Study the different standards, topologies and models of networks, cabling and connectivity devices.
International candidates must have at least a BAC or the equivalent of a secondary-level diploma. They must also have passed a recognized French language test (TEF, TFI, etc.) and obtained a result corresponding to our standards. Canadian students must have at least a secondary 5 diploma with strong mathematics (TS or SN) or equivalent training.
Professional Outlook
IT Security Analyst
Infrastructure Specialist
Network Administrator
Network Technician
Technologies Taught
Cisco, TCP/IP, Windows Server 2016, Linux, access and communications security, advanced security, etc.
Course Details
Operating System I
Install and configure a guest operating system (Windows 7) for individual or peer-to-peer local network use.
Operating System II
Install and administer a workstation using the GNU/Linux operating system.
Network Theory
Study the different standards, topologies and models of networks, cabling and connectivity devices.
Routing And Communication Principles
Install and configure a TCP/IP network with routers and network servers DNS, DHCP, etc.
Advanced Switching Functions
Study and configure Cisco products. RIP, IGRP, BGP, OSPF, VLAN, STP, VTP, ISL. Design of LAN and WAN networks.
Server II Operating System
Install, configure and administer, on a server using the GNU/Linux operating system, different types of applications or network servers (DNS, DHCP, FTP, NFS, NIS, APACHE, SAMBA, POSTFIX, SQUID, etc.)
Integration Project I
Install, configure, document and secure a network in a production environment.
Production Environment I
Introduction to the operation and configuration of Linux hosting servers with Apache and nginx. Give theoretical and practical knowledge on the use of certificates for websites. Understand how to use containers with Docker in a development environment.
Communications Security
Study of Microsoft's TMG Firewall/Proxy: proxy cache, secure publication of corporate servers (Web, DNS, SMTP/POP3), VPN, IPSEC, SSH, SSL, TLS, PGP, etc.
Advanced IT Security
Implement, on a server, different advanced security mechanisms such as Iptables, SSH, Snort, Tripwire, VPN, as well as the use of tools (Nessus, Nmap, Hping, etc.).
Virtual Infrastructures
Become familiar with advanced concepts of intrusion, detection, auditing and crisis management. Concretely address security in defense against cybercrime and cyberterrorism.
Integration Project II
Install, configure, document and secure a network in a production environment.
Dynamic Job Search Method
Become familiar with the job market. Produce the CV. Develop job search techniques.
End Of Studies Internship I
Consolidate the concepts acquired through concrete application of concepts and learning in a real situation.
The ISI school offers specialized and exclusive programs in computer science to ensure graduates technical proficiency and versatility in order to increase their chance of success in the job market.
Network security is to protect the safety and reliability of a network and its data. Also network security manages access to a network by stopping a variety of threats from entering and spreading through a system.
Do you love making networks work? The Network Architecture and Security Analytics (NASA) program at Sault College is designed to build on your already-amazing computer skills and deepen your knowledge in the design, operation, analysis, and security of enterprise networks.
This 5-day hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture.
Cybersecurity Course Breakdown This course will provide you comprehensive knowledge and skills to protect computer systems, networks and data from unauthorized access, attacks and threats. It covers all the mentioned topics.
Computer Network & Cyber Security Engineer (CNCSE) are offered by Computek College of Business, Healthcare & Technology.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy