Vak: Beveiliging en Techniek credits: 4
- Vakcode
- ITVB18SCY3
- Naam
- Beveiliging en Techniek
- Studiejaar
- 2019-2020
- ECTS credits
- 4
- Taal
- Nederlands
- Coördinator
- H.T. Keulen
- Werkvormen
-
- Hoorcollege
- Opdracht
- Toetsen
-
- Practicumopdracht - Overige toetsing
- Tentamen B&T - Computer, organisatie tentamenbureau
Leeruitkomsten
De student
- benoemt de begrippen,
- kenschetst de problemen,
- verklaart de verschijnselen,
- kiest de gereedschappen, en
- voert de stappenplannen uit
die ten gronde liggen aan
- technische beveiligingskunde,
- toegepaste cryptografie,
- netwerkbeveiliging,
- computerbeveiliging, en
- applicatiebeveiliging.
The student
- recalls the concepts,
- illustrates the problems,
- explains the phenomena,
- selects the tools, and
- carries out the procedures
behind
- security engineering,
- applied cryptography,
- network security,
- computer security, and
- application security.
Note: The description in English is the canonical version. It follows the Revised Bloom's Taxonomy, described in A Taxonomy for Learning, Teaching, and Assessing by Anderson and Krathwohl.
Body of knowledge: The course covers a technical subset of CISSP. This is specified in more detail in the CISSP Detailed Content Outline and in the CISSP Official Study Guide.
Context of use: The focus is on integrating security into the systems development life cycle.
- benoemt de begrippen,
- kenschetst de problemen,
- verklaart de verschijnselen,
- kiest de gereedschappen, en
- voert de stappenplannen uit
die ten gronde liggen aan
- technische beveiligingskunde,
- toegepaste cryptografie,
- netwerkbeveiliging,
- computerbeveiliging, en
- applicatiebeveiliging.
The student
- recalls the concepts,
- illustrates the problems,
- explains the phenomena,
- selects the tools, and
- carries out the procedures
behind
- security engineering,
- applied cryptography,
- network security,
- computer security, and
- application security.
Note: The description in English is the canonical version. It follows the Revised Bloom's Taxonomy, described in A Taxonomy for Learning, Teaching, and Assessing by Anderson and Krathwohl.
Body of knowledge: The course covers a technical subset of CISSP. This is specified in more detail in the CISSP Detailed Content Outline and in the CISSP Official Study Guide.
Context of use: The focus is on integrating security into the systems development life cycle.
Inhoud
- Security engineering
- Principles & standards
- Requirements engineering
- Threat modelling (ARA)
- Security assessment
- Applied cryptography
- Symmetric cryptosystems
- Public-key cryptography
- Key life-cycle management
- Implementation issues
- Network security
- Packets & protocols
- Network architectures
- Wireless technology
- Monitoring & response
- Computer security
- Access control methods
- Authentication & auditing
- Forensics & reversing
- Hardware-related concerns
- Application security
- Languages & programs
- Exploitation & mitigation
- Distributed applications
- Release engineering
- Principles & standards
- Requirements engineering
- Threat modelling (ARA)
- Security assessment
- Applied cryptography
- Symmetric cryptosystems
- Public-key cryptography
- Key life-cycle management
- Implementation issues
- Network security
- Packets & protocols
- Network architectures
- Wireless technology
- Monitoring & response
- Computer security
- Access control methods
- Authentication & auditing
- Forensics & reversing
- Hardware-related concerns
- Application security
- Languages & programs
- Exploitation & mitigation
- Distributed applications
- Release engineering
Opgenomen in opleiding(en)
School(s)
- Instituut voor Communicatie, Media & IT