![]() | Study programme 2024-2025 | Français | |
![]() | Applications security | ||
Programme component of Master's in Computer Engineering and Management : Specialist Focus on Cybersecurity and Forensics for the Internet of Everything (MONS) (day schedule) à la Faculty of Engineering |
Code | Type | Head of UE | Department’s contact details | Teacher(s) |
---|---|---|---|---|
UI-M1-IRIGCF-003-M | Compulsory UE | DE CONINCK Quentin | F115 - Service de Cybersécurité et Systèmes Informatiques |
|
Language of instruction | Language of assessment | HT(*) | HTPE(*) | HTPS(*) | HR(*) | HD(*) | Credits | Weighting | Term |
---|---|---|---|---|---|---|---|---|---|
| Anglais | 24 | 36 | 0 | 0 | 0 | 5 | 5.00 | 2nd term |
AA Code | Teaching Activity (AA) | HT(*) | HTPE(*) | HTPS(*) | HR(*) | HD(*) | Term | Weighting |
---|---|---|---|---|---|---|---|---|
S-INFO-044 | Cybersecurity | 24 | 24 | 0 | 0 | 0 | Q2 | 80.00% |
I-CYSI-001 | Ethical Hacking Project | 0 | 12 | 0 | 0 | 0 | Q2 | 20.00% |
Programme component |
---|
Objectives of Programme's Learning Outcomes
Learning Outcomes of UE
- Basic theoretical and practical skills in secure software development (knowing what to secure, how to do it, when, and at what cost, conscience of user culture of cybersecurity,...)
- C language vulnerabilities and binary exploitation
- Applying ethical hacking (discovery of vulnerabilities without compromising the system) and communication of the results
UE Content: description and pedagogical relevance
This course covers the following topics:
- Cryptography
- Access Control
- Web Security
- Network Security
- Side-Channel Attacks
- SetUID and Integer Overflows
- Race Condition Attacks
- Memory Safety
- Assembly & Debugging
- Buffer Overflow
- Shellcode
- Stack Protections
Prior Experience
Basic knowledge of computer systems and computer networks is a plus
Type of Teaching Activity/Activities
AA | Type of Teaching Activity/Activities |
---|---|
S-INFO-044 |
|
I-CYSI-001 |
|
Mode of delivery
AA | Mode of delivery |
---|---|
S-INFO-044 |
|
I-CYSI-001 |
|
Required Learning Resources/Tools
AA | Required Learning Resources/Tools |
---|---|
S-INFO-044 | Slides available on Moodle |
I-CYSI-001 | Same as S-INFO-044 |
Recommended Learning Resources/Tools
AA | Recommended Learning Resources/Tools |
---|---|
S-INFO-044 | Not applicable |
I-CYSI-001 | Same as S-INFO-044 |
Other Recommended Reading
AA | Other Recommended Reading |
---|---|
S-INFO-044 | Wenliang Du, Computer security : a hands-on approach, CreateSpace Independent Publishing Platform; 1st edition (October 12, 2017) Paar et Pelzl, Understanding Cryptography, Springer (2011) Jon Erickson. Hacking: the art of exploitation. No starch press (2008) Some additional references to understand all the elements discussed during the course: Bonaventure Olivier. Computer Networking: Principles, Protocols and Practice - Accessible via https://beta.computer-networking.info Bonaventure Olivier, Legay Axel, Rivière Étienne. Langage C et Systèmes Informatiques - Accessible via https://sites.uclouvain.be/SystInfo/ |
I-CYSI-001 | Same as S-INFO-044 |
Grade Deferrals of AAs from one year to the next
AA | Grade Deferrals of AAs from one year to the next |
---|---|
S-INFO-044 | Unauthorized |
I-CYSI-001 | Authorized |
Term 2 Assessment - type
AA | Type(s) and mode(s) of Q2 assessment |
---|---|
S-INFO-044 |
|
I-CYSI-001 |
|
Term 2 Assessment - comments
AA | Term 2 Assessment - comments |
---|---|
S-INFO-044 | Exam + works during the year |
I-CYSI-001 | - Ethical hacking report writing - Peer-reviewing of other students' reports |
Term 3 Assessment - type
AA | Type(s) and mode(s) of Q3 assessment |
---|---|
S-INFO-044 |
|
I-CYSI-001 |
|
Term 3 Assessment - comments
AA | Term 3 Assessment - comments |
---|---|
S-INFO-044 | As Q2, works/homeworks may potentially be redone. |
I-CYSI-001 | Same as Q2 (peer-reviewing phase may be omitted if the participation is too low) |