{"id":6286,"date":"2023-08-24T08:25:35","date_gmt":"2023-08-24T07:25:35","guid":{"rendered":"https:\/\/ensak.usms.ac.ma\/ensak\/?page_id=6286"},"modified":"2023-08-24T23:17:37","modified_gmt":"2023-08-24T22:17:37","slug":"lpu-icc","status":"publish","type":"page","link":"http:\/\/ensak.usms.ac.ma\/ensak\/lpu-icc\/","title":{"rendered":"Licence Professionnelle d\u2019Universit\u00e9 : Ing\u00e9nierie de la cybers\u00e9curit\u00e9 et cyberd\u00e9fense (ICC)"},"content":{"rendered":"<div id=\"pl-6286\"  class=\"panel-layout\" ><div id=\"pg-6286-0\"  class=\"panel-grid panel-has-style\" ><div class=\"container panel-row-style panel-row-style-for-6286-0\" ><div id=\"pgc-6286-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-6286-0-0-0\" class=\"so-panel widget widget_text panel-first-child\" data-index=\"0\" ><h3 class=\"widget-title\">Objectifs de la formation<\/h3>\t\t\t<div class=\"textwidget\"><p>\nLa licence universitaire Ing\u00e9nierie de la Cybersecurit\u00e9 et Cyberd\u00e9fense ICC est une formation technique pr\u00e9parant aux m\u00e9tiers de la s\u00e9curit\u00e9 du num\u00e9rique pour des \u00e9tudiants visant une insertion professionnelle imm\u00e9diate \u00e0 Bac+3. En sortie de la formation, les \u00e9tudiants dipl\u00f4m\u00e9s auront les comp\u00e9tences pour pouvoir directement viser des m\u00e9tiers comme technicien s\u00e9curit\u00e9, administrateur de solutions de s\u00e9curit\u00e9 et analyste SOC. Ils auront aussi \u00e9t\u00e9 sensibilis\u00e9s aux m\u00e9tiers de coordinateur s\u00e9curit\u00e9, d\u2019auditeur technique en s\u00e9curit\u00e9, de pentesteur et d\u2019analyste forensic, et seront donc capable d\u2019accomplir des t\u00e2ches simples li\u00e9es \u00e0 ces m\u00e9tiers. ICC offre des formations point\u00e9es et tr\u00e8s demand\u00e9es dans le march\u00e9 de travail telles : la Cybers\u00e9curit\u00e9, les r\u00e9seaux intelligents, et le Management SI. Le programme de\nformation est orient\u00e9 vers la ma\u00eetrise des r\u00e9f\u00e9rentiels les plus reconnus en mati\u00e8re de la Cybers\u00e9curit\u00e9 (CCNA, Huawei, CEH, ISO27K, Fortinet, \u2026).\n<\/p><\/div>\n\t\t<\/div><div id=\"panel-6286-0-0-1\" class=\"so-panel widget widget_text panel-last-child\" data-index=\"1\" ><h3 class=\"widget-title\">Chronogramme de la formation<\/h3>\t\t\t<div class=\"textwidget\"><ul class=\"bullet\">\n<li>Pr\u00e9-inscriptions en ligne sur ce site : <b>15\/08 au 25\/09\/2023<\/li><\/b>\n<li>Etude des dossiers et Entretiens : <b>26\/09 au 28\/09\/2023<\/li><\/b>\n<li>Inscription Administrative: <b>29\/09 au 02\/10\/2023<\/li><\/b>\n<li>Semestre 1: <b>15\/10\/2023 au 31\/01\/2024<\/li><\/b>\n<li>Semestre 2: <b>03\/02 au 31\/07\/2024<\/li><\/b>\n<\/ul><\/div>\n\t\t<\/div><\/div><div id=\"pgc-6286-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-6286-0-1-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"2\" ><h3 class=\"widget-title\">l&rsquo; ICC<\/h3>\t\t\t<div class=\"textwidget\"><img src=\"\/ensak\/wp-content\/uploads\/2023\/08\/ICC.png\" alt=\"BMD\" \/>\n<p><\/p>\t\nVous pouvez t\u00e9l\u00e9charger la brochure de la formation :\n<center><a target=\"_blank\" class=\"btn btn-orange btn-large\" href=\"\/ensak\/wp-content\/uploads\/2023\/08\/ICC_Brochure.pdf\" rel=\"noopener\">Brochure<i class=\"lnr lnr-arrow-right\"><\/i><\/a><\/center><\/div>\n\t\t<\/div><\/div><\/div><\/div><div id=\"pg-6286-1\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-6286-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-6286-1-0-0\" class=\"so-panel widget widget_edupress-university-aboutus-how-it-works panel-first-child panel-last-child\" data-index=\"3\" ><div class=\"so-widget-edupress-university-aboutus-how-it-works so-widget-edupress-university-aboutus-how-it-works-default-d75171398898-6286\"><section class=\"howitworks\">\r\n            <div class=\"container\">\r\n                 <div class=\"row\">  \r\n                                     \t<h2 class=\"text-center head-border-default\">Inscription<\/h2>\r\n                                        <div class=\"col-xs-12 col-sm-8 col-sm-offset-2 col-md-6 col-md-offset-3\">\r\n                                         <p class=\"text-center\"><b>Le dossier d'inscription se compose des pi\u00e8ces suivantes : <br \/>\n\u2022\tUn curriculum vitae ;<br \/>\n\u2022\t01 copie de la CIN ou des premi\u00e8res pages du passeport ;<br \/>\n\u2022\t02 copies du baccalaur\u00e9at ;<br \/>\n\u2022\t02 copies du dipl\u00f4me ou attestation Bac+2.