CYBERSECURITY OF INFORMATION SYSTEMS

This program trains engineers to meet the needs of companies and public organisms in terms of end-to-end cyber security: Information systems, Operating systems, Communication networks, and Hardware. The objective is to consider the importance of the information manipulated by the different actors. Cyber Security program aims to train operational engineers who can manage and administer the end-to-end security from high layers to hardware.

 

Cybersécurité des Systèmes d'information

Compulsory courses

  • Scientific and Technical Teaching (180 hours): Security Operating System, Windows / Linux, Security Operating System Smartphones, Security Virtualized, Operating Systems, Introduction Network Security, Audit and Security of Local Networks, Audit and Security of Operator Networks
  • Modern language (150h)
  • Management and Project Management (150h)

Options

  • Security of information systems
  • Hardware security
  • Software network security
  • IoT security
  • Software development security

Examples of courses available (420 hours)

In the specialization

  • Standards, Certifications and Identity Management
  • Information Systems Security
  • Cyber Defense and Attack
  • Viruses and viral techniques
  • Cyber security criminalist
  • Post-mortem analysis
  • IoT Security
  • Advanced Network Security (Darknet, blockchain, etc.)
  • Secure Software Development
  • AI and Social Network Analysis

Inter-specialization courses

  • Cryptography
  • Computer architecture
  • Reverse engineering
  • Smart cards
  • Hardware attacks

In Management

  • Security Management of Information Systems
  • General Data Protection Regulation (GDPR)
  • Entrepreneurship and business plan
  • Team management and leadership
  • Advanced finance
  • Knowledge Management
  • Project Management - IPMA Certification

Business sectors

Examples of professions

  • Security Architect
  • Intrusion Testing Expert
  • Security Developer
  • Security Analyst / Consultant
  • ISS Expert
  • Post-Auditor (Forensic Criminal Cybersecurity, Compromise Analysis)
  • Cyber-Security R&amp
  • D Engineer

Examples of positions held by graduates

  • IT Security Officer (Chief information security officer)
  • Information System Defense / Attack
  • Architect Engineer
  • Developer Engineer, etc.

Sectors of activity

  • Institutional (ministries, communities, etc.)
  • Operator of Vital Importance (OVI)
  • Operator of Essential Services (OES)
  • Services (banking, finance, insurance, etc.)

Examples of applications

  • IT Security
  • Operations System Security
  • Network Security
  • Hardware Security, etc.