|  | Study programme 2024-2025 | Français | |
|  | Cybersecurity | ||
|  Programme component of Master's in Computer Science (MONS) (day schedule) à la Faculty of Science | 
| Code | Type | Head of UE | Department’s contact details | Teacher(s) | 
|---|---|---|---|---|
| US-M1-SCINFO-050-M | Optional UE | DE CONINCK Quentin | 
 | 
| Language of instruction | Language of assessment | HT(*) | HTPE(*) | HTPS(*) | HR(*) | HD(*) | Credits | Weighting | Term | 
|---|---|---|---|---|---|---|---|---|---|
| 
 | Anglais | 24 | 24 | 0 | 0 | 0 | 5 | 5.00 | 2nd term | 
| AA Code | Teaching Activity (AA) | HT(*) | HTPE(*) | HTPS(*) | HR(*) | HD(*) | Term | Weighting | 
|---|---|---|---|---|---|---|---|---|
| S-INFO-044 | Cybersecurity | 24 | 24 | 0 | 0 | 0 | Q2 | 100.00% | 
| Programme component | ||
|---|---|---|
|  | US-M1-SCINFO-010-M Cryptography and Computer Security | |
Objectives of Programme's Learning Outcomes
Learning Outcomes of UE
- Basic theoretical and practical skills in secure software development (knowing what to secure, how to do it, when, and at what cost, conscience of user culture of cybersecurity,...)
- C language vulnerabilities and binary exploitation
UE Content: description and pedagogical relevance
This course covers the following topics:
- Cryptography
- Access Control
- Web Security
- Network Security
- Side-Channel Attacks
- SetUID and Integer Overflows
- Race Condition Attacks
- Memory Safety
- Assembly & Debugging
- Buffer Overflow
- Shellcode
- Stack Protections
Prior Experience
Basic knowledge of computer systems is a plus
Type of Teaching Activity/Activities
| AA | Type of Teaching Activity/Activities | 
|---|---|
| S-INFO-044 | 
 | 
Mode of delivery
| AA | Mode of delivery | 
|---|---|
| S-INFO-044 | 
 | 
Required Learning Resources/Tools
| AA | Required Learning Resources/Tools | 
|---|---|
| S-INFO-044 | Slides available on Moodle | 
Recommended Learning Resources/Tools
| AA | Recommended Learning Resources/Tools | 
|---|---|
| S-INFO-044 | Not applicable | 
Other Recommended Reading
| AA | Other Recommended Reading | 
|---|---|
| S-INFO-044 | Wenliang Du, Computer security : a hands-on approach, CreateSpace Independent Publishing Platform; 1st edition (October 12, 2017) Paar et Pelzl, Understanding Cryptography, Springer (2011) Jon Erickson. Hacking: the art of exploitation. No starch press (2008) Some additional references to understand all the elements discussed during the course: Bonaventure Olivier. Computer Networking: Principles, Protocols and Practice - Accessible via https://beta.computer-networking.info Bonaventure Olivier, Legay Axel, Rivière Étienne. Langage C et Systèmes Informatiques - Accessible via https://sites.uclouvain.be/SystInfo/ | 
Grade Deferrals of AAs from one year to the next
| AA | Grade Deferrals of AAs from one year to the next | 
|---|---|
| S-INFO-044 | Authorized | 
Term 2 Assessment - type
| AA | Type(s) and mode(s) of Q2 assessment | 
|---|---|
| S-INFO-044 | 
 | 
Term 2 Assessment - comments
| AA | Term 2 Assessment - comments | 
|---|---|
| S-INFO-044 | Exam + works during the year | 
Term 3 Assessment - type
| AA | Type(s) and mode(s) of Q3 assessment | 
|---|---|
| S-INFO-044 | 
 | 
Term 3 Assessment - comments
| AA | Term 3 Assessment - comments | 
|---|---|
| S-INFO-044 | As Q2, works/homeworks may potentially be redone. |