Salta ai contenuti. | Salta alla navigazione

Strumenti personali

Course program

Plain Text icon Course_program.txt — Plain Text, 1 kB (1698 bytes)

Contenuto del file

1-Summary, fundamentals, information
	- Basic concepts
	- Internet beyond the surface
	- Useful links

2-Risk, certification and governance
	- Risk analysis and cost-benefit-simplicity balance
	- Certifications
	- Outline of IT process management from a security point of view
	- Backup

3-Regulations
	- Notes on current legislation
	- The GDPR

4-Human factor
	- The human factor
	- BYOD and Shadow-IT
	- Social Engineering
	- Spam, Phishing and surroundings
	- Password management

5-Privacy and online rights
	- Privacy
	- My information online
	- Cookies and other profiling tools

6-The attacks
	- Types of attacks

7-Who are the bad guys
	- Who are the bad guys
	- Attacker's behavior (criminology basics)
	- How do bad guys cash out? A few words about Bitcoin and Blockchain

8-Security operation and incident management
	- From monitoring to intrusion prevention
	- Incident management (Damage Control)

9-Computer forensics
	- Digital Forensic

10-Encryption
	- Encryption
	- Certificates and digital signature

11-Operating systems and virtualization
	- Operating systems and virtual infrastructures

12-Vulnerability
	- The concept of vulnerability and its life cycle

13-Authentication Authorization
	- Authentication, authorization, identification
    	- Biometric techniques

14-Software security
	- Web application security
	- Secure software lifecicle

15-Network protocols security
	- TCP/IP protocols
	- Firewall and surroundings

16-Physical security
	- Physical/Hardware layer

17-Internet of Things
	- Internet of Things

18-Networks protection
	- Network infrastructure (physical and wifi)
	- VPN

Lab