Computer Systems Security(Synchronous e-learning)
About This Course
Students should be able to describe a) and apply commonly used cryptographic techniques, and understand the pros and cons of these techniques; b) how specific, well-known, attacks on DNS, computer systems, email, Web applications, works, and the mechanisms to protect against those attacks. Topics such as intrusion detection, DNS security, electronic mail security, authentication, access control, buffer overflow, memory and stack protection, selected topics in application security, for instance, web security, and well-known attacks are also covered in the module.
What You'll Learn
Entry Requirements
Students should be able to describe a) and apply commonly used cryptographic techniques, and understand the pros and cons of these techniques; b) how specific, well-known, attacks on DNS, computer systems, email, Web applications, works, and the mechanisms to protect against those attacks. Topics such as intrusion detection, DNS security, electronic mail security, authentication, access control, buffer overflow, memory and stack protection, selected topics in application security, for instance, web security, and well-known attacks are also covered in the module.