{"id":2785,"date":"2022-09-26T11:46:07","date_gmt":"2022-09-26T10:46:07","guid":{"rendered":"http:\/\/web.esi.ma\/?page_id=2785"},"modified":"2022-09-26T11:50:38","modified_gmt":"2022-09-26T10:50:38","slug":"ingenierie-de-la-securite-des-systemes-dinformation-et-cyberdefense","status":"publish","type":"page","link":"https:\/\/esi.ac.ma\/ar\/formation-initiale\/cycle-ingenieur\/ingenierie-de-la-securite-des-systemes-dinformation-et-cyberdefense\/","title":{"rendered":"\u0647\u0646\u062f\u0633\u0629 \u062d\u0645\u0627\u064a\u0629 \u0646\u0638\u0645 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0648\u0627\u0644\u062f\u0641\u0627\u0639 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a"},"content":{"rendered":"<p>[vc_row][vc_column]<div class=\"title-subtile-holder wow bounce text_right\"><div class=\"section-subtitle dark_subtitle\">\u0633\u0644\u0643 \u0627\u0644\u0645\u0647\u0646\u062f\u0633<\/div><h1 class=\"section-title dark_title\">\u0647\u0646\u062f\u0633\u0629 \u062d\u0645\u0627\u064a\u0629 \u0646\u0638\u0645 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0648\u0627\u0644\u062f\u0641\u0627\u0639 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a<\/h1><div class=\"section-border blue_border\"><\/div><\/div>[vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1664189231729{margin-bottom: 30px !important;}&#8221;]\u064a\u0647\u062f\u0641 \u0645\u0633\u0644\u0643 \u0647\u0646\u062f\u0633\u0629 \u062d\u0645\u0627\u064a\u0629 \u0646\u0638\u0645 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0648\u0627\u0644\u062f\u0641\u0627\u0639 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0625\u0644\u0649 \u062a\u0644\u0628\u064a\u0629 \u0627\u0644\u062d\u0627\u062c\u0629 \u0627\u0644\u0645\u062a\u0632\u0627\u064a\u062f\u0629 \u0644\u062a\u0643\u0648\u064a\u0646 \u0645\u0647\u0646\u062f\u0633\u064a\u0646 \u0645\u062e\u062a\u0635\u064a\u0646 \u0641\u064a \u0645\u062c\u0627\u0644 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0627\u0644\u0630\u064a\u0646 \u0633\u064a\u0643\u0648\u0646\u0648\u0646 \u0642\u0627\u062f\u0631\u064a\u0646 \u0639\u0644\u0649 \u0627\u064a\u062c\u0627\u062f \u062d\u0644\u0648\u0644 \u0644\u0644\u0625\u0634\u0643\u0627\u0644\u064a\u0627\u062a \u0627\u0644\u0645\u062a\u0639\u0644\u0642\u0629 \u062d\u0645\u0627\u064a\u0629 \u0646\u0638\u0645 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0639\u0627\u0646\u064a \u0645\u0646\u0647\u0627 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0648 \u0630\u0644\u0643 \u0628\u0641\u0636\u0644 \u0628\u0641\u0636\u0644 \u062a\u0643\u0648\u064a\u0646 \u0634\u0627\u0645\u0644 \u064a\u062c\u0645\u0639 \u0628\u064a\u0646 \u0623\u0633\u0627\u0633\u064a\u0627\u062a \u0627\u0644\u062a\u062d\u0648\u0644 \u0627\u0644\u0631\u0642\u0645\u064a \u0648 \u0639\u0644\u0648\u0645 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0648 \u0623\u064a\u0636\u0627 \u0627\u0644\u0645\u0643\u0648\u0646\u0627\u062a \u0627\u0644\u062a\u0642\u0646\u064a\u0629 \u0648\u0627\u0644\u0625\u062f\u0627\u0631\u064a\u0629 \u0644\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a.<\/p>\n<p><u>\u0627\u0644\u0645\u0647\u0627\u0631\u0627\u062a \u0627\u0644\u062a\u0642\u0646\u064a\u0629 \u0627\u0644\u0631\u0626\u064a\u0633\u064a\u0629 \u0627\u0644\u0645\u0643\u062a\u0633\u0628\u0629 \u0647\u064a<\/u><\/p>\n<ul>\n<li>Architecture SI et r\u00e9seaux<\/li>\n<li>Architecture de s\u00e9curit\u00e9 SI<\/li>\n<li>Gestion des risques de s\u00e9curit\u00e9 SI<\/li>\n<li>Mise en place et gestion des SMSI<\/li>\n<li>Normes de s\u00e9curit\u00e9<\/li>\n<li>Gestion des identit\u00e9s et des acc\u00e8s<\/li>\n<li>Techniques de