Cybersecurity

Course objectives

General objectives: The course aims at training professionals able to successfully face the challenges posed by the security problems of the information society. Specific objectives: The course includes the study of various models of access control, analysis of the main difficulties and resolutions of cryptographic problems and the main security protocols used in the network Knowledge and understanding: Upon passing the exam, the student will have knowledge and understanding of the bases of computer security and of the main technologies for the analysis and solution of security problems. Apply knowledge and understanding: The course enables students to apply their knowledge and understanding skills to solve IT security problems, with sufficient autonomy to deal with complex problems; and for the effective consultation of advanced scientific and technological documentation. Autonomy of judgment: The course aims to acquire autonomous interpretation skills to propose solutions to security problems congruent with the available technologies, and to continuously update the technological evolution, to formulate independent critical judgments contributing to the progress of system security. Communication skills: Students acquire the ability to present and to argue their ideas about the security problems faced and the solutions proposed, both with colleagues and with users Next learning ability: The course provides for the development of in-depth capabilities in the field of computer security both of methodological and technological aspects, to adapt to the progress of techniques and solutions to the most common security problems, and to continue autonomously to solve new problems. safety issues.

Channel 1
ANGELO SPOGNARDI Lecturers' profile

Program - Frequency - Exams

Course program
(Tentative) Computer Security Concepts Cryptographic tools User Authentication Access Control Malicious Software Denial-of-Service Attacks Intrusion Detection Firewalls and Intrusion Prevention Systems Buffer Overflow Software Security Operating System Security Trusted Computing and Multilevel Security IT Security Management and Risk Assessment IT Security Controls, Plans, and Procedures Physical and Infrastructure Security Human Resources Security Security Auditing Legal and Ethical Aspects Symmetric Encryption and Message Confidentiality Public-Key Cryptography and Message Authentication Internet Security Protocols and Standards Internet Authentication Applications Wireless Network Security
Prerequisites
Basic knowledge of operating systems, networking, and methamatics.
Books
Computer Security: Principles and Practice 4th Edition by William Stallings (Author), Lawrie Brown (Author)
Frequency
Not mandatory, highly recommended.
Exam mode
Multi-choice and open questions
  • Lesson code10595532
  • Academic year2025/2026
  • CourseApplied Computer Science and Artificial Intelligence
  • CurriculumSingle curriculum
  • Year3rd year
  • Semester1st semester
  • SSDINF/01
  • CFU6