Welcome to M2 SCCI Promotion Horst Feistel
|
|
- Alison Palmer
- 8 years ago
- Views:
Transcription
1 Welcome to M2 SCCI Promotion Horst Feistel Horst Feistel( )
2 Grenoble University SCCI - M2P / M2R Security, Cryptology and Coding of Information Systems - Sécurité, Cryptologie et Codage des Systèmes d Information Context General presentation 1. Academic program, calendar 2. Lectures/Tutoring organization Administration, registration: who s who
3 Cybersecurity Context : digital world, pervasive systems, big data Confidentiality, Authentication, Integrity, Non-repudiation Various applications and professional skills: Enterprise specialised in security: solutions providers (hardware, software, smartcard, ); security audit, Specialized department of a company : bank, e-business, telecom,tv, Information system within a company: network/system administration Professional and personal data protection 1 year dedicated program at Grenoble University (UJF+INP) Ensimag, Institut Fourier, UFR IMAG Objective : formation of experts in security and coding technologies Cryptology : mathematical protocols (RSA, AES, ECC ) Security: software/hardware (network, system, integraton) Applications : watermarking, multimedia, smartcard, M2P : Directed to profession: sept-march=lectures+training / apr-sept project M2R : Directed to research: sept-jan=lectures+training / feb-june project
4 Brief history & organization Master UJF-INPG Cryptologie, Sécurité, Codage de l Information (2001 ) Sept 2003: first promotion: 17 graduate students 290 graduate students up to sept 2015, From Sept 2007: international M2P program taught in English From sept 2008: part of MOSIG International Master; Sept 2011: 10 years birthday : From sept 2011: M2P, M2R, ( SAFE ) From 2016 : M2 Cybersecurity M2P+R Security, Cryptology and Coding of Information Systems Gathers French and English speaking students Director UJF/IF : Jean-Guillaume Dumas, Vanessa Vitse, Philippe.Elbaz-Vincent at ujf-grenoble.fr, Director INP/ENSIMAG: Jean-Louis.Roch at imag.fr Web:
5 M2P mid-sept->march: courses (level 3) [2 weeks optional pretraining early sept] April -> September : (level 4) full-time internship (Master thesis) mid-june: mid-term presentation In English! mid-september: defense Calendar M2R mid-sept->january: courses (level 3) February-> June: (level 4) full-time internship (Master thesis) mid-june: defense Validation: by level (~semester) Mark 10/20=50% to level 3 (courses) No mark < 7 in global units Mark 10/20=50% to level 4 (thesis/project) Warning! Internships must be validated by J.-G. D. / V. V (for UJF) or J.-L. R (for INP). Furthermore, academic supervisor for the internships are also chosen by the directors.
6 M2P and M2R courses Common core: cryptology and security [15 ECTS] Models for security Symmetric and asymmetric cryptology - PKI infrastructures System administration and network security Elective specialization [12 ECTS] : choose one between Security of Information Systems [12 ECTS] Advanced system and network security Secure hardware architecture Distributed algorithms and fault-tolerance Secure infrastructure deployment project Cryptology, coding and multimedia applications [12 ECTS] Advanced cryptology: elliptic curves, cryptanalysis Multimedia applications, watermarking Coding and fault-tolerance Elective course unit [3 ECTS] : choose one between Smart card security; audit and normalization [3 ECTS] New trends in cryptology: quantum, biometrics, homomorrphic encryption [3 ECTS] Master thesis [27 ECTS] Note: early september: Specific optional introduction courses Math [group theory,arithmetics]; linux & programming ; information systems [UML]
7 27 ECTS Master thesis Academic Program M2P SCCI (M2-P) 3 ECTS UE Transversal (English / French / ) 30 ECTS scientific/technology 15 ECTS Common Core 12 ECTS Elective Specialization in Security ( math or info ) 3 ECTS = elective unit (2 proposed, but yet open to all units proposed in Grenoble M2 Math-Info)
