This shows you the differences between two versions of the page.
systems [2012/09/29 15:49] sergiu.costea |
systems [2015/09/26 12:38] (current) sergiu.costea [Master Courses] |
||
---|---|---|---|
Line 54: | Line 54: | ||
</tr> | </tr> | ||
<tr class="row1"> | <tr class="row1"> | ||
- | <td style="padding:10px; border:none;"> <a href="soa/"> <img src="/courses/res/sigla_soa.png" class="mediaright" align="right" alt="" width="100" /> </a> </td><td style="padding:10px; border:none;"> <strong>Advanced Operating Systems</strong> <br/> | + | <td style="padding:10px; border:none;"> <a href="osp/"> <img src="/courses/res/sigla_osp.png" class="mediaright" align="right" alt="" width="100" /> </a> </td><td style="padding:10px; border:none;"> <strong>Operating Systems Practical</strong> <br/> |
This course presents advanced concepts in operating systems as they are explored in research publications. </td> | This course presents advanced concepts in operating systems as they are explored in research publications. </td> | ||
</tr> | </tr> | ||
<tr class="row2"> | <tr class="row2"> | ||
- | <td style="padding:10px; border:none;"> <a href="scr/"> <img src="/courses/res/sigla_scr.png" class="mediaright" align="right" alt="" width="100" /> </a> </td><td style="padding:10px; border:none;"> <strong>Computer Network Security</strong> <br/> | + | <td style="padding:10px; border:none;"> <a href="scr/"> <img src="/courses/res/sigla_cns.png" class="mediaright" align="right" alt="" width="100" /> </a> </td><td style="padding:10px; border:none;"> <strong>Computer Network Security</strong> <br/> |
- | This course aims at providing a set of tools for vulnerability assesment and security calibration both at the network and at the operating system level. </td> | + | This course aims at providing a set of tools for vulnerability assessment and security calibration both at the network and at the operating system level. </td> |
+ | </tr> | ||
+ | <tr class="row2"> | ||
+ | <td style="padding:10px; border:none;"> <a href="scr/"> <img src="/courses/res/sigla_scr.png" class="mediaright" align="right" alt="" width="100" /> </a> </td><td style="padding:10px; border:none;"> <strong>Securing Computers and Networks</strong> <br/> | ||
+ | This course teaches network administrators how to secure network devices such as routers and switches. </td> | ||
</tr> | </tr> | ||
<tr class="row3"> | <tr class="row3"> | ||
Line 66: | Line 70: | ||
</tr> | </tr> | ||
<tr class="row4"> | <tr class="row4"> | ||
- | <td style="padding:10px; border:none;"> <a href="sred/"> <img src="/courses/res/sigla_sred.png" class="mediaright" align="right" alt="" width="100" /> </a> </td><td style="padding:10px; border:none;"> <strong>Security for Routers and Switches</strong> <br/> | + | <td style="padding:10px; border:none;"> <a href="sred/"> <img src="/courses/res/sigla_sred.png" class="mediaright" align="right" alt="" width="100" /> </a> </td><td style="padding:10px; border:none;"> <strong>Securing Networks with Dedicated Devices</strong> <br/> |
- | This course focuses ont he planification, implementation and configuration of a secure, scalable, redundant and convergent network using dedicated firewalls and Unified Threat Management </td> | + | This course focuses on the planification, implementation and configuration of a secure, scalable, redundant and convergent network using dedicated firewalls and Unified Threat Management </td> |
</tr> | </tr> | ||
</table> | </table> | ||
</html> | </html> | ||