IT-Security

Course contents
  • - Difference access security, integrity and protection of personal information
    - Symmetrical vs. asymmetric encryption
    - Consequences of legal bases such as the basic data protection regulation on the development of software
    - Encryption technologies (AES)
    - Secure data transfer (TLS)
    - Secure data storage
    - Login technologies, secure user accounts
    - Network security, firewalls
    - Secure application interfaces, such as Web-Service Security
    - Security aspects when programming software
Cookies make it easier for us to provide you with our services. With the usage of our services you permit us to use cookies.
Privacy Policy