8 Security, Cryptology and Coding of Information Systems M2P SCCI 2015/2016 Academic Program Non-elective Core Courses 18 ECTS ECTS Teaching teams - Security models: proofs, protocols and politics 6 Autreau, Ene, Kumar, Roch - Symmetric and asymmetric cryptology PKI 6 Dumas,Elbaz-Vincent,Lauradoux&guests - System administration and network security 3 Mounié, - English or French 3 Pool Langues Choose one of the two following elective 12 ECTS Elective A. Security of systems and infrastructures - Advanced security of system and networks - Hardware and embedded secure architectectures - Distributed algorithms and fault-tolerance - Deployment of a secure grid infrastructure Elective B. Cryptology, coding and multimedia - Advanced cryptology:elliptic curves, cryptanalysis - Multimedia applications and watermarking - Error correcting codes and fault-tolerance Wagner, Castellucia Maisri Lachaize, Wagner Vitse Cayre, Ebrahimi Pernet; Roch; Patchichkine, Brossier Choose one of the two following elective 3 ECTS - Elective 1. Smart card security, certif. and norms 3 Autreau, Guillemet - Elective 2. New trends in cryptography 3 Malha, Mainguet, Vitse
9 Academic Program M2R SCCI 27 ECTS Master thesis 3 ECTS UE Transversal (English / French / ) 30 ECTS scientific/technology 24 ECTS Common Core 6 ECTS elective unit (2 units of 3 ETCS proposed, but yet open to all units proposed in Grenoble M2 Math-Info)
10 Security, Cryptology and Coding of Information Systems M2R SCCI 2015/2016 Academic program Non-elective Core Courses 18 ECTS ECTS Teaching teams - Security models: proofs, protocols 6 Ene, Roch - Symmetric and asymmetric cryptology PKI 6 Dumas,Elbaz-Vincent,Lauradoux&guests - Security of computer systems and networks * System administration and network security (3) * Advanced security of system and networks (3) 6 Castellucia,, Wagner - Advanced cryptology:elliptic curves, cryptanalysis 6 Vitse - English or French (FLE) 3 Pool Langues Elective scientific module/units : 6 ECTS - Requires validation from M2R SCCI academic supervisors. Timetable compatibility is guaranteed for both following units (3 ECTS each) : * Smart card security, certif. and norms (3 ECTS) * New trends in cryptography (3 ECTS) 6 Autreau, Guillemet, Malha, Mainguet, Vitse - M2R Thesis 27
11 Courses and M2P trainings 1 ECTS Scientific Unit = 10h attendency M2 Courses slots of 1.5 hours per week per student: 8h-9h30 / 9h45-11h15 / 11h30-13h 13h45-15h15/15h30-17h M2P 3 ECTS = 30H classes / 45H practical work + Homework 18h lectures in English (~ 2 slots of 1h30 / week) + 12h training : TP/ Exercises/complts If enough students, may be given twice: 1 group in English + 1 group in French => for each unit, choose either French or English, once! M2R: courses, homework, no training / TP Additional tutoring (office hours) on request: see your professors
12 Validation / Graduation Two semesters / periods S3 (30 credits) : Courses S4 (30 credits): Master thesis (internship) + English (or French) Each semester has to be validated : Requirements for S3 validation : In each module: global mark 7/20 (35%) Global average mark (GPA) on S3 10/20 (50%) Requirements for S4validation : Master thesis mark 10/20 (50%) English: B2 level (Alt or Full) IMPORTANT: No compensation between semesters Except if the candidate has a GPA in S3 (courses) 9.75 and no mark < 7 in some module For honours: the Master degree includes the 4 semesters (M1 and M2)
13 Programme = M2 (P ou R) Elèves-ingénieur (inscription en 3A -pas Master-) Anglais suivi à l ENSIMAG (+ 2eme langue) Validation REX (le 3/10 après-midi) / simulation gestion Stage 2A à valider Elective unit: NTC ou «smart card security» PFE + Thèse Master (juil pou R, sept pour P) Facultatifs: Sport, LV2, Définir programme suivi: choix M2R ou choix M2P
14 Academic supervisors: Contacts and links (UJF) Jean-Guillaume Dumas Vanessa Vitse Philippe Elbaz-Vincent (INP) Jean-Louis Roch Registration / Scholastic secretaries UJF / IM2AG : Cécile Gros Cecile.Gros@ujf-grenoble.fr INP / Ensimag : Elena Leibowitch Elena.Leibowitch@imag.fr Links SCCI web server: Kiosk: Mail: scci@ensimag and m2scci.im2ag@ujf-grenoble.fr
