Minor in ii INFORMATION SECURITY i at ESIEA Laval, France

Similar documents
Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)

Curran, K. Tutorials. Independent study (including assessment) N/A

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Network Security and Firewall 1

Implementing Cisco IOS Network Security

90% of data breaches are caused by software vulnerabilities.

Network Security Course Specifications

Introduction to Cyber Security / Information Security

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

IINS Implementing Cisco Network Security 3.0 (IINS)

e-code Academy Information Security Diploma Training Discerption

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

CompTIA Security+ (Exam SY0-410)

CompTIA Network+ (Exam N10-005)

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Security Awareness. Wireless Network Security

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Information and Communications Technology Courses at a Glance

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

One LAR Course Credits: 3. Page 4

Recommended IP Telephony Architecture

FUNDAMENTALS of INFORMATION THEORY and CODING DESIGN

Bachelor of Information Technology (Network Security)

Cisco Advanced Services for Network Security

CNA 432/532 OSI Layers Security

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Directory and File Transfer Services. Chapter 7

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

A Systems Engineering Approach to Developing Cyber Security Professionals

Tim Bovles WILEY. Wiley Publishing, Inc.

Computer Network Engineering

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

CYBERSYSTEMS AND INFORMATION SECURITY (CSIS) CURRICULUM

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

Module 1: e- Learning

Cisco Certified Security Professional (CCSP)

ICANWK406A Install, configure and test network security

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

VALLIAMMAI ENGINEERING COLLEGE

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce

Integrigy Corporate Overview

Goals. Understanding security testing

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Introduction Open Source Security Tools for Information Technology Professionals

Network Access Security. Lesson 10

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Network Security Administrator

Certified Cyber Security Analyst VS-1160

School of Computer Science

Client Server Registration Protocol

Security Technology: Firewalls and VPNs

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Advanced Higher Computing. Computer Networks. Homework Sheets

CS 450/650 Fundamentals of Integrated Computer Security

- Introduction to PIX/ASA Firewalls -

Certificate in Cyber Security

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Dept. of Financial Information Security

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

CPSC 467b: Cryptography and Computer Security

Topics in Network Security

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Linux Network Security

Tutorial 3. June 8, 2015

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CCA CYBER SECURITY TRACK

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

A Model-based Methodology for Developing Secure VoIP Systems

Masters in Human Computer Interaction

Windows Remote Access

Masters in Advanced Computer Science

NETWORK SECURITY (W/LAB) Course Syllabus

Implementing Cisco IOS Network Security v2.0 (IINS)

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Masters in Artificial Intelligence

Open Source Security Tools for Information Technology Professionals

COURSE TITLE COURSE DESCRIPTION

Assessment for Master s Degree Program Fall Spring 2011 Computer Science Dept. Texas A&M University - Commerce

Compter Networks Chapter 9: Network Security

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Masters in Networks and Distributed Systems

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

The Bomgar Appliance in the Network

Transcription:

Minor in ii INFORMATION SECURITY i at ESIEA Laval, France

Program Strengths Provides a thorough overview of information and network security, from secure programming to risk management within a company. Program developed by Prof. Dr. Eric Filiol, an internationally recognised expert in the field of computer security and the lead teacher in the minor. Taught within ESIEA s research laboratory CVO, headed by Prof. Dr. Filiol and dedicated to operational cryptology and virology. Case studies of real-life situations the laboratory has had to manage (in companies, in the criminal justice system ) 2

Do you have what it takes? You have a strong interest in information security issues. You re a good programmer and you have solid working knowledge of C. You are highly motivated and not afraid of hard work. You would like to discover France, its language, its culture and its people. If you ve answered YES to all four questions, then YOU ARE THE PERFECT CANDIDATE FOR THIS PROGRAM! 3

Program Organization Orientation week beginning of September Courses run from the 2 nd week of September to Christmas, starting September 2014 Each module is organised over one week (18 hours of contact + individual assignments) 2 hours of French classes every week Opportunity to meet and interview with companies at our «Forum Entreprises» in November Possibility of staying for a major project over the second semester (January-May) 4

Program Content Overview 5

Module descriptions (1) Information Theory Objectives: To gain clear and deep knowledge of what information and communication is. To be able to formalize most of the concepts and to manipulate at the mathematical level for later engineering applications. Entropy and uncertainty : entropy and its properties, conditional entropy, information Communication channel and Shannon theory : noiseless coding theorem for memoryless sources Communication through noisy channels Perfect secrecy Applications 6

