Mastery Topics

flickr photo by ecastro shared under a Creative Commons (BY) license
flickr photo by ecastro shared under a Creative Commons (BY) license

Show your Mastery

These are the topics that you should master during the course. I break this down into a list of topics that have a general structure and order but you can feel free to jump around the topics but you should cover each at a basic level and at least half of them at a deeper level (your choice).

Ideally you will be writing a blog post about each topic in which you can include text, images, videos or whatever helps for you to explore that area of software engineering. While putting together your content, feel free to include (or embed even) the work of others but while giving proper credit of course.

This list is by no means complete and you can dive down deeper in any area that interests you most. This course is in many ways a wide course with a shallow depth, we will look at many areas of computer security but none at a deep level and I encourage each of you to dive deeper in the topics that interest you most.

Core #TC2027 Topics

You should be looking at concepts (theory, opinions) as well as tools and practice

  1. Why should we study computing security.
  2. Three goals: Integrity, Availability and Confidentiality
  3. Ethic and legal responsibilities in computer security
  4. Certifications in Computing Security
  5. Ethical hacking
  6. IT Risk Management Frameworks
  7. Risk Assessment Methodologies
  8. Classic Security Architecture Models
  9. Security Policies
  10. Authentication and Access Control
  11. Cryptography
  12. Unintentional Security Issues
  13. Malware
  14. Security Countermeasures
  15. Security on the Web (User Perspective)
  16. Operating System Security
  17. Network Security
  18. Wireless Security
  19. Denial of Service
  20. Potpourri for $500

CC BY-SA 4.0 Mastery Topics by Bauer Ken is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.