Skip to main content
Délia Boino
Submitted by dboino on 29 July 2021
Intended learning outcomes

Students to successfully finish this course you will:

  1. Understand the attack surface of computer infrastructure and services widely available in public and private clouds;
  2. Understanding ledger-based technologies as a way to ensure tolerance and resilience to intrusions;
  3. Understand the social engineering techniques used by malicious actors;
  4. Know how to use methods and tools to model security threats taking into account the attack vectors and the different malicious actors;
  5. Know how to use methods and tools for responding to incidents and know how to design recovery plans;
  6. Understand and use forensic methods in the analysis of incidents.


Curricular Unit Form