Programma Svolto. Inglese. 5Bi. prof.ssa Fiorenza Congedo



Similar documents
Bellevue University Cybersecurity Programs & Courses

LICEO SCIENTIFICO L. da VINCI Reggio Calabria A/S 2014/2015 PROGRAMMA SVOLTO DI LINGUA E CULTURA INGLESE CLASSE 2 G

By : Khalid Alfalqi Department of Computer Science, Umm Al-Qura University

Introduction to Cyber Security / Information Security

Bachelor of Information Technology (Network Security)

Web Design (One Credit), Beginning with School Year

Detailed Description about course module wise:

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Cisco Network Specialist CCNA

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

PROGRAMMA SVOLTO LICEO GINNASIO JACOPO STELLINI ANNO SCOLASTICO 2015/2016. La Docente Silvana Foti PROF.SSA SILVANA FOTI

Assessment of Learning Report Computer Science CPT Fall 2008 Spring I. Introduction and Background

Catapult PCI Compliance

A software solution is needed for secure communication between you and a friend. Requirements

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Scene of the Cybercrime Second Edition. Michael Cross

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Developing Network Security Strategies

Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

The Impact of Computer Engineering 1. The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015

74% 96 Action Items. Compliance

IT3504: Web Development Techniques (Optional)

How To Understand The History Of The Web (Web)

CISA TIMETABLE (4 DAYS)

What is a programming language?

Achieving PCI-Compliance through Cyberoam

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

INFORMATION SECURITY TRAINING CATALOG (2015)

IT3503 Web Development Techniques (Optional)

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies

VPN. Date: 4/15/2004 By: Heena Patel

Künftige Cyber-Attacken: Risiken und Techniken. Future Cyber attacks: Risks and techniques. Prof. Dr. T. Nouri sd&m

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

Diploma in Information Security Control, Audit and Management (CISSP Certification)

Taxonomy of Security Protocol

Virtual Private Networks

capabilities statement

2016 TÜBİTAK BİLGEM Cyber Security Institute

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

INFORMATION SECURITY TRAINING CATALOG (2016)

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

VoIP Security. Seminar: Cryptography and Security Michael Muncan

OCR LEVEL 3 CAMBRIDGE TECHNICAL

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Introduction to Information Technology Course Number 10009

GUI and Web Programming

LiveBox Manual WEB USER.

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce

Chapter 4: Networking and the Internet

Web Foundations Series Internet Business Associate

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Connecting with Computer Science, 2e. Chapter 5 The Internet

Cyber Security Certificate

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Security on Embedded Systems


Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Network Security: A Critical Component to Any Business IT Plan.

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

PayFlex FTP - Wired Commute

CTI Higher Certificate in Information Systems (Engineering)

Classe I E Materia INGLESE anno scolastico 2015/2016

Content Teaching Academy at James Madison University

CIS 253. Network Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Accelerating PCI Compliance

DIGITAL MEDIA PRODUCTION

Montgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS

WEB DEVELOPMENT IA & IB (893 & 894)

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

n Introduction n Art of programming language design n Programming language spectrum n Why study programming languages? n Overview of compilation

Telework and Remote Access Security Standard

Application Intelligence, Control and Visualization

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence

BM482E Introduction to Computer Security

Bring Your Own Device (BYOD) and Mobile Device Management

ICANWK406A Install, configure and test network security

DATABASE SECURITY, INTEGRITY AND RECOVERY

ATTPS Publication: Trustworthy ICT Taxonomy

Textbook s Website for Online Review of Each Chapter

IT360: Applied Database Systems. Database Security. Kroenke: Ch 9, pg PHP and MySQL: Ch 9, pg

Certified Information Systems Auditor (CISA)

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Introduction to Windows 7 (Brought to you by RMRoberts.com)

Security in Wireless Local Area Network

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Vantage Report. User s Guide. Version /2006 Edition 1

PCI COMPLIANCE GUIDE For Merchants and Service Members

Product Summary RADIUS Servers

STOP. THINK. CONNECT. Online Safety Quiz

Transcription:

! I STITUTO T ECNICO I NDUSTRIALE S TATALE Guglielmo Marconi Verona Programma Svolto Inglese 5Bi prof.ssa Fiorenza Congedo Anno Scolastico 2014/15 Materia Inglese Classe 5Bi Docente Fiorenza Congedo Materiali didattici Blog di classe: http://englishlessons5bi.wordpress.com/ Nome documento ING5BIs

Modulo 1: The history of computers Unità didattica 1: Top 10 most important people in the history of computers Tim Berners-Lee Bill Gates Gordon Moore Philip Don Estridge Steve Jobs Douglas Engelbart John von Neumann Tommy Flowers Charles Babbage Alan Turing e visione del film The Imitation Game in lingua originale Modulo 2: Computer Languages Unità didattica 2: Programs and Programming The top 10 most popular programming languages: Java, C, C ++, PHP, Visual Basic, Python, C#, JavaScript, Perl and Ruby Unità didattica 3: Websites Designing a website Steps for a precise web design process: website layout, website style, website text, files and folders, images, links and testing Describe a web site that you have visited/that you often visit

Modulo 3: The Internet Unità didattica 4: The Internet: history & definition The history of the Internet Internet Quiz Timeline How did the Internet start? Early Networks The key moments in the development of the Internet Tim Berners Lee: biography The World Wide Web Unità didattica 5: The Internet of Things The Internet of Things What is the Internet of Things? What Does This Term Really Mean? Internet of Things: some examples of the Internet of Things in action The Web and the Internet of Things - both disruptive technologies The possible benefits of the Internet of Things How the Web and the Internet of Things will continue to improve global communication

Modulo 4: Security and Privacy of the Internet Unità didattica 6: Network Security Obiettivi specifici To understand the basic ideas related to security and privacy on the Internet To discuss controversial issues related to the Internet Network Security Anti-virus software Firewalls Secure passwords Access levels Encryption Network policies Acceptable Use Policy (AUP) Archiving Network security failures Cyber attacks Hacking 5 biometric alternatives to the password: heartbeat, ear shape, walk, typing speed and face recognition Unità didattica 7: Internet Security and Cybercrime Fight against cybercrime in Europe, EU Commission (video) James Lyne: Everyday cybercrime and what you can do about it (video) Unità didattica 8: We are living 1984 today We re living 1984 today George Orwell: biography 1984 by George Orwell: Video SparkNotes, Orwell's 1984 Summary

Unità didattica 9: Introduction to Cryptography Obiettivi specifici What is Cryptography? Modern cryptography The origin of cryptography Introduction to Cryptography and Caesar Cipher (video) Encryption The Enigma Machine Modulo 5: Networks and Databases Unità didattica 10: Network Topologies Networks Data packets Protocols Advantages and disadvantages Types of Network LAN Local Area Network WAN Wide Area network VPN Virtual Private Network WPAN Wireless Personal Area Network PAN - Personal Area Network Networking Basics Key Features Unità didattica 11: Databases What is a Database? (video) More about Databases (video) Even more about databases (video)

Unità didattica 12: Definition of a Database and a DBMS Definition of a Database Types of Database Rule 1: Information Rule Rule 2: Guaranteed Access Rule Rule 3: Systematic Treatment of Null Values Rule 5: Comprehensive Data Sublanguage Rule Rule 7. High-level Insert, Update, and Delete DBMS - Database Management Systems RDBMS Relational Database Management Systems Normalisation La docente prof.ssa Fiorenza Congedo