cryptographie<\/li>\n<li>Gouvernance et audit de s\u00e9curit\u00e9 SI<\/li>\n<li>Outils de protection<\/li>\n<li>S\u00e9curit\u00e9 applicative<\/li>\n<li>S\u00e9curit\u00e9 IoT et Cloud<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_custom_heading text=&#8221;\u0634\u0631\u0648\u0637 \u0627\u0644\u0648\u0644\u0648\u062c&#8221; font_container=&#8221;tag:h2|font_size:23px|text_align:right|color:%23252525|line_height:23px&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css_animation=&#8221;fadeInUp&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1664189264948{margin-bottom: 30px !important;}&#8221;]\u0627\u0644\u0627\u0644\u062a\u062d\u0627\u0642 \u0628\u0627\u0644\u0633\u0646\u0629 \u0627\u0644\u0623\u0648\u0644\u0649 \u0645\u0646 \u0627\u0644\u0645\u0633\u0644\u0643 \u0645\u0641\u062a\u0648\u062d \u0641\u064a \u0648\u062c\u0647:<\/p>\n<ul>\n<li>\u0627\u0644\u0645\u062a\u0631\u0634\u062d\u064a\u0646 \u0627\u0644\u0646\u0627\u062c\u062d\u064a\u0646 \u0641\u064a \u0627\u0644\u0645\u0628\u0627\u0631\u0627\u0629 \u0627\u0644\u0648\u0637\u0646\u064a\u0629 \u0627\u0644\u0645\u0634\u062a\u0631\u0643\u0629 \u0644\u0648\u0644\u0648\u062c \u0645\u0624\u0633\u0633\u0627\u062a \u062a\u0643\u0648\u064a\u0646 \u0627\u0644\u0645\u0647\u0646\u062f\u0633\u064a\u0646 .<\/li>\n<li>\u0627\u0644\u0645\u062a\u0631\u0634\u062d\u064a\u0646 \u0627\u0644\u0646\u0627\u062c\u062d\u064a\u0646 \u0641\u064a \u0645\u0628\u0627\u0631\u0627\u0629 \u0627\u0644\u0648\u0644\u0648\u062c \u0627\u0644\u0645\u0641\u062a\u0648\u062d\u0629 \u0641\u064a \u0648\u062c\u0647 \u0627\u0644\u0637\u0644\u0628\u0629 \u0627\u0644\u062d\u0627\u0635\u0644\u064a\u0646 \u0639\u0644\u0649 \u062f\u0628\u0644\u0648\u0645 \u0627\u0644\u062f\u0631\u0627\u0633\u0627\u062a \u0627\u0644\u062c\u0627\u0645\u0639\u064a\u0629 \u0627\u0644\u0639\u0627\u0645\u0629 \u0641\u064a \u0634\u0639\u0628\u0629 \u0639\u0644\u0648\u0645 \u0627\u0644\u0631\u064a\u0627\u0636\u064a\u0627\u062a \u0648 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u064a\u0627\u062a<\/li>\n<li>\u0627\u0644\u0645\u062a\u0631\u0634\u062d\u064a\u0646 \u0627\u0644\u0646\u0627\u062c\u062d\u064a\u0646 \u0641\u064a \u0645\u0628\u0627\u0631\u0627\u0629 \u0627\u0644\u0648\u0644\u0648\u062c \u0627\u0644\u0645\u0641\u062a\u0648\u062d\u0629 \u0641\u064a \u0648\u062c\u0647 \u0627\u0644\u062d\u0627\u0635\u0644\u064a\u0646 \u0639\u0644\u0649 \u0634\u0647\u0627\u062f\u0629 \u0625\u0639\u0644\u0627\u0645\u064a \u0645\u0634\u0641\u0648\u0639\u0629 \u0628\u0634\u0647\u0627\u062f\u0629 \u0627\u0644\u0628\u0643\u0627\u0644\u0648\u0631\u064a\u0627 \u0641\u064a \u0623\u062d\u062f \u0645\u0633\u0627\u0644\u0643 \u0627\u0644\u0634\u0639\u0628 \u0627\u0644\u0639\u0644\u0645\u064a\u0629 \u0623\u0648 \u0627\u0644\u062a\u0642\u0646\u064a\u0629<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_custom_heading text=&#8221;\u0627\u0644\u0645\u0647\u0646 \u0627\u0644\u0645\u0632\u0627\u0648\u0644\u0629&#8221; font_container=&#8221;tag:h2|font_size:23px|text_align:right|color:%23252525|line_height:23px&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css_animation=&#8221;fadeInUp&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1664189290210{margin-bottom: 30px !important;}&#8221;]<\/p>\n<ul>\n<li>Responsable de S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information (RSSI)<\/li>\n<li>Ing\u00e9nieur s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information<\/li>\n<li>Auditeur de s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information<\/li>\n<li>Gestionnaire des risques de s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information<\/li>\n<li>Chef de projet