1.1 Recognize the fundamental notions of threat, vulnerability, attack, countermeasure and security goals of a computing system.
1.2 Describe the major types of cryptographic algorithms and typical applications.
2.1 Choose a suitable security model for protection for a scenario
2.2 Explain the mechanisms available in an OS to control access to resources, concepts of authentication, and authorization.
2.3 Implement some of the common authentication mechanisms
2.4 Write code to encrypt and decrypt information using some of the standard algorithms.
3.1 Demonstrate important ethical issues to consider in computer security.
4.1 Communicate effectively in oral and written form
4.2 Use information and communication technologies