bachelor
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
bachelor [2017/08/24 18:46] – lallodi | bachelor [2021/01/10 21:04] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 3: | Line 3: | ||
The bachelor courses proposed by the security group give an introduction to computer and network security, its theoretical and practical aspects, an introduction to offensive techniques and a high-level perspective on cutting-edge aspects of malware economics, crypto, and crypto currencies. | The bachelor courses proposed by the security group give an introduction to computer and network security, its theoretical and practical aspects, an introduction to offensive techniques and a high-level perspective on cutting-edge aspects of malware economics, crypto, and crypto currencies. | ||
- | * XXXXX: Computer Networks | + | Links to course program |
- | * Synopsis of course | + | |
- | * **2IC80: Laboratory on Offensive Computer Security** | + | * [[http:// |
* This course will cover an introduction to practical aspects of computer security threats and defences. The course will present theoretical aspects of computer security as well as practical examples of real attacks and laboratory activities. The student will learn: | * This course will cover an introduction to practical aspects of computer security threats and defences. The course will present theoretical aspects of computer security as well as practical examples of real attacks and laboratory activities. The student will learn: | ||
* the characteristics of software vulnerabilities and their impact on system security | * the characteristics of software vulnerabilities and their impact on system security | ||
Line 12: | Line 12: | ||
* the different types of network and host defences, and their limitations | * the different types of network and host defences, and their limitations | ||
* how to engineer a working attack and deploy effective defences | * how to engineer a working attack and deploy effective defences | ||
+ | * [[http:// | ||
+ | * A computer network is a facilitator of distributed applications and comes with security threats. We cover the organization of computer networks (e.g. the Internet), basics of security and network and security protocols. Students learn to explain solutions to standard problems and to analyze protocols with respect to correctness, | ||
* 3USU0: Course 2 Information science technology and society (Security track) | * 3USU0: Course 2 Information science technology and society (Security track) | ||
- | * Synopsis | + | * This course is divided into two parts: complex networks (part I) and information security (part II). |
+ | * The goal of the first part of the course | ||
+ | * The goal of the second part is to introduce the concepts of information risk, threats, vulnerabilities, |
bachelor.1503593201.txt.gz · Last modified: 2021/01/10 20:59 (external edit)