1 |
Fundamentals of Security |
|
2 |
Fundamentals of Security-continued |
|
3 |
Authentication |
|
4 |
Authentication-continued |
|
5 |
Access Control |
|
6 |
Access Control-continued |
|
7 |
Cryptography-basics |
|
8 |
Cryptography- Symmetric |
|
9 |
Cryptography- Asymmetric |
|
10 |
Software Security |
|
11 |
Software Security-continued |
|
12 |
Database Security |
|
13 |
Database Security-continued |
|
14 |
Cloud Security |
|
15 |
Intrusion Detection Systems |
|
16 |
Intrusion Detection Systems-continued |
|
17 |
Risk management |
|
18 |
Risk management- continued |
|
19 |
Voting Systems |
|
20 |
voting Systems Security |
|
21 |
Midterm |
|
22 |
Students Presentation |
|
23 |
Students Presentation |
|
24 |
Students Presentation |
|
25 |
|
|