May 5, 2017
The objective of this course is to train the student to:
- Assimilate computer security as a set of methodologies.
- Analyze the security of a network or computer system, identifying its weak points for protection.
- Know the main attacks that a computer system can be subject to, as well as the possible methods of protection, detection and security policies that allow avoiding damage to the system or minimizing its impact.
- Understand the operation of different cryptographic protocols that are currently used.
- Know the most important authentication systems, identifying their characteristics.