In the first module we connected the methods used to the courses where they're taught, for instance provable security to the Foundations of Crypto course.
We also have courses on formal verification etc.
However, we should recap the methods that are not covered in the prerequisite courses. We should revise what the computer security course covers.
In the first module we connected the methods used to the courses where they're taught, for instance provable security to the Foundations of Crypto course.
We also have courses on formal verification etc.
However, we should recap the methods that are not covered in the prerequisite courses. We should revise what the computer security course covers.