User Tools

Site Tools


bachelor

This is an old revision of the document!


Bachelor courses in Cyber Security at TU/e

The bachelor courses proposed by the security group give an introduction to computer and network security, its theoretical and practical aspects, an introduction to offensive techniques and a high-level perspective on cutting-edge aspects of malware economics, crypto, and crypto currencies.

Links to course program and available material for each course are provided below.

    • This course will cover an introduction to practical aspects of computer security threats and defences. The course will present theoretical aspects of computer security as well as practical examples of real attacks and laboratory activities. The student will learn:
      • the characteristics of software vulnerabilities and their impact on system security
      • malware types, functionalities, and propagation mechanisms
      • vectors for attack delivery
      • the different types of network and host defences, and their limitations
      • how to engineer a working attack and deploy effective defences
    • A computer network is a facilitator of distributed applications and comes with security threats. We cover the organization of computer networks (e.g. the Internet), basics of security and network and security protocols. Students learn to explain solutions to standard problems and to analyze protocols with respect to correctness, performance, reliability and security. Concepts are realized using the underlying protocols studied
  • 3USU0: Course 2 Information science technology and society (Security track)
    • This course is divided into two parts: complex networks (part I) and information security (part II).
      • The goal of this part of the course is to introduce students to the state of the art in terms of argumentation, models, and algorithms developed for understanding complex networks of humans and devices.
      • Concepts of information risk, threats, vulnerabilities, impact; confidentiality, integrity, authenticity. Shannon’s communication model for conventional encryption. Symmetric and asymmetric cryptography, randomness in key generation and encryption. Cryptographic attacks. Physical random number generators and Physical Unclonable Functions (PUFs). Algorithms for turning non-uniform physical sources of randomness into uniform sources. Randomness tests. Uses of PUFs. Infection mechanisms and dynamics. Malware: viruses, botnets, and ransomware. The economics of the exploits market: criminal business models. Life cycle of exploits. Examples of exploits. Study of the Russian black market and traded technology. (Da sistemare)
bachelor.1508412647.txt.gz · Last modified: 2021/01/10 20:59 (external edit)