<\/b><\/p>\r\n                                 \t\t<\/div>\r\n                    \r\n                <div class=\"work-steps\">  \r\n                \t\t                         <div class=\"col-xs-12 col-sm-4\">\r\n                        \t<div class=\"steps\" style=\"background-color: #e91e63;\">\r\n                                                        <h3>Dure\u00e9 de la Formation<\/h3>\r\n                                                                                     <p>1 Ann\u00e9e<\/p>\r\n                                                        <span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf017;\"\n\t\t ><\/span>                            <\/div>\r\n                        <\/div> \r\n                                                 <div class=\"col-xs-12 col-sm-4\">\r\n                        \t<div class=\"steps\" style=\"background-color: #03a9f4;\">\r\n                                                        <h3>D\u00e9but de la Formation<\/h3>\r\n                                                                                     <p>15-10-2023<\/p>\r\n                                                        <span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf073;\"\n\t\t ><\/span>                            <\/div>\r\n                        <\/div> \r\n                                                 <div class=\"col-xs-12 col-sm-4\">\r\n                        \t<div class=\"steps\" style=\"background-color: #673ab7;\">\r\n                                                        <h3>Mode de la formation<\/h3>\r\n                                                                                     <p>En pr\u00e9sentiel et \/ ou \u00e0 distance<\/p>\r\n                                                        <span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf02d;\"\n\t\t ><\/span>                            <\/div>\r\n                        <\/div> \r\n                                                \r\n                 <\/div> <!-- work-steps #end -->    \r\n                    \r\n                  <div class=\"work-steps\"> \r\n                    <div class=\"action text-center \">\r\n                    \t                     \t<span>Pr\u00e9-Inscription ouvertes<\/span> \r\n                                                                          <a href=\"https:\/\/forms.gle\/LpwDTdCWFpf1E36h9\" class=\"btn btn-orange btn-large\">Insciption<i class=\"lnr lnr-arrow-right\"><\/i><\/a>\r\n                                             <\/div>\r\n                  <\/div>   <!-- work-steps #end -->\r\n                  \r\n            \t <\/div> <!--row #end  -->\r\n\t        <\/div><!-- container #end -->\r\n <\/section><\/div><\/div><\/div><\/div><div id=\"pg-6286-2\"  class=\"panel-grid panel-has-style\" ><div class=\"container panel-row-style panel-row-style-for-6286-2\" ><div id=\"pgc-6286-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-6286-2-0-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"4\" >\t\t\t<div class=\"textwidget\"><h2 style=\"color: #2f519e;\">Lieu de formation<\/h2>\n<ul class=\"bullet\" style=\"margin-left: 30px;\">\n<li>ENSA Khouribga<\/li>\n<\/ul>\n<h2 style=\"color: #2f519e;\">D\u00e9bouch\u00e9s<\/h2>\n<p>La formation pr\u00e9pare les \u00e9tudiants directement aux m\u00e9tiers d\u2019administrateur de solutions de s\u00e9curit\u00e9, de technicien<br \/>\ncybers\u00e9curit\u00e9, d&rsquo;analyste SOC (niveau 1) et de coordinateur s\u00e9curit\u00e9.<br \/>\nLes comp\u00e9tences d\u00e9velopp\u00e9es pendant la formation permettent de viser \u00e0 terme, avec plus d\u2019exp\u00e9rience professionnelle, des m\u00e9tiers comme auditeur technique en s\u00e9curit\u00e9, de pentesteur et d\u2019analyste forensique.