Minor content
In this minor you learn through theory and practice how a hacker thinks and works. In addition to the terminologies, you also use the tools used by hackers. You also carry out a practical assignment at a company of your choice. You conduct research into the vulnerability of that company in a number of agreed areas. During this research you record what you did and how you did it. You report this afterwards and also indicate what the risks are and how they can be prevented or mitigated.
You can choose one minor of 30EC (cybersafety) or a combination of 15EC minors. The possible combinations are listed in the list below.
You can participate in one of the modules per period. In both periods, there is a joint start and shared knowledge lectures are offered so that you, as a student, gain knowledge about technical, organisational and human aspects. Preferably you follow the modules physically, but it is also possible to follow them remotely (hybrid).
Structure of the minor
After completing this module, students can:
- Perform a security analysis on a corporate network;
- Provide a solid advice on the design of an infrastructure;
- Propose measures that benefit information security;
- Map and redesign processes while taking into account the safeguarding of the integrity of the data;
- Set up infrastructure with security in mind;
- Set up basic monitoring of infrastructure;
- Create and implement an infrastructure test plan;
- Perform a pentest;
- Explain a topic in a responsible manner based on existing sources;
- Write a justification description of the competences to be achieved.