• Your selection is empty.

    Register the diplomas, courses or lessons of your choice.

System and physical security

  • School / Prep

    ENSEIRB-MATMECA

Internal code

EIN9-RESA3

Description

This course introduces the concepts needed to understand system security. It is completed by an introduction to physical security (opening doors, padlocks and locks).

Read more

Teaching hours

  • CIIntegrated Courses48h

Syllabus

Introduction to reverse engineering

Introduction
Static analysis: First steps, Information retrieval, Code representation
Result: Function analysis, Data flow tracking, Bonus

Principles of vulnerability exploitation

Introduction: Rules of the game, Cryptographic vulnerabilities, Logical vulnerabilities, String manipulation
Attacks: Injections, Memory corruption, Secure programming
OS hardening: The administrator's part, Protections

Linux system security

Introduction to system security: General, Legal aspects, Basic concepts, Hardware security
System security: Authentication, Authorization, Auditing

Containers and virtualization under Linux

Context: What do we want to protect against? Protection mechanisms
Containers vs. Virtualization: Definitions, Virtualization:

full emulation
software-level emulation (type 2)
host-level emulation (type 1)
Virtual hard disks
Vulnerability example

Containers

First step: chroot()
Advanced Linux kernel mechanisms
Sandbox
LXC, LibContainer and Docker
Vulnerability example


Applications: Malware, Provisioning, Containers, Development support, Cloud, Virtualization API: LibVirt, Compartmentalization,
Enhanced access control: MAC, Security policy models, Most common : SELinux and AppArmor, The rebel: grsecurity

Windows system security

General security principles: The 3 "A "s, Internal structure, Accounts and groups, Control and access
System security mechanisms: System architecture, Authentication, Security strategies, File system, Registry, Tools
Network security mechanisms: Active Directory, File sharing, IPSec under Windows, Firewall
Application security: Prevention of overflow attacks

Execution prevention (DEP/NX)
Exception control
PatchGuard

Other mechanisms

Software restriction strategies
Boot security

Principle of sandboxing (browsers)

Malware extraction and analysis: from forensics to reverse

Malware "ecosystem": Who are the attackers? Definitions, Exploitation As A Service: Exploit Kits, Defenders, Monetization
Forensics: Malware extraction, Objectives, Network forensics, System forensics, Application forensics
Malware analysis: Analysis basics, Automation tools, Handheld analysis, Packers, Obfuscation

Physical security.

Read more

Assessment of knowledge

Initial assessment / Main session - Tests

Type of assessmentType of testDuration (in minutes)Number of testsTest coefficientEliminatory mark in the testRemarks
Final inspectionWritten801
ProjectDefense0.5
ProjectReport0.5

Second chance / Catch-up session - Tests

Type of assessmentType of testDuration (in minutes)Number of testsTest coefficientEliminatory mark in the testRemarks
ProjectReport1