IT-Security

Course contents
- Difference access security, integrity and protection of personal information
- Symmetrical vs. asymmetric encryption
- Consequences of legal bases such as the basic data protection regulation on the development of software
- Encryption technologies (AES)
- Secure data transfer (TLS)
- Secure data storage
- Login technologies, secure user accounts
- Network security, firewalls
- Secure application interfaces, such as Web-Service Security
- Security aspects when programming software