Module descriptions (2) Maths for Information Security Objectives: To discover thorough mathematical concepts and tools to be able to formalize most issues arising in the security field (systems and information). From that formalization, students must be able to identify which algorithmic approach must then be used to solve those issues in an operational ways or to prove that the relevant problems have no practical solution. Complexity and computability theories Basics in combinatorics (graph theory) Formal grammars and automata Boolean functions and applications Game theory 7

Module descriptions (3) Code Theory Objectives: To gain clear and deep knowledge of the different issues arising during a noisy communication and to discover concepts, tools and techniques that enables to prevent noise during communication and maximize mutual information. A large number of engineering applications are used to illustrate the full scope of ECC (error-correcting code) theory. Error-correcting codes : coding problem and general sources (Markov, ergodic) Structure of natural languages (redundancy, Zipf law) Linear codes and syndrome decoding Cyclic codes Applications : The Mariner Code, Reed-Muller codes 8

Module descriptions (4) Networks: Local Security Objectives: The aim of this course is to explain the vulnerabilities found on Local Area Networks (LAN) especially with OSI level 2 equipment (switch A.P.) and protocols (Ethernet WIFI Bt). Network reminders - Lab : system and network configuration Internet access imputability - Lab : captive portal securing the access to media - Lab : network frame analysis - Lab : security of Ethernet, WIFI and Bt - Lab : access authentication (option) 9

Module descriptions (5) Networks: Security Architecture Objectives: The aim of this course is to present the network security architectures deployed to protect companies network service. Firewall and DMZ - Lab : filtering, address translation and DMZ - Lab : services firewalls (proxy) Virtual Private Network - Lab : VPN Intrusion detection - Lab : Intrusion Detection System 1 0

Module descriptions (6) Secure Programming Objectives: To explain the different security problems arising when unsecure programming primitives are used and how attackers can exploit them. In a second part, the students will learn how to use secure programming primitives and to perform static/dynamic analysis on source codes. Security of applications and vulnerabilities (buffer overflow, heap overflow, integer and string format attacks ) Secure programming in C and secure primitives Static analysis of source code (flawfinder, coverity) Dynamic code analysis (valgrind, Seeker) 1 1

1 2 Module descriptions (7) Smart Cards Objectives: Be able to design and program a complete smart card application, both on-card and off-card parts, to solve a given problem. JavaCard, PCSC, OCF, both on-card and off-card applications development

Module descriptions (8) Cryptology Objectives: To explain the different concepts around information security and system security both at the COMSEC and TRANSEC levels. The students must learn how to protect information (confidentiality) and system (availability and integrity, authentication) with the most recent mathematical tools provided by cryptology. Introduction to cryptology (cryptography and cryptanalysis, steganography) Symmetric cryptography (confidentiality) Asymmetric cryptography (integrity, authentication) Applications : encrypted filesystems, email protection, secure data transfer 1 3

Module descriptions (9) Networks: Controls and Audits Objectives: To learn to prepare a technical security audit. Managing and mastering the security tools. Understanding the ethics when performing an audit on an operational system. Organization Port scanning - Lab : nmap Network services knowledge - Lab : network services analysis Vulnerability detection - Lab : OpenVAS, NSE WIFI /Bt - Lab : WIFI cartography 1 4

Module descriptions (10) Security and Risk Management Objectives: To bring a detailed approach and a methodology for the management of security and risks in the corporate environment. Students will learn to manage risk, to analyze a situation and to propose appropriate measures in order to limit or eradicate the risks for an enterprise / administration. Risks and their actors Risk analysis Business Continuity Crisis & Incident management Case study of real situations 1 5

Module descriptions (11) Social Engineering Objectives: to understand our environment via media and geopolitics, to discover computer science monitoring and learn about social engineering and human psychology (how to manipulate a target) Analysis and understanding of the environment Methods of medias analysis Geopolitics and social psychology of organizations Computer science monitoring and tools Social Engineering and human psychology 1 6

Module descriptions (12) French Language and Culture Objectives: To give the students the language skills necessary to manage shopping, going to restaurants, taking public transport, etc. To introduce students to French culture (gastronomy, architecture, film, etc.) Emphasis on communication: listening and speaking Small-group lessons provide students with many opportunities to speak. Visits of cultural and historical sites in and around Laval 1 7

Module descriptions (13) Individual Project in Security Objectives: To give the students the opportunity to work on an aspect of information security that interests them. Students work with tutors to determine their field of interest Students and tutors work together to negotiate deliverables (nature and number of deliverables, milestones) Possibility of continuing onto second semester for a larger project The best students can be kept on in second semester on an internship basis (modest monthly salary) 1 8

1 9 Interested??? Contact your International Office for more information! A bientôt!!!