{"id":1879,"date":"2018-11-10T23:04:12","date_gmt":"2018-11-10T23:04:12","guid":{"rendered":"http:\/\/fehmijaafar.net\/?page_id=1879"},"modified":"2023-08-01T18:19:04","modified_gmt":"2023-08-01T23:19:04","slug":"teaching","status":"publish","type":"page","link":"https:\/\/fehmijaafar.net\/fr\/teaching\/","title":{"rendered":"Enseignement"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"1879\" class=\"elementor elementor-1879\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-02258bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"02258bf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a38ca63\" data-id=\"a38ca63\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-94f749c elementor-widget elementor-widget-heading\" data-id=\"94f749c\" data-element_type=\"widget\" data-e-bg-lazyload=\".elementor-widget-container\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.19.0 - 07-02-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-xl\">Enseignement<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d84362 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"2d84362\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-e-bg-lazyload=\".elementor-widget-container\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.19.0 - 07-02-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span style=\"color: #000080; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif;\"><span style=\"font-size: 12px;\"><b>Atelier Pratique Cybers\u00e9curit\u00e9 I<\/b><\/span><\/span><\/p><p><span style=\"color: #000000; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif;\"><span style=\"font-size: 12px;\"><b>Permettre de synth\u00e9tiser les connaissances acquises dans les cours du programme par une participation active \u00e0 un projet de cybers\u00e9curit\u00e9.<\/b><\/span><\/span><\/p><p><b style=\"font-size: 12px; color: #000000;\">Le contenu varie en fonction des besoins des \u00e9tudiants et de l'expertise professorale disponible.<\/b><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21bf479 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"21bf479\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-e-bg-lazyload=\".elementor-widget-container\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000080; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif;\"><span style=\"font-size: 12px;\"><b>S\u00e9curit\u00e9 informatique pour l'internet des objets<\/b><\/span><\/span><span style=\"font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 600; color: #000000; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px;\">\u00a0<\/span><\/p><p><span style=\"color: #000000; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif;\"><span style=\"font-size: 12px;\"><b>Dresser un panorama complet des menaces et des vuln\u00e9rabilit\u00e9s li\u00e9es aux objets connect\u00e9s et aux applications associ\u00e9es afin de pr\u00e9server la s\u00e9curit\u00e9 des acc\u00e8s, l'int\u00e9grit\u00e9 des applications et des donn\u00e9es et d'apporter des solutions concr\u00e8tes pour s'en pr\u00e9munir.<\/b><\/span><\/span><\/p><p><b style=\"font-size: 12px; color: #000000;\">Architectures des syst\u00e8mes de l'internet des objets. Technologies les plus utilis\u00e9es et principales plateformes pour l'internet des objets. Vuln\u00e9rabilit\u00e9s et menaces sp\u00e9cifiques \u00e0 l'internet des objets. M\u00e9thodes de s\u00e9curit\u00e9 dans l'internet des objets. \u00c9tudes de cas (domotique, villes intelligentes, etc.).<\/b><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c52e09 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"0c52e09\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-e-bg-lazyload=\".elementor-widget-container\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000080; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif;\"><span style=\"font-size: 12px;\"><b>Informatique et industrie 4.0<\/b><\/span><\/span><\/p><h1><span style=\"color: #000000; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-variant-ligatures: normal; font-variant-caps: normal;\">\u00a0<\/span><span style=\"color: #000000; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif;\"><span style=\"font-size: 12px;\">Comprendre la r\u00e9alit\u00e9 de l'industrie 4.0 et la r\u00e9volution num\u00e9rique des entreprises manufacturi\u00e8res. Situer le r\u00f4le d'un informaticien dans le contexte des activit\u00e9s de production \u00e0 l'\u00e8re du num\u00e9rique et de la connectivit\u00e9. Comprendre l'impact de la transformation num\u00e9rique sur les organisations. Se familiariser avec le nouveau r\u00f4le de l'informatique dans la gestion de la cha\u00eene d'approvisionnement, la gestion des op\u00e9rations et la gestion du cycle de vie des produits. Conna\u00eetre les m\u00e9thodes d'am\u00e9lioration et les outils op\u00e9rationnels impliqu\u00e9s dans la transition num\u00e9rique des moyens de production. Appliquer les principes li\u00e9s \u00e0 l'industrie 4.0 \u00e0 des cas concrets li\u00e9s \u00e0 l'exploitation et au d\u00e9veloppement de logiciels.