Language of instruction
English, French
Teaching content
MB-IT
This course occurs in the following program(s)
Diplôme Ingénieur ISEN (Master's degree in electronics and information technology)
- Crédits ECTS: 0.00
Training officer(s)
O.ROSSINY, E.DRUON
Stakeholder(s)
K. Guillemot (Advens)
Présentation
Prerequisite
To follow this module, the student must be familiar with the basics of algorithmics, procedural and object-oriented programming, master C and Java programming (class, inheritance, composition, exceptions) Exploitation and unix.
Reference : « algorithmie et C language », « network and system base module », « Operating System module », « Unix module » et « Java 1 module » M1 ISEN Lille
Reference : « algorithmie et C language », « network and system base module », « Operating System module », « Unix module » et « Java 1 module » M1 ISEN Lille
Goal
Skills expected : 33 (331), 34 (342/343), 43 (431/432/433)
This module is a further development in the field of software development.
Orientation is suitable for engineering profiles in cyber security domains.
At the end of the course, the student will:
- Be able to develop an application respecting the good practices in quality and security of code development
- Know how to test a code
- Know how to test a unix operating system
- Be able to identify security risks and vulnerabilities
The project approach requires the acquisition of technical skills.
This module is a further development in the field of software development.
Orientation is suitable for engineering profiles in cyber security domains.
At the end of the course, the student will:
- Be able to develop an application respecting the good practices in quality and security of code development
- Know how to test a code
- Know how to test a unix operating system
- Be able to identify security risks and vulnerabilities
The project approach requires the acquisition of technical skills.
Presentation
It covers the following topics:
- The analysis of the standard exploits related to the development of applications in C
- The exploits experimentation
- The good practices in software development
- The analysis of the standard exploits related to the development of applications in C
- The exploits experimentation
- The good practices in software development
Modalités
Organization
Type | Amount of time | Comment | |
---|---|---|---|
Face to face | |||
Lectures - face to face | 12,00 | ||
Lab | 12,00 | ||
Tutoring | 4,00 | ||
Independent study | |||
Independent study | 30,00 | ||
Overall student workload | 58,00 |
Evaluation