Learning outcomes

The course is to provide the student with the technical basics in order to make him/her able to understand the law aspects of ICT. At the end of the course, the student will be able to:

  • Present the main concepts in IS security in a layered approach and propose a risk-based methodology to assess and improve IS security,
  • Explain the hierarchical, layered structure of a typical network architecture,
  • Understand the main aspects of the security of an Information System
  • Describe the technical aspects of more advanced topics, like Blockchain or AI

Goals

The course is to provide the student with the technical basics in order to make him/her able to understand the law aspects of ICT. At the end of the course, the student will be able to:

  • Present the main concepts in IS security in a layered approach and propose a risk-based methodology to assess and improve IS security,
  • Explain the hierarchical, layered structure of a typical network architecture,
  • Understand the main aspects of the security of an Information System
  • Describe the technical aspects of more advanced topics, like Blockchain or AI

Content

The course is built according to the following structure:
  • hardware aspects of IS
  • network aspects of IS
  • introduction to algorithmic
  • introduction to AI
  • software aspects of IS
  • data aspects of IS
  • introduction to IS security
  • risk management
  • elements of cryptography
  • visit of a data center
  • infrastructure security
  • software and system security
  • introduction to blockchain and smart contracts

Assessment method

  • the evaluation of the first part of the course takes place early november
  • the evaluation of the second part of the course is organized during the january session
  • in both cases, they take place as written examination; notes of both parts are aggregated to determine the note of the first session 
  • in case of failure in january, an oral examination is organized in august

 

Sources, references and any support material

  • Ferguson, Niels, and Bruce Schneier. Practical Cryptography. Wiley, 2003.
  • Gollmann, Dieter. Computer Security. Wiley, 2006.
  • S, Ghernaouti. Sécurité informatique et réseaux : Cours et exercices corrigés. dunod, 2008.
  • Kurose, James and Ross, Keith. Computer Networking - A Top-Down Approach Featuring the Internet, 5e édition. Morgann-Kaufman, 2009.
  • Hainaut, J.-L., Bases de données, Collection Sciences Sup, Dunod, 2009

Language of instruction

Français