Skip to content

Latest commit

 

History

History
24 lines (24 loc) · 1.31 KB

README.md

File metadata and controls

24 lines (24 loc) · 1.31 KB

Course Contents

  • Basic cryptography: symmetric and asymmetric cryptography
  • Cryptographic hashing and digital signatures
  • Security in protocols and services of the Internet
  • Certificates and infrastructures for open key encryption
  • Security in network systems: routers, firewalls, and systems to detect intrusion
  • Security in operating systems
  • Software security: vulnerability, attacks, and defence mechanisms

Intended Learning Outcomes:

  1. Explain basic mechanisms in, and the structure of, secure communications protocols.
  2. Describe weaknesses in computer systems, software, networks, and communications protocols as well as explain attacks that utilise such weaknesses.
  3. Explain and compare advantages and disadvantages with common cryptographic technologies.
  4. Design and implement simple cryptographic applications.
  5. Account for and recognise threats against information security: confidentiality, integrity, and availability, as well as choose appropriate methods to protect against threats.
  6. Design, implement, and evaluate security in networks.