Search Close
Course syllabus

Cyber Threat Management and Incident Response, 15 credits

Hantering av cyberhot och incidenthantering, 15 hp

Course code: DI4028

School of Information Technology

Level: First cycle

Select course syllabus

Version
2026-01-19 - Until further notice

Finalized by: Forsknings- och utbildningsnämnden, 2025-09-01 and is valid for students admitted for spring semester 2026.

Main field of study with advanced study

Digital Forensics, First cycle, has less than 60 credits in first-cycle course/s as entry requirements. (G1F)

Entry requirements

The courses Networking Basics 7.5 credits and Network Support and Security 7.5 credits. English 6 or English level 2. Exemption of the requirement in Swedish is granted for those with foreign grades.

Placement in the Academic System

The course is included in the course package Cyber Security Analyst 60 credits, and is also given as a single subject course.

Objectives

The goal of the course is to equip the student with the fundamental knowledge, skills, and abilities to effectively identify, analyze, and respond to cyber threats. The student will develop an understanding of the cyber threat landscape and learn how to anticipate and mitigate potential risks. The student will be trained in industry-standard incident response frameworks and proven methodologies, enabling the development and implementation of robust incident response plans.

Following successful completion of the course the student should be able to:

Knowledge and understanding

  • Describe the current cyber threat landscape, including attack vectors and emerging threats
  • Explain the Incident Response Framework and best practices

Skills and abilities

  • Identify and analyse cyber threats
  • Conduct incident response, communicate and report its results
  • Develop and implement incident response plans for business recovery and damage limitation

Judgement and approach

  • Identify and assess the potential risk of threat vectors in terms of attack patterns and potential harm to the organization
  • Review past incidents and propose strategies to mitigate risks in future events

Content

The course focuses on the identification, analysis, and response to various types of cyber threats. It addresses the current threat landscape and the most common attack vectors, including malware, phishing, and ransomware. Furthermore, the course introduces key principles of threat intelligence and emphasises the importance of proactive threat hunting to strengthen organisational cybersecurity. A central component is the development and implementation of incident response plans in accordance with established industry standards and best practices. Students are trained to structure response processes, prioritise actions, and coordinate incident management in a systematic manner.

Practical skills are developed through laboratory exercises where students conduct simulations of incident response scenarios. These include the analysis of security breaches using both traditional security tools and AI-based techniques. The course also covers the application of strategies for containment, recovery, and preventive measures across diverse threat environments.

Language of Instruction

Teaching is conducted in English.

Teaching Formats

The teaching consists of lectures and laboratory sessions.

Grading scale

Four-grade scale, digits (TH): Fail (U), Pass (3), Pass with credit (4), Pass with distinction (5)

Examination formats

The examination consists of an individual written exam, a group workshop, a written report with presentation, and laboratory exercises

2601: Written Examination, 4 credits
Four-grade scale, digits (TH): Fail (U), Pass (3), Pass with credit (4), Pass with distinction (5)

2602: Laboratory Sessions, 5 credits
Two-grade scale (UG): Fail (U), Pass (G)

2603: Workshop, 2 credits
Two-grade scale (UG): Fail (U), Pass (G)

2604: Project Report, 4 credits
Two-grade scale (UG): Fail (U), Pass (G)

Exceptions from the specified examination format

If there are special reasons, the examiner may make exceptions from the specified examination format and allow a student to be examined in another way. Special reasons can e.g. be study support for students with disabilities.

Course evaluation

Course evaluation is part of the course. This evaluation offers guidance in the future development and planning of the course. Course evaluation is documented and made available to the students.

Course literature and other materials

Select literature list
2026-01-19 – Until further notice

Literature list 2026-01-19Until further notice

Finalized by: Forsknings- och utbildningsnämnden, 2025-09-01.

Cyber Threat Management (Netacad). Will be provided by the course coordinator via the Internet at the start of the course.

NIST’s Computer Security Incident Handling Guide By Paul Cichonski,Tom, Tim and Karen. Will be provided by the course coordinator via the learning platform at the start of the course.