Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Escuela reconocida por los líderes mundiales de la industria que otorga un Bachelor (Licenciatura) y Masters Mundialmente reconocidos
Institución de enseñanza superior privada fundada en 1965, Miembro de SUPINFO Internacional Universities
Escuela presente en el mundo entero
®o e
Escuela mundial especializada en las Tecnologías de la Información
supinfo.comDesde 1965
- 2 -
Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras escuelas SUPINFO en el mundo.
* Mapa de las escuelas SUPINFO en el horizonte 2008-2011
La elección de la Movilidad internacional
Sarah, estudiante de 3° curso de ingeniería en SUPINFO Canadá en Montreal, ha comenzado su 1° curso de estudios en SUPINFO París y ha efectuado su 2° curso en SUPINFO UK en Londres:
“Cada año se puede elegir un país diferente para estudiar y esto es una verdadera ventaja. El programa no cambia, pero sí el idioma de enseñanza. El año que viene pienso matricularme en SUPINFO EE.UU. en San Francisco, porque estudiar en los EE.UU. a este precio ¡es una oportunidad única! En el último año probablemente me iré a China o a los Emiratos Árabes Unidos.”
SUPINFOLa escuela de informática mundial,
líder en Europa
FRANCEBordeauxBrestCaenClermont-FerrandGrenobleLilleLimogesLyonMaconMarseilleMetzMontpellierNantesNiceOrleansParisReimsRennesSaint-MaloStrasbourgToulouseToursTroyesValenciennes
UNITED KINGDOMLondon
ITALYCatana (Sicily)
MilanRome
CANADAMontrealTorontoVancouver
USASan Francisco
MEXICOMexico City
COSTA RICASan Jose
MOROCCOCasablancaFezMarrakechRabatTangier
REUNIONSaint-Benoit
SOUTH AFRICA
MAURITIUS
UNITED ARAB EMIRATESAbu DhabiDubai
CHINABeijingHong KongTianjinQingdaoZhenjiang
RUSMosc
Saint Petersb
GUADELOUPE
BRAZILRio de Janeiro
São Paulo
MARTINIQUELe Lamentin
BELGIUMBrussels
The Worldwidehool of Computing
#1 in France
SPAINMadrid
PORTUGALLisbon
TUNISIATunis
- 3 -
El sector de las Tecnologías de la Información es el sector en Francia que recluta a más de la mitad de los jóvenes ingenieros. En efecto, el ingeniero informático ocupa un puesto central en la empresa. Interviene en cuanto a la concepción de soluciones de carácter tecnológico para el tratamiento de la información. Se encarga de la concepción y organización de departamentos informáticos enteros, de la arquitectura e integración de las
de la gestión de personal.
Según datos elaborados por la consultora International en tecnología IDC, hay más puestos que personas disponibles en el sector tecnológico.
Esta carencia se observa sobre todo en el área de redes y tecnología de aplicada a Internet, en donde para el 2010 se
de 2.000.000 de especialistas en áreas de IT (Information Technology). Europa, Medio Oriente y África, serán las áreas con mayor escasez, y Latinoamérica en segundo lugar.
Fuente: http://isri.com.ar/academiacisco
Las empresas ya no se equivocan: los ingenieros en informática, al contrario de los prejuicios, cuyo ejercicio de su función en Francia así como en la mayor parte de los otros países del mundo, no se encuentra controlado o reglamentado por un consejo profesional o una comisión de títulos, no son solamente
en Francia por un “título de ingeniero diplomado”. Tampoco son unos “súper técnicos” o simples “expertos” principalmente
En este sector muy particular de las TIC, los primeros están a menudo considerados como poseedores de un saber demasiado general, no pragmático y no productor de valor mientras que los otros se encuentran amenazados por
competencias extranjeras más baratas basadas en Asia o en los países de Europa del Este. Los buenos ingenieros en informática, como se forman en SUPINFO, no solamente son
también de una verdadera pericia, un saber vivir, y un saber transmitir. Se convierten entonces en verdaderos arquitectos capaces de concebir, innovar y dirigir las tecnologías en el interés de la empresa.
Una encuesta realizada sobre los puestos ocupados por más de 5000 antiguos alumnos de SUPINFO pone de relieve que nuestros ingenieros en informática, que a menudo han sido ya reclutados antes de su salida de la escuela, presentan una gran movilidad, y una riqueza de carrera muy importante en empresas del mundo entero. Así, es muy natural que un ingeniero SUPINFO pase rápidamente, cuando no es él mismo creador de una empresa, de la función de ingeniero jefe de proyecto a la de director general pasando por todos los niveles de la jerarquía: director de los sistemas de la información, director de la producción e incluso director de marketing, comercial o también director de recursos humanos.
Es porque SUPINFO supo integrar estas exigencias del mercado actual que hoy la escuela considera que es una estupenda oportunidad, resultado de ello: no hay en las empresas casi ninguna función que ya no sea accesible a un ingeniero SUPINFO.
Alick MOURIESSEPresidente
Marianne BELISDirectora Académica
- 4 -
¿Qué empleo para el día de mañana? 3
La informática y los empleos del sector digital 6
La primera Gran Escuela de informática en Francia 7
Una escuela amistosa y humana 9
Una enseñanza general y especializada en informática 10
La innovación en el corazón de la formación del ingeniero 12
La informática al servicio de la pedagogía 13
Una escuela reconocida por los líderes mundiales 16
Los laboratorios pedagógicos, acelerador del saber 17
Las certifi caciones, el reconocimiento de los profesionales 18
Consejo de Perfeccionamiento: SUPINFO Advisory Board (SAB) 19
Y además de los estudios, un montón de experiencias 20
¿Cómo matricularse en una de las escuelas SUPINFO? 21
El programa SUPINFO 22
SUPINFO Global Network (SGN) 14
Una función idéntica a la de la empresa 15
La carrera SUPINFO 11
Los testimonios de los profesionales 8
- 5 -
P.7
P.21
Encuesta TNS Sofres 2007 sobre las escuelas de informática en
en el mundo entero
Simplicidad y adaptabilidad garantizadasTodas las especialidades están integradas
en los gastos de la carrera
Una red informática mundialDigna de una transnacional
P.11
P.17
P.14
- 6 -
Entre las empresas que contratan a los ingenieros SUPINFO, se encuentran las Entre las empresas que contratan a los ingenieros SUPINFO, se encuentran las r que tienen como centro de interés los empleos de la informática. Son en primer
lugar los constructores de ordenadores (IBM, HP, Sun…) y los editores de programas (Microsoft, Oracle…). Luego intervienen las Sociedades de Servicios en Ingeniería
implantar, integrar, poner en marcha y mantener el sistema de la información de las so-
compañías usuarias: PME, PMI, grandes grupos internacionales o administrativos, en el seno de sus Direcciones Informáticas.
rdefensa nacional, constructores aeronáuticos, industria petrolera, operadores de telecomunicaciones, industrias del automóvil, sector ferroviario, gran distribución, laboratorios farmacéuticos, turismo, medioambiente, humanitario, todos los sectores de la investigación
Tasa de Colocación: el 100%
Salario a la contratación: a partir de 35 000 €
Testimonios de antiguos alumnos: www.supinfo.com/video-es
El 100% de los ingenieros SUPINFO al obtener su título han sido ya contratados a la salida de la escuela. Estas excelentes cifras, las debemos al hecho de que contrariamente a muchas otras escuelas de ingenieros francesas con una tendencia generalista donde el lastre pedagógico tradicional permanece incluso después del ciclo preparatorio (fuerte presión de las asignaturas teóricas fundamentales como las matemáticas y la física), SUPINFO ha entendido las
informática al terminar una carrera, SUPINFO forma hoy en Francia y en el mundo basándose en el modelo internacional de “Master of Science”, a jóvenes apasionados por la informática inmediatamente operacionales en las empresas al salir de la escuela con un alto nivel técnico y muy competente en gestión de empresas. Esto es exactamente lo que las empresas esperan.
