Course overview
This course aims to provide foundational training in methods of hardware-based security for securing telecommunication devices and methods of network security for securing telecommunication networks.
Course learning outcomes
- Discuss common hardware-level vulnerabilities, attacks, and defences applicable to telecommunication devices
- Apply secure hardware technologies to protection of code integrity and data integrity in telecommunication devices
- Discuss common vulnerabilities, attacks and defences at the physical layer and data-link layer of a network protocol stack
- Discuss Diffie-Hellman key exchange, Transport Layer Security (TLS), post-quantum cryptography and discrete-variable quantum key distribution in terms of their principles and their roles in securing end-to-end communications