{"id":3686,"date":"2022-09-26T11:43:45","date_gmt":"2022-09-26T10:43:45","guid":{"rendered":"https:\/\/esi.ac.ma\/formation\/formation-initiale\/cycle-ingenieur\/ingenierie-de-la-securite-des-systemes-dinformation-et-cyberdefense\/"},"modified":"2023-07-15T22:25:51","modified_gmt":"2023-07-15T21:25:51","slug":"ingenierie-de-la-securite-des-systemes-dinformation-et-cyberdefense","status":"publish","type":"page","link":"https:\/\/esi.ac.ma\/en\/formation-initiale\/cycle-ingenieur\/ingenierie-de-la-securite-des-systemes-dinformation-et-cyberdefense\/","title":{"rendered":"Engineering of Information System Security and Cybersecurity"},"content":{"rendered":"<p>[vc_row][vc_column]<div class=\"title-subtile-holder wow bounce text_left\"><div class=\"section-subtitle dark_subtitle\">Engineering cycle<\/div><h1 class=\"section-title dark_title\">Engineering of Information System Security and Cybersecurity<\/h1><div class=\"section-border blue_border\"><\/div><\/div>[vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1689456231865{margin-bottom: 30px !important;}&#8221;]This program is designed to meet the growing need to train cybersecurity engineers who will be able to respond effectively to the security issues faced by companies, thanks to a comprehensive training program combining the fundamentals of digital transformation and data science with the cutting-edge technical and managerial components of cybersecurity.<\/p>\n<p>The main technical skills to be acquired are:<\/p>\n<ul>\n<li>IS and network architecture<\/li>\n<li>IS security architecture<\/li>\n<li>IS security risk management<\/li>\n<li>ISMS implementation and management<\/li>\n<li>Security standards<\/li>\n<li>Identity and access management<\/li>\n<li>Cryptographic techniques<\/li>\n<li>IS security governance and audit<\/li>\n<li>Protection tools<\/li>\n<li>Application security<\/li>\n<li>IoT and Cloud security<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_custom_heading text=&#8221;Admission requirements&#8221; font_container=&#8221;tag:h2|font_size:23px|text_align:left|color:%23252525|line_height:23px&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css_animation=&#8221;fadeInUp&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1689455967467{margin-bottom: 30px !important;}&#8221;]Access to the first year of the Engineering Cycle is open to :<\/p>\n<ul>\n<li>Candidates who have passed the National Common Entrance Examination (CNC) for Morocco\u2019s engineering schools.<\/li>\n<li>By examination for holders of a DEUG in Mathematical and Computer Sciences (SMI).<\/li>\n<li>By examination for holders of the \u201cInformatiste\u201d diploma (Bac+4) or equivalent, with a scientific or technical baccalaureate.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_custom_heading text=&#8221;Career opportunities&#8221; font_container=&#8221;tag:h2|font_size:23px|text_align:left|color:%23252525|line_height:23px&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css_animation=&#8221;fadeInUp&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1689456096512{margin-bottom: 30px !important;}&#8221;]<\/p>\n<ul>\n<li>Information Systems Security Manager (ISSM)<\/li>\n<li>Information systems security engineer<\/li>\n<li>Information systems security auditor<\/li>\n<li>Information systems security risk manager<\/li>\n<li>Information systems security project manager<\/li>\n<li>Cybersecurity consultant<\/li>\n<li>Information systems security solutions integrator<\/li>\n<li>Information systems security architect<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_custom_heading text=&#8221;Training program&#8221; font_container=&#8221;tag:h2|font_size:23px|text_align:left|color:%23252525|line_height:23px&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css_animation=&#8221;fadeInUp&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221;]<\/p>\n<div class=\"wpb_text_column wpb_content_element wpb_animate_when_almost_visible wpb_fadeInUp fadeInUp wpb_start_animation animated\">\n<div class=\"wpb_wrapper\">\n<p>Three years of training (6 semesters, 48 modules, 8 of which are reserved for the PFE end-of-studies project).