15 Calendrier Calendrier M2P et R SCCI Semaine Début Fin Lundi Mardi Mercredi Jeudi Vendredi 38 14/09/ /09/2015 Compléments Math - Info Compléments Math - Info Compléments Math - Info Compléments Math - Info Compléments Math - Info 39 21/09/15 25/09/15 Rentrée M2PR à 11h en Amphi H- Ensimag Inscription administrative /09/15 02/10/ /10/15 09/10/ /10/15 16/10/ /10/15 23/10/ Forum Ensimag /10/15 30/10/15 V V V V V 45 02/11/15 06/11/ /11/15 13/11/ V 6 7 / APM Toeic blanc Ensimag 47 16/11/15 20/11/ / APM AMNECYS /11/15 27/11/ Semestre /11/15 04/12/ /12/15 11/12/ /12/15 18/12/ /12/15 25/12/15 V V V V V 53 28/12/15 01/01/16 V V V V V 1 04/01/16 08/01/ /01/16 15/01/16 Examens session 1, M2P/R Examens session 1, M2P/R Examens session 1, M2P/R Examens session 1, M2P/R Examens session 1, M2P/R Fin cours M2R 3 18/01/16 22/01/ Forum UJF /01/16 29/01/ /02/16 05/02/ / AMP Toeic Ensimag /02/16 12/02/ /02/16 19/02/ /02/16 26/02/16 V V V V V 9 29/02/16 04/03/16 Examens session 1, M2P Examens session 1, M2P Examens session 1, M2P Examens session 1, M2P Examens session 1, M2P Fin cours M2P 10 07/03/16 11/03/16 stage stage stage stage stage 11 14/03/16 18/03/16 stage stage stage stage stage 12 21/03/16 25/03/16 stage stage stage stage stage 13 28/03/16 01/04/16 Jury Semestre 3, session 1 stage stage stage stage 14 04/04/16 08/04/16 stage stage stage stage stage 15 11/04/16 15/04/16 stage stage stage stage stage 16 18/04/16 22/04/16 stage stage stage stage stage 17 25/04/16 29/04/16 stage stage stage stage stage 18 02/05/16 06/05/16 stage stage stage stage stage 19 09/05/16 13/05/16 stage stage stage stage stage 20 16/05/16 20/05/16 stage stage stage stage stage 21 23/05/16 27/05/16 stage stage stage stage stage 22 30/05/16 03/06/16 stage stage stage stage stage Semestre /06/16 10/06/16 stage stage stage stage stage 24 13/06/16 17/06/16 stage stage stage stage stage 25 20/06/16 24/06/16 Soutenances Soutenances Examens session 2 Examens session 2 Examens session /06/16 01/07/16 stage Jury Semestre 4, session 1 stage stage stage 27 04/07/16 08/07/16 stage stage stage stage stage 28 11/07/16 15/07/16 Jury Diplôme, session 1 stage stage stage stage 29 18/07/16 22/07/16 stage stage stage stage stage 30 25/07/16 29/07/16 stage stage stage stage stage 31 01/08/16 05/08/16 stage stage stage stage stage 32 08/08/16 12/08/16 stage stage stage stage stage 33 15/08/16 19/08/16 stage stage stage stage stage 34 22/08/16 26/08/16 stage stage stage stage stage 35 29/08/16 02/09/16 Soutenances Soutenances Soutenances Soutenances Soutenances 36 05/09/16 09/09/16 Jury Sem. 3 + Sem. 4, session /09/16 16/09/16 Jury Diplôme, session /09/16 23/09/16 Calendrier-M2PR-SCCI /1
16 Timetable ADE : HowTo If you do not have an Agalan INP login+pwd : Or if you have an AGALAN login+pwd: Direct access all Master courses in Grenoble (or ) M2R SCCI (lectures from mid-september to january) : copy-paste in your browser the url : with INP Agalan login+pwd: plannings/direct_planning.jsp?resources=13289 M2P SCCI (lectures from mid-september to march) plannings/direct_planning.jsp?resources=13291
17 REGISTRATION and very important dates Now: each student : has to sign two IT charts : INP and UJF and provides the track choice (M2P or M2R) 22 september : deadline for administrative registration (in your institution, either INP or UJF) While not registered => no login, no Kiosk, no ADE! INP students: photo for trombinoscope : 21/09 13h30,room D115 Ensimag UJF students: test d'anglais aura lieu le 21/09 à 15h au DLST (Enseignante : Emmanuelle.Esperanca-Rodier@ujf-grenoble.fr) ; 1 st October: deadline to change track choice: M2P or M2R
18 Important points Charts Registration Individual interviews (on demand, current october) Internship / Master Thesis Curriculum vitae ready Prospection / application : from early October
19 Other contacts SECURIMAG club CELAIO : Carole.Durand@ujf-grenoble.fr Relations with companies CV, internship contracts, International : Cecile.Garatti@ujf-grenoble.fr ri.im2ag@ujf-grenoble.fr
