Professor | Abdallah M'HAMED |
Methods | TD and classes : 264 hours |
project : 66 hours | |
Prerequisites | None |
ECTS | 12 |
To train engineers in security and safety of the complex systems (Equipment, software and networks) able to intervene in the conception (forecast), in the production (quality) and in the maintenance (analysis, diagnosis).This training is mainly directed Security (approximately 45 in 50 % of the volume of the courses of the option)
This option is divided in eight modules.
Module 1 : Safety of the complex systems
This module approaches the security of the complex systems thanks to the projected analysis (AMDEC, Trees of failings, diagrams blocks of reliability, etc.). An important part is dedicated to a tool of functional analysis (Tool of simulation and evaluation Sofia).
Module 2 : Mathematical tools
The first part of this module is dedicated to the study of the mathematical tools necessary for the evaluation of the SdF (probability and statistics: laws, estimation, tests of hypotheses)
Module 3 : Informatic and network tools
This module propose some reminders and complements on informatic tools (Operating systems, TCP/IP, UNIX) and the local area networks.
Module 4 : Tolerance in the faults of the Intelligent Systems
This module approaches the concepts of the tolerance to the faults (aspects material and software) of the systems as well as human reliability.
Module 5 : Quality
This module is dedicated to Quality, the standards ISO 9000 and the techniques of quality control (Experimental designs, Quality processing control of the Software, Quality of networks services).
Module 6 : Security of the Intelligent Systems
This module treats methods to secure information systems (Methodology of analysis of risks, Audit of safety, Detection of intrusion, Laws).
Module 7 : Cryptography
This module is dedicated to the protection of the information in networks by the cryptography. The algorithms of encoding of data will be described there: algorithms with secret key (DES, AES), Algorithms with public key (RSA, Diffie Hellman), irreversible Algorithms (SHA, HMAC).
Module 8 : Security of Networks
This module is dedicated to the various architectures secured in the Internet networks / Intranet (filtering Routers(Route planners), Firewalls, VPN) and in the local networks.The protocols of security operated (SSL, HTTPS, IPSEC) will be presented as welle as the infrastructures with public keys ( PKI). A shutter will treat more particularly with the security of networks telecoms (RTC, SDH, ATM, WDM, GSM).
Individual global synthesis of the Unit of Value: coefficient 2
Individual control: coefficient 1