Objectives

Review the theoretical and practical security fundamentals for distributed systems, with emphasis on experimental techniques to secure, monitor and maintain an information system protected from security threats.

Pre-requisites

Basic understanding of Computer networks Architecture
Basic understanding of TCP/IP
User's knowledge of UNIX and Windows NT operating Systems

Intendended Audience

Technical and management personnel in charge of securing information systems, secure information transmission, electronic commerce and data base protection.

Coordinator

Reinaldo Mayol

Instructors

Reinaldo Mayol Arnao
Angélica Florez Abril
Lergis Valero
Leonardo Uzcátegui
Alejandra Stolk
José Francisco Torres Mozón
Antonio Lobo

Content

Introduction to computer networks security.
Fundamental Concepts: Authentication, Integrity,
Confidentiality , Availability
Security Policy Design: ISO 17799
Introduction to Cryptography
Substitution and Transposition.
Block Ciphering
Symmetric Key Ciphering
Public Key Ciphering
Hash functions Integrity and Authentication
Symmetric Key Ciphering Algorithms
DES
3DES
IDEA
Blowfish
RIJNDAEL
Asymmetric Key Ciphering Algorithms
Introduction to Numerical Methods
D. Hellman
RSA
MD5, SHA
PKI
DigitalSignatures
CA, RA
· · X.509

Capacity

Maximum of 30 Participants.
40 hours.