Number of hours
- Lectures 36.0
- Projects -
- Tutorials -
- Internship -
- Laboratory works 18.0
- Written tests -
ECTS
ECTS 6.0
Goal(s)
Design, deploy and manage Secured Infrastructure of systems
Responsible(s)
Yves GUIDO
Content(s)
I. « AAA » : Authentication, Autorisation, Accounting
- . Authentication
- Password Authentification
- Public Key Authentification
- PAM Authentification
- Monitoring
B. Autorisations - Users & groups
- File system autorization
- Device Autorization
- Service Autorisation
C. Accounting - trace : log usage, tools, architecture
- Logical integrity
B. Advanced security : - Analysis
- Reverse engineering
- Forensics
- SCADA Security
Operationg system administration
Networks
Programming skills
Crypto
Test
CC: Labs
E1: exam, no document
E2: Exam, no document
Calendar
The course exists in the following branches:
- Curriculum - Network and computer science - Semester 9
Additional Information
Course ID : 5AMSE501
Course language(s):
The course is attached to the following structures:
- Team Computer Science
You can find this course among all other courses.
Bibliography
- Computer Security [Paperback] by Dieter Gollmann
- Paperback: 456 pages
- Publisher: Wiley; 3 edition (February 28, 2011)
- Language: English
- ISBN-10: 0470741155
- ISBN-13: 978-0470741153
- Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security by T. Bradley (Jan 14, 2007)
** Paperback: 279 pages- Publisher: Syngress; 1 edition (January 14, 2007)
- Language: English
- ISBN-10: 1597491144
- ISBN-13: 978-1597491143
- Security Engineering: A Guide to Building Dependable Distributed Systems by Ross J. Anderson (Apr 14, 2008)
- Hardcover: 1080 pages
- Publisher: Wiley; 2 edition (April 14, 2008)
- Language: English
- ISBN-10: 0470068523
- ISBN-13: 978-0470068526
- The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities by Mark Dowd, John McDonald and Justin Schuh (Nov 30, 2006)
- Paperback: 1200 pages
- Publisher: Addison-Wesley Professional; 1 edition (November 30, 2006)
- Language: English
- ISBN-10: 0321444426
- ISBN-13: 978-0321444424
- Applied Information Security: A Hands-On Guide to Information Security Software (2nd Edition) by Randall J. Boyle and Jeffrey G. Proudfoot (Nov 23, 2013)
- Paperback: 512 pages
- Publisher: Prentice Hall; 2 edition (November 23, 2013)
- Language: English
- ISBN-10: 0133547434
- ISBN-13: 978-0133547436
- Secrets et mensonges. securite numerique dans un monde en réseau by Bruce Schneier (Jun 22, 2001)
- Publisher: Vuibert (June 22, 2001)
- Language: French
- ISBN-10: 2711786846
- ISBN-13: 978-2711786848
- Metasploit Sécurité & hacking - Le guide du pentesteur de David Kennedy, Jim O'Gorman, Devon Kearns et Mati Aharoni
- Broché: 332 pages
- Editeur : Pearson (30 août 2013)
- Collection : Référence
- Langue : Français
- ISBN-10: 2744025976
- ISBN-13: 978-2744025976
- Sécurité informatique : Principes et méthodes à l'usage des DSI, RSSI et administrateurs de Laurent Bloch, Christophe Wolfhugel, Nat Makarévitch et Christian Queinnec
- Broché: 349 pages
- Editeur : Eyrolles; Édition : 4e édition (15 mai 2013)
- Langue : Français
- ISBN-10: 2212137370
- ISBN-13: 978-2212137378