User Tools

Site Tools


master

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
master [2022/01/26 12:41] ggankhuyagmaster [2022/01/26 12:44] – [Courses offered by SEC] ggankhuyag
Line 4: Line 4:
  
 ===2IMS00: Seminar IST=== ===2IMS00: Seminar IST===
-In this course students train the skills required for doing independent research in security. The student has to be able to explore a new security topic on his/her own and present the results in oral and written form. The Seminar is a preparation for the masters thesis project. The students get a project assignment, consisting of a literature study and a practical assignment. They have to hand in a report and to present their results orally to their fellow students. The reports are subjected to peer review.+In this coursestudents train the skills required for doing independent research in security. The student has to be able to explore a new security topic on his/her own and present the results in oral and written form. The Seminar is a preparation for the master'thesis project. The students get a project assignment, consisting of a literature study and a practical assignment. They have to hand in a report and present their results orally to their fellow students. The reports are subjected to peer review.
  
 ===2IMS10: Physical Aspects of Digital Security=== ===2IMS10: Physical Aspects of Digital Security===
Line 35: Line 35:
 ===2IMS30: Advanced Network Security=== ===2IMS30: Advanced Network Security===
 The course is divided in THREE (3) parts.  The course is divided in THREE (3) parts. 
-1. The first part is dedicated to the recall of basic notions, such as cryptography, hashing, and fundamental related security services, that will be the roots of the following part of the course.  +  - The first part is dedicated to the recall of basic notions, such as cryptography, hashing, and fundamental related security services, that will be the roots of the following part of the course.  
-2. The second part of the course is dedicated to the security of IoT networks. The course will mostly follow a bottom-up approach, following the ISO/OSI Stack. We will establish several comparisons between traditional security protocols and the way these protocols are integrated into constrained IoT networks.  +  The second part of the course is dedicated to the security of IoT networks. The course will mostly follow a bottom-up approach, following the ISO/OSI Stack. We will establish several comparisons between traditional security protocols and the way these protocols are integrated into constrained IoT networks. 
-3. The third part will focus on specific network security applications. It will cover network security and privacy aspects of several use-case protocols, such as avionics protocols, maritime scenarios, and GNSS architectures. +  The third part will focus on specific network security applications. It will cover network security and privacy aspects of several use-case protocols, such as avionics protocols, maritime scenarios, and GNSS architectures. 
  
  
master.txt · Last modified: 2023/06/01 17:06 by ggankhuyag