20 Questions?
21 Examples of Master thesis Integration of zero-knowledge authentication on smart card [C-S] Secure server for SIP telecommunications [INRIA] Integration of strong authentication in an information system [British Telecom] Management of identity for printer access [Helwett-Packard, Germany] Reconfiguraton of a secure infrastructure [France-Telecom, Grenoble] Conception et réalisation d un composant de sécurité [Ministère Défense, Paris] Analysis and deployment of a confidential data service [Solucom, Nantes] Integration of biometrics in crypto protocols [SAGEM, Paris] Hidden channel attacks [SAGEM, Paris] Windows CardSpace components in a smart card [Gemalto, La Ciotat] Secure loading of jar in JavaCard3.0 [Gemalto, La Ciotat] Lightweight electronic signature [Dictao, Paris] Wireless infrastructure for emergency comm. [Wisecomm, Germany] Secure and anonymous communication on internet [UL, Luxembourg] Test of crypto-secure random generators [LTSI, Lyon] Security analysis of a medical data protection scheme [Philips, Eindhoven] Supervision of the CEA computer infrastructure [CEA, Grenoble] Security analysis of images watermarking [GIPSA, Grenoble] Security audit of the SCADA platform [Atos Origin, Grenoble].
Welcome to M2 SCCI 2014-2015 Promotion David Albert Huffman
Welcome to M2 SCCI 2014-2015 Promotion David Albert Huffman David A. Huffman(1925-1999) [Photo: Don Harris] Grenoble University SCCI - M2P / M2R Security, Cryptology and Coding of Information Systems -
More informationMasters of Science in Informatics at Grenoble
Masters of Science in Informatics at Grenoble Plan Objective and approach Overview of program Action Plan Provisions for Sept 2008 Academic program and teaching teams 1 Objective and Approach Objectives:
More informationWelcome to: M2R Informatique & MoSIG Master of ScienceSep. in Informatics 18, 2009 Joseph 1 / 1Fou
Welcome to: M2R Informatique & MoSIG Master of Science in Informatics Joseph Fourier University of Grenoble & Grenoble INP UFR IMAG http://www-ufrima.imag.fr & ENSIMAG http://ensimag.grenoble-inp.fr Sep.
More informationProject Informations Master s degree in Computer Science (by research) M2R Info. in short
Project Informations Master s degree in Computer Science (by research) M2R Info. in short Joseph Fourier University of Grenoble & Grenoble INP UFR IMAG http://ufrima.imag.fr & ENSIMAG http://ensimag.grenoble-inp.fr
More informationACADEMIC GUIDE SMSc SN 2013-03
ACADEMIC GUIDE SMSc SN 2013-03 www.supinfo.com Copyright SUPINFO. All rights reserved SUPINFO Academic Management Avril 2011 Version 1.0 Academic Book Specialized Master of Science - System & Networks
More informationMinor in ii INFORMATION SECURITY i at ESIEA Laval, France
Minor in ii INFORMATION SECURITY i at ESIEA Laval, France Program Strengths Provides a thorough overview of information and network security, from secure programming to risk management within a company.
