac, as these systems are not compatible with the required software.
Recommended Equipment
- 1-2 additional USB Drive with 1-4 GB storage
- 2 monitors, or 1 ultrawide screen
- 1 additional storage drive (Minimum 1 TB is recommended)
Required Software
As a student you will be provided student licences, until then you should explore the software.
Many students find that the use of Windows is a good starting point to allow them to develop the skills to configure alternative operating systems. Several tutorials will require access to a Windows operating system (either as a host or as a virtual machine).
Career Opportunities
The expertise and skills of this bachelor program are sought after as cyber security issues continue to become increasingly significant across all sectors. This has been driven over recent years by the development and adoption of new technology in the race to exploit the digitalisation of commercial and domestic products and systems.
According to Abelia there is a worrying deficit of people with strong technology skills in Norway. The distance between needs and available expertise ranges from 24 to 113 percent. The best-case scenario suggests that by 2030, one in four ICT positions will be vacant.
Most large businesses that rely on information technology have the need for people with expertise in cyber security to secure their digital assets. This bachelor's degree provides a unique qualification for handling challenges across a variety of organisations and industry sectors.
Further Studies
Students who wish for further training in the area of Cyber Security can apply for Masters level studies related to computing, Cyber Security or Network Security at a variety of higher education institutions both within Norway and internationally. Graduates who wish to pursue doctoral level studies would then be able to apply for such study opportunities in Norway or beyond.
Many choose to take CCNA certification through Noroff Accelerate. Our 10-week courses are flexible and effective, designed to fit your everyday life. Cisco's CCNA certifications are among the most recognized in the IT industry, and provide a solid foundation for further careers.
Watch recording of livestream
We recommend watching the latest livestream on our IT bachelor programs hosted by Emlyn Butterfield, and recorded 10 March 2023. You can also skip directly to the chapter regarding Cyber Security in the chapter menu, which starts at 07:42.