Modern Security Solutions: Safeguarding the Digital Landscape

2026/2027

Recommended prerequisite for participation in the module

Knowledge of fundamentals of cryptography corresponding to the course "Applied Cryptography"

Content, progress and pedagogy of the module

Learning objectives

Knowledge

The student will acquire knowledge of:

  • Various forms of prevalent attacks targeting information systems, encompassing those directed at resource-constrained devices like Internet of Things (IoT).
  • Challenges and cryptographic solutions associated with the security of resource-constrained devices.
  • Fundamental insights into the field of post-quantum cryptography, offering long-term security measures against the potential threats posed by quantum computers.
  • Implementation of Quantum Key Distribution (QKD) for ensuring secure communication.

The student must also be able to relate critically and reflexively in relation to these theoretical subjects.

Skills

The student must be able to use theories, methods, and models from the above-mentioned areas to identify, analyze, assess and come up with proposals for solving concrete problems in practice. The student must be able to argue for the relevance of the chosen theories, methods, and models as well as for the proposed solution. In addition, the student must be able to reflect on the significance of the context in which the solution is part of. Concretely, it is expected that after completion of the course, the student will be able to:

  • Identify vulnerabilities and weaknesses in cryptographic algorithms and protocols.
  • Master tools and methods for securing resource-constrained devices.
  • Predict the obsolescence of technologies vulnerable to quantum attacks and selecting and implementing quantum-resistant technologies and security applications in a system or organization for long-term security.
  • Implement Quantum Key Distribution (QKD) to enhance communication security for organizational employees, encompassing the improvement of security in video conferencing, cloud-stored data, Virtual Private Networks (VPNs), and confidential financial information.

Competences

The student will have competences in:

  • Conducting a qualified assessment to determine suitable protocols and applications in resource constrained IoT device settings.
  • Implementing long-term security measures for IT systems, safeguarding the system or organization against quantum attacks.
  • Selecting and using advanced technologies like Quantum Key Distribution (QKD) for secure remote communication environments.

Type of instruction

Teaching is based on a combination of lectures, active learning, problem solving and cases. There is an alternation between self-study, physical seminars/workshops lasting 1-2 days.

Exam

Exams

Name of examModern Security Solutions: Safeguarding the Digital Landscape
Type of exam
Oral exam
ECTS5
Permitted aids
All written and all electronic aids
Assessment7-point grading scale
Type of gradingInternal examination
Criteria of assessmentThe criteria of assessment are stated in the Examination Policies and Procedures

Facts about the module

Danish titleModerne sikkerhedsløsninger: Beskyttelse af det digitale landskab
Module codeESNITV1213
Module typeCourse
Duration1 semester
ECTS5
Language of instructionEnglish
Empty-place SchemeYes
Location of the lectureCampus Aalborg
Responsible for the module

Organisation

Education ownerMaster of Information Technology, Software Development
Study BoardStudy Board of Electronics and IT
DepartmentDepartment of Electronic Systems
FacultyThe Technical Faculty of IT and Design