Show your Mastery
These are the topics that you should master during the course. I break this down into a list of topics that have a general structure and order but you can feel free to jump around the topics but you should cover each at a basic level and at least half of them at a deeper level (your choice).
Ideally you will be writing a blog post about each topic in which you can include text, images, videos or whatever helps for you to explore that area of software engineering. While putting together your content, feel free to include (or embed even) the work of others but while giving proper credit of course.
This list is by no means complete and you can dive down deeper in any area that interests you most. This course is in many ways a wide course with a shallow depth, we will look at many areas of computer security but none at a deep level and I encourage each of you to dive deeper in the topics that interest you most.
Core #TC2027 Topics
You should be looking at concepts (theory, opinions) as well as tools and practice
- Why should we study computing security.
- Three goals: Integrity, Availability and Confidentiality
- Ethic and legal responsibilities in computer security
- Certifications in Computing Security
- Ethical hacking
- IT Risk Management Frameworks
- Risk Assessment Methodologies
- Classic Security Architecture Models
- Security Policies
- Authentication and Access Control
- Cryptography
- Unintentional Security Issues
- Malware
- Security Countermeasures
- Security on the Web (User Perspective)
- Operating System Security
- Network Security
- Wireless Security
- Denial of Service
- Potpourri for $500
Mastery Topics by Bauer Ken is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.