Computer Networks and Security
£0
About this course
Program's goal
Train specialists in network infrastructures
and computer security.

Prerequisites
International applicants must at least hold a high school degree or equivalent, and must hold an English test (ex. IELTS, TOEFL, etc.) and meet our grade requirements.
Canadian students must hold a minimum of a Secondary 5 diploma with strong mathematics (TS or SN) or equivalent education.
Professional perspectives
Technologies taught
Cisco, TCP / IP, Windows Server 2016, Linux, security of access and communications, advanced security, C, C ++, C #, SQL, Java, and more.
Request information at Institut supérieur d’informatique
Courses Details
Semester 1
Operating system I - 60h
Install and configure a client operating system (Windows 7) for individual use or peer-to-peer LAN.
Operating system II - 60h
Install and administer a workstation using the GNU / Linux operating system.
Theory of networks - 60h
Study the different standards, topologies and models of networks, cabling and connection devices.
Routing and communication principles - 60h
Install and configure a TCP/IP network with routers and network servers DNS, DHCP, etc.
Semester 2
Advanced switching functions - 60h
Study and configure Cisco products. RIP, IGRP, BGP, OSPF, VLAN, STP, VTP, ISL. Design of LAN and WAN networks.
Operating system server I - 60h
Install, configure and administer a 2016 server
Operating system server II - 60h
Install, configure and admnister, on a server using the GNU/Linux operating systems, different types of applications or network servers (DNS, DHCP, FTP, NFS, NIS, APACHE, SAMBA, POSTFIX, SQUID, etc.)
Integration project I - 60h
Install, configure, document and secure a network in a production environment.
Semester 3
Production environment I - 60h
Introduction to the operation and configuration of Linux hosting servers with Apache and nginx. Giving theoretical and practical knowledge on the use of certificates for websites. Understand the use of containers with Docker in a development environment.
Computer network access security - 60h
Ensure security of networks access. Learn the 5 phases of a cyber attack and how to protect each phase.
Security of communications - 60h
Study of the Microsoft TMG Firewall/Proxy : proxy cache, secure publishing of corporate servers (Web, DNS, SMTP/POP3), VPN, IPSEC, SSH, SSL, TLS, PGP, etc.
Advanced computer security - 60h
Set up, on a server, various advances security mechanisms such as Iptables, SSH, Snort, Tripwire, VPN, as well as the use of tools (Nessus, Nmap, Hping, etc).
Semester 4
Virtual Infrastructure - 60h
Enterprise server virtualization and virtual desktops (VDM) deployment for users.
Incident and risk management - 60h
Familiarize yourself with the advanced concepts of intrusion, detection, audit and crisis management. Concretely address security in defense against cybercrime and cyber-terrorism.
Production environment II - 60h
In this course, students learn how to create, configure and manage SAN or NAS-based storage networks. The concepts of clusters are also treated and in particular fault-tolerance clusters (Fail-Over Cluster) and load balancing clusters (Network Load-Balancing Cluster). In addition, we see the principles of the management of mail servers as well as update servers and centralized Anti-Virus.
Integration project II - 60h
Install, configure, document and secure a network in a production environment.
Semester 5 & 6
Dynamic job search method - 75h
Become familiar with the job market. Produce CV. Develop job search techniques.
Internship I - 240h
Consolidate the notions acquired by a concrete application of concepts and learning in real situations.
Internship II - 240h
Consolidate the notions acquired by a concrete application of concepts and learning in real situations.
Members
Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit. Duis sed odio sit amet nibh vulputate cursus a sit amet mauris. Morbi accumsan ipsum velit. Nam nec tellus a odio tincidunt auctor a ornare odio. Sed non mauris vitae erat consequat auctor eu in elit.