- 7 -
SUPINFO, The International Institute of Information Technology, es el nuevo nombre de la Escuela Superior de Informática de Paris antiguamente llamada ‘E.S.I”, establecimiento fundado en 1965, reconocido por el Estado francés por el decreto del 10 de enero de 1972.SUPINFO es una escuela de informática mundial que dispone de su propia red mundial dedicada a las tecnologías de la información. En Francia, SUPINFO se convirtió en la primera escuela de informática tanto en el nivel de número de estudiantes matriculados como en el nivel de la cobertura nacional con 28 escuelas, repartidas en todo el territorio y en los departamentos de Ultramar. Es una de las pocas Grandes Escuelas de informática donde el estudio de las tecnologías de la información es el núcleo central de la formación del ingeniero desde el primer año después del bachillerato. Escuela especializada con vocación generalista en materia de informática, integra a su carrera todas las especialidades que componen la informática de hoy, como se utiliza en las empresas: ingeniería
de datos, tecnologías Internet e Intranet, de decisión, ERP, multimedia. Una recién encuesta realizada en Francia en el 2007 por TNS Sofres demuestra claramente que SUPINFO goza también de una de las mejores imágenes por parte de las empresas de más de 50 asalariados, llegando incluso a la cabeza en materia de notoriedad espontánea y asistida. Estudio consultable en: www.supinfo.com/tns2007-es
En el corazón del concepto pedagógico de la escuela, el compartir las competencias llevó al cuerpo profesoral a
integrar la acción de los alumnos dentro del proceso de aprendizaje. Es la adquisición del “saber transmitir”. Los alumnos ingenieros están seleccionados y formados con anticipación en las tecnologías que les apasionan, eso además de la carrera tradicional. Reciben, durante el verano una formación especial para asistir a los profesores. Sus acciones en clase, añadidas a las que adquieren en los laboratorios pedagógicos de la escuela son particularmente apreciadas por los otros alumnos que encuentran así, en cualquier momento, una preciosa ayuda para entender mejor algunos conceptos y ciertas técnicas. Reconocidos por las empresas, estos alumnos ingenieros asistentes de los profesores tienen la oportunidad de exponer en todas las escuelas de la red en Europa, Asia, África y América, el contenido de sus trabajos. Reciben cada año premios internacionales y para los mejores una beca de estudios
Saint-MaloCaen Metz
TroyesStrasbourg
LyonGrenoble
Mâcon
Orléans
ToursNantes
Rennes
Limoges
MarseilleMontpellier
NiceToulouse
Lille
Valenciennes
Brest
Reims
Paris
BordeauxClermont-Ferrand
Mapa de las escuelas SUPINFO : www.supinfo.com/mapa-escuela
Mapa de las escuelas SUPINFO 2008 en Francia y Ultramar, Una cobertura única
SUPELEC INSALyon
Polytech SUPINFO
7,47,3 7,3
7,2
Según un sondeo TNS SOFRES en Francia realizado en el 2007 acerca de las empresas con más de 50 asalariados, SUPINFO llega al 4° puesto respecto a la opinión global de
un 7,2/10. Ver: www.supinfo.com/tns2007
Según otra encuesta independiente realizada en 2008 por Ifop y la revista 01 Informatique colocan a SUPINFO en el 3° puesto de las escuelas preferidas de las grandes empresas (más de 500 empleados).
Este artículo puede consultarlo en: www.supinfo.com/ifop2008 (en francés)
Guadalupe
Martinica
Reunión
- 8 -
Eric BOUSTOULLERPresidente Director General de Microsoft Francia y Vicepresidente de Microsoft Internacional: “Contamos con más de cinco años de colaboración muy fuerte y estratégica con SUPINFO. Esta colaboración se sitúa por supuesto al nivel de la educación, de la pedagogía pero va más allá. SUPINFO se ha convertido en una de las encrucijadas, mejor dicho, son los mejores en Francia cuando se habla de las tecnologías Microsoft. Allí se encuentran los mejores laboratorios, los ingenieros que son sin duda los más competentes hoy acerca de nuestras tecnologías y forman parte de los más cotizados en el mercado laboral. Son muy cotizados por todas las empresas, medianas o grandes, pero también por las sociedades de servicios que nos piden regularmente alumnos en prácticas o ingenieros. Si uno busca informaciones sobre nuestras tecnologías, nuestras soluciones de hoy y de mañana solo basta con visitar las Web de SUPINFO. ”
Dominique van DETHResponsable de programas para la Educación Oracle Francia:“Con SUPINFO, nosotros tenemos en común, compartir los conocimientos, el espíritu de equipo y
Francia y en el exterior, SUPINFO es un colaborador ineludible para la formación de especialistas Oracle que podrán adaptarse a las evoluciones de las empresas. ”
Jane LEWISArea Academy Manager, Cisco UK: “SUPINFO es hoy en día nuestro colaborador n°1 en Europa en la enseñaza superior con todos los estudiantes formados en nuestras tecnologías y la
cada año. La excelencia de su formación corresponde a su reactividad a responder a las necesidades del mercado en tiempo real: SUPINFO ha inmediatamente entendido la importante necesidad de tener profesionales formados en seguridad y redes inalámbricas y dispensa una formación de primer plano en estas tecnologías de punta. ”
Richard RAMOSDirector Educación Investigación, Apple Europa: “Creo que la carrera propuesta por SUPINFO va por delante de su tiempo. ”
Gilles LESAGEDirector Educación Investigación, IBM Francia: “Vendemos tecnología, pero SUPINFO va a vendernos los talentos que forman y que necesitaremos para dirigir o trabajar en nuestra empresa el día del mañana.”
Eric MAHÉResponsable de nuevas tecnologías, Sun Francia :“Cuando Sun seleccionó la lista de las escuelas prioritarias para el lanzamiento de su programa Campus Ambassador en Francia, SUPINFO se posicionó a la cabeza de la lista de todos los establecimientos nacionales.”
Mickaël OHANAManaging Director, CrossKnowledge:“SUPINFO es una de las primeras escuelas de ingenieros en Francia en comprender e integrar el desarrollo de las competencias en gestión de empresas en su carrera. Con las soluciones de formación en línea CrossKnowledge, los estudiantes pueden acceder a los mejores contenidos en gestión de empresas, en todo el mundo y cuando lo deseen.SUPINFO no prepara solamente ingenieros en informática de excelencia sino también a futuros gerentes de excelencia.”
Hervé COUTURIERExecutive VP, Product Group, Business Objects, an SAP Company:“Estamos encantados de haber puesto en marcha una colaboración con la escuela SUPINFO.La creación de un módulo en Business Intelligence y en particular la familiarización con nuestros productos permitirá a los alumnos de SUPINFO aprender un dominio de la informática aún poco enseñado a los alumnos ingenieros. Es también un excelente medio para Business Objects para formar lo antes posible a numerosos ingenieros en sus tecnologías y atraerlos a sus centros de desarrollo.”
Más testimonios (IBM, Apple, Sun, Novell, Microsoft, Cisco...) página 13 y 18
SUPINFO es una escuela que se preocupa por establecer unaverdadera relación entre los estudiantes, el cuerpo profesoral, la administración de la escuela y el mundo laboral. El conjunto del equipo pedagógico y los antiguos alumnos son muy sensibles a los valores de la escuela: espíritu de equipo, solidaridad, compartir los conocimientos, diversidad de opiniones, tolerancia, respeto de todas las diferencias, de todas las religiones, espíritu deempresa, esfuerzos compartidos y cuestionamiento permanente. A lo largo de sus estudios, gracias a los medios pedagógicospuestos a su disposición, a las actividades enlazadas con la vidade la escuela, el estudiante SUPINFO exalta su personalidad, adquiere más seguridad y eleva su potencial. Las ocasiones, paradivertirse también son numerosas: animación de seminariosttecnológicos, SUPINFO Winter Night, Brunch de Navidad, Añonuevo Chino, viajes de esquí, seminarios de integración, Fiesta de la música, SUPINFO Spring Break…
La escuela permite no solamente a los estudiantes dar rienda suelta a su pasión por las aplicaciones prácticas de las asignaturasinformáticas que reciben sino que permite también a todo alumnoingeniero SUPINFO intervenir en empresas hasta dos días a lasemana además de prácticas durante el verano obligatorias al
puesto que todas las prácticas en empresas de dos días a lasemana son, en general, muy bien remuneradas.
y Porque las tecnologías de la información progresan muyrápidamente, el ciclo preparatorio ofrece una alternativapragmática a los alumnos que no desean sufrir las presiones de las
. matemáticas y de la física impuestas por las carreras tradicionales.r En un medio ambiente de trabajo humano basado en compartir
los conocimientos, totalmente diferente del “espíritu de lasoposiciones” o semanas de programación intensiva, los alumnos
, una enseñanza muy rica en asignaturas informáticas (sistemas,redes, programación, bases de datos). Todas las especialidadesestán naturalmente integradas a la carrera, entonces no hay máselecciones que hacer en el curso de la carrera y cada uno conserva la certidumbre de adaptarse fácilmente a las necesidades del
r mercado cualquiera que sea su orientación. Así puede abordarsus estudios con más serenidad y progresar hacia la primerapráctica en empresa con fuertes conocimientos técnicos.
- 9 -
- 10 -
Todas las especialidades que componen la informática de hoy y de mañana están integradas en la carrera de SUPINFO:
análisis de datos, tecnologías Internet e intranet, multimedia. La enseñanza de la Escuela tiene como meta la preparación teórica y práctica para el ejercicio de la profesión de ingeniero en el área de las ciencias del tratamiento de la información. También, la formación SUPINFO se completa con conocimientos de enseñanza general: formación internacional en ciencias humanas, economía, derecho, gestión y management. Entonces no hay optativas que escoger durante la carrera. Todos los ingenieros SUPINFO tienen todos los conocimientos.Encuentre el programa detallado en la página 23.
Las prácticas constituyen la herramienta principal de la construcción del proyecto profesional y son obligatorias a partir del primer año del ciclo preparatorio. Esta larga inmersión en la empresa permite poner en práctica y completar los
La práctica está seguida por la redacción de un informe y de una presentación de éste durante la cual se evalúan no solamente las competencias técnicas sino también las capacidades del alumno en la comunicación.
