0 evaluări0% au considerat acest document util (0 voturi)
23 vizualizări1 pagină
This document outlines a lesson plan for a computer security course taught over 4 modules across 14 weeks. The plan covers topics such as types of threats and vulnerabilities, encryption standards, program and operating system security, database security, network security, and administrative security practices. Specific techniques covered include substitution ciphers, transposition ciphers, DES, AES, RSA, user authentication, firewalls, and intrusion detection systems. The plan aims to teach students the meaning and goals of computer security, as well as technical and policy-based approaches to protecting computer systems and data.
This document outlines a lesson plan for a computer security course taught over 4 modules across 14 weeks. The plan covers topics such as types of threats and vulnerabilities, encryption standards, program and operating system security, database security, network security, and administrative security practices. Specific techniques covered include substitution ciphers, transposition ciphers, DES, AES, RSA, user authentication, firewalls, and intrusion detection systems. The plan aims to teach students the meaning and goals of computer security, as well as technical and policy-based approaches to protecting computer systems and data.
This document outlines a lesson plan for a computer security course taught over 4 modules across 14 weeks. The plan covers topics such as types of threats and vulnerabilities, encryption standards, program and operating system security, database security, network security, and administrative security practices. Specific techniques covered include substitution ciphers, transposition ciphers, DES, AES, RSA, user authentication, firewalls, and intrusion detection systems. The plan aims to teach students the meaning and goals of computer security, as well as technical and policy-based approaches to protecting computer systems and data.