Fundamental concepts in computing systems and their security aspects
The module aims to build a solid foundation for understanding computer systems, managing data securely, developing secure applications, and protecting systems now and in future technological environments.
Module Information
This module aims to provide a comprehensive understanding of fundamental concepts in computing systems and their security aspects. Its main objectives include understanding computing systems, exploring data and file management, gaining practical skills, learning secure programming principles, understanding networking fundamentals, introducing security principles.
Key Details
This module is delivered in hybrid format, as a combination of online, in-person and self-learning activities. The module uses innovative hybrid learning methods that combine live (synchronous) and self-paced (asynchronous) activities, with particular focus on practical activities and real-world scenarios connected to cybersecurity. Expert tutors guide students through the material, ensuring a comprehensive learning experience.
This module aims to equip participants with a comprehensive understanding of industry-leading best practices—including NIST, ISO, and other standards—for establishing and enhancing organizational resilience against cyber threats. Toward this goal, the module employs periodic quizzes, assignments and team projects.
Time commitment:
- Online activities: 14 hours
- In-person activities: 14 hours
- Self-learning: 28 hours
- Individual, team and guided projects and activities: 94 hours
- Total: 150 hours
Credit points: 6 ECTS
Grading:
- Lecture quizzes: 10%
- Assignments: 20%
- Team Project: 30%
- Exam: 50% (quiz, practical exam)
Subjects covered
Computer Systems: Hardware, Software, Users
Tools and Common Applications of Computer Systems
Data and Files
Users and Access
Storing and Versioning Data
Data Processing and Visualisation
Secure Programming
Secure Code Operations
Networking and Connected Systems
Fundamental Security Topics
Integrity and Confidentiality
Authentication, Authorization and Access Control
Apply nowLearning objectives
Investigate hardware and software configurations of computing systems to assess their components and security posture.
Install, uninstall, and configure applications and operating system tools effectively.
Manage data storage, versioning, and backups using appropriate tools and methodologies.
Apply secure programming practices, including code review, static/dynamic analysis, and defensive coding techniques.
Configure network parameters, troubleshoot connectivity issues, and implement basic network security measures.
Apply nowModule leaders
Florin Daniel ANTON obtained his MSc. degree in Automatic Control in 2003, and the Ph.D. degree in “Automatic Control” in 2008 of the University Politehnica of Bucharest, Faculty of Automatic Control and Computers. Socrates scholarship at the “Université de Valenciennes et du Hainaut-Cambrésis (UVHC)”, ENSIAME faculty (2003). Since 2003 he is engineer at the University Politehnica of Bucharest, Faculty of Automatic Control and Computers where he teaches courses and laboratory classes for: Computer Systems Security and Information Systems Security, Robotics and Artificial Vision. Scientific Director of five national research grants, and team member in 16 scientific projects in national and international R&D programs. Author and co author of over 80 scientific papers in the field of security, robotics, artificial vision, distributed information systems, high availability and fault-tolerant systems, disaster recovery published in national and international monographs, journals and conference proceedings. Member of the National Organizing Committees of IFAC IAD 2003, RAAD 2005 and 2009 conferences. Session chairman in the conferences: RAAD 2006 and MITIP 2007. System engineer and Linux trainer in the IBM Linux Competency Centre in Bucharest, he received the RedHat Certified System Engineer certification in 2008.
Apply nowMaking Europe cyber-aware
Our digital world is under constant attack. Master the advanced skills to defend critical data and infrastructure. Become a sought-after expert in one of today’s most vital and in-demand career fields.
Download prospectus