×
1 Choose EITC/EITCA Certificates
2 Learn and take online exams
3 Get your IT skills certified

Confirm your IT skills and competencies under the European IT Certification framework from anywhere in the world fully online.

EITCA Academy

Digital skills attestation standard by the European IT Certification Institute aiming to support Digital Society development

LOG IN TO YOUR ACCOUNT

CREATE AN ACCOUNT FORGOT YOUR PASSWORD?

FORGOT YOUR PASSWORD?

AAH, WAIT, I REMEMBER NOW!

CREATE AN ACCOUNT

ALREADY HAVE AN ACCOUNT?
EUROPEAN INFORMATION TECHNOLOGIES CERTIFICATION ACADEMY - ATTESTING YOUR PROFESSIONAL DIGITAL SKILLS
  • SIGN UP
  • LOGIN
  • INFO

EITCA Academy

EITCA Academy

The European Information Technologies Certification Institute - EITCI ASBL

Certification Provider

EITCI Institute ASBL

Brussels, European Union

Governing European IT Certification (EITC) framework in support of the IT professionalism and Digital Society

  • CERTIFICATES
    • EITCA ACADEMIES
      • EITCA ACADEMIES CATALOGUE<
      • EITCA/CG COMPUTER GRAPHICS
      • EITCA/IS INFORMATION SECURITY
      • EITCA/BI BUSINESS INFORMATION
      • EITCA/KC KEY COMPETENCIES
      • EITCA/EG E-GOVERNMENT
      • EITCA/WD WEB DEVELOPMENT
      • EITCA/AI ARTIFICIAL INTELLIGENCE
    • EITC CERTIFICATES
      • EITC CERTIFICATES CATALOGUE<
      • COMPUTER GRAPHICS CERTIFICATES
      • WEB DESIGN CERTIFICATES
      • 3D DESIGN CERTIFICATES
      • OFFICE IT CERTIFICATES
      • BITCOIN BLOCKCHAIN CERTIFICATE
      • WORDPRESS CERTIFICATE
      • CLOUD PLATFORM CERTIFICATENEW
    • EITC CERTIFICATES
      • INTERNET CERTIFICATES
      • CRYPTOGRAPHY CERTIFICATES
      • BUSINESS IT CERTIFICATES
      • TELEWORK CERTIFICATES
      • PROGRAMMING CERTIFICATES
      • DIGITAL PORTRAIT CERTIFICATE
      • WEB DEVELOPMENT CERTIFICATES
      • DEEP LEARNING CERTIFICATESNEW
    • CERTIFICATES FOR
      • EU PUBLIC ADMINISTRATION
      • TEACHERS AND EDUCATORS
      • IT SECURITY PROFESSIONALS
      • GRAPHICS DESIGNERS & ARTISTS
      • BUSINESSMEN AND MANAGERS
      • BLOCKCHAIN DEVELOPERS
      • WEB DEVELOPERS
      • CLOUD AI EXPERTSNEW
  • FEATURED
  • SUBSIDY
  • HOW IT WORKS
  •   IT ID
  • ABOUT
  • CONTACT
  • MY ORDER
    Your current order is empty.
EITCIINSTITUTE
CERTIFIED
Questions and answers categorized in: Cybersecurity > EITC/IS/ACSS Advanced Computer Systems Security

How does the concept of authentication in network security ensure that both the client and server are legitimate entities during a communication session?

Wednesday, 12 June 2024 by EITCA Academy

The concept of authentication in network security is a cornerstone mechanism that ensures both the client and server involved in a communication session are legitimate entities. This process is important for maintaining the integrity, confidentiality, and trustworthiness of information exchanged over a network. Authentication encompasses a variety of methods and protocols designed to verify identities,

  • Published in Cybersecurity, EITC/IS/ACSS Advanced Computer Systems Security, Network security, Network security, Examination review
Tagged under: Authentication, Cybersecurity, Kerberos, MFA, PKI, TLS

What is a timing attack?

