Type of course: | Elective (1 of 2) |
Language of instruction: | Romanian |
Erasmus Language of instruction: | English |
Name of lecturer: | Arpad Incze |
Seminar tutor: | Arpad Incze |
Form of education | Full-time |
Form of instruction: | Class / Seminary |
Number of teaching hours per semester: | 72 |
Number of teaching hours per week: | 6 |
Semester: | Summer |
Form of receiving a credit for a course: | Grade |
Number of ECTS credits allocated | 6 |
Acquiring the fundamental knowledge about concepts, mechanisms, problemes and tools in conjunction with computer system/network security
Understanding the security related side of design and implementation of computer systems
Understanding of attacks on security and prevention and defence mechanism and tools to prevent or defend those attacks
Learning the mechanism methods and techniques of secure programming
Computer networks
Course based on CISCO Security Essentials module Security issues and principles Security of operating systems . Access control Network security.Vulnerabilities, Attacks types Wireless network security Network security. Firewalls and IDS Virus and malware Software security. Defensive programming Web application security Penetration testing techniques Security auditing and security policies Introduction to cryptography. History and basics. Symmetric and Asymmetric cryptography Exam
On CISCO netacad paform Lecture, discussion, presentation, scenario
CISCO certificate. A good knowledge of security issues is mandatory for every computer system/network administrator in order to design and deploy a safe working IT environment. Also computer programmers, especially those who work in the field of WEB applications must know the security related issues regarding WEB programming.
Course Final evaluation: Project presentation. 50% Seminar/laboratory Continuous assessment 50%
Dieter Gollmann,
Computer Security. ed. 3, Wiley,,
2011,
R. Seacord,,
CERT C Coding Standard: 98 Rules for Developing Safe, Reliable, and Secure Systems 2nd edition, AddisonWesley,
2014,
M. Down, J. McDonald, J. Schuh,
The Art of Software Security Assessment. Identifying and Preventing Software Vulnerabilities, AddisonWesley,
2007,