Consider some of Section 4.1.2:
End-to-end secure communications
Explain the goals of end-to-end data security.
Describe what a digital investigation is, the sources of digital
evidence, and the limitations of forensics.
Explain the various possible attacks on passwords.
Data erasure Describe the various techniques for data erasure
courses (for starters): CSC101, CSC294, CSC490
Consider some of Section 4.1.2: End-to-end secure communications Explain the goals of end-to-end data security. Describe what a digital investigation is, the sources of digital evidence, and the limitations of forensics. Explain the various possible attacks on passwords. Data erasure Describe the various techniques for data erasure