Tuesday, 16 April 2024 by Bassey Udoh

A timing attack is a type of side-channel attack in the realm of cybersecurity that exploits the variations in the time taken to execute cryptographic algorithms. By analyzing these timing differences, attackers can infer sensitive information about the cryptographic keys being used. This form of attack can compromise the security of systems that rely on

  • Published in Cybersecurity, EITC/IS/ACSS Advanced Computer Systems Security, Timing attacks, CPU timing attacks
Tagged under: Countermeasures, Cryptography, Cybersecurity, RSA, Side-Channel Attacks

What are some current examples of untrusted storage servers?

Tuesday, 16 April 2024 by Bassey Udoh

Untrusted storage servers pose a significant threat in the realm of cybersecurity, as they can compromise the confidentiality, integrity, and availability of data stored on them. These servers are typically characterized by their lack of proper security measures, making them vulnerable to various types of attacks and unauthorized access. It is important for organizations and

  • Published in Cybersecurity, EITC/IS/ACSS Advanced Computer Systems Security, Security of storage, Untrusted storage servers
Tagged under: Cybersecurity, Data Breaches, Encryption, STORAGE SECURITY, UNTRUSTED SERVERS

What are the roles of a signature and a public key in communication security?

Tuesday, 16 April 2024 by Bassey Udoh

In messaging security, the concepts of signature and public key play pivotal roles in ensuring the integrity, authenticity, and confidentiality of messages exchanged between entities. These cryptographic components are fundamental to secure communication protocols and are widely used in various security mechanisms such as digital signatures, encryption, and key exchange protocols. A signature in message

  • Published in Cybersecurity, EITC/IS/ACSS Advanced Computer Systems Security, Messaging, Messaging security
Tagged under: Cryptography, Cybersecurity, Digital Signature, Encryption, Public Key Cryptography, RSA

Is cookies security well aligned with the SOP (same origin policy)?

Tuesday, 05 March 2024 by riccardo024

Cookies play a important role in web security, and understanding how their security aligns with the Same Origin Policy (SOP) is essential in ensuring the protection of user data and preventing various attacks such as cross-site scripting (XSS) and cross-site request forgery (CSRF). The SOP is a fundamental principle in web security that restricts how

  • Published in Cybersecurity, EITC/IS/ACSS Advanced Computer Systems Security, Network security, Web security model
Tagged under: Cookies Security, Cross-Site Scripting, CSRF, Cybersecurity, Same Origin Policy, SOP, Web Security

Is the cross-site request forgery (CSRF) attack possible both with the GET request and with the POST request?

Tuesday, 05 March 2024 by riccardo024

The cross-site request forgery (CSRF) attack is a prevalent security threat in web applications. It occurs when a malicious actor tricks a user into unintentionally executing actions on a web application in which the user is authenticated. The attacker forges a request and sends it to the web application on behalf of the user, leading

  • Published in Cybersecurity, EITC/IS/ACSS Advanced Computer Systems Security, Network security, Web security model
Tagged under: Anti-CSRF Tokens, CSRF, Cybersecurity, HTTP Protocol, SameSite Cookies, Web Security

Is symbolic execution well suited to finding deep bugs?

Tuesday, 05 March 2024 by riccardo024

Symbolic execution, a powerful technique in cybersecurity, is indeed well suited for uncovering deep bugs within software systems. This method involves executing a program with symbolic values instead of concrete input data, allowing for the exploration of multiple execution paths simultaneously. By analyzing the program's behavior across various symbolic inputs, symbolic execution can reveal intricate

  • Published in Cybersecurity, EITC/IS/ACSS Advanced Computer Systems Security, Security analysis, Symbolic execution
Tagged under: Cybersecurity, Deep Bugs, Software Security, Symbolic Execution, Vulnerability Analysis

Can symbolic execution involve path conditions?

