Studying at the University of Verona

Here you can find information on the organisational aspects of the Programme, lecture timetables, learning activities and useful contact details for your time at the University, from enrolment to graduation.

Study Plan

This information is intended exclusively for students already enrolled in this course.
If you are a new student interested in enrolling, you can find information about the course of study on the course page:

Laurea in Studi strategici per la sicurezza e le politiche internazionali - Enrollment from 2025/2026

The Study Plan includes all modules, teaching and learning activities that each student will need to undertake during their time at the University.
Please select your Study Plan based on your enrollment year.

activated in the A.Y. 2024/2025
ModulesCreditsTAFSSD
C1 English or B1 other foreign languages
6
E
-
Final exam
6
E
-
Modules Credits TAF SSD
Between the years: 1°- 2°- 3°
Between the years: 2°- 3°
Training
6
F
-
Between the years: 2°- 3°
Further activities
6
F
-

Legend | Type of training activity (TTA)

TAF (Type of Educational Activity) All courses and activities are classified into different types of educational activities, indicated by a letter.




S Placements in companies, public or private institutions and professional associations

Teaching code

4S010560

Credits

6

Language

Italian

Scientific Disciplinary Sector (SSD)

INF/01 - INFORMATICS

Period

Sem. 2B dal Apr 7, 2025 al May 24, 2025.

Courses Single

Authorized

Learning objectives

The course provides a description of the main information technologies and their evolution. The student will acquire the ability to understand the fundamental characteristics and limits underlying the concept of calculation and algorithm, will understand the limits of calculation tools and how these tools are organized and designed. The problems and implications of technology in the social, technological, legal and economic filed are described. Particular emphasis will be devoted to issues related to security and privacy aspects.

Prerequisites and basic notions

There are no specific requirements, except an interest in IT and its security aspects, which will be addressed in the course of the lectures.

Program

The course provides an overview of information technology, focusing on cybersecurity in different areas and its strategic implications. It will cover the fundamental concepts of computing, algorithms, artificial intelligence, and cybersecurity, as well as the analysis of threats and the protection of networks, systems, and data.
Finally, regulatory aspects, cyber-intelligence and the role of cybersecurity in international conflicts will be explored.
- Introduction to Computer Science: basic concepts: algorithms, data, computation, evolution of information technologies, social impacts, hardware/software, networks and the Internet.
- Algorithms, data and Artificial Intelligence: algorithms and complexity, Big Data and Data Science, Artificial Intelligence (Machine Learning, Deep Learning and security), AI ethics and strategic implications.
- Cybersecurity Fundamentals: Principles of Cybersecurity (CIA: Confidentiality, Integrity, Availability), common cyber threats and attacks, cryptography, authentication, access control, cybersecurity in strategic and international contexts.
- Security in different areas: Security of networks, operating systems, applications, data and users.
Privacy, Regulations, and Cyber Intelligence: This section covers data protection regulations, cyberwarfare, international legislation, digital rights, the security of critical infrastructure (energy, transport, health), cyber intelligence, cyber defence strategies, and global threat analysis.
- Simulations, exercises and Case Studies: analysis of actual attacks, strategic responses, exercises/simulations on different cybersecurity issues, debriefing and discussion of future scenarios.

Bibliography

Visualizza la bibliografia con Leganto, strumento che il Sistema Bibliotecario mette a disposizione per recuperare i testi in programma d'esame in modo semplice e innovativo.

Didactic methods

The course is conducted mainly through lectures, in-depth studies based on examples, viewing of films and classroom discussions.

Learning assessment procedures

The examination consists of a single written test consisting of multiple-choice questions and an open question.
The final grade is single and expressed in thirtieths.
The examination procedure is the same for attending and non-attending students.

Students with disabilities or specific learning disorders (SLD), who intend to request the adaptation of the exam, must follow the instructions given HERE

Evaluation criteria

The final examination will test the understanding of IT and cybersecurity concepts, the ability to analyse threats and apply protective measures, knowledge of regulations and strategic implications.
The content of the examination will cover the entire syllabus, with a special focus on the ‘cybersecurity fundamentals’ part and on ‘cybersecurity in different areas’.

Criteria for the composition of the final grade

The final mark is single and expressed in thirtieths.

Exam language

Italiano