Professional Documents
Culture Documents
ch
5-day course
Organisation
School of Computer and Communication Sciences (IC), Ecole Polytechnique Fdrale de Lausanne (EPFL)
Overview
IT security has over recent years become a crucial consideration for all businesses and organisations across all industries in both the private and public sectors. As the number of threats is growing, all those involved in IT infrastructure, from the CEO right down to network users, need to keep one step ahead and alert regarding potential threats to their business. This 5-day course provides a comprehensive overview of the latest IT security issues and what they could mean for your business from both theoretical and practical perspectives.
Certification
A certificate of participation will be delivered at the end of the course.
Objectives
Get a full overview of the latest IT security issues Understand the problems and main solutions of privacy protection and of wireless network security Acquire an understanding of the underlying mathematical principles of information security and developments therein Obtain a clear picture of available cryptographic primitives for information security, how to use them, and how to select their parameters Learn about what IT professionals must watch out for to develop and deploy secure software Get hands-on experience of a few common vulnerabilities and attack scenarios
Course venue
UNIL-EPFL campus, Lausanne, Switzerland
DAY 1
SECURITY AND PRIVACY BASICS
Morning (09:00 12:30) Phil Janson
COMPUTER SECURITY BASICS Threats, risks, basic principles, and practical limitations Information security basics and protection policies Best practices for executives and end users The state of affairs and potential evolution of the field
DAY 2
SECURITY AND CRYPTOGRAPHY BASICS
DAY 3
SECURITY ENGINEERING & PRACTICE LAB PART I
DAY 4
SECURITY ENGINEERING & PRACTICE LAB PART II
DAY 5
WIRELESS SECURITY AND PRACTICE LAB
Phil Janson
COMPUTER SECURITY BASICS Cryptography deployment and usage Identity and access management
Phil Janson
COMPUTER SECURITY ENGINEERING* Technical view of the threats to IT security and the nature of malware Overview and classification of the most frequent software vulnerabilities that lead to security violations How hackers leverage these to break into IT systems, and what attack patterns are most frequent
Phil Janson
COMPUTER SECURITY ENGINEERING How to defend, prevent, monitor, detect and recover from attacks Best Practices in ensuring secure system and software development, deployment, installation, configuration & operation
Jean-Pierre Hubaux
SECURITY AND PRIVACY FOR MOBILE NETWORKS Attacker model in a wireless networking setting Security of WiFi networks Security of cellular networks Security of sensor networks Security of multi-hop wireless networks Location privacy; mix zones; quantification of location privacy
Arjen Lenstra
CRYPTOGRAPHY BASICS The three pillars of cryptography (symmetric cryptography, hash functions, and public key cryptosystems): How they are assembled to secure communications What the various security parameters actually mean How the parameter choices have evolved and keep evolving Understanding the risks and the impact of developments What triggers developments
*Note
Participants should bring their private laptop equipped with minimum: VirtualBox installed, or the privileges to install it 1.5 GB free disk space 256 MB free memory (not counting host OS consumption) Recommended: 512 MB free memory Virtualization-assisted CPU (either Intel VT-X or AMD-V)
www.formation-continue-unil-epfl.ch
Registration
Course fee : CHF 3500.Places are limited.
Application deadline
10 January 2014
Program Director
Philippe Janson Adjunct Prof., Computer Science & Communication Systems
Instructors
Philippe Janson Adjunct Prof., Computer Science & Communication Systems Jean-Pierre Hubaux Professor, Computer Communications and Application Laboratory Arjen Lenstra Professor, Laboratory for Cryptologic Algorithms Maxime Augier Doctoral assistant, Laboratory for Cryptologic Algorithms Yannis Klonatos Doctoral assistant, Data analysis theory and Applications Laboratory