Understand how the properties of confidentiality, integrity, availability, authenticity, and non-repudiation affect information security requirements in different computer systems and application contexts;
Understand the main threats and attacks on stored data and data in transit;
Understand the appropriate levels of authentication, authorization, and access control to guarantee data integrity, confidentiality and privacy;
Use cryptographic protocols appropriate to the different scenarios and security requirements of computer systems;
Apply techniques for security applied to the storage of sensitive data, e.g., cryptographic hashing functions, password-based key derivation and password management;
Understand the levels of data protection provided by computer network security protocols.
Program
Concepts and fundamentals of data security
Security properties, threats, attacks, vulnerabilities, risk, and security models