Sécurisation desprotocoles

  • Voir la page en français

    In brief

  • Code : N9EN27C

Objectives

Learning of the following aspects :

    Fragile protocols
    A priori security
    A posteriori security (e.g. SSH tunnels)

Description

This course highlights the many fragile protocols in use today and describes best practices for designing a posteriori secure protocols and techniques for securing a posteriori fragile protocols through the use of tunnels.

At the end of this course the student will be able to:
    Recognize the fragile protocols typically implemented in a computer network
    Secure fragile protocols by using tunnels for applications where this is necessary
    Use SSH and related functions (file transfers, proxies, etc.)
    Describe best practices for defining a secure protocol

Contact(s)

MORGAN BENOIT

Contact

The National Institute of Electrical engineering, Electronics, Computer science,Fluid mechanics & Telecommunications and Networks

2, rue Charles Camichel - BP 7122
31071 Toulouse Cedex 7, France

+33 (0)5 34 32 20 00

Certifications

  • Logo MENESR
  • Logo UTFTMP
  • Logo INP
  • Logo INPT
  • Logo Mines télécoms
  • Logo CTI
  • Logo CDEFI
  • Logo midisup