COMP 4410 Computational Security
Analysis of the foundations for the detection of risks and threats against information systems. Evaluation of the vulnerability of computer systems. Application of controls and methods of protection in the safe and reliable operation of an information system. It requires 45 hours of conference-laboratory.
Prerequisite
COMP 3300 or ADEV 2500