| 1 |
- |
Introduction, Basic Threats, Vulnerability |
Lecture, Question-Answer, Problem Solving Method |
| 2 |
- |
Analysis, Profile Analysis, MO. |
Lecture, Question-Answer, Problem Solving Method |
| 3 |
- |
ISO 27001 Information Security Management System |
Lecture, Question-Answer, Problem Solving Method |
| 4 |
- |
Malware and Malware, Virus Scanner Design and Usage Policies |
Lecture, Question-Answer, Problem Solving Method |
| 5 |
- |
Network security and Mobile security |
Lecture, Question-Answer, Problem Solving Method |
| 6 |
- |
Operating Systems and Critical Infrastructure Security |
Lecture, Question-Answer, Problem Solving Method |
| 7 |
- |
Social Engineering and Cyberbullying, Password Security |
Lecture, Question-Answer, Problem Solving Method |
| 8 |
- |
Security Concerns for IoT |
Lecture, Question-Answer, Problem Solving Method |
| 9 |
- |
Basic definitions and history of cryptography |
Lecture, Question-Answer, Problem Solving Method |
| 10 |
- |
MID-TERM EXAM |
- |
| 11 |
- |
Symmetric and Asymmetric Cryptosystems |
Lecture, Question-Answer, Problem Solving Method |
| 12 |
- |
Asymmetric Protocols: Electronic and Mobile signature systems |
Lecture, Question-Answer, Problem Solving Method |
| 13 |
- |
Pentest Stages and Methods |
Lecture, Question-Answer, Problem Solving Method |
| 14 |
- |
Pentest Stages and Methods |
Lecture, Question-Answer, Problem Solving Method |
| 15 |
- |
Pentest Stages and Methods |
Lecture, Question-Answer, Problem Solving Method |
| 16 |
- |
FINAL EXAM |
- |
| 17 |
- |
FINAL EXAM |
- |