Establishment
Language of instruction
English, French
Teaching content
MB-IT
This course occurs in the following program(s)
Training officer(s)
O.ROSSINY, E.DRUON
Stakeholder(s)
K. Guillemot (Advens)
Présentation
Prerequisite
To follow this module, the student must be familiar with the basics of algorithmics, procedural and object-oriented programming, master C and Java programming (class, inheritance, composition, exceptions) Exploitation and unix.
Reference : « algorithmie et C language », « network and system base module », « Operating System module », « Unix module » et « Java 1 module » M1 ISEN Lille
Reference : « algorithmie et C language », « network and system base module », « Operating System module », « Unix module » et « Java 1 module » M1 ISEN Lille
Goal
Skills expected : 33 (331), 34 (342/343), 43 (431/432/433)
This module is a further development in the field of software development.
Orientation is suitable for engineering profiles in cyber security domains.
At the end of the course, the student will:
- Be able to develop an application respecting the good practices in quality and security of code development
- Know how to test a code
- Know how to test a unix operating system
- Be able to identify security risks and vulnerabilities
The project approach requires the acquisition of technical skills.
This module is a further development in the field of software development.
Orientation is suitable for engineering profiles in cyber security domains.
At the end of the course, the student will:
- Be able to develop an application respecting the good practices in quality and security of code development
- Know how to test a code
- Know how to test a unix operating system
- Be able to identify security risks and vulnerabilities
The project approach requires the acquisition of technical skills.
Presentation
It covers the following topics:
- The analysis of the standard exploits related to the development of applications in C
- The exploits experimentation
- The good practices in software development
- The analysis of the standard exploits related to the development of applications in C
- The exploits experimentation
- The good practices in software development
Modalités
Organization
Type | Amount of time | Comment | |
---|---|---|---|
Face to face | |||
Lectures - face to face | 12,00 | ||
Lab | 12,00 | ||
Tutoring | 4,00 | ||
Independent study | |||
Independent study | 30,00 | ||
Overall student workload | 58,00 |
Evaluation