Having completed this course the student will be able to: • communicate knowledge of the concepts, models and terms commonly used in the area of ICT security. • understand the basic concepts and scientific thinking in information security. • identify the current ICT security issues. • evaluate factors that influence the security of systems.

Having completed this course the student will be able to: • understand the basic concepts and scientific thinking in cryptography. • describe a number of cryptographic algorithms and protocols. • do security proofs for cryptographic schemes. • prove the security of cryptographic protocols.

Having completed this course the student will be able to: • understand the necessity of formal specification and analysis of security-critical systems. • have acquired profound knowledge about some of the existing models, analysis methods and tools for cryptographic protocols/access control/information flow: underlying assumptions, techniques, limitations, relationships. • apply and judge these methods and tools.

Having completed this course the student will be able to: • understand the security threats, mechanisms, protocols and services in computer networks. • analyze and evaluate the implementation and functioning of network applications and decide on their suitability from the security point of view. • design and implement applications that provide or use security services in computer networks.

Skip Navigation