Cybersecurity major
Lieu des études | France, Paris |
---|---|
Type | First level of higher education, temps plein |
Durée nominale | 4 ans |
Langue d'étude | anglais |
Frais de scolarité | 10 250 € par année |
---|
Conditions d'admission | Lycée / enseignement secondaire (ou plus) Les diplômes sont acceptés dans les langues suivantes : anglais. Often you can get a suitable transcript from your school. If this is not the case, you will need official translations along with verified copies of the original. |
---|
Exigences linguistiques | anglais |
---|
Autres exigences | Au moins 2 références doivent être fournies. |
---|
Plus d'informations |
---|
Aperçu
The defensive cybersecurity major extends over 2 years , the 2nd and 3rd year of the engineering cycle. While teaching in the second year is generic and covers a wide range of skills that allow students to learn how to design, build and manage information systems , the second year is devoted to defensive cybersecurity. The latter was created in partnership with Microsoft, Orange Cyberdefense with the aim of training future talents in cybersecurity . It is the first cybersecurity training to integrate a unique focus on identity. The major has been labeled SecNumEdu by ANSSI in August 2018.
The needs for cybersecurity talent are increasingly important in large international companies. In the Information Systems & Defensive Cybersecurity Major, students understand the issues of computer security and cybersecurity and learn to develop the technological knowledge necessary to deal with cyber threats . How to build an Active Directory, an Azure Active Directory , how to develop an SSI security policy, etc. are all essential skills for a cybersecurity expert.
Opportunités de carrière
Consulting and expertise, to support the transformation of the company and the integration of new IT tools.
Product trades, to develop new tools, software, software packages in response to the needs of users and companies .
Production jobs, to administer the information system and ensure the availability of IT resources and applications.