General description
The course aims to identify the gaps and security threats faced by data transmitted over the Internet and its applications, and explain the ways to protect stored and transmitted data and access to the Internet, focus on breaches in websites and web pages, and use security tools to detect and confront security problems within their legal context and develop the necessary protection systems.
Learning Objectives:
At the end of this course the student should be able to:
§ Being able to identify the most important problems and security holes in operating systems and networks;
§ Ethics of Internet use and related laws;
§ Management of protections, and methods of verifying the level of security in services on the Internet.