1 |
- |
Introduction, Basic Threats, Vulnerability |
Lecture, Question-Answer, Problem Solving Method |
2 |
- |
Analysis, Profile Analysis, MO. |
Lecture, Question-Answer, Problem Solving Method |
3 |
- |
ISO 27001 Information Security Management System |
Lecture, Question-Answer, Problem Solving Method |
4 |
- |
Malware and Malware, Virus Scanner Design and Usage Policies |
Lecture, Question-Answer, Problem Solving Method |
5 |
- |
Network security and Mobile security |
Lecture, Question-Answer, Problem Solving Method |
6 |
- |
Operating Systems and Critical Infrastructure Security |
Lecture, Question-Answer, Problem Solving Method |
7 |
- |
Social Engineering and Cyberbullying, Password Security |
Lecture, Question-Answer, Problem Solving Method |
8 |
- |
MID-TERM EXAM |
- |
9 |
- |
Security Concerns for IoT |
Lecture, Question-Answer, Problem Solving Method |
10 |
- |
Basic definitions and history of cryptography |
Lecture, Question-Answer, Problem Solving Method |
11 |
- |
Symmetric and Asymmetric Cryptosystems |
Lecture, Question-Answer, Problem Solving Method |
12 |
- |
Asymmetric Protocols: Electronic and Mobile signature systems |
Lecture, Question-Answer, Problem Solving Method |
13 |
- |
Pentest Stages and Methods |
Lecture, Question-Answer, Problem Solving Method |
14 |
- |
Pentest Stages and Methods |
Lecture, Question-Answer, Problem Solving Method |
15 |
- |
Pentest Stages and Methods |
Lecture, Question-Answer, Problem Solving Method |
16 |
- |
FINAL EXAM |
- |
17 |
- |
FINAL EXAM |
- |