User Tools

Site Tools


tanszek:oktatas:computer_system_security

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
tanszek:oktatas:computer_system_security [2025/02/12 07:49] – [Handouts] ohornyaktanszek:oktatas:computer_system_security [2025/03/19 13:51] (current) – [Handouts] ohornyak
Line 4: Line 4:
   * Data loss and corruption   * Data loss and corruption
   * User authentication methods, Passwords, encryption.   * User authentication methods, Passwords, encryption.
-  * Protection of privacy, destruction of data+  * Protection of privacy
   * Network security knowledge: protocols, devices, network attacks   * Network security knowledge: protocols, devices, network attacks
-  * Virtual private networks +  * Ethical hacking and forensics
-  * Ethical hacking+
   * Design and implement secure applications   * Design and implement secure applications
  
Line 128: Line 127:
   - {{tanszek:oktatas:w1_software_system_security.pdf|Week 1-2}}   - {{tanszek:oktatas:w1_software_system_security.pdf|Week 1-2}}
   - {{tanszek:oktatas:w2_software_system_security.pdf|Week 3-4}}   - {{tanszek:oktatas:w2_software_system_security.pdf|Week 3-4}}
-  - [[https://www.youtube.com/watch?v=lZAoFs75_cs|Week 5-6]]+  - {{ :tanszek:oktatas:cybersecurity_threats_identification_en2.pptx | Week 5}} 
 +  - [[https://www.youtube.com/watch?v=lZAoFs75_cs|Week 6]]
   - [[https://www.youtube.com/watch?v=3Kq1MIfTWCE|Week 7-8]]   - [[https://www.youtube.com/watch?v=3Kq1MIfTWCE|Week 7-8]]
   - {{tanszek:oktatas:pythontools.pdf|Week 9-10}}   - {{tanszek:oktatas:pythontools.pdf|Week 9-10}}
tanszek/oktatas/computer_system_security.1739346576.txt.gz · Last modified: 2025/02/12 07:49 by ohornyak