-
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Backup of Obsidian Vault on 04-03-24 : 03:26:40 from SamPC | 4 files …
…changed Details: M content/Computer Science/Algorithms & Data Structures Analysis/Notes/3.3 Radix Sort.md content/Computer Science/Cybersecurity Fundamentals/Cybersecurity Fundamentals.md, R content/Computer Science/Cybersecurity Fundamentals/Notes/1.1 Cybersecurity Overview.md content/Computer Science/Cybersecurity Fundamentals/Notes/2.1 Applied Cryptography.md
- Loading branch information
1 parent
e254eff
commit 8b35aaa
Showing
4 changed files
with
6 additions
and
10 deletions.
There are no files selected for viewing
2 changes: 1 addition & 1 deletion
2
.../Computer Science/Algorithms & Data Structures Analysis/Notes/3.3 Radix Sort.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
14 changes: 5 additions & 9 deletions
14
content/Computer Science/Cybersecurity Fundamentals/Cybersecurity Fundamentals.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,10 +1,6 @@ | ||
<<<<<<< HEAD | ||
|
||
| Week | Notes | Workshops | Assignments | | ||
| ---- | -------------------------- | -------------------------------------------------------------------------- | --------------------------------------- | | ||
| 1 | [[Cybersecurity Overview]] | | | | ||
| 2 | [[Applied Cryptography]] | [Workshop 1](https://github.com/santiagosayshey/CF-S2-2024/tree/workshop1) | [[Assignment 1 - Intro & Cryptography]] | | ||
|
||
======= | ||
In this course, you will be introduced to real-world cybersecurity challenges that organisations face, and learn to apply knowledge and skills gained through other Computer Science courses to address them. The challenges will be examined both from the attacker's perspective (how systems are exploited) and the defender's perspectives (how to secure systems or respond to threats). Common attack and defence strategies for software, web applications, networks, operating systems, cryptographic systems and humans will be explored. The course will also introduce cybersecurity management concepts, including security operations, risk management, security engineering and security architecture, as well as provide guidance on different career paths specialising in cybersecurity. We will also discuss the legal and ethical aspects of information security. This course focuses on hands-on activities, and students are encouraged to participate in public and industry cybersecurity challenges, including capture-the-flag competitions. | ||
>>>>>>> origin/v4 | ||
| Week | Notes | Workshops | Assignments | | ||
| ---- | ------------------------------ | -------------------------------------------------------------------------- | --------------------------------------- | | ||
| 1 | [[1.1 Cybersecurity Overview]] | | | | ||
| 2 | [[2.1 Applied Cryptography]] | [Workshop 1](https://github.com/santiagosayshey/CF-S2-2024/tree/workshop1) | [[Assignment 1 - Intro & Cryptography]] | | ||
| 3 | | | | |
File renamed without changes.
File renamed without changes.