Certification Programme description: Information security threats: intentional threats, unintentional threats, malicious software (spyware, antivirus software); Information security policy: the security policy areas, security policy rules, examples; Information security audit: audit IT tools; Introduction to cryptography: information security history, breakthroughs in cryptography, cryptology; Confidentiality and encryption techniques: substitution cypher (types, examples), number systems (writing system, system types), Boolean functions, transposition cipher (matrix-based implementation of the cipher), one-time pad (encryption, key usage); Symmetric and asymmetric cryptosystems: encryption as a mathematical process, cryptosystems (construction, usage, defects, security), ideas of quantum cryptography; Biometric systems: the biometrics term, biometric system scheme (object identification in security systems - identification characteristics); Certificates: application, structure of a certificate; Hash functions: string conversion; Digital signature: operating principles, characteristics of digital signature; Kerberos server verification: authentication, passes
Certification Programme version/revision: EITC/IS/ISCFv1r2)Earned ECTS credits: 2