Prácticas en SUPINFO 1 y 2: 3 meses en análisis de concepción
Prácticas en SUPINFO 3, 4 y 5: de 3 a 4 meses (6 meses durante el quinto año en concepción y realización completa de proyectos de sistemas y redes o de ingeniería de programación
de estudios sobre un tema aprobado permite la obtención del International Master of Science SUPINFO.
SUPINFO ha iniciado un programa de colaboración con las empresas permitiéndole a cada alumno ingeniero, a partir del ciclo de ingeniería, intervenir en la empresa hasta dos días a la semana. Estas colaboraciones aportan una verdadera riqueza a la empresa tanto por el ritmo de trabajo impuesto como por la continuidad de las misiones efectuadas. En efecto, el ritmo escolar, basado en el año escolar, no le conviene forzosamente a una empresa: nuestros alumnos efectúan prácticas de tres meses en empresa cada verano pero ¿cómo hacer para acelerar el aprendizaje de la “pericia” de los estudiantes, el resto del año?
competencias de los estudiantes durante todo el año escolar 2 días a la semana a partir del 1° año del ciclo de ingeniería. Son estos mismos estudiantes que pueden luego efectuar sus prácticas de verano en el seno de estas mismas empresas, durante 3 meses a tiempo completo.
Ventajas de la colaboración en la empresa2 días a la semana
Las empresas ya no tienen que conformarse con la temporada de las prácticas: las empresas pueden encontrar competencias SUPINFO en cualquier momento.
Tampoco tienen que conformarse con la duración de las prácticas: si una práctica tiene que prolongarse más allá del
con la escuela para que el alumno en prácticas pueda seguir su formación durante el año escolar siguiente.
El alumno en colaboración en el seno de la empresa
¡Estas colaboraciones constituyen una fuente de
El contenido de las misiones que le incumben al alumno ingeniero es cuidadosamente estudiado por la escuela y la empresa. Permite completar algunos proyectos de la escuela por proyectos concretos realizados en el seno de la empresa por un colaborador.
de precontratación para los estudiantes y las empresas.
La búsqueda de una práctica sigue siendo un excelente entrenamiento para la búsqueda de un empleo, los estudiantes pueden efectuarla por sus propios medios pero también gracias a la Escuela que pone a su disposición paneles de anuncios y un servidor Intranet con las ofertas de prácticas que se reciben regularmente.
- 11 -
Cada año de estudio puede efectuarse en una escuela diferente de la red mundial SUPINFO.*
Mandriva y Novell están incluidas en los gastos de estudios sin suplemento alguno.
*
años de estudios universitarios, Técnico
Matemáticos
años de estudios universitarios, Bachelor,
Diplomatura, Licenciatura
año de estudios universitarios, Técnico
Matemáticos
2° año Ciclo de Ingeniería 1 día a la semana en la
empresa
1° año Ciclo preparatorio 1 día a la semana en la
empresa
3° año Ciclo de Ingeniería2 días a la semana en la
empresa
4° año Ciclo de Ingeniería 2 días a la semana en la
empresa
5° año Ciclo de Ingeniería2 días a la semana en la
empresa
SUPIN
FO
Luego de 3 o 4 años después del bachillerato
- 12 -
OSUPINFO asegura una lucha activa contrala obsolescencia del material y de los
vanguardista de la Escuela. Su parqueinformático representa una replica de losambientes heterogéneos encontrados en
las empresas. Es actualizado regularmente al ritmo de las evolucionesttecnológicas. Se compone de varias aulas multimedia tanto para losttrabajos prácticos como para las clases, con un conjunto importantede servidores: Sun, HP, Apple, AS400, IBM, HP y Dell, quedadisponible en permanencia incluso fuera de las clases sin límitealguno.
El conjunto de ordenadores estáenteramente conectado a la red delestablecimiento gracias a Cisco con un alto
r, débito con una apertura hacia el exterior,para asegurar los mejores débitos paranavegar en la Web o descargar (un accesoVPN se encuentra disponible desde la casa del alumno).
Lazos permanentes que permiten a los estudiantes de SUPINFOde otros países del mundo trabajar con los mismos recursos y en las mismas condiciones que en Francia. Todos los proyectos debenrealizarse por los alumnos en inglés desde el primer año permitiendoa los estudiantes trabajar en binomio en los otros países parafavorecer el aprendizaje de la gestión de equipos internacionalesen el mundo.
Portal de e-learning utilizando la tecnología Campus-Booster desarrollado en el seno de SUPINFO.
Además del groupware, el alumno ingeniero tiene acceso a un importante número de aplicaciones proporcionadas por la escuela.
SUPINFO ha generalizado el uso de Tablet PC en la escuela. Todos los profesores disponen de un Tablet PC con acceso inalámbrico a la red de la escuela y al Campus-Booster. Esta herramienta les permitirá transmitir su saber durante las clases. El Tablet PC reemplaza entonces la pizarra tradicional y todo lo que se escribe es difundido en una gran pantalla. Además, el uso de esta herramienta facilitará la interacción directa con las clases de los centros a distancia.
Progresivamente, los estudiantes, padres y profesores pueden bajar un catálogo cada día más completo de los cursos del programa SUPINFO y descargarlos en su portátil numérico vídeo del tipo iPod, Archos o Zune. Los estudiantes pueden entonces repasar sus cursos donde lo deseen.
En su ordenador portátil personal, es posible asistir las 24 horas a la enseñanza multimedia disponible en la red interna de la Escuela. Durante estas sesiones, los profesores utilizan el sonido, el vídeo y demostraciones visuales para dar formaciones completas integrando teorías y ejercicios prácticos.
la plataforma Tell me more online: Inglés británico, inglés americano, español, español de Latinoamérica, alemán, francés, italiano, holandés, chino, japonés…
plataforma Crossknowledge.
En su ordenador portátil, gracias al VPN SUPINFO (Virtual Private Network) es posible acceder las 24 horas en todo el mundo a todos los recursos pedagógicos de la escuela a distancia, y con una buena seguridad.Esta tecnología emula su presencia en los locales de SUPINFO donde sea que se encuentre en el mundo.
- 13 -
Para la Dirección académica de SUPINFO, demasiadas formaciones para informáticos utilizan aún métodos tradicionales de enseñanza: clases magistrales en grupos y exposiciones. Sin embargo, las poblaciones concernidas están abiertas a la utilización del conjunto de las técnicas modernas de enseñanza y el contenido mismo de estas formaciones en informática se adapta particularmente bien a estos métodos.Enseñanza por medio del ordenador, (e-learning), gran disponibilidad de documentos técnicos en los puestos informáticos, amplia elección de programas informáticos y herramientas de programación, utilización de sitios pedagógicos en la red interna de la Escuela, sistemas de búsqueda avanzada, cursos multimedia disponibles en permanencia integran vídeos, sonidos y demostraciones visuales. En SUPINFO, todas estas tecnologías están de ahora en adelante integradas al sistema pedagógico. A estas se les añade la utilización intensiva de las mensajerías electrónicas (e-mail y mensajería instantánea) que permite mantener una comunicación apropiada con los profesores, tutores o asistentes pedagógicos. También, la generalización de los trabajos efectuados en laboratorios y publicados en el sitio intranet de la Escuela permite difundir mejor los estudios y el saber de cada uno.Es el trabajo de equipo que transmite el espíritu de la escuela.
proyectores. Así, todas las aulas están equipadas de un sistema multimedia de video proyección conectado a la red informática de la Escuela. A eso se le agrega demostraciones en directo, ejemplos, documentos, ejercicios TPs publicados en la red del establecimiento. El conjunto de esta base de conocimientos se encuentra disponible en permanencia las 24 horas a todos los estudiantes del establecimiento.
El conjunto de los recursos informáticos del establecimiento forman parte del polo sistemas de información llamado también “SUPINFO Information Systems” o simplemente SIS. En el seno de este polo, un equipo controlado por el equipo administrativo de la Escuela se une particularmente a la gestión de los recursos unidos a la pedagogía. Este equipo está constituido desde siempre por estudiantes asistentes que actúan bajo el control de la Dirección Pedagógica. Particularmente dinámicos, verdaderamente apasionados, poseen sólidos conocimientos técnicos o generales y
demuestran rigor y profesionalismo. En el transcurso de su carrera, varios años pasados en el SIS aportan a estos estudiantes el dominio de la administración de los sistemas y de las redes heterogéneas a las cuales se agrega una fuerte experiencia de la organización de un servicio informático. Para sostener la alimentación en información de todos los puestos de trabajo de los estudiantes, un arsenal de más de 100 servidores está movilizado. Contienen varios millones de gigabytes de datos que circulan a una alta velocidad sobre una red ultra moderna.
Desde hace varios años, SUPINFO ha iniciado con el acuerdo de IBM-Lenovo y Apple, un programa de equipamiento de los alumnos ingenieros de todos sus establecimientos con un ordenador portátil individual Lenovo Thinkpad o Apple con una tarifa muy especial. Todos los equipos están naturalmente equipados de una interfaz de red inalámbrica.
