Aller au contenu

Description of IT and cybersecurity courses taught in French

BLOCK 1: Optional educational activities common to course-type pathways

Educational objective(s)

From an analytical perspective, experiment with and apply the theoretical knowledge learned in the classroom at a workplace. Learn about the work methods of a public body or private company. Show proficiency at writing an internship report that meets the requirements of company-based technical writing or scientific research.

Content

Complete an internship at a placement site to learn about a company's work methods and organizational culture and take part in its activities as a highly qualified professional. Write an internship report describing the scope of your duties, the results of the internship, and a critical analysis of the work carried out. The internship is done under an internship supervisor.

Prerequisite(s)

Have completed 18.00 credits

Educational objective(s)

Write a report on an independent study topic; demonstrate your ability to systematically examine a topic related to IT, bioinformatics, or digital media and imaging.

Content

Write an essay whose content will vary depending on the topic chosen. This essay must include a critical overview of relevant sources and references; a theoretical and critical analysis appropriate to the topic; knowledge synthesis and sharing; and comprehensive conclusions. The paper may be submitted using an essay formatting tool that adheres to the submission requirements.

Prerequisite(s)

Have completed 27.00 credits

BLOCK 2: Mandatory educational activity

Educational objective(s)

Learn the theoretical foundations of cryptography and be able to correctly use modern primary cryptographic systems. Become familiar with various applications of modern cryptography, particularly to secure information on networks. Get an overview of advanced theoretical applications of cryptography.

Content

Classical and modern cryptography. Private and public key systems. Digital signature and key distribution. Pseudorandom generation, hash functions, one-way functions and hidden gates. Practical implementations. Confidentiality, authentication, identification, integrity. Coin flipping, commitment scheme, oblivious transfer, zero-knowledge proof, and secret sharing. Introduction to secure multiparty computation, information theory, and quantum cryptography.

BLOCK 3: Optional educational activity

Educational objective(s)

Learn about machine learning techniques in artificial intelligence.

Content

Basic concepts of machine learning, probabilistic numerical computation, linear regression, linear classification, kernel trick, maximum margin classifier and support vector machines, Bayesian learning, Gaussian mixture model, EM algorithm, dimensionality reduction, model combination, sampling methods, and machine learning theory.

Educational objective(s)

Understand and master basic data-science theories and methods.

Content

Statistical inference: basic statistical procedures, estimation of model parameters, hypothesis testing of a model’s structural features, confidence intervals for model parameters. Data mining techniques: exploratory data analysis, preprocessing, visualization, association rule search and extraction, classification and prediction, cluster analysis. Information searches: premise, basic concepts, indexing, search engines. Applications in fields such as health, business intelligence, social networks and finance.

Educational objective(s)

Know how to use formal notations; read and understand formal specifications; choose between different formal specification methods; use formal methods to specify systems and analyze system properties.

Content

Reminder of mathematical tools used for the formal specification of systems. Temporal logics. Petri nets. Formal specification languages: CSP, VDM, Z, Telos, Larch, OBJ, EB3. Modelling and formal system specification. Case studies and power of expression. Transformation of specifications. Analysis of specification properties.

Educational objective(s)

Understand the concepts related to building a data warehouse. Understand the concepts related to data mining and the role of mining to build a data warehouse. Build a data warehouse and apply data mining techniques to the warehouse.

Content

Definitions and relationships to a company’s business environment. Overview of issues and definition of needs. Warehouse characteristics and architecture. Metadata. Multidimensional models. Schematics. Warehouse construction process. Mining characteristics. Models and algorithms. Mining process. Mining limitations, challenges and tools. Choice of constituent components.

BLOCK 4: Optional educational activity

Educational objective(s)

Develop knowledge of business continuity management and situate the sector within a risk management framework. Learn about all kinds of norms and standards for risk management and business continuity management. Study various recognized professional practices in the industry as well as the implementation cycle of a continuity management program.

Content

Relationship between internationally recognized business continuity and risk management practices; continuity management norms and standards within an organization and its governance system; audit of a business continuity management program. Identify the components of a business continuity management program; the process of implementing a continuity management program; and an assessment of an organization's progress in implementing this type of program.

Prerequisite(s)

(DAT802) and (DAT823)

Equivalent(s)

DAT816

Educational objective(s)

Master the models and best practices required to understand and evaluate strategies, policies, norms, procedures and practices related to IT management, planning and organization.

Content

IT and IS planning and management; IT and IS strategic planning; current issues in IT and IS management; methodological frameworks and support tools; auditor approaches and techniques in these areas.

Prerequisite(s)

(DAT802) and (DAT823)

Educational objective(s)

Describe the information requirements and performance indicators for cybersecurity management and how they align with business concerns. Understand the relationship between reporting information and organizational performance management. Understand the cognitive constraints associated with information visualization. Understand and apply best practices for visually representing performance indicators. Create a prototype dashboard using specialized software. Understand the impact of data integration architecture and data quality on performance tracking.

Content

Organizational performance management. Theoretical model of situational awareness. User-centred design approach. Analysis of the use context. Requirement specification. Theoretical foundations of visualization in decision support. Design and evaluation of a dashboard prototype. Alignment with business concerns. Work organization. Impacts of architecture and data quality.

Educational objective(s)

Evaluate the social and political issues of cybersecurity and cyberspace based on concrete cases. Observe and question cybersecurity governance frameworks.

Content

Analyze and evaluate different cybersecurity policies. Perform a full cybersecurity analysis of a concrete case. Different methods of social research in cybersecurity.

Supplementary instruction

Educational objective(s)

Discover the main terms used in French in the fields of IT and cybersecurity. Develop an ability to use these terms appropriately both orally and in writing in a work context.

Content

Vocabulary specific to IT and cybersecurity.