Pratical Cybersecurity Workshop I

Make it possible to synthesize the knowledge acquired in the courses of the program through active participation in a cybersecurity project.

The content varies according to the needs of the students and the professorial expertise available.

IT Security for the Internet of Things 

Draw up a complete overview of the threats and vulnerabilities associated with connected objects and related applications in order to preserve the security of access, the integrity of applications and data and provide concrete solutions to protect against them.

Architectures of systems in the Internet of Things. Most used technologies and main platforms for the Internet of Things. Vulnerabilities and threats specific to the Internet of Things. Security methods in the Internet of Things. Case studies (home automation, smart cities, etc.).

IT and Industry 4.0

 Understand the reality of Industry 4.0 and the digital revolution of manufacturing companies. Situate the role of a computer scientist in the context of production activities in the digital age and connectivity. Understand the impact of digital transformation on organizations. Become familiar with the new role of IT in supply chain management, operations management, and product lifecycle management. Know improvement methods and operational tools involved in the digital transition of the means of production. Apply principles related to Industry 4.0 to concrete cases related to the operation and development of software.

Advanced Web Programming

 This course gives students the opportunity to enhance and enrich their skills in web programming. Students will  learn to develop web applications that use three-tier architecture, session management, object-oriented techniques, and advance database interactions. Concepts such as advanced CSS concepts, XHTML, JavaScript, PHP, Jquery, SQL, rich interactive web environments, authentication, and security will also be explored.

Software Requirements Specification

 In the course students learn the full cycle of collecting, prioritizing, balancing and agreeing on IT product/service requirements, they learn the software specification document and UML models. At the course our students work the following tools:  Technical Requirements Matrix, Software Requirements Specification, MoSCoW Priority Matrix, UML Models for Use Cases, States Diagrams,  and Sequence diagrams. At the course a student can consequently develop his/her own package of software requirements.

 Information Systems Audit 

 This course examines the use of various standards, guidelines, laws and methods, which are used in information systems audits. The discussion serves both to set the governance framework, the information systems audit works within and the choices for specific courses of action to meet the requirements of the audit.


Securing an E-Commerce Infrastructure

Securing the e-commerce infrastructure, taking into account data architecture and management and advanced network protocols. In the e-commerce environment, both information security needs of organizations and privacy needs of customers and clients are examined. In addition, the OWASP top 10 is discussed to educate the students about the consequences of the most common and most important web application security weaknesses.


Digital Forensics

 In-depth coverage of live incident response and file system forensic analysis. The course will include the use of various tools and techniques used to extract information from digital media, with a focus on information that is difficult to find using normal methods. These tools and techniques will be supplemented with theoretical discussion, both of the structure of the media itself and of the nature and limitations of digital evidence. The course will cover the most commonly used operating systems and file systems.


 Disaster Recovery and Planning

An in-depth coverage of disaster recovery planning including, techniques to prevent, detect, and recover from loss of information availability. Students are instructed in ways to formulate a disaster and recovery plan, and test and implement the plan in a simulated lab environment.