More informationUNIVERSITY OF TRIESTE UNIVERSITY OF UDINE ACADEMIC REGULATIONS MASTER DEGREE PROGRAMMEME IN PHYSICS. Master Degree Programme Section LM-17
UNIVERSITY OF TRIESTE UNIVERSITY OF UDINE ACADEMIC REGULATIONS MASTER DEGREE PROGRAMMEME IN PHYSICS Master Degree Programme Section LM-17 DM 270/2004, art.12 R.D.A. art. 5 1 Art. 1 General rules and objectives
More informationMaster of Business Management
Master (Master Administration des Entreprises of the University of Lorraine) The master (2 semesters) International Track General Track isam-iae.univ-lorraine.fr University Diploma in (1 semester in English)
More informationCYBERSYSTEMS AND INFORMATION SECURITY (CSIS) CURRICULUM
CYBERSYSTEMS AND INFORMATION SECURITY (CSIS) CURRICULUM The approved (by ACHE in 12/2009) and accredited (by SACS in 12/2010) Master of Science degree program in Cybersystems and Information Security will
More informationModule 1: e- Learning
Module 1: e- Learning SECTION 1: OVERVIEW... 2 PRIMER ON INFORMATION TECHNOLOGY, IS INFRASTRUCTURE AND EMERGING TECHNOLOGIES (12%) E-LEARNING... 2 Objective Objective:... 2 Task Statements... 2 Knowledge
More informationLecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic University Outline Administrative Stuff Introductory Technical Stuff Some Pointers Course Web Page http://isis.poly.edu/courses/cs6903-s10
More informationDOUBLE BACHELOR'S DEGREE IN ECONOMIC SCIENCES / LANGUAGES (ENGLISH, GERMAN)
Academic year 2014/2015 DOUBLE BACHELOR'S DEGREE IN ECONOMIC SCIENCES / LANGUAGES (ENGLISH, GERMAN) Domaine(s) ARTS - LITERATURE - LANGUAGES, LAW - ECONOMY- MANAGEMENT General informations Fields Length
More informationUsing BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
More informationSecure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
More informationGTEM TRAINING PROGRAM
GTEM TRAINING PROGRAM 1. Overview The Training Program consist of five modules, which are given in Table 1. A broad description of Table 1: Training modules and dependencies T1: General mathematical skills
More informationCurriculum Vitae. Claude Barral. 1984 1988 Baccalaureat (E-level) : Mathematics and Technologies Lycée polyvalent Antonin Artaud, Marseille, France
Curriculum Vitae Address n o 6 La Bastide Samat 13119 Saint Savournin, France Phone: +33.4.42.32.36.92 Mobile Phone: +33.6.86.83.19.55 Email: claude.barral@gmail.com Homepage: http://www.linkedin.com/in/cbarral
More informationCertificate in Cyber Security
Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F SATI), CS Interactive Training and Boshoff
More informationCryptography & Network Security. Introduction. Chester Rebeiro IIT Madras
Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf
More informationINFORMATION FOR EXCHANGE STUDENTS AND PARTNER UNIVERSITIES 2015-2016
INFORMATION FOR EXCHANGE STUDENTS AND PARTNER UNIVERSITIES 2015-2016 Welcome to Toulouse Business School Master in Management (Grande Ecole) Program International Relations Office 1 TABLE OF CONTENTS YOUR
More informationINFORMATION FOR EXCHANGE STUDENTS AND PARTNER UNIVERSITIES 2015-2016
INFORMATION FOR EXCHANGE STUDENTS AND PARTNER UNIVERSITIES 2015-2016 Welcome to Toulouse Business School Master in Management (Grande Ecole) Program International Relations Office 1 TABLE OF CONTENTS YOUR
More informationINFORMATION FOR EXCHANGE STUDENTS AND PARTNER UNIVERSITIES 2014-2015
INFORMATION FOR EXCHANGE STUDENTS AND PARTNER UNIVERSITIES 2014-2015 Welcome to Toulouse Business School Master in Management (Grande Ecole) Program International Relations Office 1 TABLE OF CONTENTS LIST
More informationAnca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography
Anca Nitulescu PhD Student Personal information Address: Ecole Normale Supérieure, DI Paris, France Email: anca.nitulescu@ens.fr Occupational field Cryptography: Provable Security for Protocols I have
More informationMaster informatique 2 e année Spécialité Recherche en informatique - MRI
Master informatique 2 e année Spécialité Recherche en informatique - MRI http://master.irisa.fr Welcome presentation 2014-2015 Sandrine Blazy, Valérie Gouranton, m2r_resp@irisa.fr 1 Outline Generalities
More informationSTUDENT APPLICATION FORM (Dossier d Inscription) ACADEMIC YEAR 2010-2011 (Année Scolaire 2010-2011)
Institut d Administration des Entreprises SOCRATES/ERASMUS APPLICATION DEADLINE : 20th November 2010 OTHER (Autre) STUDENT APPLICATION FORM (Dossier d Inscription) ACADEMIC YEAR 2010-2011 (Année Scolaire
More informationAn Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
More informationGlobal Identity Management of Virtual Machines Based on Remote Secure Elements
Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management
