Cyber Security Training


Content, progress and pedagogy of the module

In this project unit, the students must work with the relationships between technical, economic- political-, regulatory and cultural aspects of cyber security threats for individuals, companies, organizations and nations. The aim is that the students must understand the interplay between these aspects of cyber security and how precautions require solutions that include technical as well as political-regulatory and normative initiatives. Furthermore, the students must be able to operationalize knowledge on complex cyber security problems in managerial initiatives at strategic and tactical levels.

Learning objectives


Must have knowledge:

  • on problems within cyber security, that individuals, companies, organizations, public institutions and nations can encounter
  • on the interrelationships between technical, economic, political-regulatory and cultural aspects of threats against cyber security
  • on how the interplay between technical, political-regulatory and normative precautions can limit threats against cyber security
  • on legal requirements, standards and certification arrangements concerning cyber security at national and EU level respectively
  • on strategic and tactical management of cyber security within organizations, including norms for strengthening of the protection of personal data and cyber security
  • about the relation between security risks and business processes including the identification and protection of business-critical assets



Must have skills:

  • in detecting new risks and threats concerning cyber security within companies and other organizations
  • in being able to contribute to the development of methods to protect cyber security
  • in management of the prevention and control of threats against cyber security
  • in developing security strategies that include technical as well as normative aspects


Must have competences:

  • in being able to reflect on the ethical issues which the processing of sensitive personal data can involve
  • in understanding complex security problems
  • in communicating cyber security challenges and solutions to non-experts
  • to independently define and analyze scientific and engineering problems in the area defined by the project theme, also in cooperation with external/ internal partners or as a part of a multidisplinary projects
  • to control the working and development process within the project theme

Type of instruction

Types of instruction are listed at the start of §17; Structure and contents of the programme.



Name of examCyber Security Training
Type of exam
Oral exam based on a project
Assessment7-point grading scale
Type of gradingInternal examination
Criteria of assessmentThe criteria of assessment are stated in the Examination Policies and Procedures

Facts about the module

Danish titleGovernance af IT-sikkerhed
Module codeESNCYSK3P5
Module typeProject
Duration1 semester
Language of instructionEnglish
Empty-place SchemeYes
Location of the lectureCampus Copenhagen
Responsible for the module


Education ownerMaster of Science (MSc) in Engineering (Cyber Security)
Study BoardStudy Board of Electronics and IT
DepartmentDepartment of Electronic Systems
FacultyThe Technical Faculty of IT and Design