Study programme 2024-2025 | Français | ||
Cybersecurity | |||
Learning Activity |
Code | Lecturer(s) | Associate Lecturer(s) | Subsitute Lecturer(s) et other(s) | Establishment |
---|---|---|---|---|
S-INFO-044 |
|
|
Language of instruction | Language of assessment | HT(*) | HTPE(*) | HTPS(*) | HR(*) | HD(*) | Term |
---|---|---|---|---|---|---|---|
Anglais | Anglais | 24 | 24 | 0 | 0 | 0 | Q2 |
Content of Learning Activity
This course covers the following topics:
- Cryptography
- Access Control
- Web Security
- Network Security
- Side-Channel Attacks
- SetUID and Integer Overflows
- Race Condition Attacks
- Memory Safety
- Assembly & Debugging
- Buffer Overflow
- Shellcode
- Stack Protections
Required Learning Resources/Tools
Slides available on Moodle
Recommended Learning Resources/Tools
Not applicable
Other Recommended Reading
Wenliang Du, Computer security : a hands-on approach, CreateSpace Independent Publishing Platform; 1st edition (October 12, 2017)
Paar et Pelzl, Understanding Cryptography, Springer (2011)
Jon Erickson. Hacking: the art of exploitation. No starch press (2008)
Some additional references to understand all the elements discussed during the course:
Bonaventure Olivier. Computer Networking: Principles, Protocols and Practice - Accessible via https://beta.computer-networking.info
Bonaventure Olivier, Legay Axel, Rivière Étienne. Langage C et Systèmes Informatiques - Accessible via https://sites.uclouvain.be/SystInfo/
Mode of delivery
Type of Teaching Activity/Activities
Evaluations
The assessment methods of the Learning Activity (AA) are specified in the course description of the corresponding Educational Component (UE)
Location of learning activity
Location of assessment