Continuing Professional Development
InnoICT Competition Review
IS Audit & Security
Summer Activities 2012
|Organizer：||Education and Youth Affairs Bureau (DSEJ)|
|Co-Organizer：||Macau New Technologies Incubator Centre (Manetic)|
|Category Code：||369||Course Code：||3303|
|Course Name：||Computer Security Summer Course|
|Time：||02 – 26 July of 2012 , Mon & Thu, 14:30 – 16:00|
|Venue：||Pui Ching Middle School
(Avenida de Horta e Costa, No.7, Macau)
|Duration：||12 hours||Registration Fee：||MOP 35|
|Objective：||Integrating theory and practice in learning techniques of encryption, auditing computer systems and security implications of things such as buffer overflows, that allows students to apply better computer security.|
|Law, Ethics, Vulnerabilities and Risk Management
It is important to know the legal boundaries with computers and activities. Just because you can does not mean that you must partake in activities that breach laws ethics. This session includes learning about Risk management in a formal manner when finding about computer security problems to be able to know whether something should be done to correct the problems.
|Computer Security in the Software Industry
Computer system vulnerabilities are due to the way that computers are made and the way they are programmed. This session talks about the Hardware and Software designs that are inherently weak and require protection.
A presentation of the inner workings of a design flaws in software and hardware is shown. Students are welcome to bring their computers where they will be instructed on how to reproduce the presentation so as to be familiar with the concepts.
|Cryptography, Passwords and other Access management
There are good ways to protect information, and there are ways that make you believe that information is protected. This session covers the basics of cryptography, passwords, their use, their flaws and methods for correction.
|Reactive and Proactive Network
Computer security goes beyond just the computer but also security on the network. This session looks at network security in both a reactive approach such as firewalls and proactive approach such as intrusion protection systems.
|Tutorial: Checking Computer Systems
A presentation of tools that are available to check computer security is shown. Students are welcome to bring their computers where they will be instructed on how to reproduce the presentation so as to be familiar with the concepts.
|Malware, botnets and the malware prevention industry
Computer programs that take control of system are looked at, explained, and shown. Their methods of propagation are also discussed for the purpose to be able to interrupt their operation and keep computers safe.
|Tutorial: Security in Web Applications
A presentation of Web Application and their security issues are shown with the purpose to be able to identify and correct problems. Students are welcome to bring their computers where they will be instructed on how to reproduce the presentation so as to be familiar with the concepts.
- Students are required to have basic knowledge of computer and bring their own stationery to class.
- Instruction in English supplemented with Cantonese.
- Venue with unobstructed passages.