Computer security
INTRODUCTION TO COMPUTER SECURITY
Definition of security
Threats and attacks
Security principles
Access control
Cryptography concepts
Passwords
Authentication technologies
RISK MANAGEMENT
Fundamental principles
Methodology
Concept of risk
Risk analysis
ATTACKS AND COUNTERMEASURES
Threats
vulnerabilities
Concept of hacking
Malicious code
Trojan horses
User accounts, permissions, passwords
Security copies
OPERATING SYSTEM SECURITY
Operating system concepts
Operating system security
Buffer overflow attack
Secure storage
File system security
NETWORK PROTECTION
Computer networks
TCP and IP
DNS
Firewalls, Tunnels and IDS/IPS
Wireless networks
DATA AND DATABASE SECURITY
Data security
Secure storage
Database security
Intellectual property
Payment systems
Spam and cybercrime
CLASSICAL CRYPTOGRAPHY
Symmetric cryptography
Public Key Cryptography
RSA cryptosystem
Cryptographic Hash Functions
Data integrity: Applications of cryptographic hash functions
PRIVACY AND PROTECTION ON THE INTERNET
Concept of privacy
Protection on the Internet
Secure programming
Examples of attacks
Duration: 12 months (6 hours / week)
PRE-REQUISITES
BACC