Skip to main content
Délia Boino
Submitted by dboino on 23 March 2021
Intended learning outcomes

Students to successfully finish this course you will:

  1. Clearly perceive the concepts of confidentiality, integrity and authentication and protocols used to ensure them.
  2. Identify, either from the standpoint of the attackers or defenders, the critical points in terms of security.
  3. Define possible solutions to increase the security by analyzing the vulnerabilities, threats and attacks of communication systems.
  4. Use and configure network equipment with different protocols used to increase safety.
  5. Make the conscious choice of the security policy most appropriate for each situation.

 

Curricular Unit Form