The « I502A Sécurité physique et logicielle » activity, taught to second year master students in computer science industrial engineer at the ECAM Brussels Engineering School (ECAM), is about the security of computer systems, both hardware and software. It includes an introduction to cryptography, elements of networks, databases and operating systems security and, finally, security auditing techniques of a computer system.

I started to give this course in 2017 and I am currently giving it for the fourth time. The course is taught in English, but all the material is available in English and in French.



  • Session 1: Introduction to Computer Security Slides
  • Session 2: Introduction to Cryptography and Symmetric Encryption
  • Session 3: Hash Function, Asymmetric Encryption and Signature
  • Session 4: Malware and Protection
  • Session 5: Software and Operating Systems Security
  • Session 6: Network Protections: DoS, Firewall and IDS
  • Session 7: Authentication et Access Control
  • Session 8: Database, Cloud and IoT Security
  • Session 9: Network Security
  • Session 10: Security Audit


  • Work: Security audit of a computer system


Reference books

  • William Stallings and Lawrie Brown. (2018). Computer Security: Principles and Practice (4th edition). Pearson. (ISBN: 978-1-292-22061-1)
  • Douglas Robert Stinson and Maura Paterson. (2017). Cryptography: Theory and Practice (4th edition). CRC Press. (ISBN: 978-1-138-19701-5)

Other books

  • Michael Goodrich and Robert Tamassia. (2013). Introduction to Computer Security. Pearson. (ISBN: 978-1-292-02540-7)
  • Matt Bishop. (2018). Computer Security: Art and Science (2th edition). Addison-Wesley. (ISBN: 978-0-321-71233-2)
  • Douglas Stinson, Serge Vaudenay, Gildas Avoine and Pascal Junod. (2003). Cryptographie : Théorie et pratique (2th edition). Vuibert. (ISBN: 978-2-711-74800-6)
  • Jonathan Katz and Yehuda Lindell. (2014). Introduction to Modern Cryptography (2th edition). Chapman and Hall/CRC. (ISBN: 978-1-466-57026-9)

Scientific references

  • Sattarova Feruza Y. and Tao-Hoon Kim. IT Security Review: Privacy, Protection, Access Control, Assurance and System Security. In International Journal of Multimedia and Ubiquitous Engineering, 2(2):17-32, 2017.
  • Celia Paulsen and Robert Byers. Glossary of Key Information Security Terms. Technical report NISTIR 7298, revision 3. NIST, July 2019.
  • Butler W. Lampson. Computer Security in the Real World. In Computer, 37(6):37-46, 2004.

Online resources