Explores cybersecurity vulnerabilities, exploits, and attacks, including nation agent motivations, vulnerability types, exploit processes, and phishing tactics during crises.
Covers the principles and strategies of privacy engineering, emphasizing the importance of embedding privacy into IT systems and the challenges faced in achieving privacy by design.
Covers the concept of biometrics, the process of enrolling and verifying biometrics, and the importance of balancing false positives and false negatives.
Explores symmetric cryptography for integrity, emphasizing Message Authentication Codes and different encryption approaches to ensure data confidentiality and integrity.