Study programme 2024-2025 | Français | ||
Cybersecurity | |||
Programme component of Master's in Computer Science (MONS) (day schedule) à la Faculty of Science |
Code | Type | Head of UE | Department’s contact details | Teacher(s) |
---|---|---|---|---|
US-M1-SCINFO-050-M | Optional UE | DE CONINCK Quentin |
|
Language of instruction | Language of assessment | HT(*) | HTPE(*) | HTPS(*) | HR(*) | HD(*) | Credits | Weighting | Term |
---|---|---|---|---|---|---|---|---|---|
| Anglais, Français | 24 | 24 | 0 | 0 | 0 | 5 | 5.00 | 2nd term |
AA Code | Teaching Activity (AA) | HT(*) | HTPE(*) | HTPS(*) | HR(*) | HD(*) | Term | Weighting |
---|---|---|---|---|---|---|---|---|
S-INFO-044 | Cybersecurity | 24 | 24 | 0 | 0 | 0 | Q2 | 100.00% |
Programme component | ||
---|---|---|
US-M1-SCINFO-010-M Cryptography and Computer Security |
Objectives of Programme's Learning Outcomes
Learning Outcomes of UE
- Basic theoretical and practical skills in secure software development (knowing what to secure, how to do it, when, and at what cost, conscience of user culture of cybersecurity,...)
- C language vulnerabilities and binary exploitation
UE Content: description and pedagogical relevance
This course covers the following topics:
- Cryptography
- Access Control
- Web Security
- Network Security
- Side-Channel Attacks
- SetUID and Integer Overflows
- Race Condition Attacks
- Memory Safety
- Assembly & Debugging
- Buffer Overflow
- Shellcode
- Stack Protections
Prior Experience
Basic knowledge of computer systems is a plus
Type of Teaching Activity/Activities
AA | Type of Teaching Activity/Activities |
---|---|
S-INFO-044 |
|
Mode of delivery
AA | Mode of delivery |
---|---|
S-INFO-044 |
|
Required Learning Resources/Tools
AA | Required Learning Resources/Tools |
---|---|
S-INFO-044 | Slides available on Moodle |
Recommended Learning Resources/Tools
AA | Recommended Learning Resources/Tools |
---|---|
S-INFO-044 | Not applicable |
Other Recommended Reading
AA | Other Recommended Reading |
---|---|
S-INFO-044 | Wenliang Du, Computer security : a hands-on approach, CreateSpace Independent Publishing Platform; 1st edition (October 12, 2017)#newline# Paar et Pelzl, Understanding Cryptography, Springer (2011)#newline# Jon Erickson. Hacking: the art of exploitation. No starch press (2008)#newline# #newline# Some additional references to understand all the elements discussed during the course:#newline# Bonaventure Olivier. Computer Networking: Principles, Protocols and Practice - Accessible via https://beta.computer-networking.info#newline# Bonaventure Olivier, Legay Axel, Rivière Étienne. Langage C et Systèmes Informatiques - Accessible via https://sites.uclouvain.be/SystInfo/ |
Grade Deferrals of AAs from one year to the next
AA | Grade Deferrals of AAs from one year to the next |
---|---|
S-INFO-044 | Authorized |
Term 2 Assessment - type
AA | Type(s) and mode(s) of Q2 assessment |
---|---|
S-INFO-044 |
|
Term 2 Assessment - comments
AA | Term 2 Assessment - comments |
---|---|
S-INFO-044 | Exam + works during the year |
Term 3 Assessment - type
AA | Type(s) and mode(s) of Q3 assessment |
---|---|
S-INFO-044 |
|
Term 3 Assessment - comments
AA | Term 3 Assessment - comments |
---|---|
S-INFO-044 | As Q2, works/homeworks may potentially be redone. |