Authentication & Security Models
Course Description :
As more users access remote systems, the job of identifying and authenticating those users at distance becomes increasingly difficult. The growing impact of attackers on identification and authentication systems puts additional strain on our ability to ensure that only authorized users obtain access to controlled or critical resources. This course reviews basic cryptology techniques and introduces their application to contemporary authentication methods.
 Introduction for Authentication, Crypto Hash Functions for Authentication, Message Authentication Codes, Digital Signature, Trust Models - key management and distribution, User Authentication, Access Control, Wireless Authentication, cloud and IoT authentication.

Department :Computer Science
Program :Bachelor Of Cyber Security
Course Level :Bachelor
Course Outline :
 

King Abdullah II School of Information Technology
Department of Computer Science

Testimonials

  • Saying goodbye to my wonderful faculty is more nostalgic than simple words can describe; it has truly become a second home. ... Eman Ennab

  • King Abdullah II College for Information Technology was and still maintains the pertinent atmosphere for volunteering in many sci ... Yousef Arabiat

  • Despite having differences between the study experiences and real work experience, the university is the pillar for building care ... Abed Abuhijleh