List of courses of the second year of the EIT master in cybersecurity (provisional)
|Software Security (5 ECTS)||This course will present the basic
principles of software obfuscation and malware analysis using formal
methods and data mining techniques.
|Vulnerabilities Studies (5 ECTS)||This course will present the basic
principles of buffer overflow and reverse-engineering using IDA Pro
|Security of embedded cryptographic implementations (5 ECTS)||This
course will present the security of implementations from the API
problems down to the cryptographic implementations with side-channel
|Security Verification for Protocols (5 ECTS)||This course will
present formal methods to analyse the security of protocols using
symbolic models such as Dolev-Yao. Such approaches allow to model
cryptographic at a high level and reason with automatic tools in
search of attack procedures.
|Security for Web Applications (5 ECTS)||This course will show via the
development of a chat forum many security problems from the Top 10
OWASP: from the security of the database to the authentication
|Supervision for Security (5 ECTS)||This course will present the
security of intrusion detection system (IDS) and supervision systems
for the network security.