ِCybersecurity State Engineer

Explore the programs and courses offered by ِCybersecurity State Engineer

Browse Programs Admission Information

Program Overview

 cybersecurity. Specialization begins in the third year and spans five semesters. The curriculum includes advanced cryptography, secure operating systems, network security, malware analysis, ethical hacking, digital forensics, and secure software development.

Key Competencies:

Designing and deploying cybersecurity solutions.

Vulnerability analysis and penetration testing.

Expertise in cryptographic methods and secure communications.

Development of secure web, mobile, and embedded applications.

Identity and access management.

Career Opportunities:

Cybersecurity engineer.

SOC analyst.

Digital forensics expert.

Security architect.

Secure software developer.

Teaching Language : French / English

Curriculum Highlights

Core Courses

 1. Cybersecurity:

Cybersecurity Fundamentals

Operating System Security

Network & Wireless Security

Web & Mobile App Security

Digital Forensics

Advanced Cryptography

Embedded Systems Security

 2. AI and Machine Learning:

Introduction to Artificial Intelligence

Machine & Deep Learning for Security

 3. Programming and Development:

Advanced Programming (Python)

Web & Mobile Development

Secure Software Development

 4. Analysis & Technical Tools:

Malware Analysis

Ethical Hacking

DevOps & Cloud Security

Identity and Access Management

Advanced Topics

1. Advanced Cybersecurity:

Advanced OS Security: kernel-level defense, secure boot, memory protection.

Wireless & Mobile Network Security: WPA3, rogue AP detection, LTE/5G security.

Malware Analysis: static/dynamic analysis, reverse engineering tools.

Digital Forensics: data recovery, timeline analysis, evidence integrity.

Embedded & IoT Security: firmware analysis, secure hardware.

 2. AI for Cybersecurity:

Threat detection via ML/DL, anomaly detection, automated response systems.

 3. Technical & Emerging Domains:

DevSecOps & Cloud Security: CI/CD pipelines, Kubernetes security.

Ethical Hacking: penetration testing, red teaming techniques.

Identity & Access Management (IAM): MFA, RBAC, SSO protocols.

Admissions Information