Objectives and competences
The aim is to introduce students to the concepts and practices of
modern cybersecurity. The course provides general information on
the main aspects of cybersecurity that we encounter on a daily
basis. In addition to fundamental concepts such as maintaining
confidentiality, integrity, and authentication of information, the
course also addresses modern mechanisms currently in use.
Students will acquire the theoretical foundations of the field (core
knowledge and technologies) and become familiar with the most
advanced components of cybersecurity.
Content (Syllabus outline)
• Ssecurity principles, objectives and risks.
• Cryptography fundamentals to ensure confidentiality, integrity
and authentication.
• Public Key Infrastructure (concepts, building blocks and terms),
digital certificates and electronic signatures.
• Authentication methods, passwords and multi-factor
authentication (MFA).
• Malware and internet scams.
• Introduction to websecurity.
Learning and teaching methods
• lectures
• lab work
• individual work
Intended learning outcomes - knowledge and understanding
• understand the principles and techniques of cryptography
• understand how digital certificates and signatures work and how
to use them
• understand how different authentication methods work
• distinguish between different types of attacks
• demonstrate the building blocks of secure (online)
communication
Intended learning outcomes - transferable/key skills and other attributes
• Communication skills: oral lab work defence and manner of
expression at the oral examination.
• Use of information technology: systematic approach to solving
cybersecurity problems, deployment and use of software solutions
to protect ICT systems.
• Problem-solving: use of tools related to cybersecurity.
Readings
• Marko Hölbl In Lili Nemec Zlatolas, Gesla, overjanje in digitalno podpisovanje : učno gradivo [na spletu]. Maribor : Fakulteta za
elektrotehniko, računalništvo in informatiko. 2022. Pridobljeno s: https://dk.um.si/IzpisGradiva.php?lang=slv&id=83411
• Easttom, C. (2016). Computer security fundamentals (3rd ed., p. XVIII, 426). Pearson.