Courses of the first year of the EIT cybersecurity curriculum

  1. Cybersecurity courses
  2. Innovation and entrepreneurship courses

Cybersecurity courses

Introduction to Security (semester 1 - 5 ECTS)
  • Definitions of basic security terms, Security Goals (CIA), Risks,Vulnerabilities, Attacks, Basic Cryptography and Cryptography, Protocols (e.g., Kerberos, SSL), Threats in IT systems (Malware, targeted attacks, …), Security Mechanisms (Authentication, Access Control, Network Security FW IDS, Browser,Email),
  • Introduction to Information Security Management: Evaluation of information security like the Common Criteria, EBIOS Method and Attack trees

Lecturer: Pierre-Alain Fouque


  • Ross Anderson. Introduction to Computer Security
  • William Stallings. Computer Security – Principles and Practice.
Software engineering and Security  (semester 1 - 5 ECTS) In this course we study the principles behind robust and reliable software architectures, such as defensive programming, assertion-based specification, fault detection and recovery, testing techniques for robustness assessment, techniques for safe API definition.

Lecturer: Noël Plouzeau


  • Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda. Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs. Addison-Wesley, 2013.
  • Joshua Bloch, Effective Java, 3rd Edition. Pearson Education Inc, 2018.
Operating Systems and Security (semester 1 - 5 ECTS) In this course, we will develop how works an operating system
(user/kernel space, processus, memory management, Input/output), using
the C Programming Language, and processor architecture (registers,
stack, MMU), as well as some Security Mechanisms (Authentication,
Access Control, Overflows Attacks).

Lecturer: Isabelle Puaut

Network Security (semester 1 - 5 ECTS) In this course, we will develop the principles of Firewalls, IDS
(signature-, anomaly-based), IPsec (IKE), Malware, Remote Attacks,
Protocol Attacks (ARP, DNS, Routing, ICMP), Non-IP Network Security
(SS7, layer 2), Mobile Networks (WLAN).
Example Literature: William Stallings: Network Security – Principles
and Practice.
Algorithmics for security (semester 2 - 5 ECTS In this course, we will develop the principles of Cryptography:
Cryptanalysis, Randomness, Adversary Models, Zero-Knowledge,
Side-Channel Attacks.
Literature: Henk van Tilborg: Fundamentals of Cryptology, Vaudenay: A
Classical Introduction to Cryptography, Stinson: Cryptography: Theory
and Practice

Lecturer: Patrick Derbez

Privacy (semester 2 - 5 ECTS) In this course, we will develop the principles of Privacy, Data
Protection, Legal Basis, Privacy Enhancing Technologies, Privacy by
Design, Privacy Assessment, Location Privacy.

Lecturer: Tristan Allard

System Security (semester 2 - 5 ECTS) In this course, we will develop Secure Boot (UEFI, TPM), Local and
Network authentification (PAM, NTLM, Kerberos, Password Storage),
Access Control (privilege), Security of File Systems (integrity check,
encryption of data), Kernel and Application Protection, Log Files.


Software Security (semester 2 - 5 ECTS) Language-level security, Application-level security, Webbased Attacks
(OWASP), Formal verification, Sandboxing, Isolation.
Example Literature: Gary McGraw: Software Security Library.


Innovation and entrepreneurship courses

The curriculum contains four courses, described here.