Secure implementation of systems
Overall Course Objectives
When the company must secure data in transit and storage, it is important to choose a safe and sufficiently fast cryptographic algorithm. In order to make a sensible choice, it is necessary to know the most commonly used algorithms. It is also important to create a secure network and databases.
It is also necessary to work with strategic planning in cyber security.
The course provides an overview of secure network architecture and data storage as well as the most commonly used security algorithms. The course introduces to symmetric and asymmetric algorithms and ECC (Elliptic Curve Cryptography). In addition, the course reviews HASH algorithms and the use of digital signatures. The course covers the most commonly used security protocols (Diffie-Hellman key distribution, Kereberos, X.509, PgP SSL/TLS). The course also contains implementation of backup systems and use of honeypots.
The course uses Cybersecurity Framework from NIST. This framework is used to identify security risks and create protection strategies as well as strategies to detect cyber security events in the system.
See course description in Danish
Learning Objectives
- Design a secure system
- Document the secuirty in the system
- Know, understand, explain, and apply the Cyber Security framework (NIST)
- Know, understand, and explain the most used cryptographic algorithms
- Reflect on the cryptographic algorithms used in a system
- Identify security risks in a system
- Describe methods for securing networks and databases
- Argue for the choice of protective strategies
- Reflect on how to respond on a given security incident
Course Content
– Secure system design
– Cyber Security Framework (NIST)
– Cyber riscs and response
– Documentation of security
Faculty
Remarks
Section of AI, Mathematics and Software
Valgfag: IT og Økonomi
Limited number of seats
Minimum: 10, Maximum: 80.
Please be aware that this course has a minimum requirement for the number of participants needed, in order for it to be held. If these requirements are not met, then the course will not be held. Furthermore, there is a limited number of seats available. If there are too many applicants, a pool will be created for the remainder of the qualified applicants, and they will be selected at random. You will be informed 8 days before the start of the course, whether you have been allocated a spot.