In the era of digital transformation, securing and assuring our digital assets is crucial. This program covers IT knowledge, from business processes to database systems, business intelligence, and IT architectures.
Venture into Digital's Dynamic Security Odyssey
The need for specialists in digital assurance and security management has never been more urgent. As our reliance on digital platforms grows, so does the sophistication of threats poised against them.
Beyond mere technical prowess, understanding the intricate dance between business processes, governance, and the virtual ecosystem is paramount. Failing to secure and assure our digital assets could result in catastrophic consequences, both economically and socially. In this high-stakes environment, specialists with the expertise to navigate these challenges are not just valuable—they are indispensable.
Assurance and security specialists
In the digital age, security specialists are vital guardians of progress. Our three-year program immerses you in security management and assurance, blending accounting foundations with IT audit principles. Gain expertise in Information Security Management, explore IT operational management, governance, and navigate risk and compliance in the Cloud. Develop unparalleled Information Assurance skills, addressing legal, ethical, and social aspects. Shape a resilient digital world; your journey to becoming a digital guardian starts here. Apply for the Bachelor in Digital Assurance and Security Management to step into an exciting cyber career. Unlock your potential and protect businesses from cyber threats.
In your first year you will build a solid foundation consisting of both core technical fundamentals and a broad understanding of business governance- and processes.
The second year is more in-depth and specialized. You will now develop competencies in understanding and managing cyber related risk. You will be taught the principles of accounting and auditing and be shown how to transfer and apply this knowledge towards managing compliance with the business’ cyber security goals. Your technical foundation will be strengthened through further understanding on IT architectures. All of this will be supported by knowledge and skills relevant to the management and governance of cyber security.
Your third year adds further skills relevant to IT operational management and business intelligence. Your knowledge about security governance and management is expanded, and students are given the choice to specialise through some elective subjects, preparing you to tackle the challenges of today and tomorrow. The year culminates in a Bachelor Project, allowing you to apply your newfound competence to innovative systems and applications.
Year 1: 60 ECTS
- Academic Skills 1
- IT Fundamentals
- Introduction to Programming
- Business Analytics
- Programming and Databases
- Introduction to Business Processes
- Information Security and Governance
- Foundations of Accounting
Year 2: 60 ECTS
- Management Accounting
- IT Risk Management
- IT Audit Principles
- Regulatory Compliance
- IT Governance
- Risk and Compliance 1
- IT Architectures
- IT Audit Practice
Year 3: 60 ECTS
- Business Intelligence
- IT Operational Management
- IT Governance
- Risk and Compliance 2
- Bachelor Project
- has broad knowledge of important theories, processes and methods within Information Technology Assurance and related fields
- has broad knowledge of complex digital environments and the problems these environments pose to risk-, assurance-, and compliance management
- has broad knowledge of important concepts, principles and methods that apply to risk analysis and mitigation in complex digital environments
- is familiar with current and emerging research and development work within Information Security and Assurance
- can update their knowledge of national and international regulatory frameworks and compliance to relevant frameworks
- has knowledge of organisational values and ethics required by corporate governance principles to achieve organisational goals
- can apply knowledge, relevant research and current developments for IT audits and assurance processes and consulting to solve problems in a diverse business environment
- can apply knowledge and emerging developments to calculate and quantify risks and recommend appropriate risk mitigation to solve business problems
- can reflect upon their own practice using a risk-based approach to planning, executing and reporting on assurance engagements
- masters relevant tools and techniques to conduct and manage IT assurance activities
- masters relevant tools, techniques and communication methods to conduct interviews and take structured notes in assurance processes
- has insight into relevant academic and professional issues relating to computing, ethics and socio-culture in Assurance and Compliance within Information Security
- can plan, carry out and manage IT assurance activities and projects over time, alone or as part of a group, in accordance with relevant legal and ethical requirements and principles
- can communicate important concepts, processes, problems and solutions professionally, both in writing and orally, to selected stakeholders using appropriate theories and methods
- can communicate in a clear and concise to present arguments both rationally and logically using acceptable academic referencing
- can exchange opinions, experiences and ideas with peers and professionals within Information Security and Assurance, thereby contributing to good development practices
- is familiar with current and evolving processes and emerging technologies within Information and Communication Technology and Information Security
As an online student you are required to purchase the required equipment and software. As a Campus student the required equipment and software is available for use.
- A reliable internet connection
- Headphones or headset – with a microphone.
- 2 USB Drives with 8-16 GB storage.
- PC/Laptop with the following specifications:
- Microsoft® Windows® 10 or 11.
- CPU: Intel i5 (64-bit Intel® or AMD® multi-core processor is recommended)
- GPU: Nvidia GeForce GTX (GeForce RTX 3070 is recommended)
- RAM: 16 GB (32 GB recommended)
- Storage: 500 GB (SSD/NVMe is highly recommended)
You must have full administrative privileges to install and manipulate all aspects of your computer. The minimum requirements apply to all who purchase/use their own machine. This may not be an Apple Mac, as these systems are not compatible with the required software.
- 1-2 additional USB Drive with 1-4 GB storage
- 2 monitors, or 1 ultrawide screen
- 1 additional storage drive (Minimum 1 TB is recommended)
As a student you will be provided student licences, until then you should explore the software.
Many students find that the use of Windows is a good starting point to allow them to develop the skills to configure alternative operating systems. Several tutorials will require access to a Windows operating system (either as a host or as a virtual machine).
There was an estimated worldwide shortage of 3.12 million cyber security professionals in 2020 and the demand in cyber related jobs is estimated to grow by 13.5% per year until 2026 (NICE, 2020). A large part of this shortage is in areas that are increasingly more specialised. However, an estimated 16/50 28% of the skills needed is in the areas of Risk Assessment, Analysis, and Management (ISC2,2020).
Graduates will be positioned to help fulfil this need in positions such as:
- Cyber Risk Managers
- Information Security Audit and Assurance Practitioners
- Regulatory Compliance Managers
- Cloud Security Analysts
- Cloud Security Managers
- Information Security Managers
- Privacy and Compliance Officers
Students who wish for further training in information- and cyber security can apply for studies related to computing, cyber security or network security at the master level by Norwegian or international universities.