Principes fondamentaux de la sécurité
Course Features
Course Details
Principes fondamentaux de la sécurité GIN3208
Enseignant: Email: Durée totale du cours: 22.5 H Option concernée : Tron Commun Semestre : 2 Nombre de crédits : 2Modules spécialisés | Modules de base | Sciences et techniques de l'ingénierie | Préparation à la carrière professionnelle |
X |
Nombre d’heures | Activités hors classe | |||
45 | 38 | |||
cours | TD | TP | ||
15 | 6 | 9 | ||
DESCRIPTION DU COURS ET DES COMPÉTENCES COUVERTES :
-
Description du cours
-
Objectifs
-
Conditions préalables
-
Résultats d’apprentissage
Chapitre | Titre | Durée | Compétences ciblées | ||
Chapitre 1 | couches de sécurité | 6 | - Comprendre les principes de sécurité fondamentaux - Comprendre la sécurité Internet - Comprendre la sécurité sans fil | ||
Chapitre 2 | sécurité du système d’exploitation | 6 | - Comprendre l’authentification de l’utilisateur - Comprendre les autorisations - Comprendre les stratégies de mot de passe - Comprendre les politiques d’audit - Comprendre le chiffrement - Comprendre les logiciels malveillants | ||
Chapitre 3 | sécurité du réseau | 10 | - Comprendre les pare-feu dédiés - Comprendre l’isolement du - réseau - Comprendre la sécurité du protocole | ||
Chapitre 4 | logiciel de sécurité | 6 | - Comprendre la protection des clients - Comprendre la protection par courriel - Comprendre la protection du serveur | ||
MÉTHODOLOGIE:
Cours intégré (h) | 20 |
Travail pratique (h) | 8 |
Projet (h) | |
Visites (h) |
ÉVALUATION :
Type | Couvrant quel chapitre (s) | Les facteurs de pondération |
Projet | - | - |
Travail pratique | - | - |
Ds | Chapitre 1+ Chapitre 2 | 30% |
Test oral | ||
Examen final | Tous les chapitres | 70% |
BIBLIOGRAPHIE ET LOGISTIQUE RECOMMANDÉES :
- William Stallings et Lawrie Brown, Computer Security Principles and Practice, (3e édition), Pearson, 2014Résultats d'apprentissage :
- Comprendre les principes fondamentaux de la sécurité informatique et des réseaux.
- Identifier et évaluer les risques de sécurité potentiels dans les systèmes informatiques.
- Concevoir des stratégies de sécurité pour protéger les données et les systèmes informatiques.
- Mettre en œuvre des mécanismes de sécurité, tels que des pare-feux, des systèmes de détection d'intrusion, etc.
- Analyser les vulnérabilités de sécurité et proposer des solutions pour les atténuer.
- Comprendre les lois et les réglementations liées à la sécurité informatique et à la confidentialité des données.
- Évaluer l'efficacité des mesures de sécurité mises en place et apporter des améliorations si nécessaire.
- Sensibiliser les utilisateurs aux bonnes pratiques en matière de sécurité informatique.
- Analyser les attaques de sécurité et mettre en œuvre des contre-mesures appropriées.
- Gérer les incidents de sécurité et les problèmes de confidentialité de manière appropriée.
More Courses by this Instructor
Proud of NASCAR and its supporters and fans. They won put up with disrespecting our Country or our Flag they said it loud and clear! words Friday and Saturday sparked a massive show of defiance Sunday as more than 200 NFL players protested by choosing not to stand for the national anthem. Many coaches locked arms with the players.
Goal was to provide cheap china jerseys open dialogue and communication. We listened to one another. We believe it the best way to work through any issue we are facing, on and off the field, owners Terry and Kim Pegula said in a statement distributed by the Bills. Trump remarks were divisive and disrespectful to the entire NFL community, but we tried to use them as an opportunity to further unify our team and our organization. Our players have the freedom to express themselves in a respectful and thoughtful manner and we all agreed that our sole message is to provide and to promote an environment that is focused on love and equality.
"Within hours, cheap jerseys certainly, and probably less, the Ranger regiment officers, high ranking officers back in the States were conspiring to cover this up," Krakauer says. military's highest honors, immediately began moving through the Army ranks something that is not done cheap nfl jerseys for deaths by friendly fire, Krakauer says.
'Prairie niggers' is an insult. Those are very upsetting to our kids. But 'Redskins' is an honorable name we wear with pride. He wondered how to tell the Willpinit Redskins the "name they wear proudly across their chests is insulting them. Because they have no idea.".
According to the "Princeton Review," there are no prerequisites for sports management positions, but most general managers in the NFL have similar backgrounds as former scouts, accountants or athletes.Start in SchoolGMs in the NFL must have a passion for the game. They typically have experience either playing or coaching football.
"This pro football has been personally hand cheap china jerseys signed by Hall of Fame defensive tackle Joe Greene with the inscription ""HOF 87"". This product is officially licensed by the National Football League and comes with an individually numbered; tamper evident hologram from Mounted Memories. To ensure authenticity, the hologram can be reviewed online. This oakley sunglasses sale process helps to ensure that the product purchased is authentic and eliminates any possibility of duplication or Retro Jordans fraud. "
Setting Point Spreads, OddsOddsmakers do more than predict the outcome of games. They weigh myriad factors to determine which team is favored by how many points. In individual sports or group events, they set odds on which individual or team is most likely to win. They set odds that spread the betting encouraging bets on the underdogs and discouraging bets on heavy favorites. Their goal is to create higher betting volume and more wins than losses for the sports cheap jerseys book.
Need Help? Chat with us
Start a Conversation
Hi! Click one of our member below to chat on Whatsapp
The team typically replies in a few minutes.