s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information<\/li>\n<li>Consultant en cybers\u00e9curit\u00e9<\/li>\n<li>Int\u00e9grateur de solutions de s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information<\/li>\n<li>Architecte en s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_custom_heading text=&#8221;\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u062a\u0643\u0648\u064a\u0646&#8221; font_container=&#8221;tag:h2|font_size:23px|text_align:right|color:%23252525|line_height:23px&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css_animation=&#8221;fadeInUp&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221;]\u062b\u0644\u0627\u062b \u0633\u0646\u0648\u0627\u062a \u0645\u0646 \u0627\u0644\u062a\u0643\u0648\u064a\u0646 (6 \u0641\u0635\u0648\u0644 \u062f\u0631\u0627\u0633\u064a\u0629\u060c 48 \u0648\u062d\u062f\u0629 \u0645\u0646\u0647\u0627 8 \u0644\u0645\u0634\u0631\u0648\u0639 \u0646\u0647\u0627\u064a\u0629 \u0627\u0644\u062f\u0631\u0627\u0633\u0627\u062a( PFE)[\/vc_column_text][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;green&#8221; c_align=&#8221;right&#8221; active_section=&#8221;1&#8243; el_class=&#8221;accordion-services&#8221;][vc_tta_section title=&#8221;\u0627\u0644\u0623\u0633\u062f\u0633 \u0627\u0644\u0623\u0648\u0644&#8221; tab_id=&#8221;semestre-1&#8243;][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<ul>\n<li>Architecture des ordinateurs et Syst\u00e8mes d\u2019exploitation<\/li>\n<li>Math\u00e9matique pour l\u2019Ing\u00e9nieur<\/li>\n<li>Algorithmique et Programmation<\/li>\n<li>Gestion \u00e9lectronique des documents et Documents structur\u00e9s<\/li>\n<li>R\u00e9seaux informatiques<\/li>\n<li>Recherche Op\u00e9rationnelle<\/li>\n<li>\u00c9conomie de l\u2019Entreprise<\/li>\n<li>Anglais et TEC 1<\/li>\n<li><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;\u0627\u0644\u0623\u0633\u062f\u0633 \u0627\u0644\u062b\u0627\u0646\u064a&#8221; tab_id=&#8221;semestre-2&#8243;][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<ul>\n<li>Analyse et Conception des Bases de Donn\u00e9es<\/li>\n<li>Probabilit\u00e9 et statistiques<\/li>\n<li>Programmation et Technologies Web<\/li>\n<li>Algorithmique et Programmation Avanc\u00e9e<\/li>\n<li>eServices et gestion de contenu d&#8217;entreprise<\/li>\n<li>Gestion du capital immat\u00e9riel<\/li>\n<li>Management pour l&#8217;ing\u00e9nieur<\/li>\n<li>Anglais et TEC 2<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;\u0627\u0644\u0623\u0633\u062f\u0633 \u0627\u0644\u062b\u0627\u0644\u062b&#8221; tab_id=&#8221;semestre-3&#8243;][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<ul>\n<li>Analyse des syst\u00e8mes et Conduite de Projet<\/li>\n<li>Programmation Orient\u00e9e Objet<\/li>\n<li>Statistiques Inf\u00e9rentielles et Processus Stochastiques<\/li>\n<li>Fondements de la cyberd\u00e9fense<\/li>\n<li>Th\u00e9orie de l\u2019Information et Traitement du Signal<\/li>\n<li>Administration r\u00e9seau et Qos<\/li>\n<li>Project Management et Entrepreneuriat<\/li>\n<li>Anglais et TEC 3<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;\u0627\u0644\u0623\u0633\u062f\u0633 \u0627\u0644\u0631\u0627\u0628\u0639&#8221; tab_id=&#8221;semestre-4&#8243;][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<ul>\n<li>Programmation avanc\u00e9e et mobile<\/li>\n<li>S\u00e9curit\u00e9 des services et applications<\/li>\n<li>Math\u00e9matiques pour la s\u00e9curit\u00e9<\/li>\n<li>Machine Learning<\/li>\n<li>Syst\u00e8mes R\u00e9partis et Virtualisation<\/li>\n<li>Ing\u00e9nierie de la cryptographie<\/li>\n<li>Gestion des identit\u00e9s et acc\u00e8s<\/li>\n<li>Management de la