“La división de los ordenadores personales IBM, ahora Lenovo ha iniciado desde hace
tiempo búsquedas en relación con estos temas, particularmente para sus necesidades propias en materia de formación.
revolución al lado de SUPINFO además, en su caso, la herramienta informática no es solamente una herramienta de trabajo si no también una herramienta de investigación. Nosotros pensamos que el equipamiento de los estudiantes SUPINFO con un ordenador portátil individual representa un extra para los estudiantes al igual que en las Grandes Escuelas de Comercio y las mejores universidades americanas.”
Gilles LESAGEDirector Educación e InvestigaciónIBM Francia
“Las clases Apple impartidas en SUPINFO, la preparación
diferentes proyectos llevados a cabo con los alumnos ingenieros SUPINFO y los equipos de Apple Europa en
Paris y San Francisco, nos permiten, apreciar el dinamismo de una escuela que ofrece una combinación única de pericia y herramientas pedagógicas para el éxito y el futuro de sus estudiantes.”
Richard RAMOS - SUPINFO Promoción 1988 Director de Educación e Investigación Apple Francia
permitir a los estudiantes SUPINFO equiparse de un portátil Mac Os X a una tarifa especial. Una máquina revolucionaria, a la vez Mac y PC gracias al procesador Intel, que permite pasar de un sistema de explotación Mac Os y Windows o linux en el mismo ordenador portátil.
-50 %
Reducción generalmente consta
tada
-15 %
Reducción generalmente consta
tada
100 Mbps
8 Mbps
8 Mbps
8 Mbps
To SUPINFO UK
To SUPINFO USA
To Africa
To SUPINFO Italy
To SUPINFO Belgium
To SUPINFO United Arab Emirates
To SUPINFO China
Internet
Lille
Nice
Strasbourg
Grenoble
2,1 Gbps8 Mbps
10 Mbps
100 MbpsValenciennes
10 Mbps
Metz
100 Mbps
Troyes
20 Mbps
10 Mbps
100 Mbps
100 Mbits
Macon
Lyon
100 Mbps100 Mbps
Marseille
100 Mbps
Montpellier
100 Mbps
100 Mbps
Toulouse
Clermont-Ferrand
100 Mbps
Bordeaux
10 Mbps
Tours
100 Mbps
Orléans
Saint-Malo10 MbpsBrest
10 MbpsCaen 10 Mbps
10 Mbps
Rennes
MReims
10 Mbps
Nantes
100 Mbps
10 Mbps
Limoges
2Mbps
1
SGN euParis backbone
- 14 -
entre todos los sitios
Internet
diferentes sitios
(antiguos alumnos, estudiantes, profesores, asalariados y otros colaboradores)
El SGN (SUPINFO Global Network) es una red privadamundial, transcontinental e independiente de la educación, única en su género. Es administrada por un equipo joven y dinámico del SIS, esencialmente compuesto por estudiantesSUPINFO que aprovechan esto para entrenarse en laadministración de una red de una gran envergadura.
El SGN es una red informática mundial equivalente a lasgrandes redes de las empresas actuales. Une actualmente a4 continentes y está basada en un 100% en equipos Cisco. Gracias a nuestro colaborador Nº1 Mundial en equipos de telecomunicación, ofrece una calidad de servicio, una seguridad y una disponibilidad óptima, indispensablespara el uso intensivo de los recursos pedagógicos para losestudiantes y sus profesores pero también para todos loscolaboradores y los antiguos alumnos de SUPINFO a travésdel mundo. En todos los centros de SUPINFO, la red de cable, se ve prolongada naturalmente de manera inalámbrica por el SWN (SUPINFO Wireless Network) gracias a la decenade terminales WiFi Cisco repartidos en los establecimientos. Son millones de usuarios que, cada día, utilizan esta red paraencontrar, no importa el centro donde se encuentren, loscursos, consultar sus notas, dialogar con compañeros, trabajar en la red en proyectos, visualizar vídeos y, claro está, llamar.Las conexiones entre los sitios se basan en la red MPLS de
Equant (Orange Business) y ofrecen posibilidades de controles de calidad de servicios avanzados. Los estudiantes puedenigualmente conectarse al SGN en todos lados del mundo, gracias a un VPN (Virtual Private Network) y a 4 puntos deentrada (EMEA - Europa Medio Oriente y África, América, Asia, Océano Índigo). Ellos disponen también así de un accesoa todos los recursos pedagógico de la escuela a distancia, y
Internet). Mejor, el SGN transmite también todos los datosmultimedia de los sistemas de control de SUPINFO. La telefonía sobre IP (VoIP) entre todos los estudiantes esposible, la vídeo conferencia y el control de acceso son partede los datos que cambian todos los días en el SGN. La red esaccesible en los diferentes centros de SUPINFO por mediode enchufes presentes en todas las mesas de las aulas, perotambién inalámbrica, gracias al SWN (SUPINFO WirelessNetwork) y a sus 180 puntos de acceso. Un estudiante puedeviajar a todos los centros estando siempre conectado a lamisma red, puede entonces trabajar sin ningún problema delocalización. Cada centro se articula alrededor del corazónde la red gigabites, permitiendo así a todos los estudiantes
el número de usuarios conectados.
- 15 -
El SIS (SUPINFO Information Systems) se encarga de los recursos informáticos del establecimiento. Con funcionamiento idéntico al de una empresa, los responsables del SIS aseguran la gestión, el mantenimiento y la evolución del parque para los laboratorios tecnológicos, el cuerpo profesoral, las asociaciones y los servicios administrativos de la Escuela. Una disponibilidad máxima de sus recursos está asegurada en la óptica de una orientación de servicios muy marcados y conformes a la misión pedagógica de SUPINFO.El SIS asegura el buen funcionamiento de los servicios del groupware:Mensajería, anuario en línea de todos los estudiantes, agendas de grupos personalizadas, foro de discusión: news, páginas Web y e-mail personales con tantos apodos como quiera, acceso a los suportes de las clases, etc. El sistema de mensajería “Corporate” de la Escuela
de las comunicaciones, la posibilidad de
acuse de recibo. El sistema de agendas de grupo interfaz de la mensajería que permite a los estudiantes y a la
de las disponibilidades de cada uno y reservar salas o material pedagógico. El sistema queda disponible desde el exterior del establecimiento vía un simple navegador Internet.
Varios laboratorios tienen a su disposición una impresionante
de un soporte especial en término de material. Estos son, el laboratorio Management, el laboratorio bases de datos Oracle, el laboratorio red Cisco
y Security, el laboratorio Sun, el laboratorio Linux, el laboratorio Mandriva, los laboratorios de las Tecnologías Microsoft y .Net, los laboratorios Apple e IBM. En el seno de los laboratorios, los estudiantes están
encargados de estudios reales y deben no solamente llevar a cabo trabajos de investigación importantes pero también asegurar la comunicación del fruto de sus investigaciones por los intermediarios de publicaciones de reportes y para la animación de seminarios internos.
Lenovo con tarifa reducida
las licencias
(vía VPN)
en la mensajería
a la Web
en Internet
vídeos proyectores
gratuitas al mundo entero
recursos de la red global SGN. Los tiempos de espera (ping) y el ancho de banda están garantizados con una calidad de servicio único en el mundo de la educación.También, con una conexión Internet central que garantiza un ancho de banda de más de 2,1 Gbps (¡o sea el equivalente a más de 100
labo-apple.comlabo-cisco.comlabo-dotnet.comlabo-ibm.comlabo-linux.comlabo-mandriva.comlabo-microsoft.comlabo-oracle.comlabo-sun.comlabo-security.com
- 16 -
La información constituye el trabajo de Oracle: cómo administrarla, utilizarla,
compartirla, protegerla. Inicialmente presente en las bases de datos, Oracle es ahora un editor de programas completos presentes en las diferentes áreas: bases de datos, middleware, business intelligence, aplicaciones de gestión y colaboración. La gestión de la información con los programas Oracle permite a las empresas medir los resultados, mejorar los procesos operacionales y comunicar
Oracle procedió también a numerosas adquisiciones que completan la oferta. Todos los productos están gradualmente abiertos a los estándares e integrados entre ellos según la “Application Integration Architecture” y el acercamiento SOA.Eje central de un programa europeo de Responsabilidad Social de la Empresa, el enfoque Educación de Oracle propone innovadores programas de formación que motivan al desarrollo de las competencias profesionales e informáticas. Así, Oracle Academy ha sido integrada en la carrera en más de 1500 establecimientos de enseñanza en la región EMEA.SUPINFO es uno de los pioneros en este programa en Francia, al lado del Master en Bases de Datos de Sophia-Antipolis y de la Universidad Paris 1 Sorbonne. Con el OAI, Oracle pone a la disposición de los estudiantes SUPINFO, los recursos de Oracle Educación. Así, la Escuela propone a sus estudiantes
Professional y les proporciona, en el marco de una utilización pedagógica en la Escuela y para sus ordenadores personales, el conjunto de los productos Oracle para los servidores y las herramientas de concepción y de desarrollo (Oracle Designer
SUPINFO y Oracle, el número de usuarios es limitado. Además, el soporte electrónico Oracle MetaLink se encuentra a la disposición de los profesores en permanencia. Así dotados, los
Oracle DBA (DataBase Administrator) que integra los ejes siguientes: Introduction to Oracle servers, Oracle Database Administration, Backup and Recovery Workshop, Performance Tuning Workshop, a las cuales SUPINFO agregará pronto las
Developer/Designer.
de SUPINFO, a cooperar para abrir las mejores oportunidades
ha permitido la creación del Laboratorio SUPINFO de las Tecnologías Oracle, www.labo-oracle.com cuyas realizaciones son hoy mundialmente reconocidas.
