Studying at the University of Verona

Here you can find information on the organisational aspects of the Programme, lecture timetables, learning activities and useful contact details for your time at the University, from enrolment to graduation.

This information is intended exclusively for students already enrolled in this course.
If you are a new student interested in enrolling, you can find information about the course of study on the course page:

Laurea in Informatica - Enrollment from 2025/2026

The Study Plan includes all modules, teaching and learning activities that each student will need to undertake during their time at the University.
Please select your Study Plan based on your enrollment year.

2° Year  It will be activated in the A.Y. 2025/2026

ModulesCreditsTAFSSD
12
B
INF/01
12
B
INF/01
6
A
FIS/01
6
C
MAT/01

3° Year  It will be activated in the A.Y. 2026/2027

ModulesCreditsTAFSSD
6
B
INF/01
Final exam
6
E
-
It will be activated in the A.Y. 2025/2026
ModulesCreditsTAFSSD
12
B
INF/01
12
B
INF/01
6
A
FIS/01
6
C
MAT/01
It will be activated in the A.Y. 2026/2027
ModulesCreditsTAFSSD
6
B
INF/01
Final exam
6
E
-
Modules Credits TAF SSD
Between the years: 2°- 3°
Training
6
F
-
Between the years: 2°- 3°

Legend | Type of training activity (TTA)

TAF (Type of Educational Activity) All courses and activities are classified into different types of educational activities, indicated by a letter.




S Placements in companies, public or private institutions and professional associations

Teaching code

4S012340

Credits

6

Scientific Disciplinary Sector (SSD)

INF/01 - INFORMATICA

Learning objectives

The course aims to introduce the main properties underlying computer security. Provide an overview of the main vulnerabilities and ways of attacking the security of applications, systems, and networks. Introduce the main security mechanisms to protect applications, networks, and systems from security attacks At the end of the course, the student will: Demonstrate knowledge and understanding of the main vulnerabilities exploited to violate fundamental security properties and the protection measures that can be implemented to mitigate cyber-attacks; Know how to apply the knowledge acquired to deal with practical and laboratory activities relating to attack methods and to use the main security mechanisms by analyzing how these protection tools are implemented in real systems; Be able to propose appropriate solutions (technical and/or design choices) based on the problem to be addressed and aligned with current security standards; ability to discusss the level of security of an application, system or network and propose suitable protection measures; Be able to autonomously gain knowledge of new security tools and applications and to design secure applications, systems, and networks.