Study programme 2023-2024 | Français | ||
Cybersecurity | |||
Programme component of Master's in Computer Science (MONS) (day schedule) à la Faculty of Science |
Code | Type | Head of UE | Department’s contact details | Teacher(s) |
---|---|---|---|---|
US-M1-SCINFO-050-M | Optional UE | DE CONINCK Quentin |
|
Language of instruction | Language of assessment | HT(*) | HTPE(*) | HTPS(*) | HR(*) | HD(*) | Credits | Weighting | Term |
---|---|---|---|---|---|---|---|---|---|
| Anglais, Français | 30 | 0 | 20 | 0 | 0 | 5 | 5.00 | 2nd term |
AA Code | Teaching Activity (AA) | HT(*) | HTPE(*) | HTPS(*) | HR(*) | HD(*) | Term | Weighting |
---|---|---|---|---|---|---|---|---|
S-INFO-044 | Cybersecurity | 30 | 0 | 20 | 0 | 0 | Q2 | 100.00% |
Programme component | ||
---|---|---|
US-M1-SCINFO-010-M Cryptography and Computer Security |
Objectives of Programme's Learning Outcomes
Learning Outcomes of UE
Basic theoretical and practical skills in secure software development
Knowing what to secure, how to do it, when, and at what cost
Conscience of user culture of cybersecurity
UE Content: description and pedagogical relevance
This course covers different security aspects that an application developer must take into account when designing it. Covered themes include (but are not limited to): access control, binary exploitation and its mitigations, cross-site scripting, SQL injection,...
Prior Experience
Basic knowledge of computer systems is a plus
Type of Teaching Activity/Activities
AA | Type of Teaching Activity/Activities |
---|---|
S-INFO-044 |
|
Mode of delivery
AA | Mode of delivery |
---|---|
S-INFO-044 |
|
Required Learning Resources/Tools
AA | Required Learning Resources/Tools |
---|---|
S-INFO-044 | Slides available on Moodle |
Recommended Learning Resources/Tools
AA | Recommended Learning Resources/Tools |
---|---|
S-INFO-044 | Not applicable |
Other Recommended Reading
AA | Other Recommended Reading |
---|---|
S-INFO-044 | Wenliang Du, Computer security : a hands-on approach, CreateSpace Independent Publishing Platform; 1st edition (October 12, 2017) Paar et Pelzl, Understanding Cryptography, Springer (2011) Jon Erickson. Hacking: the art of exploitation. No starch press (2008) |
Grade Deferrals of AAs from one year to the next
AA | Grade Deferrals of AAs from one year to the next |
---|---|
S-INFO-044 | Authorized |
Term 2 Assessment - type
AA | Type(s) and mode(s) of Q2 assessment |
---|---|
S-INFO-044 |
|
Term 2 Assessment - comments
AA | Term 2 Assessment - comments |
---|---|
S-INFO-044 | Exam + works during the year |
Term 3 Assessment - type
AA | Type(s) and mode(s) of Q3 assessment |
---|---|
S-INFO-044 |
|
Term 3 Assessment - comments
AA | Term 3 Assessment - comments |
---|---|
S-INFO-044 | Not applicable |