#cybersecurity #systems #networks #IT

Path to become a cybersecurity administrator 

Cybersecurity

Professional title from the French department of Labor “networks and systems superior technician”

 

 

 

En un coup d'oeil

  • Length

    March 1st, 2022, to July 22nd 2022. 

    640 hours

  • Requirements / level of admission

    “Bacalauréat” job seeker knowing how to use computers or having a first experience with IT

  • Diploma

    networks and systems superior technician acknowledged by the French state (level 5)

  • Admission requirements

    Admission in 3 steps: 

    • Evaluation test of skills
    • English test
    • Professional motivation interview
  • Cost of the training

    Training paid by the “Région grand-Est” and by the European Union with the European Social Fund. We invite you to reach a counselor to validate your application eligibility. 

  • Rhythm

    500 hours in the training center and 140 hours in company. 

Presentation

Become a cybersecurity administrator

Become a cybersecurity administrator

Cybersecurity challenges become more and more priority for companies, subject to malwares and data theft. The training to become a cybersecurity administrator is gearing up to this field jobs. It addresses more precisely to job seekers from the IT field looking for an enhancement of their practice in sight of their entrance to employment and issued from other professional fields in reconversion process. 

  • Technician: support, systems and computer, operating networks
  • Administrator: SME systems, networks

ICAM Strasbourg – Europe offers you an access to Cybersecurity administrator job in two stages. 

  • In a first stage, a preparatory training allows you to obtain the “TSSR” validate by the tittle “networks and systems superior technician” level 5. 
  • In a second stage, after validation, the training allows you to integrate the path “secured infrastructures administrator” level 6. 

Program

This training validates the area of expertise asked for the secured administration of an information system.

It allows a reconversion toward system administration jobs with cybersecurity high exposure risks while appropriating frameworks and their application to networks and systems, data and hardware.

Detailed program

Communication and company: 50h

Job search methods

Know to organize the job search
Write an impacting resume
Prepare and succeed a job interview – coaching
Work with a professional coach: stress management, self confidence
Face tough situation – English
Communicate in spoken and written English in professional situation
Development of comprehension, expression, and interaction skills
Contents will be adapted by the teacher regarding the group’s level
The oral and written comprehension, the oral and written expression, oral interaction, English corporate and professional grammar, and lexicon will be worked based on communication situation.
Work can be individual or collective and can be support by activities in collaboration between students in small groups 

Informatics in Cybersecurity project management: 90h

ITIL presentation
Master key concepts of the ITIL work framework
Advocate improvements in terms of organization, management, process
Establish a quality process through creation and monitoring

Security generality
Cyber criminality introduction
Presentation of all the risks and dangers (virus, malware, …)
Presentation of frameworks and good practices
Learn to sensibilize users 

Project management
Master the UML tool
Software lifecycle models: cascade model, V model, spiral model
IT project documentation: expression of needs, terms of reference, technical specification, recipe book
Test campaign
Agile project management with SCRUM: project life cycle, agile team organization; agile artefacts: backlog, Kanban chart, tasks cards

IT fundamentals: 81h 

Algorithm introduction
Understand computers operating principles, programing, and algorithm basics
Master the notions of variables, type, affectation, conditionals, loops, functions, …
Know to interpret error messages and correct errors while using especially a debugger
Being able to understand an algorithm and translate it in a programing language
Python basics

Relational data base
Conception of relational patterns: dependences between data, conception process, normal forms, normalization process
Relational algebra: definition of a N-aire relation, definition of a N-uplet relation
SQL language: definition, creation use, interrogation and update of data base
Basics data base management: definition, use example, practical work 

“Development of a web app” project
Implement the project management skills, algorithm, and data base to achieve a web app development project end-to-end, from the customer need input

Administration of users’ stations: 74h

Exploitation systems administration

Obtain knowledges on the general architecture of an IT system and on the composition of a computer
Know and understand different exploitation systems
Know the files management system on a computer
Being able to install and operate stations under different exploitation systems (Linux, Windows)

Windows client administration and securitization
Basic installation and administration of a Windows exploitation system
Realize the level 1 support to users
Windows’ network services administration
Collaborative resources administration
Set up and supervise the save and restauration process
Set up security measures of the workstation
Set up supervision and maintain of security on the workstation
Incidence and issues resolution management