More informationWelcome presentation 2012-2013
http://master.irisa.fr Welcome presentation 2012-2013 Isabelle Puaut, Valérie Gouranton m2r_resp@irisa.fr 1 Generalities Curriculum organization and structure Planning of the year Selection of core modules
More informationM.Tech. Software Systems
M.Tech. Software Systems Input Requirements Employed professionals holding an Integrated First Degree of BITS or its equivalent in relevant disciplines, with minimum one year work experience in relevant
More informationMarianne.Hoyez-Genet@u-bourgogne.fr School : Dijon Institute of Business Administration (IAE Dijon - UFR Economie - Gestion)
Niveau : Domaine : Mention : Spécialité: DROIT-ECONOMIE-GESTION SCIENCES DU MANAGEMENT ( Sciences) MIB Master in International Business Volume horaire étudiant : 494 h (Administration des entreprises)
More informationUCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com
UCL MSc in Information Security Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com About UCL Established in 1826 First institution to welcome students of any race, class or religion,
More informationTable of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
More informationInformation Security and Cryptography
Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00
More informationUCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com
UCL MSc in Information Security Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com About UCL Established in 1826 First institution to welcome students of any race, class or religion,
More informatione-code Academy Information Security Diploma Training Discerption
e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER
More informationDROIT-ECONOMIE-GESTION. Formation dispensée en : marianne.hoyez-genet@u-bourgogne.fr bertrand.belvaux@u-bourgogne.fr
Niveau : Domaine : Mention : Spécialité : DROIT-ECONOMIE-GESTION SCIENCES DU MANAGEMENT (Management Sciences) IMBS International Master in Business Studies (Administration des Enterprises) Volume horaire
More informationInternational Exchange Programmes Fact Sheet 2014 2015 Lille & Nice Campuses
International Campus in Lille Mailing address : ESPEME/EDHEC Business School 24 Avenue Gustave Delory CS 50411 59057 Roubaix Cedex 1, France International Exchange Programmes Fact Sheet 2014 2015 Lille
More information7 semesters or 7x30 = 210 ECTS
General description of the degree program Name Qualification awarded: Level of qualification Qualification requirements and regulations Key learning outcomes Profile of the program Occupational profiles
More informationUniversité de Nice. Each Faculté will have a different website and courses will be located in different places.
Université de Nice 1. Go to the home page of the university: http://unice.fr/ 2. If there is an option to set a language, click on the French flag. If you find that some of the pages do not work, make
More informationOnline Masters Programme in Computer Science Study anytime, anywhere. School of Computer Science
Online Masters Programme in Computer Science Study anytime, anywhere School of Computer Science What is online study? Our innovative online programme enables you to study for a masters degree (MSc) without
More informationCOURSE WEBSITE: http://leonardo.sfasu.edu/jjohnston *This is essential for success in this class.
French 132 Beginning French II FRE 132.001 Dr. Joyce Johnston Email: jjohnston@sfasu.edu Phone: X2279 Office: LAN 252 Office Hours: MW 8-9am,12-1pm and 2:15-2:45pm Th 1-3:30 F 8-9am and 1-2:45pm *or by
More informationReSIST NoE Resilience for Survivability in IST
MSc Curriculum in Resilient Computing Courseware availability Luca Simoncini University of Pisa, Italy Curriculum rationale To move from the usual application-driven MSc curricola (like MSc in embedded
More informationJTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder WG 1 Information security management systems WG 2 Cryptography and security mechanisms WG 3 Security evaulation criteria WG 4 Security
More informationTextbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
More information11557 - CRIPT - Cryptography and Network Security
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 744 - ENTEL - Department of Network Engineering DEGREE IN ELECTRONIC ENGINEERING (Syllabus 1992). (Teaching unit Optional) MASTER'S
More informationTELECOMMUNICATION NETWORKS
THE USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATION NETWORKS John Snare * Manager Telematic and Security Systems Section Telecom Australia Research Laboratories Victoria TELECOMMUNICATIONS
More informationthe degree program Electrical Engineering Power Engineering and Bachelor of Engineering (B.Eng.)
