This course provides students with an understanding of the technical elements required for auditing a technological system, ensuring anonymity, data protection and cryptographic operations such as encryption and re-identification.
Week 1 – Threat detection and modelling
Week 2 – Translating societal concerns into technological solutions
Week 3 – Cryptography, anonymity and re-identification
Week 4 – Secure storage and authentication management
Hours of dedication
5 hours a week. Total amount of hours: 20
Professionals, students or scholars interested in the field of technology consultancy related to privacy issues.