Fakta
Informasjon er oppdatert av Universitetet i Sørøst-Norge
.


Om studiet
With fundings from the Norwegian Directorate for Higher Education and Skills, and in collaboration with partners within the business, the University of South-Eastern Norway and LØRN have developed a series of studies tailored for and by the business itself.
Schedule
Semester start: May 2025
Semester end: 15. November 2025
All mandatory assignments must be completed within the 15th of November.
Course content
- Safety and security. What is the distinction between safety and security?How does understanding these differences help implement effective measures in both areas?
- Control systems in maritime cyber security management, such as network access control, cybersecurity surveillance, and cyber incident response mechanisms; and "best practice" for maintaining the effictiveness of such systems.
- Information security management systems (ISMS). What are the essential regulations and standards that govern maritime information security? How can companies stay compliant in a dynamic regulatory environment?
- Information security management challenges and the continuously changing nature of threats in information security, especially within maritime contexts. This includes cyber threats, physical threats, and insider threats. Incident response plans and communication strategies.
- The security management lifecycle, from risk assessment, implementation of protective measures, incident response, and post-incident recovery. What methodologies can maritime organizations use to improve their security management continuously?
- Risk and vulnerability analyses (RVA). The various tools and techniques used in conducting risk and vulnerability analyses in maritime security. Strategies for prioritizing actions based on the severity and likelihood of identified risks and how to allocate resources effectively to address these priorities.
- Value and hazard identification. Methods to identify potential hazards in maritime operations and how to mitigate them effectively, i.e. threat modeling, safety audits, hazard analysis, and critical control points.
- Exposure and vulnerability. The importance of assessing exposure to digital risks in the maritime industry, including threats like cyber-attacks, data breaches, and digital espionage like insiders. The methodologies for evaluating exposure levels and the impact of these risks on operations. Strategies for reducing vulnerability and incident response and preparing for the inevitable.
- Intra- and intersectoral collaboration. How does collaboration between sectors such as shipping, port authorities, and government agencies lead to more robust security protocols and information sharing?
- Framework development. What are the key elements to consider when designing a security framework that needs to be scalable? Best practice and adherence to international standards, guidelines, and protocols.
- Building an effective information security strategy. The foundational pillars of a robust information security strategy, such as governance, risk management, and compliance. Setting measurable goals, conducting regular reviews, and adjusting the strategy based on performance metrics and the evolving digital security landscape.
- Building a security culture. Strategies for cultivating high-security awareness among all employees, including training programs, simulated exercises, and ongoing education.Embedding security into the very philosophy and ethos of the corporate culture.
Opptakskrav
Open for all.
If you want credits - please check the general admission requirements for higher education in Norway.