Security models and terminology, authentication, access control, software security, cryptography, network security, threat analysis, examples of advanced security technologies, privacy, security policies and regulation
After taking the course, students are familiar with the key concepts and abstractions of information security and understand the purpose, function and weaknesses of several security technologies. They are able to model threats and analyze the security of a system critically, from the viewpoint of an attacker. Moreover, they can identify common security flaws in software and apply principles of secure programming. During course, students also practice the use of English in an engineering context.