Código y Nombre de la Asignatura: ELP 8011 - CRIPTOGRAFIA |
División Académica:
División de Ingenierías
Departamento Académico: Dpto. Ingeniería de Sistemas Número de créditos: Intensidad horaria (semanal para nivel pregrado y total para nivel postgrado): 3.000 Horas de Teoría 0.000 Horas de Laboratorio Niveles: Educación Superior Pregrado Tipos de Horario: Teoría This course presents an introduction to computer and network security. The course will change the student perspective so he can build systems taking into account the insecurity of the environment, allowing him to create controls in the building, managing, and auditing processes of systems. 3. Relevance The latest advances in technology have drastically changed the way companies make business. Advances such as the mobile revolution, big data and e-commerce have made information the most critical asset in every company. For this reason, protecting and securing these assets is a key element that must be considered as part of the strategy of any business. Information security’s best practices will help guarantee business continuity and competitiveness avoiding the risks associated with taking advantage of all the information technologies advances present in the market today. 4. General objective of the course: This course will be oriented towards: Understand information security’s importance in our increasingly complex systems world. Get in touch with the concepts that rules today security standards. Grow a “security mindset:” learn how to critically explore situations of computer and network usage. Design or audit systems aligned with the latest security best practices. 5. Learning outcomes At the end of the course, students must be able to: Competence dimension Learning outcome Knowledge of concepts Acknowledge the Impact of the security models in the competitive success and profitability of modern Systems organizations. Appreciate the ethical, contractual, and legal issues faced by security administrators. Abilities (Applying concepts) Design security strategies to reduce securities risks. Know how to use planning and technology to achieve secure building standards. Design systems taking into account security best practices. Attitudes (As an individual) Apply analysis methods, take decisions, and add strategic support to systems management and administration. 6. Course planner Introduction What is security? Whitepapers, textbook and other articles readings.Why security?. History of security Security Process Security model 6 Case Studies, Workshops Security Policies. Security trends. Security standards Host security Servers security, Mobile Security Internet Security web security Network Security Network security designs Case Studies, Workshops, Wired security, Wireless Security Cryptography Asymmetric-Cryptography Case studies, Workshops, Symmetric-Cryptography, Hashing, Key Exchange Methods |
Regresar a Anterior | Nueva búsqueda |