General description of the degree program Name of the degree program: Degree awarded: Electrical Engineering Power Engineering and Renewable Energy Bachelor of Engineering (B.Eng.) Educational and professional
More informationMaster of Science in Computer Science Degree Requirements, Policies, and Procedures
Master of Science in Computer Science Degree Requirements, Policies, and Procedures Summary of Procedures for M.S. Students Complete every deficiency course with a B or higher within the first two terms
More informationPart I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
More informationSwiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg
Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg 1 The MSc program in computer science Worldwide, computer scientists are in high demand. To cater for this demand,
More informationBachelor of Applied Information Science (Information Systems Security)
Sheridan College Institute of Technology and Advanced Learning Bachelor of Applied Information Science (Information Systems Security) Victor Ralevich, Ph.D. Professor and Program Coordinator Sheridan College
More informationMSc Programme Intelligent Adaptive Systems (IAS)
Faculty of Mathematics, Informatics and Natural Sciences Department of Informatics UHH Fachbereich Informatik Vogt-Koelln-Str. 30 D-22527 Hamburg MSc Programme Intelligent Adaptive Systems (IAS) Web: http://www.master-intelligent-adaptive-systems.com/
More informationqwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb
qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb The e-cheque System nmqwertyuiopasdfghjklzxcvbnmqwer System Specification tyuiopasdfghjklzxcvbnmqwertyuiopas
More informationPlymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification
Plymouth University Faculty of Science and Engineering School of Computing Electronics and Mathematics Programme Specification MSc Network Systems Engineering Programme codes: 2359 (Sept), 2938(Jan) September
More informationMonitoring Students Performances in French Institutes of Technology using the ScoDoc Software
http://www-lipn.univ-paris3.fr/ petrucci/papers In Proc. of the 3th International Conference on Information Technology Based Higher Education and Training (ITHET 4), York, UK, IEEE Computer Society Press,
More informationCIS 253. Network Security
CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum
More informationDepartment of Computer Science
Department of Computer Science Unless indicated to the contrary the Period of Registration, Entry Requirements, Curriculum, Assessment and Qualifications for Programmes are as follows: Period of Registration:
More informationPacket Level Authentication Overview
Packet Level Authentication Overview Dmitrij Lagutin, Dmitrij.Lagutin@hiit.fi Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction
More informationEntschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты?
Entschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты? World Standards Day 2015 ILNAS 2015-10-14 Cédric Mauny, Vice-Chairman of Luxembourg National Committee ISO/IEC JTC1
More informationMASTER S DEGREE IN ENGINEERING
The combines many different positions for engineers. Our graduates might decide to work as network access architects, radio support engineers, network deployment project managers, marketing managers for
More informationWeb-based Modules for Cyberphysical Systems Security
Web-based Modules for Cyberphysical Systems Security Janusz Zalewski, Florida Gulf Coast University Nary Subramanian, University of Texas at Tyler Andew Kornecki, Embry-Riddle Aeronautical University Bogdan
More informationCryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely
More informationCESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
More informationMaster s Degree in INTERNATIONAL MARKETING & SALES MANAGEMENT Official Master s Degree European Higher Education Area
Master s Degree in INTERNATIONAL MARKETING & SALES MANAGEMENT Official Master s Degree European Higher Education Area 2 Why study at IQS? IQS is a Higher Education Center founded by the Society of Jesus,
More informationThe University Board of the Bern University of Applied Sciences,
Study and examination regulations for the Master of Science in Engineering in the departments Architecture, Wood and Civil Engineering and Engineering Science and Information Technology (CER MSE) The University
More informationNetwork Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and
More informationProgramme Specification
LOUGHBOROUGH UNIVERSITY Programme Specification Information Technology & Physics Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes
More informationGeostatistics and GIS. M. Kanevski Geolab. Geostatistics and GIS. M. Kanevski Geolab. Geostatistics and GIS. M. Kanevski Geolab. Geostatistics and GIS
MSc Env Printemps semaine 1 (8) Heures Lundi 22.02.3016 Mardi 23.02.2016 Mercredi 24.02.2016 Jeudi 25.02.2016 Vendredi 26.02.2016 MSc Env Printemps semaine 2 (9) Heures Lundi 29.02.2016 Mardi 01.03.2016
More informationInformation session April 2nd, 2015. Master 2 in Information System Security Management (ISSM)
Information session April 2nd, 2015 Master 2 in Information System Security Management (ISSM) Master s team Prof. Yves Le Traon Study director Rita Giannini Study coordinator Master s team Nicolas Mayer
More informationMS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
More informationACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network
More informationMSc in Network Centred Computing. For students entering in October 2009. contributions from other EU universities Faculty of Science
MSc in Network Centred Computing (NCC) For students entering in October 2009 Awarding Institution: The University of Reading Teaching Institution: The University of Reading, with contributions from other
