User Tools

Site Tools


bachelor

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
bachelor [2017/08/24 18:47] lallodibachelor [2021/01/10 21:04] (current) – external edit 127.0.0.1
Line 5: Line 5:
 Links to course program and available material for each course are provided below. Links to course program and available material for each course are provided below.
  
-  * XXXXX: Computer Networks and Security 
-    * Synopsis of course 
   * [[http://www.win.tue.nl/~lallodi/|2IC80: Laboratory on Offensive Computer Security]]   * [[http://www.win.tue.nl/~lallodi/|2IC80: Laboratory on Offensive Computer Security]]
     * This course will cover an introduction to practical aspects of computer security threats and defences. The course will present theoretical aspects of computer security as well as practical examples of real attacks and laboratory activities. The student will learn:     * This course will cover an introduction to practical aspects of computer security threats and defences. The course will present theoretical aspects of computer security as well as practical examples of real attacks and laboratory activities. The student will learn:
Line 14: Line 12:
       * the different types of network and host defences, and their limitations       * the different types of network and host defences, and their limitations
       * how to engineer a working attack and deploy effective defences       * how to engineer a working attack and deploy effective defences
 +  * [[http://www.win.tue.nl/~tozceleb/2IC60/|2IC60: Computer Networks and Security]] 
 +    * A computer network is a facilitator of distributed applications and comes with security threats. We cover the organization of computer networks (e.g. the Internet), basics of security and network and security protocols. Students learn to explain solutions to standard problems and to analyze protocols with respect to correctness, performance, reliability and security. Concepts are realized using the underlying protocols studied
   * 3USU0: Course 2 Information science technology and society (Security track)   * 3USU0: Course 2 Information science technology and society (Security track)
-    * Synopsis of course+    * This course is divided into two parts: complex networks (part I) and information security (part II). 
 +      *  The goal of the first part of the course is to introduce students to the state of the art in terms of argumentation, models, and algorithms developed for understanding complex networks of humans and devices. 
 +      * The goal of the second part is to introduce the concepts of information risk, threats, vulnerabilities, impact; confidentiality, integrity, authenticity. Shannon’s communication model for conventional encryption. Cryptography and cryptographic attacks. Physical random number generators and Physical Unclonable Functions. Malwares and Exploits. Study of the Russian black market and traded technology.
bachelor.1503593271.txt.gz · Last modified: 2021/01/10 20:59 (external edit)