Information must be protected for several reasons. Some information must be protected from eavesdroppers and some from unauthorized modification. Users must be authenticated and access to information must be controlled. At the same time, the number of Internet-connected devices are increasing and so is the amount of information that we are able to access online. This course introduces the problems we face when designing security for computers, mobile devices and web applications and provides an overview of the solutions to these problems. The course focuses on concepts and ideas, not technical details. Still, the goal is to provide a good understanding of building blocks, attacks, and defenses.
WHO SHOULD ATTEND
Anyone who wants to increase their understanding of information security and how it affects the systems and products that we interact with in everyday life. If you would like to understand how to protect your own data, in business or privately, this course will help. As the course does not include technical details, you do not need a technical background to find the course useful.
- Password security
- Principles for protecting stored and transmitted data
- Data integrity
- Security features in computers and applications
- Email security
- Internet anonymity
- Security in electronic payment solutions
- Security in Internet applications
On completion of the course, participants should be able to:
- discuss security aspects in an informed way
- understand design decisions related to security
- understand basic security principles on the Internet
- understand how security can be broken
- understand common ways of protecting computers and systems against attacks
- distinguish different security measures and explain where and why they are used
- understand how web accounts can be hijacked and how to protect against this
Martin Hell is an Associate Professor at the Department of Electrical and Information Technology. He has a Ph.D. in Information Theory and has been teaching various courses in computer and web security for more than 10 years. In his research in security and cryptography, he has published more than 40 articles in international conferences and journals.
TEACHING AND ASSESSMENT
Teaching takes the form of lectures. Assessment is based on home exercises and written assignments. Participants are awarded one of the following grades: Fail, Pass or Pass with Distinction.
Given upon reqest
Lund University, Lund, Sweden
17.500 SEK, excluding VAT. The course fee includes tuition and documentation in the form of printed lecture slides and diploma.
Time schedule and setup
One half day per week. The course will be studied together with exchange students at Lund University.
For course information,
please contact Martin Hell,
Lund University Faculty of Engineering,
+46 222 43 53
For practical information,
please contact Anders Dackehed,
Lund University Commissioned Education,
+46 222 07 54