Studying at the University of Verona
Here you can find information on the organisational aspects of the Programme, lecture timetables, learning activities and useful contact details for your time at the University, from enrolment to graduation.
Study Plan
This information is intended exclusively for students already enrolled in this course.If you are a new student interested in enrolling, you can find information about the course of study on the course page:
Laurea in Studi strategici per la sicurezza e le politiche internazionali - Enrollment from 2025/2026The Study Plan includes all modules, teaching and learning activities that each student will need to undertake during their time at the University.
Please select your Study Plan based on your enrollment year.
1° Year
Modules | Credits | TAF | SSD |
---|
2° Year activated in the A.Y. 2023/2024
Modules | Credits | TAF | SSD |
---|
2 modules among the following
3° Year activated in the A.Y. 2024/2025
Modules | Credits | TAF | SSD |
---|
2 modules among the following
Modules | Credits | TAF | SSD |
---|
Modules | Credits | TAF | SSD |
---|
2 modules among the following
Modules | Credits | TAF | SSD |
---|
2 modules among the following
Modules | Credits | TAF | SSD |
---|
Legend | Type of training activity (TTA)
TAF (Type of Educational Activity) All courses and activities are classified into different types of educational activities, indicated by a letter.
Introduction to computer science and cybersecurity (2024/2025)
Teaching code
4S010560
Teacher
Coordinator
Credits
6
Language
Italian
Scientific Disciplinary Sector (SSD)
INF/01 - INFORMATICS
Period
Sem. 2B dal Apr 7, 2025 al May 24, 2025.
Courses Single
Authorized
Learning objectives
The course provides a description of the main information technologies and their evolution. The student will acquire the ability to understand the fundamental characteristics and limits underlying the concept of calculation and algorithm, will understand the limits of calculation tools and how these tools are organized and designed. The problems and implications of technology in the social, technological, legal and economic filed are described. Particular emphasis will be devoted to issues related to security and privacy aspects.
Prerequisites and basic notions
There are no specific requirements, except an interest in IT and its security aspects, which will be addressed in the course of the lectures.
Program
The course provides an overview of information technology, focusing on cybersecurity in different areas and its strategic implications. It will cover the fundamental concepts of computing, algorithms, artificial intelligence, and cybersecurity, as well as the analysis of threats and the protection of networks, systems, and data.
Finally, regulatory aspects, cyber-intelligence and the role of cybersecurity in international conflicts will be explored.
- Introduction to Computer Science: basic concepts: algorithms, data, computation, evolution of information technologies, social impacts, hardware/software, networks and the Internet.
- Algorithms, data and Artificial Intelligence: algorithms and complexity, Big Data and Data Science, Artificial Intelligence (Machine Learning, Deep Learning and security), AI ethics and strategic implications.
- Cybersecurity Fundamentals: Principles of Cybersecurity (CIA: Confidentiality, Integrity, Availability), common cyber threats and attacks, cryptography, authentication, access control, cybersecurity in strategic and international contexts.
- Security in different areas: Security of networks, operating systems, applications, data and users.
Privacy, Regulations, and Cyber Intelligence: This section covers data protection regulations, cyberwarfare, international legislation, digital rights, the security of critical infrastructure (energy, transport, health), cyber intelligence, cyber defence strategies, and global threat analysis.
- Simulations, exercises and Case Studies: analysis of actual attacks, strategic responses, exercises/simulations on different cybersecurity issues, debriefing and discussion of future scenarios.
Bibliography
Didactic methods
The course is conducted mainly through lectures, in-depth studies based on examples, viewing of films and classroom discussions.
Learning assessment procedures
The examination consists of a single written test consisting of multiple-choice questions and an open question.
The final grade is single and expressed in thirtieths.
The examination procedure is the same for attending and non-attending students.
Evaluation criteria
The final examination will test the understanding of IT and cybersecurity concepts, the ability to analyse threats and apply protective measures, knowledge of regulations and strategic implications.
The content of the examination will cover the entire syllabus, with a special focus on the ‘cybersecurity fundamentals’ part and on ‘cybersecurity in different areas’.
Criteria for the composition of the final grade
The final mark is single and expressed in thirtieths.
Exam language
Italiano