Computer science and communication systems
- Admission : /en/education/bachelor/computer-science-and-communication-systems/admission/
- Study program : /en/education/bachelor/computer-science-and-communication-systems/study-program/
- Structure of studies : /en/education/bachelor/computer-science-and-communication-systems/structure-of-studies/
- Career perspectives : /en/education/bachelor/computer-science-and-communication-systems/career-perspectives/
- Exchange programs : /en/education/bachelor/computer-science-and-communication-systems/exchange-programs/
- People : /en/education/bachelor/computer-science-and-communication-systems/people/
- Admission : /en/education/bachelor/computer-science-and-communication-systems/admission/
- Study program : /en/education/bachelor/computer-science-and-communication-systems/study-program/
- Structure of studies : /en/education/bachelor/computer-science-and-communication-systems/structure-of-studies/
- Career perspectives : /en/education/bachelor/computer-science-and-communication-systems/career-perspectives/
- Exchange programs : /en/education/bachelor/computer-science-and-communication-systems/exchange-programs/
- People : /en/education/bachelor/computer-science-and-communication-systems/people/
Study program
Department:
Computer science and communication systems
Specialization:
Networks and Systems
Module: IT management
Course description
Back-
Objectives
IT security
- Understands and can explain the challenges in the field of security. Is capable to describe good practices in cyber security.
- Knows classical encryption algorithms such as Caesar, Vignenère, ...
- Can apply frequency analysis methods to decrypt a text
- Knows the principles of modern symmetric and asymmetric encryption algorithms such as AES, RSA, Diffie-Hellman
- Knows the principle of hash functions
- Knows the principle of hybrid encryption like SSL-TLS
- Knows the principles of digital signature, digital certificates and PKI
IT methodology
- Knows how to use a version management tool (like git) for IT application development
- Knows how to work in an agile development context
- Is capable of using the command line (bash) available on Linux systems and is able to write scripts to carry out tasks (e.g. repetitive tasks).
-
Content
IT Security
- Study of encryption algorithms, César, Vigenère, AES, RSA, Diffie-Hellman and hash functions
- Frequency analysis of texts encrypted using traditional algorithms (César, Vigenère)
- Decoding method based on frequency analysis
- Hybrid protocols such as SSL-TLS, PGP
- Practical application of cyber security measures
IT Methodology
- Using the git version manager in a single and multi-user environment
- Putting agile development concepts into practice in personal/group projects
- Development of command-line scripts as part of mini-projects
Type of teaching and workload
Lecture course (including exercises)
48 periods
Course specification
Year of validity
2024-2025
Weight
1st year
Semester
Autumn
Program
French,Bilingual
Department
Computer science and communication systems
Language of instruction
French
ID
B1C-MSIT-S
Level
basic
Course type
Core
Study program
Bachelor
Evaluation methods
- Continuous assessment Written work, Practical exercises / Evaluated reports
Course grade calculation method
The continuous assessment mark corresponds to the weighted average of all of the semester's exams. In case of a revision exam, the course's final mark corresponds to the arithmetic average of the continuous assessment and the revision exam marks.
Intructor(s) and/or coordinator(s)
Luca Haab, Philippe Joye, Michael Mäder, Jean-Roland Schuler