369
Comment:
|
905
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
#acl pierre:read,write,delete,revert,admin All:read | #acl ulrikan:read,write,delete,revert,admin All:read |
Line 4: | Line 4: |
== Aim == On successful completion of this course students should: |
|
Line 5: | Line 7: |
Describe the pages in this category... | 1) Have a deep and comprehensive understanding of security threats, mechanisms, protocols and services in computer networks. |
Line 7: | Line 9: |
To add a page to this category, add a link to this page on the last line of the page. You can add multiple categories to a page. | 2) Be able to analyze and evaluate the implementation and functioning of network applications and decide on their suitability from the security point of view. |
Line 9: | Line 11: |
'''List of pages in this category:''' | 3) Be able to design and implement applications that provide or use security services in computer networks. == Syllabus == * Digital signatures * Public-Key Infrastructure (PKI) and Trusted Third Party (TTP) * Message authentication * Network authentication (Kerberos) * Email security * VPN technology (IPSec) * WWW security (SSL/TLS/SET) * Security in Web services . |
NETSEC - Network Security
Aim
On successful completion of this course students should:
1) Have a deep and comprehensive understanding of security threats, mechanisms, protocols and services in computer networks.
2) Be able to analyze and evaluate the implementation and functioning of network applications and decide on their suitability from the security point of view.
3) Be able to design and implement applications that provide or use security services in computer networks.
Syllabus
- Digital signatures
- Public-Key Infrastructure (PKI) and Trusted Third Party (TTP)
- Message authentication
- Network authentication (Kerberos)
- Email security
- VPN technology (IPSec)
- WWW security (SSL/TLS/SET)
- Security in Web services .