En el dominio de los sistemas de explotación UNIX y la plataforma Java, Sun Microsystems y SUPINFO
ha concluido una colaboración con una meta pedagógica: SUPINFO ha integrado en su programa cursos sobre las tecnologías Sun y creado un laboratorio en su seno que está dedicado a las tecnologías Sun Solaris y Java. La misión del Laboratorio SUPINFO de las Tecnologías Sun está
“System Administrator Solaris”, “Network Administrator Solaris”, “Programmer for Java 2 Platform”, “Developer for Java 2 Platform”, “Enterprise Architect for Java 2 Platform”, y “Enterprise Edition (J2EE) Technology.”
“Cuando Sun seleccionó la lista de las escuelas prioritarias para el lanzamiento de su programa Campus Ambassador en Francia, SUPINFO se posicionó a la cabeza de la lista de todos los establecimientos nacionales. La cooperación entre SUPINFO y Sun ya era fructífera y los primeros resultados del programa
de SUPINFO era… sencillamente la mejor.”
Eric MAHÉResponsable de nuevas tecnologías, Sun France
Apple Computer y SUPINFO han construido las bases de una colaboración a largo plazo cuyos objetivos son:
de la enseñanza de las tecnologías Apple Mac OS X, la elección de servidores Apple Xserve en el seno del sistema de información de la Escuela,
por vocación animar a la comunidad de los desarrolladores y especialistas de sistemas Apple Mac OS X y a divulgar y democratizar estas tecnologías puesta a la disposición, soportes de formaciones, documentaciones técnicas, foros, artículos y astucias al igual que los otros portales de laboratorios pedagógicos de la escuela,
de material Apple a precios extremadamente competitivos, (-15% generalmente constatados)
programas libres en asociación con Apple,
las prácticas realizadas por los estudiantes SUPINFO en Apple Computer en Francia, en Bélgica y en Escocia.
administración de SUPINFO y de Apple Computer para crear el Laboratorio Apple de la Escuela. La colaboración con la Escuela nos ha permitido ser invitados por Apple Computer a la WWDC, la Worldwide Developers Conferencia que tuvo lugar en San Francisco. Terminar así el primer año de ingeniería es para nosotros la ocasión de reanudar desde el inicio de las clases, con muchos proyectos para esta colaboración.”
Matthieu DUCROS, Vincent LE NORMAND BERNIER
Con El Laboratorio SUPINFO de
una enseñanza variada sobre los sistemas de explotación y subraya su interés por el mundo de los programas libres.SUPINFO y Mandriva se han asociado para crear un curso de
las tecnologías GNU/Linux.
permite a quien lo desee validar conocimientos técnicos en adecuación con las necesidades crecientes de las empresas en competencias Linux.
al mercado profesional, está puesta a la disposición de los estudiantes de SUPINFO con la meta de formar a ingenieros a la punta de los avances tecnológicos y será enseñada en el seno de SUPINFO por los formadores del Laboratorio SUPINFO de las Tecnologías Linux.Está igualmente disponible en la formación profesional.
Microsoft es el líder mundial del programa para los ordenadores. Hoy,
la empresa desarrolla, comercializa y presenta una larga gama de productos y servicios: sistemas de explotación por estación de trabajo o servidores (Windows Vista o Windows Server), sistemas para servidores de empresas (Microsoft Exchange, plataformas .Net, etc.). La mayoría de estas herramientas, por haber sido elegidas por los usuarios, representan hoy verdaderos estándares en el mercado.
“Hoy, la Web del Laboratorio SUPINFO de las Tecnologías Microsoft, www.labo-microsoft.com, se ha convertido en la Web francófona N°1 en nuestras tecnologías con más de 2 millones de páginas leídas al mes.”
Laurent ELLERBACHResponsable de Relaciones con La Enseñanza Superior en Informática Microsoft División Empresas y Educación
estudiantes propuesto por SUPINFO está basado en un acuerdo
Microsoft. Este programa ofrece un complemento de formación técnica y práctica acerca de las tecnologías Microsoft a los estudiantes del ciclo de ingeniería. La Escuela asegura además la
de la informática.
Con el laboratorio SUPINFO de las
un acuerdo mundial con NOVELL, para hacer de SUSE Linux
de SUPINFO.
SUPINFO tiene una reputación excepcional para ofrecer una carrera internacional a sus estudiantes franceses a través del mundo y eso trae también una gran valorización
formados sobre la plataforma Linux, hoy la más completa del mercado.”
Volker SMIDPresidente Europa y Medio Oriente de NOVELL
En el marco de esta colaboración, más de 10.000 estudiantes SUPINFO serán formados sobre SUSE Linux Enterprise del 2008 al 2013. La carrera SUSE Linux Enterprise será también parte integral del programa académico de SUPINFO y todos los estudiantes de la escuela pasarán el examen práctico que les
- 17 -
®o e
- 18 -
Una sólida preparación a las expectativas del mercado como lo subraya justamente la campaña de comunicación pública de la empresa: “La gran parte de datos que transitan hoy en Internet pasan por Cisco”. Líder de las tecnologías y de los equipos de redes de alto nivel, Cisco es actualmente un actor esencial en el mundo de las telecomunicaciones y de las
redes digital de transporte de informaciones. El constructor juega un papel cada día más importante en el dominio de la interconexión de redes locales (LAN) y a distancia (WAN) al nivel de las grandes empresas pero también de las PME PMI, principalmente como creador de elementos agrupadores de redes (hubs, switchs, puentes, routers etc.).
Hoy, el laboratorio de las tecnologías Cisco, creado por la escuela, publica regularmente artículos particularmente apreciados por el mundo de la educación y los profesionales de las Telecomunicaciones y de la red. El sitio www.labo-cisco.com permite igualmente, a través de Cisco
oportunidades reales para los jóvenes diplomados. Gracias a estas colaboraciones, la Escuela se dota de herramientas y medios hasta aquí reservados a los profesionales de la formación informática. Un material y programas costosos son puestos sin reservas a la disposición de los estudiantes acompañados por programas de formación y seguimiento del cuerpo profesoral. Una larga elección de documentos y soportes pedagógicos de renombre están disponibles para asegurar un perfecto dominio de las tecnologías enseñadas (DVD, CD-ROM, vídeos, soportes de clases multimedia, ejercicios, exámenes electrónicos). Los
autorizados por NCS Pearson VUE (Virtual University Entreprises) y Prometric.
“Uno se dio cuenta que había una carencia de personas competentes en tecnologías de Redes y hay que saber que SUPINFO es una de las escuelas más grandes a nivel de la formación sobre las tecnologías de Redes. El Laboratorio Cisco de SUPINFO es un escaparate para nosotros. SUPINFO es nuestro primer colaborador en Francia tanto en número de estudiantes formados en nuestras
Christophe DOLINSEKArea Academy ManagerCisco Francia
otorgadas.”
Stéphane MARTIGNONSales Channel Europe Middle East & AfricaNCS Pearson VUE
- 19 -
La pedagogía de SUPINFO es el resultado de una búsqueda permanente en la que se implican las empresas, los estudiantes y elLa pedagogía de SUPINFO es el resultado de una búsqueda permanente en la que se implican las empresas, los estudiantes y elcuerpo profesoral. Este último está compuesto en un 80% de ingenieros con experiencia profesional o de profesionales comprometidosen la búsqueda aplicada. Selecciona y forma los alumnos ingenieros que se convierten entonces sus asistentes pedagógicos en los laboratorios. Ellos integran naturalmente en sus enseñanzas las innovaciones relativas a las tecnologías
.del mercado. SUPINFO ha creado un Consejo de Perfeccionamiento llamado “SUPINFO Advisory Board” (SAB).Entre sus miembros activos uno cuenta la administración de la Escuela representada por su Presidente, el Director Académico, elDirector de los Estudios, los antiguos alumnos, los profesores, los delegados de los alumnos y los numerosos representantes decolaboradores de la industria informática Son tantos colegios que por sus competencias intrínsecas enriquecen el conjunto deprocedimientos del establecimiento.
www.supinfo.com/sab.
“Las clases Apple impartidas en SUPINFO, la preparación a las
llevados a cabo con los alumnos ingenieros SUPINFO y los equipos de Apple Europa en Paris y San Francisco, nos permiten, apreciar el dinamismo de una escuela que ofrece una combinación única de pericia y herramientas pedagógicas para el éxito y el futuro de sus estudiantes.”
Richard RAMOS - SUPINFO Promoción 1988Director de Educación e InvestigaciónApple Francia
Alick MouriesseSUPINFO Presidente
Eric Boustouller
Presidente Director General de Microsoft Francia y
Vicepresidente de Microsoft Internacional
- 20 -
Cada escuela SUPINFO dispone de un espacio de descanso amistoso que incluye ping-pong, billar, futbolín y en algunos centros, gimnasios para musculación.
