Objectives
In today’s world, there is an ongoing surge of growth and progress, driven by rapid technological advancements and innovations. The need for digital data exchange has increased over the past decade, driven by the digital transition. It is therefore essential to secure digital data, networks, applications, and systems against cyber attacks. The present program is part of this perspective, the main objective is to acquire a strong knowledge of the concepts and techniques of cybersecurity.
The training will cover a broad and specific spectrum of courses in the field of cybersecurity and will revolve around IT, networks, applied cryptography, AI, and Generative Adversarial Networks. In parallel, the training will cover methods and standards of cyber risk policy and management, threat intelligence, web and IoT security, DevSecOps, Ethical hacking, forensics, and security of Industry installations. This training enables individuals to develop a comprehensive understanding of the technical and technological environments in which companies operate and acquire advanced technical and methodological skills for cybersecurity. The cybersecurity experts will possess advanced technical skills in information systems to collect, identify, analyze, and interpret various cyber threats that may affect computers, mobile phones, connected objects, or industrial systems. They will be able to define and implement an Information systems security strategy to prevent or respond to encountered threats effectively. The graduates will have the essential assets to take charge of cybersecurity projects, and to participate in the development of solutions and approaches responding to the challenges launched in the cyber defense field, both nationally and internationally.
Skills
This training will allow engineering students to acquire solid and cutting-edge skills in the field of cybersecurity and cyberintelligence. More specifically, skills will be acquired in information system security, cyber threat intelligence, forensics, ethical hacking, forensics, pentesting, IoT security, web security, mobile application security, and network and information system security. These skills will enable learners, and future business executives, to provide solutions in the field of cybersecurity, conduct cyber risk management studies, and propose reliable security policies. The skills acquired will meet the needs and expectations of different sectors of the country (academic, ministerial, technological, industrial, banking, etc.)
Main technical skills to acquire :
- Master fundamental technical concepts of cybersecurity, including safety mechanisms for Web, Mobile Apps, IoT, IIoT, etc., and compliance with norms and standards, enabling effective work within a Security Operation Center (SOC) ;
- Understand and navigate ethical issues in computer security and penetration testing ;
- Assess IT security risks for organizations comprehensively ;
- Excel in malware analysis, using tools for simulating malicious attacks, and gathering threat intelligence ;
- Perform security audits and conduct rigorous intrusion tests ;
- Master both the technical and legal aspects of data protection.
Career Opportunities
- Cybersecurity Analyst ;
- Penetration Tester (Ethical Hacker) ;
- Security Consultant ;
- Incident Response Specialist ;
- Security Architect ;
- Cyber Forensic Analyst ;
- Threat Intelligence Analyst ;
- Security Operations Center (SOC) Analyst ;
- Compliance and Risk Analyst ;
- Chief Information Security Officer (CISO) ;
- Network Security Engineer ;
- Cloud Security Specialist ;
- IoT Security Specialist ;
- Application Security Engineer ;
- Cyber Policy Advisor ;
- Cybersecurity Entrepreneur ;
- Data Privacy Officer ;
- Academic or Trainer in Cybersecurity.
Public Concerned
Diplomas required :
- 2 Preparatory Years for the Engineering Cycle
Specialization :
Any specialization justifying the prerequisites for access to the program.
