Syllabus

Topics of lectures [tentative, subject to changes!]

Introduction


Authentication (I)


Authentication (II)


Access Control (I)


Access Control (II)


Wrap-up on Authentication and Authorization: TreC


Cryptography I


Cryptography II


Cryptography at work I


Cryptography at work II


Guest Lecture by A. Zorer, President of Trentino Network


Web security


Mobile security


Lectures by Tal Melamed of the Security & Trust Research Unit, FBK: Penetration Testing of Web Applications


Cloud security


Guest Lecture by P. Sartori, CSO & SOC Manager of Informatica Trentina


Guest Lecture by P. Guarda, Lecturer in Information Technologies Law, Faculty of Law, University of Trento