After completion of the course students are expected to be able to:
- explain the principles of cryptography.
- discuss the practical use of cryptography in symmetric/asymmetric encryption, hash functions, MAC, and digital signatures.
- discuss key management schemes for master, public, and session keys.
- discuss and explain network authentication protocols (Kerbeors, PKI), Web security paradigms (TLS, SSL, SSH), and IP Security.
- identify network attacks (denial of service, flooding, sniffing and traffic redirection, inside attacks, etc.) and basic network defense tools
- identify various types of malicious software and use countermeasure defense/detection tools
- appreciate the importance of ethics as a network security practitioner
- use existing technologies and libraries to achieve security goals
More info can be found at ECTS course syllabus.