Understanding of security issues and risk assessment for the implementation of adapted defensive devices. The main threats and vulnerabilities of networks and systems are covered in detail.
Presentation of techniques and methods of research and identification and exploitation of flaws.
With reference to current professional referentials and methodologies the course will cover definitions of security requirements. Study of the main defensive devices and secured architectures will then illustrate state of the art in-depth defence for networks and systems.
On completion of the unit, the student will be capable of: | Classification level | Priority |
---|---|---|
Mastering the fundamental notions and major concepts of security | 2. Understand | Essential |
Exploiting these notions to design secured architectures | 3. Apply | Essential |
Percentage ratio of individual assessment | Percentage ratio of group assessment | ||||
---|---|---|---|---|---|
Written exam: | 100 | % | Project submission: | 0 | % |
Individual oral exam: | 0 | % | Group presentation: | 0 | % |
Individual presentation: | 0 | % | Group practical exercise: | 0 | % |
Individual practical exercise: | 0 | % | Group report: | 0 | % |
Individual report: | 0 | % | |||
Other(s): 0 % |
Type of teaching activity | Content, sequencing and organisation |
---|---|
Course | General introduction to security Norms and methods. Risk analysis |
Course/Supervised study | Threats to and vulnerabilities of systems Case of Web technologies Post-exploitation and introduction to forensics |