Esisar rubrique Formation 2022

System security - 5AMSE501

  • Number of hours

    • Lectures 36.0
    • Projects -
    • Tutorials -
    • Internship -
    • Laboratory works 18.0
    • Written tests -

    ECTS

    ECTS 6.0

Goal(s)

Design, deploy and manage Secured Infrastructure of systems

Responsible(s)

Yves GUIDO

Content(s)

I. « AAA » : Authentication, Autorisation, Accounting

  • . Authentication
    • Password Authentification
    • Public Key Authentification
    • PAM Authentification
  • Monitoring
    B. Autorisations
  • Users & groups
  • File system autorization
  • Device Autorization
  • Service Autorisation
    C. Accounting
  • trace : log usage, tools, architecture
  • Logical integrity
    B. Advanced security :
  • Analysis
  • Reverse engineering
  • Forensics
  • SCADA Security

Prerequisites

Operationg system administration
Networks
Programming skills
Crypto

Test

CC: Labs
E1: exam, no document
E2: Exam, no document

Calendar

The course exists in the following branches:

see the course schedule for 2022-2023

Additional Information

Course ID : 5AMSE501
Course language(s): FR

The course is attached to the following structures:

You can find this course among all other courses.

Bibliography

  • Computer Security [Paperback] by Dieter Gollmann
    • Paperback: 456 pages
    • Publisher: Wiley; 3 edition (February 28, 2011)
    • Language: English
    • ISBN-10: 0470741155
    • ISBN-13: 978-0470741153
  • Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security by T. Bradley (Jan 14, 2007)
    ** Paperback: 279 pages
    • Publisher: Syngress; 1 edition (January 14, 2007)
    • Language: English
    • ISBN-10: 1597491144
    • ISBN-13: 978-1597491143
  • Security Engineering: A Guide to Building Dependable Distributed Systems by Ross J. Anderson (Apr 14, 2008)
    • Hardcover: 1080 pages
    • Publisher: Wiley; 2 edition (April 14, 2008)
    • Language: English
    • ISBN-10: 0470068523
    • ISBN-13: 978-0470068526
  • The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities by Mark Dowd, John McDonald and Justin Schuh (Nov 30, 2006)
    • Paperback: 1200 pages
    • Publisher: Addison-Wesley Professional; 1 edition (November 30, 2006)
    • Language: English
    • ISBN-10: 0321444426
    • ISBN-13: 978-0321444424
  • Applied Information Security: A Hands-On Guide to Information Security Software (2nd Edition) by Randall J. Boyle and Jeffrey G. Proudfoot (Nov 23, 2013)
    • Paperback: 512 pages
    • Publisher: Prentice Hall; 2 edition (November 23, 2013)
    • Language: English
    • ISBN-10: 0133547434
    • ISBN-13: 978-0133547436
  • Secrets et mensonges. securite numerique dans un monde en réseau by Bruce Schneier (Jun 22, 2001)
    • Publisher: Vuibert (June 22, 2001)
    • Language: French
    • ISBN-10: 2711786846
    • ISBN-13: 978-2711786848
  • Metasploit Sécurité & hacking - Le guide du pentesteur de David Kennedy, Jim O'Gorman, Devon Kearns et Mati Aharoni
    • Broché: 332 pages
    • Editeur : Pearson (30 août 2013)
    • Collection : Référence
    • Langue : Français
    • ISBN-10: 2744025976
    • ISBN-13: 978-2744025976
  • Sécurité informatique : Principes et méthodes à l'usage des DSI, RSSI et administrateurs de Laurent Bloch, Christophe Wolfhugel, Nat Makarévitch et Christian Queinnec
    • Broché: 349 pages
    • Editeur : Eyrolles; Édition : 4e édition (15 mai 2013)
    • Langue : Français
    • ISBN-10: 2212137370
    • ISBN-13: 978-2212137378