-
Presentation
Presentation
The objectives of this course is to train students to obtain specialized professional profiles, capable of dealing effectively with the increasing complexity of the security threats to which network and cloud applications are exposed, using the most advanced technologies in computer security to implement high security standards in computer networks.
-
Class from course
Class from course
-
Degree | Semesters | ECTS
Degree | Semesters | ECTS
Bachelor | Semestral | 5
-
Year | Nature | Language
Year | Nature | Language
3 | Mandatory | Português
-
Code
Code
ULHT2531-11194
-
Prerequisites and corequisites
Prerequisites and corequisites
Not applicable
-
Professional Internship
Professional Internship
Não
-
Syllabus
Syllabus
Introduction to IT Security Fundamental concepts of IT Security Security paradigms · Crypto · Security algorithms · Authentication · Key management Network security · Firewalls · IDS/IPS · Wireless · Security architectures · Secure communication · Attacks and vulnerabilities Security management and policies
-
Objectives
Objectives
At the end of the course, students must: Identify the different areas and applications of computer security. Understand and apply the key encryption algorithms, and to assess the security levels they provide Identify and understand the current threats to security in data networks and develop the best practices needed to prevent them Design and implement network applications complying with strong security requirements even using insecure communication channels Apply these concepts to real life scenarios, in the context of their final project or professional internship
-
Teaching methodologies and assessment
Teaching methodologies and assessment
To be described
-
References
References
Matt Bishop (2004), Introduction to Computer Security. Addison Wesley Professional. William Stallings (2003), Network Security Essentials Applications and Standards, Prentice Hall, 2 Ed. William Stallings (2005), Cryptography and Network Security Principles and Practices. Prentice Hall, 4 Ed. C. P. Pfleeger, S. L. Pfleeger (2006), Security in Computing, Prentice Hall, 4 Ed Bruce Schneier (1996), Applied Cryptography. John Wiley & Sons, 2 Ed. A. Zúquete (2006) Segurança em redes informáticas. FCA. M. Correia, P. Sousa (2017) Segurança no software. FCA
-
Office Hours
Office Hours
-
Mobility
Mobility
No