This shows you the differences between two versions of the page.
|
systems [2012/09/29 15:49] sergiu.costea |
systems [2015/09/26 12:38] (current) sergiu.costea [Master Courses] |
||
|---|---|---|---|
| Line 54: | Line 54: | ||
| </tr> | </tr> | ||
| <tr class="row1"> | <tr class="row1"> | ||
| - | <td style="padding:10px; border:none;"> <a href="soa/"> <img src="/courses/res/sigla_soa.png" class="mediaright" align="right" alt="" width="100" /> </a> </td><td style="padding:10px; border:none;"> <strong>Advanced Operating Systems</strong> <br/> | + | <td style="padding:10px; border:none;"> <a href="osp/"> <img src="/courses/res/sigla_osp.png" class="mediaright" align="right" alt="" width="100" /> </a> </td><td style="padding:10px; border:none;"> <strong>Operating Systems Practical</strong> <br/> |
| This course presents advanced concepts in operating systems as they are explored in research publications. </td> | This course presents advanced concepts in operating systems as they are explored in research publications. </td> | ||
| </tr> | </tr> | ||
| <tr class="row2"> | <tr class="row2"> | ||
| - | <td style="padding:10px; border:none;"> <a href="scr/"> <img src="/courses/res/sigla_scr.png" class="mediaright" align="right" alt="" width="100" /> </a> </td><td style="padding:10px; border:none;"> <strong>Computer Network Security</strong> <br/> | + | <td style="padding:10px; border:none;"> <a href="scr/"> <img src="/courses/res/sigla_cns.png" class="mediaright" align="right" alt="" width="100" /> </a> </td><td style="padding:10px; border:none;"> <strong>Computer Network Security</strong> <br/> |
| - | This course aims at providing a set of tools for vulnerability assesment and security calibration both at the network and at the operating system level. </td> | + | This course aims at providing a set of tools for vulnerability assessment and security calibration both at the network and at the operating system level. </td> |
| + | </tr> | ||
| + | <tr class="row2"> | ||
| + | <td style="padding:10px; border:none;"> <a href="scr/"> <img src="/courses/res/sigla_scr.png" class="mediaright" align="right" alt="" width="100" /> </a> </td><td style="padding:10px; border:none;"> <strong>Securing Computers and Networks</strong> <br/> | ||
| + | This course teaches network administrators how to secure network devices such as routers and switches. </td> | ||
| </tr> | </tr> | ||
| <tr class="row3"> | <tr class="row3"> | ||
| Line 66: | Line 70: | ||
| </tr> | </tr> | ||
| <tr class="row4"> | <tr class="row4"> | ||
| - | <td style="padding:10px; border:none;"> <a href="sred/"> <img src="/courses/res/sigla_sred.png" class="mediaright" align="right" alt="" width="100" /> </a> </td><td style="padding:10px; border:none;"> <strong>Security for Routers and Switches</strong> <br/> | + | <td style="padding:10px; border:none;"> <a href="sred/"> <img src="/courses/res/sigla_sred.png" class="mediaright" align="right" alt="" width="100" /> </a> </td><td style="padding:10px; border:none;"> <strong>Securing Networks with Dedicated Devices</strong> <br/> |
| - | This course focuses ont he planification, implementation and configuration of a secure, scalable, redundant and convergent network using dedicated firewalls and Unified Threat Management </td> | + | This course focuses on the planification, implementation and configuration of a secure, scalable, redundant and convergent network using dedicated firewalls and Unified Threat Management </td> |
| </tr> | </tr> | ||
| </table> | </table> | ||
| </html> | </html> | ||