Ship in the horizon

Security management and measures

The course deals with security management, risk evaluation, and security incident management in the maritime sector.

Study facts

  • Campus: Online
  • Study level: Further education
  • Progression of study: Part time
  • Start up: Spring 2026
  • Teaching model: Online
  • Credits: 2,5
  • Charge: No tuition fees
  • Closing dates: 01.08.2026
  • Semesters: 1
  • Teaching Language: English
  • Number of students: 30
Show more keyboard_arrow_down keyboard_arrow_up

How to sign up? 

1. If Norwegian ID-number, apply by the applicaton link (see above)

2. If no Norwegian ID-number, please select subject below, fill in and submit the form:  

NOTE: You must send one application per subject.

Admission requirements

Open for ALL.

If you want credits - please check the general admission requirements  for higher education in Norway.

Why study?

  • Relevant for all working in the maritime sector
  • The topics are tailored for and by the business itself
  • You may earn credits
  • It is free of charge
  • It is all online and flexible

Teaching schedule and activities

The learning platform opens 1st of March 2026.

On the learning platform you have access to:

  • Video lectures and podcasts
  • Quizzes
  • Individual portfolio assessment: The student will submit two reflections on course content, either as a video reflection or a written reflection report. Portofolio is rated as passed/failed.

All mandatory assignments must be completed within the 15th of November. 

About Security management and measures

Course content

  • Safety and security. What is the distinction between safety and security?How does understanding these differences help implement effective measures in both areas?
  • Control systems in maritime cyber security management, such as network access control, cybersecurity surveillance, and cyber incident response mechanisms; and "best practice" for maintaining the effictiveness of such systems.
  • Information security management systems (ISMS). What are the essential regulations and standards that govern maritime information security? How can companies stay compliant in a dynamic regulatory environment?
  • Information security management challenges and the continuously changing nature of threats in information security, especially within maritime contexts. This includes cyber threats, physical threats, and insider threats. Incident response plans and communication strategies.
  • The security management lifecycle, from risk assessment, implementation of protective measures, incident response, and post-incident recovery. What methodologies can maritime organizations use to improve their security management continuously?
  • Risk and vulnerability analyses (RVA). The various tools and techniques used in conducting risk and vulnerability analyses in maritime security. Strategies for prioritizing actions based on the severity and likelihood of identified risks and how to allocate resources effectively to address these priorities.
  • Value and hazard identification. Methods to identify potential hazards in maritime operations and how to mitigate them effectively, i.e. threat modeling, safety audits, hazard analysis, and critical control points.
  • Exposure and vulnerability. The importance of assessing exposure to digital risks in the maritime industry, including threats like cyber-attacks, data breaches, and digital espionage like insiders. The methodologies for evaluating exposure levels and the impact of these risks on operations. Strategies for reducing vulnerability and incident response and preparing for the inevitable.
  • Intra- and intersectoral collaboration. How does collaboration between sectors such as shipping, port authorities, and government agencies lead to more robust security protocols and information sharing?
  • Framework development. What are the key elements to consider when designing a security framework that needs to be scalable? Best practice and adherence to international standards, guidelines, and protocols.
  • Building an effective information security strategy. The foundational pillars of a robust information security strategy, such as governance, risk management, and compliance. Setting measurable goals, conducting regular reviews, and adjusting the strategy based on performance metrics and the evolving digital security landscape.
  • Building a security culture. Strategies for cultivating high-security awareness among all employees, including training programs, simulated exercises, and ongoing education.Embedding security into the very philosophy and ethos of the corporate culture.

Any questions?

In collaboration with