course
Computer Security CSC 519
In this course, we will discuss the Threats and vulnerabilities - Identification and authentication - Access control -
Intrusion detection - Encryption and privacy - Security policies and their evaluation.