<\/span><\/span><\/h1>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ada301 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"4ada301\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-e-bg-lazyload=\".elementor-widget-container\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong><span style=\"color: #000080; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-variant-ligatures: normal; font-variant-caps: normal;\">Programmation Web Avanc\u00e9e<\/span><\/strong><\/p><h1><span style=\"color: #000000; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-variant-ligatures: normal; font-variant-caps: normal;\">\u00a0C<\/span><span style=\"color: #444444; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-variant-ligatures: normal; font-variant-caps: normal;\"><span style=\"color: #000000;\">e cours donne aux \u00e9tudiants la possibilit\u00e9 d\u2019am\u00e9liorer et d\u2019enrichir leurs comp\u00e9tences en programmation Web. Les \u00e9tudiants apprendront \u00e0 d\u00e9velopper des applications Web utilisant une architecture \u00e0 trois niveaux, la gestion de session, des techniques orient\u00e9es objet et des interactions de base de donn\u00e9es avanc\u00e9es. Des concepts tels que les concepts CSS avanc\u00e9s, XHTML, JavaScript, PHP, Jquery, SQL, les environnements Web interactifs riches, l'authentification et la s\u00e9curit\u00e9 seront \u00e9galement explor\u00e9s.<\/span><\/span><\/h1>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2de129c elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"2de129c\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-e-bg-lazyload=\".elementor-widget-container\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong><span style=\"color: #000080; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-variant-ligatures: normal; font-variant-caps: normal;\">Sp\u00e9cification des exigences logicielles<\/span><\/strong><\/p><h1><span style=\"color: #000000; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-variant-ligatures: normal; font-variant-caps: normal;\">\u00a0<\/span><span style=\"color: #444444; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-variant-ligatures: normal; font-variant-caps: normal;\"><span style=\"color: #000000;\">Ce cour<\/span>s permet <span style=\"color: #000000;\">de<\/span> montrer comment nous pouvons sp\u00e9cifier, valider et v\u00e9rifier les exigences des clients pour en d\u00e9duire une architecture technologique. Le contenu du cours inclus la sp\u00e9cification fonctionnelle et non fonctionnelle, les diagrammes de flux de donn\u00e9es et les mod\u00e8les de donn\u00e9es, la sp\u00e9cification textuelle des exigences, la validation des exigences, la g\u00e9n\u00e9ration de sc\u00e9narios de tests d\u2019acceptation, et la pr\u00e9sentation des normes de sp\u00e9cification IEEE.<\/span><\/h1>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff1a2b1 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"ff1a2b1\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-e-bg-lazyload=\".elementor-widget-container\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000080;\"><span style=\"font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400;\">\u00a0<\/span><span style=\"font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: bold;\">Audit des syst\u00e8mes d'information\u00a0<\/span><\/span><\/p><p><span style=\"color: #444444; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: bold;\">\u00a0<\/span><strong><span style=\"color: #444444; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal;\">Ce cours examine l'utilisation de diverses normes, directives, lois et m\u00e9thodes utilis\u00e9es dans les audits de syst\u00e8mes d'information. La discussion sert \u00e0 la fois \u00e0 d\u00e9finir le cadre de gouvernance, l\u2019audit des syst\u00e8mes d\u2019information et les choix de plans d\u2019action sp\u00e9cifiques pour r\u00e9pondre aux exigences de l\u2019audit.