Ir a Contenido Principal

AURORA - Sistema de Información Académico

 

AYUDA | SALIR

Información detallada de curso

 

Primer semestre 2017
Abr 24, 2024
Imagen transparente
1. IDENTIFICACION DEL CURSO

Código y Nombre de la Asignatura: ELP 8011 - CRIPTOGRAFIA
División Académica: División de Ingenierías
Departamento Académico: Dpto. Ingeniería de Sistemas
Número de créditos:
Intensidad horaria (semanal para nivel pregrado y total para nivel postgrado):
3.000 Horas de Teoría
0.000 Horas de Laboratorio
Niveles: Educación Superior Pregrado
Tipos de Horario: Teoría


This course presents an introduction to computer and network security. The course will change the student perspective so he can build systems taking into account the insecurity of the environment, allowing him to create controls in the building, managing, and auditing processes of systems.

3. Relevance

The latest advances in technology have drastically changed the way companies make business. Advances such as the mobile revolution, big data and e-commerce have made information the most critical asset in every company. For this reason, protecting and securing these assets is a key element that must be considered as part of the strategy of any business. Information security’s best practices will help guarantee business continuity and competitiveness avoiding the risks associated with taking advantage of all the information technologies advances present in the market today.


4. General objective of the course:
This course will be oriented towards:

Understand information security’s importance in our increasingly complex systems world. Get in touch with the concepts that rules today security standards. Grow a “security mindset:” learn how to critically explore situations of computer and network usage. Design or audit systems aligned with the latest security best practices.

5. Learning outcomes

At the end of the course, students must be able to:

Competence dimension Learning outcome
Knowledge of concepts Acknowledge the Impact of the security models in the competitive success and profitability of modern Systems organizations. Appreciate the ethical, contractual, and legal issues faced by security administrators.

Abilities (Applying concepts)
Design security strategies to reduce securities risks. Know how to use planning and technology to achieve secure building standards. Design systems taking into account security best practices.

Attitudes (As an individual)
Apply analysis methods, take decisions, and add strategic support to systems management and administration.

6. Course planner

Introduction What is security?
Whitepapers, textbook and other articles readings.Why security?. History of security

Security Process Security model 6 Case Studies, Workshops
Security Policies. Security trends. Security standards

Host security
Servers security, Mobile Security

Internet Security
web security

Network Security Network security designs
Case Studies, Workshops, Wired security, Wireless Security

Cryptography Asymmetric-Cryptography
Case studies, Workshops, Symmetric-Cryptography, Hashing, Key Exchange Methods


Regresar a Anterior Nueva búsqueda
Imagen transparente
Versión: 8.7.2 [BSC: 8.10]