Learning Outcomes
Cognitive: Understanding of cryptography and cryptanalysis, classical cryptography, symmetric cryptography, asymmetric cryptography, network and internet security protocols,
systems security, systems threat management, security identification and vulnerabilities, Security policies, introduction to justice systems, economic, legal and ethical issues in systems security.
Skills: Acquire in-depth knowledge of the field of network security, solving exercises based on theory, implementation of laboratory exercises
Course Content (Syllabus)
ntroduction, cryptography and cryptanalysis techniques, classical cryptography, symmetric cryptography, asymmetric cryptography, network and internet security protocols,
systems security, systems threat management, security identification and vulnerabilities, Security policies, introduction to justice
systems, economic, legal and ethical issues in systems security.
Additional bibliography for study
1. W. Stallings , “Cryptography and Network Security” – Fifth Edition, Prentice Hall, 2011
2. K.Lam, D.LeBlanc, B.Smith, “Assessing Network Security”, Microsoft Press, 2004.
3. J.Kizza, F.M.Kizza, “Securing the Information Infrastructure”, IGI Global, 2008.
4. Σ.Κάτσικας, Δ.Γκρίτζαλης, Σ.Γκρίτζαλης, «Ασφάλεια Πληροφοριακών Συστημάτων», Εκδόσεις Νέων Τεχνολογιών, 2004.
5. Nigel Smart, Introduction to Cryptography (https://www.cs.umd.edu/~waa/414-F11/IntroToCrypto.pdf)