1 What is Security?
2 Where do the threats come from? Encryption: Procedures and methods
3 Public Key Infrastructure
4 Network Security
5 Security in the operating system
This course is targeted at ICT Architects, Developers and Decision Makers who want to identify the current threats to ICT and understand the appropriate countermeasures.
Basic understanding of ICT technologies, in particular understanding of TCP/IP architecture in the scope of the following courses: