Students completing the major “Security and Networking” will be able to:
- Understand and explain different devices and protocols used in computer networking;
- Design, configure and manage computer networks while taking into account application needs;
- Identify large scale distributed and parallel applications, the problems occurring with these applications and propose solutions;
- Carry out distributed applications by implementing the appropriate techniques;
- Understand the characteristics of distributed systems: parallelism, synchronisation, communication, error and threat models;
- Use appropriate techniques, algorithms and languages to design, model and analyse distributed applications;
- Understand and implement mechanisms (cryptography, protocols) to secure networks and distributed systems.
|
|||||||||||||||||||||||||||
The student shall select
|
|||||||||||||||||||||||||||
From 20 to 30 credits | |||||||||||||||||||||||||||
Annual unit | |||||||||||||||||||||||||||
1 | 2 | ||||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||||
![]() |
Computer networks: configuration and management | Olivier Bonaventure | 30h+30h | 5 credits | q1 | x | x | ||||||||||||||||||||
![]() |
Cloud Computing | Etienne Riviere | 30h+15h | 5 credits | q1 | x | x | ||||||||||||||||||||
![]() |
Mobile and Embedded Computing | Ramin Sadre | 30h+15h | 5 credits | q2 | x | x | ||||||||||||||||||||
![]() |
Computer system security | Ramin Sadre | 30h+15h | 5 credits | q2 | x | x | ||||||||||||||||||||
![]()
The student can select 10 credits amongst
|
|||||||||||||||||||||||||||
![]() |
Concurrent systems : models and analysis | Charles Pecheur | 30h+15h | 5 credits | q1 | x | x | ||||||||||||||||||||
![]() |
Secured systems engineering | Axel Legay | 30h+15h | 5 credits | q2 | x | x | ||||||||||||||||||||
![]() |
Design of Embedded and real-time systems | Jean-Didier Legat | 30h+30h | 5 credits | q2 | x | x | ||||||||||||||||||||
![]() |
Information theory and coding | Jérôme Louveaux | , Benoît Macq , Olivier Pereira30h+15h | 5 credits | q2 | x | x | ||||||||||||||||||||
![]() |
Stochastic modelling | Philippe Chevalier | 30h+22.5h | 5 credits | q2 | x | x | ||||||||||||||||||||
![]() |
Cryptography | Olivier Pereira | 30h+15h | 5 credits | q1 | x | x | ||||||||||||||||||||
![]() |
Languages and algorithms for distributed Applications | Peter Van Roy | 30h+15h | 5 credits | q1 | x | x | ||||||||||||||||||||
![]() |
Multicore programming | Etienne Riviere | 30h+15h | 5 credits | q2 | x | x | ||||||||||||||||||||
![]() |
Privacy Enhancing technology | Olivier Pereira (coord.) | , François-Xavier Standaert30h+30h | 5 credits | q1 | x | x |