IT-Security

Course contents
  • - Difference access security, integrity and protection of personal information
    - Symmetrical vs. asymmetric encryption
    - Consequences of legal bases such as the basic data protection regulation on the development of software
    - Encryption technologies (AES)
    - Secure data transfer (TLS)
    - Secure data storage
    - Login technologies, secure user accounts
    - Network security, firewalls
    - Secure application interfaces, such as Web-Service Security
    - Security aspects when programming software
MCI uses cookies to align content and recommendations with your interests. Detail information on the use of cookies and services for web analysis and online marketing can be found in our privacy policy. By using our website, you consent to the use of our cookie policy.
Privacy Policy