GCYS

Descriptif de l’Enseignement de la Filière Génie Cybersécurité (GCYS) / Engineering program in Cybersecurity

Coordinatrice : Pr. LAZAAR Saiida

1. Objectifs de la formation

In today’s world, there is an ongoing surge of growth and progress, driven by rapid technological advancements and innovations. The need for digital data exchange has increased over the past decade, driven by the digital transition. It is therefore essential to secure digital data, networks, applications, and systems against cyber attacks. This degree is part of this perspective, the main objective is to acquire a strong knowledge of the concepts and techniques of cybersecurity.

The training will cover a very broad and specific spectrum of courses in the field of cybersecurity, and will revolve around IT, networks, and security based on cryptography and AI. In parallel, the training will cover methods and standards of cyber risk policy and management, threat intelligence, and security of Industry 4.0. This training enables individuals to develop a comprehensive understanding of the technical and technological environments in which companies operate and acquire advanced technical and methodological skills for cybersecurity. The cybersecurity experts will possess advanced technical skills in information systems to collect, identify, analyze, and interpret various cyber threats that may affect computers, mobile phones, connected objects, or industrial systems. They then define and implement an information systems security strategy to prevent or respond to encountered threats effectively. The graduates will have the essential assets to take charge of cybersecurity projects, and to participate in the development of solutions and approaches responding to the challenges launched in the cyber defense field, both nationally and internationally.  

2. Compétences à acquérir

This training will allow engineering students to acquire solid and cutting-edge skills in the field of cybersecurity. More specifically, skills will be acquired in information system security, applied cryptology, machine learning, intelligent systems, IoT security, web security, mobile application security, network and system security, data centers, system administration, and programming.

These skills will enable learners, and future business executives, to provide solutions in the field of security in the digital world, conduct cyber risk management studies, and propose reliable security policies. The skills acquired will meet the needs and expectations of different sectors of the country (academic, ministerial, technological, industrial, banking, etc.)  

Main technical skills to acquire:

  • Master the fundamental technical concepts of cybersecurity: safety mechanisms, cryptography, artificial intelligence tools for malware analysis …, intrusion detectors, norms, and standards ; 
  • Understand the ethical issues in computer security and pentesting ; 
  • Assess the IT security risks of an organization; 
  • Master malware analysis, malicious attack simulation tools, and threat intelligence ; 
  • Be able to perform IT security audits and conduct intrusion tests ; 
  • Master the technical and legal concepts of protecting an organization’s data and technological assets.

3. Débouchés de la formation

  • Cybersecurity expert, Systems and Network Engineer, Cryptologist Engineer, Artificial intelligence Engineer, Security Administrator, Cybersecurity Consultant, Project Manager, Cybersecurity Project Director, IS Manager, Security Designer / Architect, IS Security Manager, Cybersecurity Auditor, etc.       
  • Expert Cybersécurité, Ingénieur Systèmes et Réseaux, Ingénieur Cryptologue, Ingénieur Intelligence Artificielle, Administrateur Sécurité, Consultant Cybersécurité, Chef de Projets, Directeur de Projets Cybersécurité, Responsable SI, Concepteur / Architecte Sécurité, Responsable Sécurité SI, Auditeur Cybersécurité, etc.

4. Semestres

5. Sommaire des modules

Descriptif du Module n° :Intitulé du Module
M111Mathematics for Engineering: Numerical analysis Optimisation Statistics
M112Computer Architecture Analog Electronics And Digital Electronics
M113Databases and WEB
M114Object oriented programming UML Python Language
M115Network 1: Network Protocols & Network Interconnection
M116Management of Companies
M128Signal processing
M127P.O.O with Java and Data Structures
M128Mobile Operating systems
M128Networks 2: Advanced networks Network Administration Network programming
M127Fundamentals of cybersecurity and Cyber threats – General Data Protection Regulation
M127COMPANY MANAGEMENT I
M231Cryptography for cybersecurity and Network security
M236Network 3: IoT Security & Mobile Networks
M233ADMINISTRATION AND SYSTEM PROGRAMMING
M235Artificial Intelligence 1
M232Pentesting and Ethical hacking
M234MANAGEMENT II
M242Artificial Intelligence 2
M241OS security Web security
M244Audit Risk analysis
M246Virtualisation and data center Cloud administration
M245Anomaly and intrusion detection – Watermarking
M243LANGUAGE AND COMMUNICATION II
M353Cybersecurity for industry
M355Malware analysis Reverse engineering Digital forensics
M351Security management framworks
M354SWIFT and banking cybersecurity
M352Projects and preparation to certification
M356Management 3