5-year program
Designed for students wishing to eventually lead multidisciplinary teams, this 5-year program allows you to master the basic skills necessary for your future position.

An innovative learning concept
Based on modularity, you choose, after a skills assessment, the training modules to work on. You validate them at your own pace during 3 exam sessions per year. At each session, you select the module on which you are ready to be assessed.
Jobs matching
With us, companies are waiting for you! "Job matching" sessions are organized so you can find your job with one of our partners.
No more grades
Effective work is collaborative work rather than a race to the top. Here, no grades, the training modules are or are not validated.
A la carte
Why attend a class, if you already master its content? Further to a skills assessment, you choose your training modules. Optimization and efficiency!
Free of charge
Your tuition fees are 100% supported by your sponsor company. Your smile is all you need to join.
Bachelor program 3 years
Designed to train students in technical professions, our Bachelor program offers 2 specialisations.
• Option 1 : IT (Information Technology)
Specialty to secure all the elements impacting IT management.
History of computing and cybersecurity
To acquire a good knowledge of technological developments and their impact on security
- Panorama of the evolution of technologies
- Internet History
- History of security
IT governance
To understand and master IT governance and its various components
- Leadership and Management
- Strategy and Roadmap
- Organizational models of IT services
- Information systems architecture
- Communication and crisis management
- Business continuity and recovery
- Performance and security management
- Purchasing and partner management
IT technical environments
To understand the IT technical environments to which cybersecurity applies
- Systems Engineering
- Networks
- Software development
- Private and public cloud
IT operations
To understand the operational management of an end-to-end IT service
- Assets, data and flows
- User support, Incidents
- System modifications/evolutions supervision
- Infrastructure and application life cycle
• Option 2 : OT (Operational Technology)
Protection of the industrial sector.
Industrial environments and systems
To acquire basic knowledge of industrial systems, the scope of the scope, its actors and the differences/convergences with the IT environment
- Perimeter of industrial systems
- Types of processes
- Types of technical components and assets
- Main equipment suppliers and service providers
- Differences between IT and OT scopes
- Impact of new technologies
- Actors in the industrial environment
- Maintenance
OT technical environments
To learn how an industrial information system works and discover the architectures, networks & protocols used, operating systems and programming languages implemented.
- Principles and standards of architecture
- Equipment vendors and typical architecture by domain
- Industrial networks
- Operating systems
- Remote access and control
- Programming
- New technologies
OT cybersecurity
To discover the threats and vulnerabilities specific to this environment and master the different principles, techniques and tools to secure industrial information systems
- Threats – actors, techniques…
- Vulnerabilities of industrial systems
- Industrial systems security assessment tools
- Security architecture
- Basic security principles
- Reinforcement/Connection/Monitoring of industrial systems
- Asset inventories
- Network Security
- Managing identities and privileged accounts
- Applying security and antivirus updates
- Detection of anomalies and threats on terminals
- Integrity check
- Backup
OT governance
To discover all the themes that make up the cyber governance of an organization
- Leadership and Management
- Strategy and Roadmap
- Organization models
- Information systems security management system
- Communication
- Performance and security management
- Risk and threat analysis
- Training and awareness
- Cyber insurance
- Purchasing and partner management
- Cyber OT Program Management
• Common core curriculum
If you can shape your course in your image, certain modules remain compulsory for all students, in order to ensure consistency and educational continuity.
Cybersecurity strategy and governance
To understand the geopolitical issues and the threats, the organization and the actors in cybersecurity
- Geopolitics and economic intelligence
- Threat Management, Cybersecurity and
- Strategy/Governance of Organizations
- Audit of information systems and organizations,
- Old technology…
Compliance and cybersecurity
To understand the impacts of the regulatory framework on cybersecurity
Norms, standards and regulations applicable to the field of cybersecurity in France and internationally: defense and security, export control, health and personal data, banking and finance, etc.
Organizational cybersecurity
To master the key success factors of a cybersecurity organization
- Enterprise Architecture and Business Process
- Management
- Human resources and cyber skills
- Cybersecurity investments and budgets
- Purchasing/services/outsourcing and cyber contracts
- Managing cybersecurity performance…
Information systems and cybersecurity
To integrate cybersecurity from the design stage and throughout the life cycle of information systems
- Urbanization and security of information systems
- SecOps and DevSecOps
- Big Data and cybersecurity
- Quality management
- Conduct project
SOC governance
To understand the organization and mission of the SOC
- Organizational models of the SOC
- Management of skills and resources of the SOC
- Management of relations with governmental entities/Regulations
- Cyber crisis management and associated communication
- Incident response management
The technical environment of the SOC
To master the technical components of the SOC
- Configuration and management of the Security
- Information Event Management tool – SIEM
- Event Log Provisioning and Correlation
- Asset/data/flow management in a SOC
- Vulnerability management
Personal development and communication
To communicate and act effectively, professionally and responsibly
- Communication
- Technical and Business English
- Ethics and deontology in cybersecurity
Master program 2 years
Designed for students wishing to eventually lead multidisciplinary teams, this 2-year program allows you to master the basic skills necessary for your future position. Our Master program offers 3 specialisations.
Option 1 : Master IT
Specialty to secure all the elements impacting IT management and all new technologies such as blockchain or artificial intelligence.
Option 2 : Master OT
Industrial sector protection for more specific components.
Option 3 : Master SOC
Learning related to management and crisis management and operational security (threat management, detection, containment, etc.)
Hybrid learning at the service of cybersecurity
Our education model
Modularity and practice are the two pillars of our education model. Practice is carried out in our rooms dedicated to simulation exercises replicating information and industrial systems environments. This notably allows free reproduction of cybersecurity incidents and attacks.
What is a BTU?
The Blended Training Units ensure the modularity of our training courses. A BTU is made up of a set of face-to-face, remote and e-Learning training courses, each representing 20-hour investment time for our learners. It makes it possible to optimize the best of each type of teaching.
specialisations
Information Technology (IT) - Operational Technology (OT) and Management of Cybersecurity Operations (SOC)
skills sets
represent the knowledge to be acquired to become an expert in one of our training courses
BTU
available and selected by us based on the skills you must acquire
know-how
represent what you have acquired at the end of your training program
Admission
Access open to undergraduate students 5 years / Possibility of gateways for direct access to our programs at superior stages
Admission criteria
To enter the first year of our 5-year program, you must own an undergraduate degree and demonstrate strong motivation. We provide you with tools and create a place in which, we hope, you enjoy living and following a demanding training program.
To directly enter the second year of our 5-year program, you must justify your attendance to courses for 1 or 2 years after earning your undergraduate degree.
Prerequisite
Notion on cybersecurity area main characteristics and news would be appreciated.
Examination for admission
An interview based on soft skills and a skills assessment are carried out.
Apply
No need to go to the post office or to send us an email. Just click on the “Apply” icon and forward us your application file.


Consult our booklets
Our booklets are access-free. To consult them, we do not ask you for your motives, nor the training program you are interested in, nor even your email address. Just click and download the booklet you want.