<\/span><\/strong><\/p><p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f745b42 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"f745b42\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-e-bg-lazyload=\".elementor-widget-container\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h1><span style=\"color: #000080;\"><strong style=\"font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px;\">S\u00e9curiser une infrastructure de commerce \u00e9lectronique<\/strong><\/span><\/h1><h1><strong><span style=\"color: #444444; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal;\">S\u00e9curiser l'infrastructure de commerce \u00e9lectronique en tenant compte de l'architecture et de la gestion des donn\u00e9es, ainsi que des protocoles r\u00e9seau avanc\u00e9s. Dans l'environnement de commerce \u00e9lectronique, les besoins de s\u00e9curit\u00e9 des informations des organisations et les besoins de confidentialit\u00e9 des clients sont examin\u00e9s. En outre, le top 10 de l'OWASP est pr\u00e9sent\u00e9 pour informer les \u00e9tudiants des cons\u00e9quences des faiblesses les plus courantes et les plus importantes en mati\u00e8re de s\u00e9curit\u00e9 des applications Web.<\/span><\/strong><\/h1><h1><span style=\"color: #444444; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400;\">\u00a0<\/span><\/h1>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c75cc2f elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"c75cc2f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-e-bg-lazyload=\".elementor-widget-container\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h1><span style=\"color: #000080;\"><strong style=\"font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px;\">Informatique l\u00e9gale num\u00e9rique<\/strong><\/span><\/h1><h1><strong style=\"font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; color: #444444; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px;\">\u00a0<\/strong><strong><span style=\"color: #444444; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal;\">Ce cours pr\u00e9sente une couverture approfondie de la r\u00e9ponse aux incidents en direct et de l'analyse d'informatique l\u00e9gale du syst\u00e8me de fichiers. Le cours comprend l'utilisation de divers outils et techniques d'extraction d'informations \u00e0 partir de supports num\u00e9riques, l'accent \u00e9tant mis sur les informations difficiles \u00e0 trouver avec les m\u00e9thodes habituelles. Ces outils et techniques seront compl\u00e9t\u00e9s par une discussion th\u00e9orique, \u00e0 la fois de la structure du m\u00e9dia elle-m\u00eame et de la nature des limites des preuves num\u00e9riques. Le cours couvre les syst\u00e8mes d'exploitations et les syst\u00e8mes de fichiers les plus couramment utilis\u00e9s.<\/span><\/strong><\/h1><h1>\u00a0<\/h1>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e44d20 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"0e44d20\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-e-bg-lazyload=\".elementor-widget-container\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h1><span style=\"color: #000080;\"><span style=\"font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400;\">\u00a0<\/span><strong style=\"font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px;\">Reprise apr\u00e8s sinistre et planification<\/strong><\/span><\/h1><h1><strong><span style=\"color: #444444; font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal;\">Une couverture d\u00e9taill\u00e9e de la planification de la reprise apr\u00e8s sinistre, y compris des techniques pour pr\u00e9venir, d\u00e9tecter et r\u00e9cup\u00e9rer des pertes de disponibilit\u00e9 de l'information. Les \u00e9tudiants apprennent \u00e0 \u00e9laborer un plan de secours et de reprise d'activit\u00e9, \u00e0 tester et \u00e0 mettre en \u0153uvre ce plan dans un environnement de laboratoire simul\u00e9.<\/span><\/strong><\/h1>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Teaching Pratical Cybersecurity Workshop I Make it possible to synthesize the knowledge acquired in the courses of the program through active participation in a cybersecurity project. The content varies according to the needs of the students and the professorial expertise available. IT Security for the Internet of Things\u00a0 Draw up a complete overview of the [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/pages\/1879"}],"collection":[{"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/comments?post=1879"}],"version-history":[{"count":12,"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/pages\/1879\/revisions"}],"predecessor-version":[{"id":2417,"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/pages\/1879\/revisions\/2417"}],"wp:attachment":[{"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/media?parent=1879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}