SUPINFO Family es un servicio de asistencia informática a domicilio impartida por SUPINFO, la escuela de informática líder en Francia. Este servicio está dirigido a todas las edades y conviene entonces a toda la familia. Porque SUPINFO cuenta cada año con más ingenieros en informática en toda Francia, deseamos poner su saber y pericia al alcance de cada uno a través de SUPINFO Family, sin ningún tipo de compromiso, de abono o gastos de inscripción.El personal se compone entonces de alumnos ingenieros previamente formados y
darles consejos o también enseñarles a utilizar diariamente un MAC o un PC. Los alumnos ingenieros SUPINFO son remunerados y pueden ganarse más de 2000 € al año por medio día de intervención a la semana.
SUPINFO Family propone también programas de clases particulares personalizadas destinadas a los niños, estudiantes, adultos o jubilados para adquirir conocimientos informáticos indispensables (acceso a Internet y búsquedas en la Web, utilización de una mensajería electrónica, chatear, Word, Excel, gestión del puesto de trabajo y de archivos, fotos y música, protección contra los virus informáticos, grabación de CD o de DVD).
SUPINFO.
El departamento Professional Services de SUPINFO, también llamado “PSO” forma parte del polo SBN de la escuela, el SUPINFO Business Network, una doble
vocación: económica y pedagógica. Sus áreas de actividad se basan a la vez en las necesidades de las empresas y las enseñanzas de SUPINFO: ingeniería de programas, multimedia, sistemas y redes, etc. SBN / PSO permite a los estudiantes de la escuela realizar proyectos informáticos. En el transcurso de las misiones, los estudiantes entran en contacto con empresas y mejoran su inserción en el ambiente profesional. Finalmente; los proyectos SBN / PSO les permiten a algunos alumnos asegurar sus ingresos durante su escolaridad.
SUPINFOBUSINESS NETWORKProfessional Services Organization Department
El polo de la comunidad de SUPINFO (SCO - SUPINFO Community) incluye varios departamentos dedicados a la
gestión de la vida de la escuela, a las animaciones y a los deportes. Estos departamentos son administrados por el conjunto de los estudiantes SUPINFO. Su meta es animar la vida de los centros nacionales e internacionales a través de múltiples actividades lúdicas y deportivas. Agrupan estudiantes para actividades tanto internas como externas a la escuela.
S C OC o m m u n i t y
- 21 -
Fecha de creación: 1965
Área: Informática
Estatus: Colaboraciones estratégicas con las instituciones diplomáticas, colectividades territoriales y representaciones nacionales einternacionales: Cámaras de Comercios y de Industrias Regionales, ayuntamientos, comunidades de aglomeraciones, consejosgenerales, consejos regionales, embajadas.
Visa y Sello: I (Bachillerato +5 años, Ingeniero, Master). Master of Science international.
Duración de la carrera: 5 años después del Bachillerato. Ciclo Preparatorio incluido (SUPINFO 1 y 2): 2 años después del
Coste de la escolaridad: Todo incluido cualquiera que sea el año: 4990 € al año de contado o 5190 € al año en pagosescalonados (sin incluir la seguridad social).
Financiamiento: honor del Consejo Regional y del Consejo General.
Las admisiones en SUPINFO se realizan exclusivamente en línea en:
www.supinfo.com/es
Los gastos de dossier son de 50€ pagables directamente en línea.
dossier será transmitido a la comisión de admisión SUPINFO, la cual se reúne cada semana a partir del mes de noviembre, cada año. En el caso de una admisibilidad se le tendrá al tanto por correo postal y por correo electrónico, usted podrá luego prematricularse en uno de los centros de su preferencia en Francia o en el mundo.
Los gastos de escolaridad son de 4990€ al año. Estos gastos no deben representar un obstáculo para un estudiante meritorio para proseguir sus estudios,
préstamos bancarios, prácticas remuneradas en empresas, actividades en el departamento de los servicios profesionales de SUPINFO, acuerdo de colaboración SUPINFO Empresas y para las regiones, bajo ciertas condiciones, becas regionales o departamentales y préstamos de honor. Siendo reconocida por el Estado francés, la escuela recibe a estudiantes becados de la enseñanza superior.
Una colaboración con el banco HSBC ofrece a los estudiantes SUPINFO ventajas excepcionales, consúltelas pinchando aquí:
www.supinfo.com/fi nanciamiento
La inscripción, de un alumno es válida por un año escolar y se realiza en dos momentos:
Después de una decisión de admisibilidad por la comisión de admisión (todas las admisiones se hacen de ahora en adelante según el dossier, sin examen y bajo reserva de la obtención de un título (bachillerato o universitario)) La preinscripción permite
pago para pagar sus gastos de escolaridad. La preinscripción se materializa con el boletín de preinscripción y con un pago inicial de 1000€.
candidatos directamente admisibles y preinscritos que pueden entonces inscribirse inmediatamente. Los candidatos admisibles bajo reserva de la obtención de un título (bachillerato o título universitario) y preinscritos tienen su plaza reservada hasta el 15 de julio (fecha límite). Cuando están en posesión de sus resultados, tienen que comunicarlos a SUPINFO en 15 días. En caso de éxito, se vuelven inmediatamente
caso de la no aprobación, no pueden ser admitidos en SUPINFO y su pago inicial le será reembolsado.
La inscripción se materializa con el boletín de inscripción y el primer pago de los gastos de escolaridad, según el modo de pago elegido:
los 1000€ de preinscripción.
22
Con una actitud resueltamente vanguardista y siempre al acecho de la integración de nuevas tecnologías en el seno de su programa, la Escuela Superior de Informática propone a lo largo de su carrera, todas las especialidades informáticas que el ingeniero generalista SUPINFO debe adquirir, dominar y poner al día con el paso del tiempo…
Este programa es validado en el Consejo de perfeccionamiento en presencia de los profesores,
de actores mayores de la industria informática pero también representantes del Ministerio de Educación
Nacional y de representantes de grandes empresas usuarias de sistemas de información en función de los avances de la búsqueda así como de la escogencia de mercado. Dada la evolución rápida de las tecnologías y de repercusiones sobre la enseñanza, el programa está regularmente actualizado.
SUPINFO, al disponer de un programa de intercambios y de colaboración a nivel Europeo e Internacional, ha adoptado el sistema europeo de transferencia de créditos llamados ECTS (European Credit Transfer System).
Este sistema forma parte del programa SOCRATES ERASMUS de la Comunidad Europea en el dominio de la enseñanza superior.
Los ECTS permiten a SUPINFO reforzar su dimensión Europea e Internacional rindiendo transparente sus programas de enseñanza para todos los estudiantes, tanto nacionales como extranjeros y facilitando su movilidad. Los ECTS contribuyen entonces al reconocimiento académico internacional del título de SUPINFO.
Cada año de estudio en SUPINFO, desde el primer año del ciclo preparatorio hasta el último año del ciclo de ingeniería, permiten validar 60 créditos ECTS. Los 5 años de la carrera SUPINFO permiten entonces obtener los 300 créditos ECTS necesarios a la validación de un Master of Science europeo.
El programa detallado y las fi chas ECTS se encuentran disponibles en:www.supinfo.com/ects-es
El Programa SUPINFO y el sistema ECTS
Institución de enseñanza superior privada fundada en 1965
ContenidoPedagógico
®o e
Escuela presente en el mundo entero
- 24 -
SUPINFO - 1 (L1) 25
SUPINFO - 2 (L2) 43
SUPINFO - 3 (L3) 59
SUPINFO - 4 (M1) 71
SUPINFO - 5 (M2) 79
- 25 -
Introduction and Generalities about AlgorithmicPresentation
Presentation, history of the languagesDefi nitionsGoalsHistoryProgram implementation programNotions in instructionsNotions in sequencingNotions in sequencing interruptionsThe 3 sequencesEntries conventions
Data structurePresentationThe 5 structures of elementary dataKey words, syntax, operators and associated symbolsElementary operations: statement, initialization, assignment statement and re-assignmentAdvanced data structuresResolved problems
Algorithmic structurePresentationRepetitive structures and conditional structuresRepetitive instructionsRepetitive instruction “as long as”Repetitive instructions “repeat until” and “repeat as long as”Repetitive instruction “for”Conditional instructionsConditional instructions “if…then” and “if …then…or else”Conditional instructions “case among” and “case among by default” (and variants)Resolved problems
Program structurePresentationMain programProgram modularityProcedure and functionThe qualities of a computer program
Advanced algorithmic structureConditional instructions: If…then and Case…among (and variants)Statement: if…then
Statement: is… then… or elseStatement: case…amongStatement: case…among…by defaultDiverse statements
Repetitive instructions: as long as and repeat (and variants)PresentationInstruction: as long asInstruction: repeat…untilInstruction: repeat…as long asEarly exit from loopNested loops
Repetitive instructions: forPresentationInstruction: forEarly exit from loopPersistence in a loopLoop with variable rangesLoop with variable step valueLoops with fi xed rangesLoops with nested ranges
Instructions to break overlapping sequencesProblem resolution 1Problem resolution 2Problem resolution 3Problem resolution 4
Advanced data structure: linear structuresArrays
PresentationArrays and array dimensionsBasic operationsExample
StacksPresentationBasic operationsAssociated primitivesPrimitive algorithmsExample
QueuesPresentationBasic operationsAssociated primitivesPrimitive algorithmsExampleImplementing using arrays
ListsPresentationBasic operationsAssociated primitivesPrimitive algorithmsExampleImplementation using arrays
Advanced program structureProgram modelling
PresentationProgram dividing into modulesModules representation in a graph
Main program, function and proceduresPresentationMain programFunctionProcedureMemory organization: reminderPointersGlobal variable and local variableFormal parameter and real parameter
RecursionDefi nitionCorrespondence between repetitive instruction and recursionAdvantages and constraints attached to recursionAssociated data structure: the stackExample
Global approach for the resolution of a problemProblem acknowledgmentData structures fi tting the problemAlgorithmic structures studyMain program, procedures and functionsPotential use of recursionProgram validation
Advance data structure: non-linear structures and fi lesRecordings
PresentationSimple recordings: basic operationsNested recordings: basic operationsExample
GraphsPresentationBasic operationsAssociated primitivesExample
TreesPresentationBasic operationsAssociated primitivesExample
FilesPresentationBasic operationsAssociated primitivesExample
Dynamic data structureData chainingDefi nitionData representation in memoryAdvantages and disadvantages
Data chaining: list representationPresentationSingle chained listDouble chained listLooped listImplementation of a single chained list using an arrayImplementation of a double chained list using an array
Data chaining: graph representationPresentation
ALGORITHMIC 62 h.
