1. Context of the security in computer systems |
1.1 Concepts and terminology
1.2 Levels of the security: physics, logical, organisational
1.3 Norms and recommendations |
3. Secure application development |
3.1 Software vulnerabilities and threats
3.2 Exploitation of vulnerabilities
3.3 Safe programming |
4. Safe administration of O.S. |
4.1 Authentication mechanisms
4.2 Monitoring tools
4.3 Typical vulnerabilities
4.4 Security incident response |
5. Secure network protocols |
5.1 Vulnerabilities in TCP/IP networks
5.2 Security at network layer: IPSec
5.3 Security at transport layer: SSL/TLS
5.4 Security at application layer: SSH |
PRACTICAL ASSIGMENTS |
- Use of encryption APIs
- Security analysis in networks, systems and services
- Design and deployment of perimeter protection solutions
- Web application security analysis and countermeasures deployment |