Study the different standards, topologies and models of networks, cabling and connectivity devices.
International candidates must have at least a BAC or the equivalent of a secondary-level diploma. They must also have passed a recognized French language test (TEF, TFI, etc.) and obtained a result corresponding to our standards. Canadian students must have at least a secondary 5 diploma with strong mathematics (TS or SN) or equivalent training.
Professional Outlook
IT Security Analyst
Infrastructure Specialist
Network Administrator
Network Technician
Technologies Taught
Cisco, TCP/IP, Windows Server 2016, Linux, access and communications security, advanced security, etc.
Course Details
Operating System I
Install and configure a guest operating system (Windows 7) for individual or peer-to-peer local network use.
Operating System II
Install and administer a workstation using the GNU/Linux operating system.
Network Theory
Study the different standards, topologies and models of networks, cabling and connectivity devices.
Routing And Communication Principles
Install and configure a TCP/IP network with routers and network servers DNS, DHCP, etc.
Advanced Switching Functions
Study and configure Cisco products. RIP, IGRP, BGP, OSPF, VLAN, STP, VTP, ISL. Design of LAN and WAN networks.
Server II Operating System
Install, configure and administer, on a server using the GNU/Linux operating system, different types of applications or network servers (DNS, DHCP, FTP, NFS, NIS, APACHE, SAMBA, POSTFIX, SQUID, etc.)
Integration Project I
Install, configure, document and secure a network in a production environment.
Production Environment I
Introduction to the operation and configuration of Linux hosting servers with Apache and nginx. Give theoretical and practical knowledge on the use of certificates for websites. Understand how to use containers with Docker in a development environment.
Communications Security
Study of Microsoft's TMG Firewall/Proxy: proxy cache, secure publication of corporate servers (Web, DNS, SMTP/POP3), VPN, IPSEC, SSH, SSL, TLS, PGP, etc.
Advanced IT Security
Implement, on a server, different advanced security mechanisms such as Iptables, SSH, Snort, Tripwire, VPN, as well as the use of tools (Nessus, Nmap, Hping, etc.).
Virtual Infrastructures
Become familiar with advanced concepts of intrusion, detection, auditing and crisis management. Concretely address security in defense against cybercrime and cyberterrorism.
Integration Project II
Install, configure, document and secure a network in a production environment.
Dynamic Job Search Method
Become familiar with the job market. Produce the CV. Develop job search techniques.
End Of Studies Internship I
Consolidate the concepts acquired through concrete application of concepts and learning in a real situation.
The ISI school offers specialized and exclusive programs in computer science to ensure graduates technical proficiency and versatility in order to increase their chance of success in the job market.
This introductory course is designed for personnel who use software applications such as email, the WWW, or work in an organization of connected computers.
Do you love making networks work? The Network Architecture and Security Analytics (NASA) program at Sault College is designed to build on your already-amazing computer skills and deepen your knowledge in the design, operation, analysis, and security of enterprise networks.
Cyber Security course is offered by Liberty College Of Management. This course is designed to provide students an introduction to cybersecurity and understanding its basic concepts.
Imagine a world where you can use your skills to protect our cybersecurity and privacy. A place with no worries about your job stability, as we’re always adapting new technology for the best possible outcome in an ever-changing landscape of threats!
In collaboration with the employer community, we rapidly train essential skill sets required to secure high-paying entry-level information security jobs.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy