Copenhagen School of Design and Technology



Danish title
Study programme
Business Economics & Information Technology
Type of education
Full time education
Level of education
Bachelor Programme
5. semester
Duration of the subject/module
1 semester
Programme elements
Start time
Guldbergsgade 29 N, København N
Subject number
Responsible for the subject(s)/modul(es)
Tue Hellstern
Jan Ivan Andersen
  • Purpose and learning objectives

    The course will provide you with a solid understanding of the technical aspects of cybersecurity, as well as the economic principles that underpin it.
    After this elective you will have the knowledge and skills needed to protect computer systems, networks, and data from cyber threats and attacks, and to develop effective cybersecurity strategies for organizations there are following the current regulations.
    Cybersecurity is a rapidly growing field with a high demand for skilled professionals in all levels.


    •You will understand the basics of cybersecurity, including the different types of threats and the methods that attackers use to exploit vulnerabilities.
    •Knowledge of the regulatory and compliance frameworks that organizations use to ensure that they are meeting their cybersecurity obligations.
    •Knowledge of different techniques that organizations can use to secure their networks
    •Knowledge of different analytical techniques that organizations can use to monitor and detect cybersecurity threats.


    •Understanding of different methods that organizations can use to manage their cybersecurity risks.
    •Understanding of economic principles that underpin cybersecurity, including the costs of cybersecurity breaches, the cost-benefit analysis of cybersecurity investments, and the economic incentives that drive cybercriminals.


    •Understanding of cybersecurity in business strategy.

  • Type of instruction
    The lectures will be based on business cases, with hands-on exercises, supported by theory. You will in this groups works on the different business cases in relations with cybersecurity.
  • Subject/module requirement for participation

    Academic requirement for participation
    In order to participate in the elective, the student must have completed 1 to 4 semesters of the Economics and IT program or equivalent.

  • Exam

    The learning outcomes of the exam are identical with the learning outcomes of the subject(s)/modul(es)

    Exam in one or more subjects
    •A hand-in in the form of a written group report, 4 pages, which is to demonstrate ability to combine theory and practice.
    •Group oral exam based on written group report.
    Type of exam
    Combined written and oral examination
    Individual exam or group exam
    Individual or group, 3-7 participants
    Exam languages
    Type of evaluation
    7-point grading scale
    Internal censure
hours of teaching
hours of preparation
The figure shows the extent of workload related to the subject divided into different study activities.

In the subject Cybersecurity you will receive 82 hours of instruction, which corresponds to 109 lessons (1 lesson = 45 min.) and 30% of your total workload for the subject.

The teaching primarily consists of the following activities: cases.
The preparation primarily consists of the following activities: group work.

Read about KEAs Study Activity Model

*KEA can deviate from the number of hours if this is justified by special circumstances