Tuesday, 05 March 2024 by riccardo024

Symbolic execution is a powerful technique used in cybersecurity to analyze software systems for vulnerabilities and potential security threats. It involves executing a program with symbolic inputs rather than concrete values, allowing the exploration of multiple execution paths simultaneously. Path conditions play a important role in symbolic execution by representing the constraints on the input

  • Published in Cybersecurity, EITC/IS/ACSS Advanced Computer Systems Security, Security analysis, Symbolic execution
Tagged under: Cybersecurity, PATH CONDITIONS, Program Analysis, Software Security, Symbolic Execution

Why mobile applications are run in the secure enclave in modern mobile devices?

Tuesday, 05 March 2024 by riccardo024

In modern mobile devices, the concept of the secure enclave plays a important role in ensuring the security of applications and sensitive data. The secure enclave is a hardware-based security feature that provides a protected area within the device's processor. This isolated environment is designed to safeguard sensitive information such as encryption keys, biometric data,

  • Published in Cybersecurity, EITC/IS/ACSS Advanced Computer Systems Security, Mobile security, Mobile device security
Tagged under: Biometric Authentication, Cybersecurity, Encryption Keys, Hardware Security, Mobile Security, Secure Enclave

Is there an approach to finding bugs in which software can be proven secure?

Tuesday, 05 March 2024 by riccardo024

In the realm of cybersecurity, particularly concerning advanced computer systems security, mobile security, and mobile app security, the question of whether there exists an infallible approach to uncovering bugs and ensuring software security is a pivotal one. It is essential to acknowledge that achieving absolute security in software is an elusive goal due to the

  • Published in Cybersecurity, EITC/IS/ACSS Advanced Computer Systems Security, Mobile security, Mobile app security
Tagged under: AutomatedTesting, Cybersecurity, SecureCoding, SecurityBestPractices, SoftwareDevelopment, ThreatModeling
  • 3
  • 4
  • 5
  • 6
  • 7
Home » EITC/IS/ACSS Advanced Computer Systems Security

Certification Center

USER MENU

  • My Account

CERTIFICATE CATEGORY

  • EITC Certification (105)
  • EITCA Certification (9)

What are you looking for?

  • Introduction
  • How it works?
  • EITCA Academies
  • EITCI DSJC Subsidy
  • Full EITC catalogue
  • Your order
  • Featured
  •   IT ID
  • EITCA reviews (Medium publ.)
  • About
  • Contact

EITCA Academy is a part of the European IT Certification framework

The European IT Certification framework has been established in 2008 as a Europe based and vendor independent standard in widely accessible online certification of digital skills and competencies in many areas of professional digital specializations. The EITC framework is governed by the European IT Certification Institute (EITCI), a non-profit certification authority supporting information society growth and bridging the digital skills gap in the EU.
Eligibility for EITCA Academy 90% EITCI DSJC Subsidy support
90% of EITCA Academy fees subsidized in enrolment

    EITCA Academy Secretary Office

    European IT Certification Institute ASBL
    Brussels, Belgium, European Union

    EITC / EITCA Certification Framework Operator
    Governing European IT Certification Standard
    Access contact form or call +32 25887351

    Follow EITCI on X
    Visit EITCA Academy on Facebook
    Engage with EITCA Academy on LinkedIn
    Check out EITCI and EITCA videos on YouTube

    Funded by the European Union

    Funded by the European Regional Development Fund (ERDF) and the European Social Fund (ESF) in series of projects since 2007, currently governed by the European IT Certification Institute (EITCI) since 2008

    Information Security Policy | DSRRM and GDPR Policy | Data Protection Policy | Record of Processing Activities | HSE Policy | Anti-Corruption Policy | Modern Slavery Policy

    Automatically translate to your language

    Terms and Conditions | Privacy Policy
    EITCA Academy
    • EITCA Academy on social media
    EITCA Academy


    © 2008-2026  European IT Certification Institute
    Brussels, Belgium, European Union

    TOP
    CHAT WITH SUPPORT
    Do you have any questions?
    We will reply here and by email. Your conversation is tracked with a support token.