IT-Security

Course contents
  • - Difference access security, integrity and protection of personal information
    - Symmetrical vs. asymmetric encryption
    - Consequences of legal bases such as the basic data protection regulation on the development of software
    - Encryption technologies (AES)
    - Secure data transfer (TLS)
    - Secure data storage
    - Login technologies, secure user accounts
    - Network security, firewalls
    - Secure application interfaces, such as Web-Service Security
    - Security aspects when programming software