s\u00e9curit\u00e9<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;\u0627\u0644\u0623\u0633\u062f\u0633 \u0627\u0644\u062e\u0627\u0645\u0633&#8221; tab_id=&#8221;semestre-5-op1&#8243;][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<ul>\n<li>Ethical hacking<\/li>\n<li>Syst\u00e8mes embarqu\u00e9s et intelligents<\/li>\n<li>S\u00e9curit\u00e9 r\u00e9seaux et mobile<\/li>\n<li>Syst\u00e8mes ubiquitaires<\/li>\n<li>Biometric Systems and Security<\/li>\n<li>S\u00e9curit\u00e9 des syst\u00e8mes distribu\u00e9s<\/li>\n<li>Gouvernance &amp; Audit de la s\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information<\/li>\n<li>M\u00e9thodologie de recherche<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;\u0627\u0644\u0623\u0633\u062f\u0633 \u0627\u0644\u0633\u0627\u062f\u0633&#8221; tab_id=&#8221;semestre-6&#8243;][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<ul>\n<li>Stage et Projet de fin d\u2019\u00e9tudes &#8211; PFE (\u00e9quivalant \u00e0 8 modules)<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1664189231729{margin-bottom: 30px !important;}&#8221;]\u064a\u0647\u062f\u0641 \u0645\u0633\u0644\u0643 \u0647\u0646\u062f\u0633\u0629 \u062d\u0645\u0627\u064a\u0629 \u0646\u0638\u0645 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0648\u0627\u0644\u062f\u0641\u0627\u0639 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0625\u0644\u0649 \u062a\u0644\u0628\u064a\u0629 \u0627\u0644\u062d\u0627\u062c\u0629 \u0627\u0644\u0645\u062a\u0632\u0627\u064a\u062f\u0629 \u0644\u062a\u0643\u0648\u064a\u0646 \u0645\u0647\u0646\u062f\u0633\u064a\u0646 \u0645\u062e\u062a\u0635\u064a\u0646 \u0641\u064a \u0645\u062c\u0627\u0644 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0627\u0644\u0630\u064a\u0646 \u0633\u064a\u0643\u0648\u0646\u0648\u0646 \u0642\u0627\u062f\u0631\u064a\u0646 \u0639\u0644\u0649 \u0627\u064a\u062c\u0627\u062f \u062d\u0644\u0648\u0644 \u0644\u0644\u0625\u0634\u0643\u0627\u0644\u064a\u0627\u062a \u0627\u0644\u0645\u062a\u0639\u0644\u0642\u0629 \u062d\u0645\u0627\u064a\u0629 \u0646\u0638\u0645 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0639\u0627\u0646\u064a \u0645\u0646\u0647\u0627 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0648 \u0630\u0644\u0643 \u0628\u0641\u0636\u0644 \u0628\u0641\u0636\u0644 \u062a\u0643\u0648\u064a\u0646 \u0634\u0627\u0645\u0644 \u064a\u062c\u0645\u0639 \u0628\u064a\u0646 \u0623\u0633\u0627\u0633\u064a\u0627\u062a \u0627\u0644\u062a\u062d\u0648\u0644 \u0627\u0644\u0631\u0642\u0645\u064a \u0648 \u0639\u0644\u0648\u0645 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0648 \u0623\u064a\u0636\u0627 \u0627\u0644\u0645\u0643\u0648\u0646\u0627\u062a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":791,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2785","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/esi.ac.ma\/ar\/wp-json\/wp\/v2\/pages\/2785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esi.ac.ma\/ar\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/esi.ac.ma\/ar\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/esi.ac.ma\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/esi.ac.ma\/ar\/wp-json\/wp\/v2\/comments?post=2785"}],"version-history":[{"count":2,"href":"https:\/\/esi.ac.ma\/ar\/wp-json\/wp\/v2\/pages\/2785\/revisions"}],"predecessor-version":[{"id":2787,"href":"https:\/\/esi.ac.ma\/ar\/wp-json\/wp\/v2\/pages\/2785\/revisions\/2787"}],"up":[{"embeddable":true,"href":"https:\/\/esi.ac.ma\/ar\/wp-json\/wp\/v2\/pages\/791"}],"wp:attachment":[{"href":"https:\/\/esi.ac.ma\/ar\/wp-json\/wp\/v2\/media?parent=2785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}