SUPINFO - 1 (L1)
26
Adjacency relation and adjacency listsPredecessor and successor notionsIncidence relationUtilization example
Data chaining: tree representationPresentation
Adjacency relation and adjacency lists“father-son” and “brother” relations notionsUtilization example
ARITHMETIC AND CRYPTOGRAPHY 32 h.
Theoretical course in arithmetic: defi nitions, language, properties and main theoremsDivision in Z
IntroductionDefi nition, remarks and examplesElementary properties: proposition and remarkDivision algorithm in Z: theorem and defi nitionPrinciple of the division algorithm: Euclidian algorithmDivision algorithm: application example
Divisibility in ZGreatest common divisor (GCD): introductionGCD: theoremGCD calculation example using the Euclidian algorithmGCD calculation exampleGCD propertiesGCD and prime numbersExtended Euclidian algorithm and Bezout’s theoremDiophantine equationLeast common multiple of two integers: theorem and defi nitionLeast common multiple practical calculation
Prime numbersDefi nition and fi rst propertiesInteger factorization: existence, uniqueness and notationsArithmetic’s fundamental theorem and its applicationsInfi nitude of the prime numbers: function and a few famous prime numbersAlgorithmic aspects: Sieve of EratosthenesInteger search algorithmPrime decomposition application: a fi rst theoremPrime decomposition application: examplesPrime decomposition application: a second theoremPrime decomposition application: examples
CongruencySimulation PracticeTheorem and meaningDefi nition: “x congruent to y modulo n”RemarksNumeral systemNumeral system -2Applications
Introduction to cryptographyIntroduction – presentation
HistoryA few words: cryptology, cryptography and cryptanalysisThe role of arithmetic in cryptographyThe reasons for cryptographyThe goals of cryptography
Cryptography principlesPresentation – principleEncryption, decoding and keysSymmetric key and public key encryptionSymmetric keyPublic keyOne-way functions
Arithmetic and cryptographyEncryption of alphabetical characters
IntroductionCommon principles to all encryption modesMonographic encryption: the Julius Cesar cipherDecoding
Encryption by affi ne transformationDecoding and the Bezout theoremDecoding and the Bezout theorem – 2Affi ne transformation decoding using extended Euclidean algorithmAn example of cryptanalysisAn example of cryptanalysis - 2
Poly-graphical encryption (or block encryption)IntroductionEncryption systemEncryption system – 2DecodingThe crypto-analyst’s riposte
Encryption by arithmetic exponentiationPresentation of the encryption modeExponentiation encryption principleExampleEncryption’s exponential costDecoding: Fermat’s little theoremFermat’s little theorem – 2Decoding costCode resistance to cryptanalysisCode resistance to cryptanalysis - 2
“Public key cryptography“: the RSA systemThe public-key encryption systemBasic principleThe public-key system’s mechanismHow is the encryption done?Decoding principleEncryption and decoding costsThe impossible mission facing the crypto-analystConclusion
Activity themes Base switching
IntroductionFrom the decimal numeral system to the binary numeral systemFrom the binary numeral system to the decimal numeral systemCase when the base is the others power factorCase when the base is the others power factor – 2
Divisibility PresentationControl keysI.N.S.E.E. numberR.I.B. numberI.S.B.N. numberUPC codeRepartition of the terms of a sequence in an array
Affi ne encryptionAffi ne encryption principle: a reminderThe keys: encryption functionsDecoding functionsCryptanalysis
Error correction codesHAMMING correction codeHAMMING correction code – 2The correction limits
MATHEMATICS FOR FINANCIAL USE 32 h.
Reminders: Equations, Percentages1st and 2nd degree equation solving
1st degree equations: method and principle1st degree equations: examplesEquation products
Problem resolution through an equation: situation and methodProblem resolution through an equation: examples2nd degree equations2nd degree equations - 2
Linear systems (simple models) equation solving
SUPINFO - 1 (L1)
- 27 -
Presentation – frameworkResolution methodResolution method - 2
PercentagesCalculating the % of a valueDetermining a %Adding or subtracting a %Calculating an indirect %Calculating successive %Calculating % by blocks
Simple interests (short term fi nancial operations)IntroductionWhat is a simple interest?Difference between simple interest and compound interestUses for simple interestsUses for compound interestsIn practice…
Basic defi nitionsSimple interest: defi nitionInvestment durationInterest rate: annual rates and periodic ratesRemarksProportional rateAverage rate of various investments
Calculation principlesNotationReturn on investment calculationReturn on investment if the duration is given in yearsReturn on investment if the duration is given in daysReturn on investment if the duration is given in monthsReturn on investment if the duration is given in trimestersExample 1Example 2In shortSimple interests applications
Compound interests (long term fi nancial operations)Interests and return on investment resulting from long term investment
Return on investment: defi nition and notationCalculation of the return on investment if the number of investment periods is an integer nExampleCalculation of the return on investment in the number of investment period is not completeApplication exampleReturn of interest on an investmentRemark
Investment capital determination (net value)1st method: formula2nd method: using the fi nancial tableExample 1Test: Practice
Investment rate calculation; calculation of an investment’s duration; equivalent rate
Calculation method of an investment rateExampleCalculation method of an investment’s durationExampleTest: Practice
Current value of a capital or of compounded interestsDefi nitionsSignifi cationCapitalization and realizationExamplePractice
Annual instalments: repayment (long term fi nancial operations)Annual instalmentCharacteristicsAnnual instalment periodicityExamplesNumber of payments in an annual instalmentPayments amount in an annual instalmentExampleDate of deferred annual instalments
Annual instalments capitalization and return on investmentCalculation methodInterpretationExamplesExceptional case of constant annual instalments: beginning of period annual instalmentsExceptional case of constant annual instalments: end of period annual instalments
Annual instalments repayment and net value of a loaned capitalRemindersRepayment instalments: defi nitionRepayment instalments: calculation methodNet value of a loaned capitalInterpretation: instalment/loanRemarkExampleExceptional case of constant annual instalments: beginning of period instalmentsExceptional case of constant annual instalments: end of period instalments
Determination of an annual instalment amount; determination of the duration of capitalization or of the repayment
How to determine the amount of the annual instalmentExampleDuration of the capitalization or of the repayment: calculation methodExamplePractice
Presentation - HistoryMathematical logic
A few historical factsNotions
PropositionsDefi nitionsTable of truthNegation of a propositionBinary connectorsBinary connectors – 2PropertiesProperties - 2
PredicatesIntroductionUsual quantifi ersMultiple quantifi ersQuantifi ers’ propertiesQuantifi ers’ properties – 2In shortPractice
Set language theoryIntroductionDefi nitionsSet cardinalSymbols: defi nitionSymbols: in short
Symbols: a reminder of the propertiesComplementsExample Cartesian product of two sets
ApplicationsDefi nition and basic terminology
FunctionsApplicationsImage setImage and premiseCardinal of the applications set
Direct image and inverse imageDefi nitionsPropositions
Injectivity, surjectivity and bijectivity Defi nitions and graph interpretationsDefi nitions and graph interpretations – 2Applications and fi nite setsApplications and fi nite sets – 2Examples
Compound applications and inverse applicationsCompound applications: defi nitions and propertiesInverse applications: defi nitions and properties
Binary relationsDefi nitions and basic terminology
Binary relation
SET THEORY 44 h.
