- 5MMCL
A+Augmenter la taille du texteA-Réduire la taille du texteImprimer le documentEnvoyer cette page par mail
Goals
Identify elements of trust at the software level.
Identify bad and good practices to achieve this.
This course is complementary to the Building full-stack applications course
Content This course will cover in particular:
- Common software vulnerabilties and exposures (mainly Web)
- Least privileges, isolation
- Isolation of services by containers and virtual machines
- Use of certificates (PKI, non-repudiation, trusted servers, signature)
- Simple and delegated authentications
PrerequisitesSecurity 1A
Communication networks 1A
Operating systems and concurrent programming 2A
Principles of database management systemes(BD1)
Tests Continuous monitoring: 1 fault study assignment + upstream and downstream recommendations + experimentation.
N1=CC
N2=N1 (non rattrapable)
A+Augmenter la taille du texteA-Réduire la taille du texteImprimer le documentEnvoyer cette page par mail
Date of update September 21, 2022