1. Accueil
  2. EN
  3. Studying at ULB
  4. Find your course
  5. UE
INFO-Y124

Corporate information security

academic year
2025-2026

Course teacher(s)

Charles CUVELLIEZ (Coordinator)

ECTS credits

5

Language(s) of instruction

english

Course content

The course has an objective of immersion in the practice of information security management in the field.

The basis are the various themes considered in the theoretical courses given in the Master in Cyber Security, especially IT Risks and Cyber Risks.
Students will make the link between all their courses and how the concepts they learn get implemented/used on the field, in practice on a daily basis.
At the beginning of the course, students have the opportunity to propose topics that correspond to their interests.

Typical  topics addressed are

- Threat Intelligence (How does this help to mitigate cyberattacks)
Ransomwares (Why is this attack so successful)
Cyberresilience (Why is still the Graal)
Quantum Computing (Should companies already worry about quantum computing applied to cryptography)
Cloud Security (less or more secure than having one's one infrastructure - what should I pay attention to)
Cybersecurity of supply chain management
- Mobile Security (why are smartphone more secure than desktop and laptops)
Websecurity and the same origin principle (Why are web browsers are in fact very secure despite their open door policy ?)
Enclaves (why Intel SGX is not the best model)
Securing Corporate Networks (and the zero-trust model).
- Cyberregulation, certification, does it really help to improve one's cyberposture ?
Scamming (why does it work always ? Why people are trapped)
- Threat Modelling
Patch Management - (How to,  ideally)
Remote Identity Proofing
Decision Process in Cybercrisis Situation  & Safety Culture 

Objectives (and/or specific learning outcomes)

The student will have acquired a vision of how cybersecurity and information security work in the field,  in the industry and for the general public.
He will be able to apply his theoretical knowledge, how to apply it and create the cyberadhesion of his employer or his client.

Prerequisites and Corequisites

Required and Corequired knowledge and skills

None, except courses already followed  in the master (so that the student can propose topics at the beginning of the course).

Teaching methods and learning activities

Interactive courses based on a dialog with students, especially since some of them already have professional experience.

References, bibliography, and recommended reading

References will be given throughout the course and topics covered.

Other information

Campus

Plaine

Evaluation

Method(s) of evaluation

  • Other

Other

A student/teacher dialog to ensure that the student is familiar with the concrete application of information security ion the filed. A subject, related to the course content, is prepared by the student (Part 1). The teacher then asks questions about the rest of the course with a focus on real cases.

Mark calculation method (including weighting of intermediary marks)

1/2 of the score for the case presented, 1/2 for the ability to conduct a challenging dialog with the teacher.

Language(s) of evaluation

  • english

Programmes