For topics in computer security, this course will cover an overview of operation systems security (particularly Linux), password security, access control mechanisms, patching, vulnerability analysis, ...
The program also provides current employees in the public and private sectors an opportunity to obtain advanced-level, high-quality training in the core areas of computer forensics, information ...
The degree will establish the computer science and software engineering system fundamentals needed by the modern security expert, in addition to how these fundamentals, when combined with expert ...
The past decade has seen an explosion in the concern for the security of information. This course introduces students to the basic principles and practices of computer and information security. Focus ...
It explains vulnerabilities of computer systems and networks ... UTSA Center for Infrastructure Assurance and Security Certified Information Systems Security Professional Prep Courses are instructed ...
This course will focus on remote computer penetration (hacking). The class will introduce basic theory for many different types of attacks; then we will actually carry them out in 'real-world' ...
Prepare and train computer security experts for the delivery of computer security training modules, demonstrations and hands-on exercises conducted during training activities at the IAEA’s NSTDC.
Basic concepts and techniques of computer network security; data encryption algorithms; public-key cryptography and key management; data authentication; network security protocols in practice; ...
This course aims to meet the increasing demands for combining computer networks, security and programming expertise raised by the growing adoption of the next-generation network services. On this page ...
Security was top of mind when Dr. Marcus Botacin, assistant professor in the Department of Computer Science and Engineering, heard about large language models (LLMs) like ChatGPT. LLMs are a type of ...
The IAEA provides guidance and training to assist States in developing comprehensive computer and information security activities. The use of computer-based systems at nuclear and radiological ...