More informationMIB Application Guide
MIB Application Guide The dead line of the application is on the 24 th April 2013. The requested documents for the application are : Curriculum vitae All your diploma since the baccalauréat or equivalent
More informationWorld Summit on Information Society (WSIS) Forum 2013. 16 May 2013
World Summit on Information Society (WSIS) Forum 2013 Toolkit for creating ICT-based services using mobile communications for e- government services 16 May 2013 Hani Eskandar ICT Applications coordinator
More informationPKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240
PKI Uncovered Andre Karamanian Srinivas Tenneti Francois Dessart Cisco Press 800 East 96th Street Indianapolis, IN 46240 Contents Introduction XIII Part I Core Concepts Chapter 1 Crypto Refresh 1 Confidentiality,
More informationComputer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner wagnerpj@uwec.edu
Computer Security Curriculum at the Univ. of Wisconsin Eau Claire Paul J. Wagner wagnerpj@uwec.edu Background! Attended week-long workshop at Indiana University of Pennsylvania in 2002 with colleague Andy
More informationM.Sc. Computer Science Information about the degree programme
Academic Advice Service Faculty of Computer Science and Mathematics M.Sc. Computer Science Information about the degree programme For more information, visit www.uni-passau.de/en/msc-computer-science/
More informationAdministration Marianne HOYEZ-GENET 03.80.39.54 20 marianne.hoyez-genet@u-bourgogne.fr
Niveau : Domaine : Mention : Spécialité : DROIT-ECONOMIE-GESTION SCIENCES DU MANAGEMENT (Management Sciences) IMBS International Master in Business Studies (Administration des Enterprises) Volume horaire
More informationPrinciples of ICT Systems and Data Security
Unit 14: Principles of ICT Systems and Data Security Unit code: L/601/3508 QCF Level 2: BTEC Specialist Credit value: 6 Guided learning hours: 45 Aim and purpose This unit introduces the common types of
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationMajor prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.
Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part
More informationDurée 4 jours. Pré-requis
F5 - BIG-IP Application Security Manager V11.0 Présentation du cours Ce cours traite des attaques applicatives orientées Web et de la façon d utiliser Application Security Manager (ASM) pour s en protéger.
More informationLOUGHBOROUGH UNIVERSITY
LOUGHBOROUGH UNIVERSITY Programme Specification Computer Science Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical
More informationFaculty of Arts. 5. Registration for course units and study progress supervision
Faculty of Arts Teaching and Examination Regulations 2014-2015 Research Master s degree programmes in History (CROHO 60139) and International Relations (CROHO 60820) Specialization Modern History and International
More informationProgramme name Mathematical Science with Computer Science Mathematical Science with Computer Science with Placement
PROGRAMME SPECIFICATION KEY FACTS Programme name Mathematical Science with Computer Science Mathematical Science with Computer Science with Placement Award BSc (Hons) School School of Mathematics, Computer
More informationDiploma of Advanced Studies / REALisation - Ceramic & Polymers
Diploma of Advanced Studies / REALisation - Ceramic & Polymers Luka Maurer, Researchs Workshop Wieki Somers & Chris Kabel / Photography Sandra Pointet REAL postgraduate studies CERCCO is the Centre for
More informationInternational Journal for Research in Computer Science
TOPIC: MOBILE COMPUTING AND SECURITY ISSUES. ABSTRACT Owodele Odukale The past decade has seen a growth in the use of mobile computing. Its use can be found in areas such as social media, information exchange,
More informationMathematics, Computer Science and Engineering Department or equivalent Computer Science
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name MSc Health Informatics Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Computer Science
More informationa) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
More informationDigital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
More informationIT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
More informationEUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
More informationSmart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
More informationInformation and Network Security Certificate Program
Information and Network Security Certificate Program University of California, Irvine, P.O. Box 6050, Irvine, CA 92612-6050 www.extension.uci.edu PROGRAM DESCRIPTION Data security is critical and increasingly
More informationCULTURAL POLICY AND MANAGEMENT
and Master Programme in CULTURAL POLICY AND MANAGEMENT (Interculturalism and Mediation in the Balkans) MA IN CULTURAL POLICY AND MANAGEMENT Study Level: Master Study Mode: Full Time Duration: One academic
More informationBachelor of Engineering (B.Eng.)
General description of degree program Name of degree program: Degree awarded: Specialization: Educational and professional goals: Program duration: Pre-study work experience: Conditions of admission: Traineeship
More informationSchool of Informatics Department or equivalent Department of Computer Science Programme code
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name E-Business Systems Award MSc School School of Informatics Department or equivalent Department of Computer Science Programme code
More informationA Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University
More informationChapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
More informationOFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
More information