369
Comment:
|
1048
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
#acl pierre:read,write,delete,revert,admin All:read | #acl ulrikan@dsv.su.se:read,write,delete,revert,admin All:read |
Line 4: | Line 4: |
== Requirements == 90 hp Computer and Systems Sciences with at least: * 7,5 hp introduction to information and computer security == Aim == On successful completion of this course students should: |
|
Line 5: | Line 10: |
Describe the pages in this category... | 1) Have a deep and comprehensive understanding of security threats, mechanisms, protocols and services in computer networks. |
Line 7: | Line 12: |
To add a page to this category, add a link to this page on the last line of the page. You can add multiple categories to a page. | 2) Be able to analyze and evaluate the implementation and functioning of network applications and decide on their suitability from the security point of view. |
Line 9: | Line 14: |
'''List of pages in this category:''' | 3) Be able to design and implement applications that provide or use security services in computer networks. == Syllabus == * Digital signatures * Public-Key Infrastructure (PKI) and Trusted Third Party (TTP) * Message authentication * Network authentication (Kerberos) * Email security * VPN technology (IPSec) * WWW security (SSL/TLS/SET) * Security in Web services . |
NETSEC - Network Security
Requirements
90 hp Computer and Systems Sciences with at least:
- 7,5 hp introduction to information and computer security
Aim
On successful completion of this course students should:
1) Have a deep and comprehensive understanding of security threats, mechanisms, protocols and services in computer networks.
2) Be able to analyze and evaluate the implementation and functioning of network applications and decide on their suitability from the security point of view.
3) Be able to design and implement applications that provide or use security services in computer networks.
Syllabus
- Digital signatures
- Public-Key Infrastructure (PKI) and Trusted Third Party (TTP)
- Message authentication
- Network authentication (Kerberos)
- Email security
- VPN technology (IPSec)
- WWW security (SSL/TLS/SET)
- Security in Web services .