Formation's goal
Career opportunities
The objective is to train IT systems security specialists and researchers capable of designing, analyzing and implementing security policies adapted to different environments.
The research requested in this area is clearly of an applied nature. For this reason, the training provides in addition to the theoretical disciplines necessary to model and solve the problems posed, a certain number of courses which allow to apprehend in depth the practical aspects of security.
Graduates of the course can use their skills in the field of research and development since they have a fundamental approach allowing:
– Some of them, if they wish, to prepare a doctoral thesis at the university.
– For others, to ensure within companies, the functions of manager, security consultant (CSSI, RSSI, DSSI), security project manager or designer_developer.
The targeted skills are:
- Design and implement security policies in various environments.
- Analyze the vulnerability and security potential of an infrastructure; detect its flaws and room for improvement.
- Model security issues for data, hardware, networks, operating systems and applications.
- React to attacks, repair a damaged system.
- Identify the origins of damage; improve the reliability of detection, intrusion and backup systems.
- Recommend and provide balanced solutions taking into account technical, organizational and relational constraints.
- Convince decision-makers and users of the importance of the risks incurred and of the merits of the procedures envisaged or already in progress.
- Organize the implementation of political, regulatory and technical decisions (concerning IT security) for all types of users.
- Ensure a technological watch on developments in terms of risks and countermeasures.
Master's program in Information Systems Security
Download : The canvas
1st year
1 semester
S1 | CM | TD | TP | Credits | coefficient | link to course |
Teaching unit : Fundamental EU | ||||||
Algorithm |
1.5 | 1.5 | 1.5 | 6 | 3 | link |
Networks |
1.5 | 1.5 | 1.5 | 6 | 3 | link |
Software engineering |
1.5 | 1.5 | 1.5 | 6 | 3 | link |
Teaching unit : EU methodology | ||||||
cryptography |
1.5 | 1.5 | 1.5 | 6 | 3 | link |
C++ programming |
0 | 1.5 | 1.5 | 3 | 2 | link |
Teaching unit : EU discovery | ||||||
RO |
1.5 | 0 | 0 | 1 | 1 | link |
Teaching unit : transversal unit | ||||||
English |
1.5 | 0 | 0 | 1 | 1 | link |
Cybercriminality |
1.5 | 0 | 0 | 1 | 1 | link |
2 semester
S8 | CM | TD | TP | Credits | coefficient | link to course |
Teaching unit : Fundamental EU | ||||||
Operating systems |
1.5 | 1.5 | 1.5 | 6 | 3 | link |
Distributed applications |
1.5 | 1.5 | 1.5 | 6 | 3 | link |
Advanced networks |
1.5 | 1.5 | 1.5 | 6 | 3 | link |
Teaching unit : EU methodology | ||||||
Introduction to safety |
1.5 | 0 | 1.5 | 4 | 2 | link |
Databases |
1.5 | 1.5 | 1.5 | 5 | 3 | link |
Teaching unit : EU discovery | ||||||
Teaching unit : transversal unit | ||||||
English |
1.5 | 0 | 0 | 1 | 1 | link |
Entrepreneurship |
1.5 | 0 | 0 | 1 | 1 | link |
work ethic |
1.5 | 0 | 0 | 1 | 1 | link |
2nd year
3 semester
S3 | CM | TD | TP | Credits | coefficient | link to course |
Teaching unit : Fundamental EU | ||||||
Information systems security |
1.5 | 1.5 | 1.5 | 6 | 3 | link |
Network security |
1.5 | 1.5 | 1.5 | 6 | 3 | link |
Database Security |
1.5 | 1.5 | 1.5 | 6 | 3 | link |
Teaching unit : EU methodology | ||||||
Security methodology |
3 | 0 | 0 | 4 | 2 | link |
Identity management techniques |
1.5 | 0 | 0 | 1 | 1 | link |
Advanced Security Methodology |
1.5 | 1.5 | 0 | 4 | 2 | link |
Teaching unit : EU discovery | ||||||
Teaching unit : transversal unit | ||||||
English |
1.5 | 0 | 0 | 1 | 1 | link |
Project Management |
1.5 | 0 | 0 | 1 | 1 | link |
Writing techniques |
1.5 | 0 | 0 | 1 | 1 | link |
4 semester
The S4 semester is reserved for an internship or an initiation to research, culminating in a dissertation and a defense.
Production and defense of a dissertation with an overall hourly volume of 368 hours. Internship in a company sanctioned by a dissertation and a defence.
VHS | coefficient | Credits | |
Memo | 375 h | 1 | 30 |
Total Semester 4 | 375 h | 11 | 30 |
Test
Test
S1 | CM | TD | TP | Credits | coefficient | link to course |
Teaching Unit: Fundamental EU | ||||||
Algorithm | 1.5 | 1.5 | 1.5 | 6 | 3 | link |
Networks | 1.5 | 1.5 | 1.5 | 6 | 3 | link |
Software engineering | 1.5 | 1.5 | 1.5 | 6 | 3 | link |
Teaching Unit: UE methodology | ||||||
cryptography | 1.5 | 1.5 | 1.5 | 6 | 3 | link |
C++ programming | 0 | 1.5 | 1.5 | 3 | 2 | link |
Teaching Unit: UE discovery | ||||||
RO | 1.5 | 0 | 0 | 1 | 1 | link |
Teaching Unit: Transversal EU | ||||||
English | 1.5 | 0 | 0 | 1 | 1 | link |
Cybercriminality | 1.5 | 0 | 0 | 1 | 1 | link |