Prerequisites :
- Mathematics , Algorithmics and C Language
Training Program
Semestres | Modules | Volume Horaire | Nb Crédits | Département d’Attache | Coordinateur |
Semestre 1 | M117 : Mathematics for Engineering 1 | 54 | 5 | MI | Pr. AMAL Youssef |
M111 : Databases and WEB | 54 | 5 | MI | Pr. KHANNOUS Anass | |
M112 : Object Oriented Design & Python Programming | 54 | 5 | MI | Pr. EL ALAMI HASSOUN Mohammed | |
M113 : Network Fundamentals | 54 | 5 | MI | Pr. TANANA Mariam | |
M114 : Electronics – Computer Architecture | 54 | 5 | SIC | Pr. BELMOKADEM Houda | |
M115 : Foreign Languages 1 | 48 | 3 | LCM | Pr. LAAMARTI Latifa | |
M116 : Digital Technologies | 54 | 3 | MI | Pr. GOUY Rabia | |
Semestre 2 | M121 : Fundamentals of Cybersecurity | 54 | 5 | MI | Pr. LAZAAR Saiida |
M126 : Java and Data Structures | 54 | 5 | MI | Pr. KHANNOUS Anass | |
M122 : Operating Systems | 54 | 5 | MI | Pr. BOUCHKAREN Said | |
M123 : Advanced Networking Concepts | 54 | 5 | MI | Pr. BOUCHKAREN Said | |
M125 : Mathematics for Engineering 2 | 54 | 4 | MI | Pr. AMAL Youssef | |
M124 : Foreing Languages 2 | 48 | 3 | LCM | Pr. LAAMARTI Latifa | |
M127 : History of Science and Digital Design | 48 | 3 | MI | Pr. AMECHNOUE Khalid | |
Semestre 3 | M236 : Cryptography for Cybersecurity | 54 | 5 | MI | Pr. LAZAAR Saiida |
M237 : System Administration and System Programming | 52 | 5 | MI | Pr. AMECHNOUE Khalid | |
M234 : Intelligence Computing | 54 | 5 | MI | Pr. EL ALAMI HASSOUN Mohammed | |
M233 : Pentesting and Ethical Hacking | 54 | 5 | MI | Pr. SBAYTRI Youssef | |
M235 : IoT and Wireless Networks | 54 | 4 | MI | Pr. TANANA Mariam | |
M231 : Foreing Languages 3 | 48 | 3 | LCM | Pr. LAAMARTI Latifa | |
M232 : Augmented Reality | 54 | 3 | MI | Pr. LAZAAR Saiida | |
Semestre 4 | M247 : DevOps and DevSecOps | 54 | 5 | MI | Pr. BOUCHKAREN Said |
M242 : Cloud Computing | 54 | 4 | MI | Pr. KHANNOUS Anass | |
M241 : Foreing Languages 4 | 48 | 3 | LCM | Pr. LAAMARTI Latifa | |
M243 : Management | 63 | 3 | LCM | Pr. RAHALI EL AZZOUZI Saida | |
M2410 : Intelligence Computing II | 54 | 5 | MI | Pr. EL ALAMI HASSOUN Mohammed | |
M249 : Advanced Web and Web Security | 54 | 5 | MI | Pr. BOUCHKAREN Said | |
M248 : Advanced Cryptography and Applications | 54 | 5 | MI | Pr. LAZAAR Saiida | |
Semester 5 | OPTION : Cyber Threat Intelligence | ||||
M357 : Digital Forensics and Governance | 54 | 5 | MI | Pr. BOUCHKAREN Said | |
M354 : Project, Internship and Professional Meetings | 50 | 4 | MI | Pr. LAZAAR Saiida | |
M353 : Cyber Threat Intelligence and Incident Responses | 54 | 5 | MI | Pr. LAZAAR Saiida | |
M352 : Blockchain and Distributed Ledger Technology | 54 | 5 | MI | Pr. KHANNOUS Anass | |
M356 : Industrial Systems and Security | 54 | 5 | MI | Pr. TANANA Mariam | |
M359 : Foreign Languages 5 | 54 | 3 | LCM | Pr. LAAMARTI Latifa | |
M359 : Employement Skills | 63 | 3 | LCM | Pr. HARIS Nadia | |
OPTION : Cyberdefense and Information Security | |||||
Digital Forensics and Governance | 54 | 5 | MI | Pr. BOUCHKAREN Said | |
Project, Internship and Professional Meetings | 50 | 4 | MI | Pr. LAZAAR Saiida | |
Cyber Threat Intelligence and Incident Responses | 54 | 5 | MI | Pr. LAZAAR Saiida | |
Generative Adversarial Networks and Adversarial Attack Detection | 54 | 5 | MI | Pr. EL ALAMI HASSOUN Mohammed | |
Security Management Frameworks | 54 | 5 | MI | Pr. SBAYTRI Youssef | |
Foreign Languages 5 | 54 | 3 | LCM | Pr. LAAMARTI Latifa | |
Employement Skills | 63 | 3 | LCM | Pr. HARIS Nadia | |
Semestrer 6 | END-TERM PROJECT |
Coordinateur Pédagogique
- Pr. LAZAAR Saiida
- Email : slazaar@uae.ac.ma