Télécom ParisTech

Infrastructures and network securities (SR2I)

The SR2I track aims to train highly qualified engineers in Cybersecurity by providing the necessary foundations of theoretical and practical skills. These skills will in turn allow for the mastery of essential technical, organizational and legal aspects of IT infrastructures and networks in their various mutations with the end goal of learning how to manage associated risks.

Course topics include:

  • Mastering the different security services and cryptographic mechanisms
  • Evaluating risks, threats and concerns
  • Assessing and implementing attacks
  • Understanding security assessment and auditing tools
  • Developing techniques for secured applications and secured protocols
  • Implementing trust infrastructures

Security concepts and methods as well as their associated tools are detailed in-depth through theoretical teaching and reinforced with diverse and practical application including labs, practical exercises, group projects, and individual projects.

2nd year courses

SR2I 2nd year program
(192 hours)
Fall Semester Spring Semester
Period 1 Period 2 Period 3 Period 4
Time slot A1 SR2I201 Internet Infrastructure: basics, methods, architecture and protocols SR2I203 Risks and attacks : analysis, investigation and implementation SR2I205 Networks and information system security SR2I207 Applications and communication protocols security
Time slot A2 SR2I202 Security services and cryptographic mechanisms SR2I204 Access control and authentication SR2I206 Trust infrastructure and implementation SR2I208 Projects

Details :

Fall semester, period 1

  • SR2I 201 Internet Infrastructure : basics, methods, architecture and protocols (24 hrs) Ahmed Serhrouchni
    The goal this course is to obtain an in-depth understanding of Internet infrastructure (architecture, protocols, organization, etc.) in order to show how choices in infrastructure design impact security issues.
  • SR2I 202 Security services and cryptographic mechanisms (24 hrs) Romain Alléaume
    This course aims to provide the necessary theoretical and practical basis for learning the most important cryptographic mechanisms and their associated security services. The following will be studied and analyzed: symmetric cryptography (DES, 3DES, AES), asymmetric cryptography (RSA, El Gamal , ECC), hashing, digital signatures, shared secret keys (DH), security functions (confidentiality, integrity, authentication, authorization, non-repudiation).

Fall semester, period 2

  • SR2I 203 Risks and attacks : analysis, investigation and implementation (24 hrs) Ahmed Serhrouchni
    Analyzing and designing attacks is necessary to better understand the defense mechanisms that can be applied in various ad hoc environments. The set of concepts, definitions and standards related to the attacks and to their consequences will be addressed. These attacks, which target networks, applications, and infrastructures will be detailed and an exhaustive taxonomy will be defined. The course unit is composed of two parts: (1) theoretical background knowledge and (2) practical learning.
  • SR2I 204 Access control and authentication (24 hrs) Jean Leneutre
    This course unit covers : - access control models (DAC , MAC, RBAC , ORBAC) - authentication schemes (mutual, third party, etc. ) - access control protocols.

Spring semester, period 3

  • SR2I 205 Networks and information system security (24 hrs) Rida Khatoun
    Network security covers networked computer systems and communication protocols. All defense solutions for networks and information systems are studied and analyzed. Firewalls, intrusion detection systems, partitioning architectures, tunneling protocols, VPN, IPSEC, authentication protocols (SSO, Kerberos ...) will be studied and implemented. Practical training including hands-on labs is an important component of this course.
  • SR2I 206 Trust infrastructure and implementation (24 hrs) Houda Labiod
    Cryptographic key management is central to the implementation of security services such as confidentiality, integrity, authentication, non-repudiation and timestamp. PKI or Public Key Infrastructure is also crucial for trust management architectures. The following key elements will be studied and analyzed: architectures (certification authority, registration authority, directory), protocols (revocation, OCSP, etc.), cryptographic mechanisms (asymmetric, certificates: X509, ETSI, IEEE, etc.), and policies. Hands-on labs to implement these architectures are an important part of this course.

Spring semester, period 4

  • SR2I 207 Applications and communication protocols security (24 hrs) Pascal Urien
    Applications and exchange security protocols are central to this course unit. Basic applications (web applications, messaging, directory, IP telephony), and advanced applications (digital safe, Internet of things, payment) will be dealt with. Security protocols of exchanges: TLS (Transport Layer Secure), SSH (Secure Shell), VPN, TLS will be analyzed and detailed in depth.
  • SR2I 208 Projects (24 hrs) Rida Khatoun, Houda Labiod
    The aim of the project is to consolidate the skills acquired in the different educational units offered, through personal work overseen by a supervisor. This project will result in the writing and defense of a thesis. A jury of experts will evaluate the completed work.

3rd year options

Program  at Télécom ParisTech 
For all students: specialization SR2I at Telecom ParisTech
- courses (120 hours)  
- and a Research and Innovation Project (120 hours)