master
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
master [2022/01/26 12:41] – ggankhuyag | master [2022/01/26 12:44] – [Courses offered by SEC] ggankhuyag | ||
---|---|---|---|
Line 4: | Line 4: | ||
===2IMS00: Seminar IST=== | ===2IMS00: Seminar IST=== | ||
- | In this course students train the skills required for doing independent research in security. The student has to be able to explore a new security topic on his/her own and present the results in oral and written form. The Seminar is a preparation for the masters | + | In this course, students train the skills required for doing independent research in security. The student has to be able to explore a new security topic on his/her own and present the results in oral and written form. The Seminar is a preparation for the master' |
===2IMS10: Physical Aspects of Digital Security=== | ===2IMS10: Physical Aspects of Digital Security=== | ||
Line 35: | Line 35: | ||
===2IMS30: Advanced Network Security=== | ===2IMS30: Advanced Network Security=== | ||
The course is divided in THREE (3) parts. | The course is divided in THREE (3) parts. | ||
- | 1. The first part is dedicated to the recall of basic notions, such as cryptography, | + | - The first part is dedicated to the recall of basic notions, such as cryptography, |
- | 2. The second part of the course is dedicated to the security of IoT networks. The course will mostly follow a bottom-up approach, following the ISO/OSI Stack. We will establish several comparisons between traditional security protocols and the way these protocols are integrated into constrained IoT networks. | + | |
- | 3. The third part will focus on specific network security applications. It will cover network security and privacy aspects of several use-case protocols, such as avionics protocols, maritime scenarios, and GNSS architectures. | + | |
master.txt · Last modified: 2023/06/01 17:06 by ggankhuyag