<\/p>\n<ul class=\"bullet\" style=\"margin-left: 30px;\">\n<li>Administrateur (trice) cybers\u00e9curit\u00e9<\/li>\n<li>Administrateur (trice) s\u00e9curit\u00e9 informatique<\/li>\n<li>Auditeur \/ Pentester<\/li>\n<li>SOC Analyst<\/li>\n<li>Administrateur (trice) des syst\u00e8mes et r\u00e9seaux,<\/li>\n<li>Administrateur (trice) d&rsquo;infrastructures,<\/li>\n<li>Administrateur (trice) cybers\u00e9curit\u00e9,<\/li>\n<li>Responsables informatiques des PME,<\/li>\n<li>Responsable de la s\u00e9curit\u00e9 informatique de l&rsquo;entreprise,<\/li>\n<li>Architecte et administrateur de r\u00e9seaux,<\/li>\n<li>Responsable s\u00e9curit\u00e9 et qualit\u00e9 r\u00e9seaux,<\/li>\n<li>Consultant en s\u00e9curit\u00e9,<\/li>\n<li>Consultant en cybers\u00e9curit\u00e9,<\/li>\n<li>Consultant solutions r\u00e9seaux,<\/li>\n<li>Analyste d\u2019exploitation,<\/li>\n<li>Int\u00e9grateur syst\u00e8mes et s\u00e9curit\u00e9<\/li>\n<li>Conseiller client\u00e8le.<\/li>\n<\/ul>\n<h2 style=\"color: #2f519e;\">Contenu p\u00e9dagogique<\/h2>\n<p><strong>S1<\/strong><\/p>\n<ul class=\"bullet\" style=\"margin-left: 30px;\">\n<li>Traitement de l\u2019information Communication Num\u00e9rique<\/li>\n<li>Algorithmique et programmation Python<\/li>\n<li>CISCO CCNA : Routing &amp; Switching<\/li>\n<li>Administration des R\u00e9seaux et Syst\u00e8mes<\/li>\n<li>Bases de donn\u00e9es et Programmation Web<\/li>\n<\/ul>\n<p><strong>S2<\/strong><\/p>\n<ul class=\"bullet\" style=\"margin-left: 30px;\">\n<li>S\u00e9curit\u00e9 R\u00e9seaux (Certification Fortinet NSE)<\/li>\n<li>Cybersecurit\u00e9 et Ethical Hacking<\/li>\n<li>R\u00e9seaux Nouvelle g\u00e9n\u00e9ration 5G et S\u00e9curit\u00e9<\/li>\n<li>Cyberd\u00e9fense et SMSI (ISO 27000)<\/li>\n<li>Projet de Fin d\u2019Etudes<\/li>\n<\/ul>\n<h2 style=\"color: #2f519e;\">D\u00e9roulement des enseignements<\/h2>\n<p>Les enseignements sont programm\u00e9s lors des <b>week-ends<\/b> selon les horaires suivants:<\/p>\n<ul class=\"bullet\" style=\"margin-left: 30px;\">\n<li>Matin 9:00h \u00e0 12:00h<\/li>\n<li>Apr\u00e8s-midi 13:00h \u00e0 16:00h<\/li>\n<\/ul>\n<h2 style=\"color: #2f519e;\">Frais de scolarit\u00e9<\/h2>\n<p>Co\u00fbt de formation: 20000 DH<br \/>\nNB : Frais du dossier d\u2019inscription : 600 DH<\/p>\n<h2 style=\"color: #2f519e;\">Responsable de la formation<\/h2>\n<p style=\"color: #2f519e;\"><b>Pr. MOUNIR Soufyane<\/b><\/p>\n<ul class=\"bullet\" style=\"margin-left: 30px;\">\n<li>E-mail : <a href=\"s.mounir@usms.ma\">s.mounir@usms.ma<\/a><\/li>\n<li>T\u00e9l : 06\u00a008 97 89 14<\/li>\n<\/ul>\n<\/div>\n\t\t<\/div><\/div><\/div><\/div><div id=\"pg-6286-3\"  class=\"panel-grid panel-has-style\" ><div class=\"container panel-row-style panel-row-style-for-6286-3\" ><div id=\"pgc-6286-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-6286-3-0-0\" class=\"so-panel widget widget_edupress-university-aboutus-partnering-with-us panel-first-child panel-last-child\" data-index=\"5\" ><div class=\"so-widget-edupress-university-aboutus-partnering-with-us so-widget-edupress-university-aboutus-partnering-with-us-default-d75171398898-6286\"><section class=\"col-xs-12 partnering-with-us\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n                \t\t<\/div> <!--row #end  -->\r\n\t<\/div><!-- container #end -->\r\n<\/section><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>La licence universitaire Ing\u00e9nierie de la Cybersecurit\u00e9 et Cyberd\u00e9fense ICC est une formation technique pr\u00e9parant aux m\u00e9tiers de la s\u00e9curit\u00e9 du num\u00e9rique pour des \u00e9tudiants visant une insertion professionnelle imm\u00e9diate \u00e0 Bac+3. En sortie de la formation, les \u00e9tudiants dipl\u00f4m\u00e9s auront les comp\u00e9tences pour pouvoir directement viser des m\u00e9tiers comme technicien s\u00e9curit\u00e9, administrateur de solutions [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/tpl-pagebuilder.php","meta":{"ngg_post_thumbnail":0,"cybocfi_hide_featured_image":""},"acf":[],"_links":{"self":[{"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/pages\/6286"}],"collection":[{"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/comments?post=6286"}],"version-history":[{"count":11,"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/pages\/6286\/revisions"}],"predecessor-version":[{"id":6301,"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/pages\/6286\/revisions\/6301"}],"wp:attachment":[{"href":"http:\/\/ensak.usms.ac.ma\/ensak\/wp-json\/wp\/v2\/media?parent=6286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}