SALEIE logo that when clicked will open a new window to access the SALEIE home page.

Strategic ALignment of Electrical and Information Engineering in European Higher Education Institutions

European Union flag.



User guide



Click on the image to the left to select the project website section to go to.

Click on the images to the left and above to select the project website section to go to (Technical Challenge Areas, Student and Staff Support Hub or Governance) OR select the Student and Staff Support Hub below.

Technical Global Challenges Areas Student and Staff Support HUB Higher Education Policy Hub


Higher Education Technical Challenges Hub: Module Specification

ICT15B5 ICT_Security management

pdf version of module specification

Download the module specification

pdf version of module specification



ICT_Security management





Module name:

ICT_Security management

Scope and form:

Classical module + labs in French (available for classical full-time students and also for part-time students), classical module + lab in English (+ academic project, optional in both languages), academic project

Duration (weeks; Hours/week):

1 semester,
On a  15-week basis, 3 contact-hours/week for the module,
3 day per semester lab (one lab duration is 6 hour),
Academic project is around one day per week of autonomous work (some meetings with the teacher) during 15 weeks

Type of assessment:

Reports about labs, final exam, report + defense for the academic project

Qualified Prerequisites:

Mainly networking (intermediate or advanced level), industrial computing

General module objectives:

Transmission systems – network administration – securisation of network architectures – Points to take into account to set a security policy

Topics and short description:

This module deals with the management of security. The mechanisms (technical, organizational, methodological) needed to design, implement, operate and maintain a network infrastructure are taught and practiced through the labs and the academic project. Concerning the academic project: the students will have to design a network with security aspects and a wireless extension, to implement it, and be audited by another group of students. Some meetings with the teachers will be organised to validate the advancements of works.
Introduction to dependability, principles of security (physical, exploitation, logical, application, telecommunications…)
Strategies of attacks and organisms for security
Strategies and policies for security
Technologies for security, firewall
Cryptographic issues
Security Protocols
Intrusion detection systems
Security thanks to networks administration and management

Learning outcomes:




Errors detection

Configuration of an operating system (Windows, W. Server, Linux)

Designing, maintaining and auditing a secure network architecture in its environment

Symmetric and asymmetric cryptography

Configuration of a firewall

Contributing in the setting of a security policy

Security protocols

Configuration of a router (and wireless router) and client

Academic project:  Teamwork


Academic project: communication

Academic project:  project management

Academic project:  organizational skills

Academic project:  multicultural environment

Recommended literature:

G. Avoine, P. Junod, P. Oechslin – Sécurité informatique, exercices corrigés – Vuibert, Paris, 2006
Security for industrial communication systems, Dacfey Dzung, Martin Naedele, Thomas P. Von Hoff, Mario Crevatin, pp. 1152-1177, Proceedings of the IEEE, Vol. 93, n° 6 "Industrial Communication Systems", June 2005
La sécurité des réseaux-First steps, Tom Thomas, Cisco Press, 2005
Les réseaux, édition 2005, G. Pujolle, Eyrolles 2004
G. Avoine, P. Junod, P. Oechslin – Sécurité informatique, exercices corrigés – Vuibert, Paris, 2006
SSL VPN, Understanding, evaluating and planning secure, web-based remote access – J. Steinberg & T. Speed, 2005.
S. Ghernaouti-Helie – Sécurité informatique et réseaux – Dunod, 2005
F. Halsall – Computer networking and the internet – Addison Welseley, 2005 + additional student support at
E. Cole, R. Krutz, JW Conley - Network security bible – Wiley, 2005