Learning outcomes
The course is to provide the student with the technical basics in order to make him/her able to understand the law aspects of ICT. At the end of the course, the student will be able to:
-
Present the main concepts in IS security in a layered approach and propose a risk-based methodology to assess and improve IS security,
-
Explain the hierarchical, layered structure of a typical network architecture,
-
Understand the main aspects of the security of an Information System
-
Describe the technical aspects of more advanced topics, like Blockchain or AI
Objectives
The course is to provide the student with the technical basics in order to make him/her able to understand the law aspects of ICT. At the end of the course, the student will be able to:
-
Present the main concepts in IS security in a layered approach and propose a risk-based methodology to assess and improve IS security,
-
Explain the hierarchical, layered structure of a typical network architecture,
-
Understand the main aspects of the security of an Information System
-
Describe the technical aspects of more advanced topics, like Blockchain or AI
Content
The course is built according to the following structure:
-
hardware aspects of IS
-
network aspects of IS
-
introduction to algorithmic
-
introduction to AI
-
software aspects of IS
-
data aspects of IS
-
introduction to IS security
-
risk management
-
elements of cryptography
-
visit of a data center
-
infrastructure security
-
software and system security
-
introduction to blockchain and smart contracts
Teaching methods
Class lectures based on reference documents (lecture notes, books), life demonstrations and classroom exercices.
Evaluations
-
the evaluation of the first part of the course takes place early november
-
the evaluation of the second part of the course is organized during the january session
-
in both cases, they take place as written examination; notes of both parts are aggregated to determine the note of the first session
-
in case of failure in january, an oral examination is organized in august
Recommended readings
-
Ferguson, Niels, and Bruce Schneier. Practical Cryptography. Wiley, 2003.
-
Gollmann, Dieter. Computer Security. Wiley, 2006.
-
S, Ghernaouti. Sécurité informatique et réseaux : Cours et exercices corrigés. dunod, 2008.
-
Kurose, James and Ross, Keith. Computer Networking - A Top-Down Approach Featuring the Internet, 5e édition. Morgann-Kaufman, 2009.
-
Hainaut, J.-L., Bases de données, Collection Sciences Sup, Dunod, 2009
Language of instruction
French / Français
Location for course
NAMUR
Organizer
Faculté de droit
Rue de Bruxelles, 61
5000 NAMUR
Degree of Reference
Master's Degree