Learning outcomes

The course is to provide the student with the technical basics in order to make him/her able to understand the law aspects of ICT. At the end of the course, the student will be able to:

  • Present the main concepts in IS security in a layered approach and propose a risk-based methodology to assess and improve IS security,
  • Explain the hierarchical, layered structure of a typical network architecture,
  • Understand the main aspects of the security of an Information System
  • Describe the technical aspects of more advanced topics, like Blockchain or AI

Goals

The course is to provide the student with the technical basics in order to make him/her able to understand the law aspects of ICT. At the end of the course, the student will be able to:

  • Present the main concepts in IS security in a layered approach and propose a risk-based methodology to assess and improve IS security,
  • Explain the hierarchical, layered structure of a typical network architecture,
  • Understand the main aspects of the security of an Information System
  • Describe the technical aspects of more advanced topics, like Blockchain or AI

Content

The course is built according to the following structure:
  • hardware aspects of IS
  • network aspects of IS
  • introduction to algorithmic
  • introduction to AI
  • software aspects of IS
  • data aspects of IS
  • introduction to IS security
  • risk management
  • elements of cryptography
  • visit of a data center
  • infrastructure security
  • software and system security
  • introduction to blockchain and smart contracts

Assessment method

  • a written examination is organized at the half of the semester
  • a second written examination is organized during the january session; for the students who passed the first one, this second examination only covers the second half of the course; for the others, it covers the full course
  • in case of failure in january, an oral examination is organized in august

Sources, references and any support material

  • Ferguson, Niels, and Bruce Schneier. Practical Cryptography. Wiley, 2003.
  • Gollmann, Dieter. Computer Security. Wiley, 2006.
  • S, Ghernaouti. Sécurité informatique et réseaux : Cours et exercices corrigés. dunod, 2008.
  • Kurose, James and Ross, Keith. Computer Networking - A Top-Down Approach Featuring the Internet, 5e édition. Morgann-Kaufman, 2009.
  • Hainaut, J.-L., Bases de données, Collection Sciences Sup, Dunod, 2009

Language of instruction

Français
Training Study programme Block Credits Mandatory
Standard 0 6
Standard 1 6