<\/p>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;green&#8221; c_position=&#8221;right&#8221; active_section=&#8221;1&#8243; el_class=&#8221;accordion-services&#8221;][vc_tta_section title=&#8221;Semestre 1&#8243; tab_id=&#8221;semestre-1&#8243;][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<ul>\n<li>Architecture des ordinateurs et Syst\u00e8mes d\u2019exploitation<\/li>\n<li>Math\u00e9matique pour l\u2019Ing\u00e9nieur<\/li>\n<li>Algorithmique et Programmation<\/li>\n<li>Gestion \u00e9lectronique des documents et Documents structur\u00e9s<\/li>\n<li>R\u00e9seaux informatiques<\/li>\n<li>Recherche Op\u00e9rationnelle<\/li>\n<li>\u00c9conomie de l\u2019Entreprise<\/li>\n<li>Anglais et TEC 1<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Semestre 2&#8243; tab_id=&#8221;semestre-2&#8243;][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<ul>\n<li>Analyse et Conception des Bases de Donn\u00e9es<\/li>\n<li>Probabilit\u00e9 et statistiques<\/li>\n<li>Programmation et Technologies Web<\/li>\n<li>Algorithmique et Programmation Avanc\u00e9e<\/li>\n<li>eServices et gestion de contenu d&#8217;entreprise<\/li>\n<li>Gestion du capital immat\u00e9riel<\/li>\n<li>Management pour l&#8217;ing\u00e9nieur<\/li>\n<li>Anglais et TEC 2<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Semestre 3&#8243; tab_id=&#8221;semestre-3&#8243;][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<ul>\n<li>Analyse des syst\u00e8mes et Conduite de Projet<\/li>\n<li>Programmation Orient\u00e9e Objet<\/li>\n<li>Statistiques Inf\u00e9rentielles et Processus Stochastiques<\/li>\n<li>Fondements de la cyberd\u00e9fense<\/li>\n<li>Th\u00e9orie de l\u2019Information et Traitement du Signal<\/li>\n<li>Administration r\u00e9seau et Qos<\/li>\n<li>Project Management et Entrepreneuriat<\/li>\n<li>Anglais et TEC 3<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Semestre 4&#8243; tab_id=&#8221;semestre-4&#8243;][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<ul>\n<li>Programmation avanc\u00e9e et mobile<\/li>\n<li>S\u00e9curit\u00e9 des services et applications<\/li>\n<li>Math\u00e9matiques pour la s\u00e9curit\u00e9<\/li>\n<li>Machine Learning<\/li>\n<li>Syst\u00e8mes R\u00e9partis et Virtualisation<\/li>\n<li>Ing\u00e9nierie de la cryptographie<\/li>\n<li>Gestion des identit\u00e9s et acc\u00e8s<\/li>\n<li>Management de la s\u00e9curit\u00e9<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Semestre 5&#8243; tab_id=&#8221;semestre-5-op1&#8243;][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<ul>\n<li>Ethical hacking<\/li>\n<li>Syst\u00e8mes embarqu\u00e9s et intelligents<\/li>\n<li>S\u00e9curit\u00e9 r\u00e9seaux et mobile<\/li>\n<li>Syst\u00e8mes ubiquitaires<\/li>\n<li>Biometric Systems and Security<\/li>\n<li>S\u00e9curit\u00e9 des syst\u00e8mes distribu\u00e9s<\/li>\n<li>Gouvernance &amp; Audit de la s\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information<\/li>\n<li>M\u00e9thodologie de recherche<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Semestre 6&#8243; tab_id=&#8221;semestre-6&#8243;][vc_column_text css_animation=&#8221;none&#8221;]<\/p>\n<ul>\n<li>Stage et Projet de fin d\u2019\u00e9tudes &#8211; PFE (\u00e9quivalant \u00e0 8 modules)<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1689456231865{margin-bottom: 30px !important;}&#8221;]This program is designed to meet the growing need to train cybersecurity engineers who will be able to respond effectively to the security issues faced by companies, thanks to a comprehensive training program combining the fundamentals of digital transformation and data science with the cutting-edge technical and managerial components of cybersecurity. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":792,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3686","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/pages\/3686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/comments?post=3686"}],"version-history":[{"count":5,"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/pages\/3686\/revisions"}],"predecessor-version":[{"id":3691,"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/pages\/3686\/revisions\/3691"}],"up":[{"embeddable":true,"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/pages\/792"}],"wp:attachment":[{"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/media?parent=3686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}