Information System Security
The course is structured into 12 key thematic areas:
- Foundations: Introduction to the CIA Triad and the evolution of security.
- Threat Landscape: Analysis of Malware, Phishing, DDoS, and Social Engineering.
- Policy & Governance: Developing Access Control and RBAC policies.
- Architecture: Security models (Bell-LaPadula, Biba) and Network Security (Firewalls, IDS).
- Cryptography: Symmetric vs. Asymmetric encryption and PKI.
- Identity Management: Multi-factor Authentication (MFA) and Single Sign-On (SSO).
- Testing: Vulnerability Assessment and Penetration Testing (VAPT).
- App Security: Secure SDLC and OWASP Top 10.
- Network Defense: VPNs, Tunneling, and Packet Analysis.
- Incident Response: Containment, eradication, and post-incident analysis.
- Legal & Ethics: Privacy laws and responsible disclosure.
- Future Trends: Cloud, IoT security, and AI in cyber defense.