Sécurisation desprotocoles
Objectives
Learning of the following aspects :
Fragile protocols
A priori security
A posteriori security (e.g. SSH tunnels)
Description
This course highlights the many fragile protocols in use today and describes best practices for designing a posteriori secure protocols and techniques for securing a posteriori fragile protocols through the use of tunnels.
At the end of this course the student will be able to:
Recognize the fragile protocols typically implemented in a computer network
Secure fragile protocols by using tunnels for applications where this is necessary
Use SSH and related functions (file transfers, proxies, etc.)
Describe best practices for defining a secure protocol