The aim of the course is to cover the underlying principles and techniques used in securing CIS and to give examples of how they are applied in practice.
At the end of the course, the students will have an understanding of the themes and challenges of CIS security and the current state of the art, they will have developed a critical approach to the analysis of CIS security and will be able to bring this approach to bear on future decisions regarding security. Finally students will be able to appreciate the main threats, attack techniques and defenses relevant to the security of CIS, to identify potential vulnerabilities and propose countermeasures and to design secure CIS.