Linux client Administration and securitization
Basic installation and administration of a Linux exploitation system
Realize the level 1 support to users
Administration of network services
Collaborative resources administration
Set up and supervise the save and restauration process
Set up security measures of the workstation
Set up supervision and maintain of security on the workstation
Incidence and issues resolution management

Administrate and secure a centralized infrastructure: 111h 

Introduction to TCP/IP networks Cybersecurity
Conception of a PME network: structure, IP addressing
Communication protocols: TCP IP Network services: DHCP, DNS, OSI model, HTTP, socket notion
IP telephony
Energetic performance implied by servers’ configuration, AC methods, datacenters conceptions
Security criterions: availability, integrity, confidentiality
Threats: user, malicious person
Security techniques ways

Microsoft network administration and securitization
Install, set up, and configure servers’ stations: file system, account and group of users, rights, tools and basics command, app, desktop (Active Directory)
Administration of Windows network
Set up and supervise save and restauration process
Set up network security measures
Set up supervision and maintain server’s security

Linux network administration and securitization
Install, set up, and configure servers’ stations: file system, account and group of users, rights, tools and basics command, app, desktop (LDAP)
Administration of network services
Set up and supervise save and restauration process
Set up network security measures
Set up supervision and maintain server’s security

“Set up a company network” project
Set up up skills in system administration (Linux/Windows) and the networks knowledges to realize end-to-end the set-up of a small network answering customers’ needs and assure a good installation et good configuration of network and client workstation 

Automatization of process, Cloud Computing & Virtualization: 79h

Scripting
Understand interpreters principles of command and script languages
Master basic Linux commands and being able to write a shell script (Linux Bash)

Cloud computing & Virtualization
Know fundamentals notions of Cloud Computing and Virtualization
Know the existing solutions and tools
Being able to set up virtual networks
Administrate virtual storage (volume, snapshots, …)
Setup, supervise and maintain security measures in a virtual environment
“Tasks automatization in a Cloud environment” Project
Set up skills in scripting and acquired knowledges in Cloud
Computing & Virtualization while realizing a script allowing automatization of security tasks in a Virtual or cloud environment. 

Communication and Company (44,5h)

English (37,5h)
Communicate in oral and written English in professional contexts
Development of comprehension, expression, and interaction skills
Contents will be adapted by the teacher regarding the group level
The oral and written comprehension, the written and oral expression, the oral interaction, the English corporate and professional world grammar and lexical will be worked from communication situation. The work can be done individually or collectively and can rely on collaborative activities in small students group. 

Internship (140h)

Learning tools

  • Alternation of theory and supervised works: in class courses, distance class, practical work, supervised work, based on an organization (schedule, training place, teachers,..) operated by the ICAM Strasbourg- Europe

 

  • A module “job search practices” allow you to value your abilities and professional skills and prepare you for the job research. A personalized coaching is offered to you, which modalities will be specified by the coach during your module first session. 

Profile:

This training is addressed to job seekers with a “Bacalauréat” degree knowing how to use computers or having a first experience with IT

 

Prerequisite: 

  • Good capacity for abstraction
  • Good logic ability 
  • Intermediary knowledge of English (level A2+ from the CECRL)
  • Advanced uses of computers 

Costs and financing

Admission: 

The admission process is in 3 stages: 

  • Evaluation test of skills
  • English test
  • Professional motivation interview

Financing: 

The training is paid by the “Région grand-Est” and by the European Union with the European Social Fund. We invite you to reach a counselor to validate your application eligibility. 

Financing professional training

Operation financed by the “Région Grand-Est”

 

The two trainings of the path to become a cybersecurity administrator are co-financed by the European Union with the European social fund

 

Contact

We are here to guide you

All our team is ready to discuss and answer your questions.

Icam, site de Strasbourg-Europe
Espace Européen de l’Entreprise
2, Rue de Madrid
67300 SCHILTIGHEIM
CS 20013
67012 Strasbourg CEDEX

Switchboard: +33 (0)3 90 40 09 63
Admissions: +33 (0)3 90 40 29 90

Nos autres formations