SUPINFO - 1 (L1)
28
Presentation of the various types of binary relationsSymmetryAnti-symmetryTransitivityPractice
Order theoryDefi nitionExamplesEquivalence relation
The principles of mathematical reasoning: the proof methodsVocabulary
Axioms and theoremsReasoning by AbsurdThe contraposition proposalThe contraposition proposal and the reciprocalThe counter-exampleThe recurrence
Proof method by recurrenceDefi nitionsThe recurrence principle evidenceAdvicesExample 1Example 2Practice
Proof method by absurdDefi nitionExamplePractice
Boolean algebraDefi nitions and properties
Major axioms of the Boolean algebraPrimordial remarkMain propertiesMain properties - 2The MORGAN lawsEquivalence between Boolean algebra and the propositions language and sets languageStop and think: Practice
Boolean functionsIntroduction, defi nitions2 variables Boolean functions3 variables Boolean functionsMain properties of the Boolean functionsMain properties of the Boolean functions
Canonical writings of a Boolean functionVocabularyVocabulary - 2Notations and representationsConjunctionsConjunctions - 2DisjunctionsDisjunctions - 2Properties of canonical writingsExample and link with computingIn short
Graphical representation of Boolean functions: Karnaugh diagramPrinciple, conventionPrinciple, convention - 2Boolean expression diagram: complementary, product, additionPracticeCartesian product of two sets
EVERYDAY SITUATIONS - INTERMEDIATE +Window-shopping
You go into town to shop with a friend. Give your opinion about which products to buy.The fi tting room
You go clothes shopping. Learn the name of items of clothing and compare them. Discuss size and colour.
Grocery shopsAsk for advice on ingredients and cooking while grocery shopping.
At the supermarketYou go food shopping with your child. Learn vocabulary related to products found in supermarkets.
An emergencySeek assistance for an injured person. Learn basic medical vocabulary.
At the doctor’sYou feel ill. Describe your symptoms and discuss treatments with a doctor.
A driving lessonFirst driving lesson. Get familiar with the car and its functions, the Highway Code and driving on the road.
PROFESSIONAL SITUATIONS – AVANCEDAgreeing to meet
Deal with a business call. Assist the caller and take their name and number. Arrange an appointment and respond to their questions.
Business callsYou make arrangements to have a stand at a trade fair. Explain your requirements in detail
The company standSpeak to a client at a trade fair. Detail the features of your product and convince the client of its merits. Arrange an appointment for a product demonstration.
Comparing productsConvince someone of the quality of your product.
Making a saleYou meet a client who would like to place an order. Discuss product type and price. Negotiate the discount. Agree the delivery date.
NegotiatingNegotiate the specifi c details of an order. Convince your client to choose your product over that of your competitor.
Trouble with ordersReply to a dissatisfi ed customer. Apologise for problems and try to fi nd a compromise.
After-sales serviceDeal with an angry customer. Attempt to fi nd solutions to their problems. Arrange assistance
Handling an invoiceYou phone a client whose invoice is overdue. Ask when payment can be expected and arrange terms.
Deferring paymentFind a solution with a customer whose payment is overdue.
Organising a stay
A client would like to pay your company a visit. Give advice on where to stay and leisure-time activities. Ask for details of the trip.
Welcoming visitorsAsk practical questions about a client’s visit. Propose various leisure-time activities to be included in the visitor’s itinerary.The training course
Set up training programmes. Organise a training workshop, decide on the sort of training required and who will need training.
Job searchAt a recruitment agency. Look for jobs in management. Talk about your professional experience. Go for an interview.Starting a new job First day at a new job. Sign the contract, settle into your offi ce, and meet your colleagues. Talk business.
EVERYDAY SITUATIONS - ADVANCEDA car trip
You go on a car trip. Express your agreement/disagreement and reach a compromise. Describe the features of a car. Ask for precise directions.
On the motorwayGive advice about the way someone is driving. Ask for petrol at a petrol station and have a conversation with a police offi cer.
At the airportCheck in your bags at the airport and state your seating preferences. Go through customs.
On the planeAsk questions about what happens during the course of a fl ight. Ask the fl ight attendant for various items you need during your journey. Pick up your luggage on arrival.
At the stationYou want to buy a train ticket. Say what kind of ticket you want and ask for the departure and arrival time of a train.
On the trainYou take the train. Speak to the ticket inspector and reply to his questions. Make conversation with another passenger.
Customs checksYou go through the formalities at customs. Show your passport and respond to the questions posed by the customs offi cer
The luggage searchYou declare goods at customs. Respond to the customs offi cer
Hotel reservationsYou need a hotel room for the night. Explain which kind of room you would like and enquire about meal times and the cost of your stay.
Staying in a hotelEnquire about hotel facilities. Talk about your hotel stay.
A tour of the townYou go on a guided tour of a town. Ask questions about the different buildings you encounter while sightseeing.
Foreign language: BRITISH ENGLISH 1 70 h.
SUPINFO - 1 (L1)
- 29 -
A tour of the castleYou take a tour of a medieval castle. Ask questions about the castle and express your feelings about your visit
FINANCIAL MECHANISMS 15 h.
Introduction to fi nanceWhat is a balance sheet?What is an income statement?
What is a «by-function» income statement? (IFRS standard)Intermediate marginsUnderstanding consolidation
PROJECT MANAGEMENT 15 h.
Project managementDefi ning a project and everyone’s role in itUsing milestones to conduct a projectSplitting up your projectOrganizing a project and negotiating for resourcesLaunching a project, ensuring the conditions for its success
Controlling your projectClosing your projectManaging project riskManaging human factors in projectsPost-project change management
PERSONAL SKILLS 4 h.Manage your stress
What is stress?Analyze and assess your stressFacing up to the typical stresses of being a manager
PERSONAL EFFICIENCY 17 h.
Formulating your goalsWhat is a good goal?Fix your goals clearly to reach them better
Boost your everyday effectivenessRemembering betterTaking effective notesCommunicating powerfully by email
Time managementAnalyze the organization of your work and your prioritiesRecognize the factors in time-wastingUse the tools for planning and rememberingHow to deal with everyday interruptionsHow to manage trouble-makers
Building a high-performance teamWhat is a team?The 4 stages of team developmentLaying your team’s foundationCreating a united teamDeveloping team performance
Managing ideas in your teamGetting ideas to emergeHelping ideas to materializeMaking the most of your innovative colleaguesHelping develop complex ideas in your company
Effective meetingsHow to prepare your meetings by using the CPA methodHow to keep your meetings under control from the very startMastering presentation supportsHow to run meetings effi cientlyHow to conclude your meetings
Managing interpersonal disputesUnderstanding the process of confl ictHow to say things are wrong using the DESC methodDealing with a crisis situationUsing transactional analysis in confl ict managementUsing transactional analysis in confl ict management
TEAM MANAGEMENT 24 h.
COMPUTER ARCHITECTURE 80 h.
The mathematic conceptsDigital advantages
Continuous data and discrete data notions From continuous to discrete: the Sampling notionFrom discrete to continuousContinuous data scope (analogical electronics, loud-speakers…)Discrete data scope (numerical electronics, encryption…)
Binary arithmetic
History of binary numbersFrom binary positive binary integer to positive decimal integerFrom positive decimal integer to binary positive integerAdding two positive binary integerSubtracting two positive binary integer (direct method)Negative binary integer coding Subtracting two positive binary integer (adding of the opposite)Multiplying two binary integer
SUPINFO - 1 (L1)
30
Dividing two binary integersOther encryptions
Real binary numbers with position-locked commaReal binary numbers with fl oating comma (IEEE 754 coding)Adding and subtracting two coded real binary numbers following the IEEE 754 codingMultiplying and dividing two coded real binary numbers following the IEEE 754 codingHexadecimal codingOctal coding and DCB codingCharacter coding (EBCDIC, ASCII, UNICODE)
Boole’s algebraWenn diagrams and operations on the wholePredicates and associated operationsSynthesis: truth table of the various operatorsPresentation of George BooleDefi nition and properties of the operators +, xThe duality principle and the Morgan lawAnalogies between the operators -,? And / applied to the predicates and the operators +,x (using the truth tables)The = operatorThe Karnaugh tables
Logical gates construction Semiconductor materials
A reminder of the electronic structure of the matterAtomic orbital and their fi llingMaterials classifi cationEnergy bandsConductor materials, insulating materials, semiconductor materialsPresentation of silicium, boron and phosphorPositive dopingNegative doping
Semiconductor electronic componentsDiodeBipolar transistor (BJT)Field effect transistor (JFET)Field effect transistor (MOSTFET)The TTL logic and the CMOS logic
Gates constructionThe AND gateThe OR gateThe NO gateThe NO-AND gateThe NO-OR gateThe Exclusive OR gateThe 3 states gate
Industrial processes for semiconductors conceptionThe wafer creation (pellets and production of silicium) and of masksSubstratum creation (epitaxy, oxidation and varnishing)Doping zones creationIonic implantation and depositsOxidation and interconnection within a single layerPolishing and interconnection between the layersInspection and test
Logical gates interconnection in electronic circuitsCombinatorial circuits
EncoderDecoderMultiplexerDemultiplexerComparatorParity controlHalf adder and full adder 1 bit and N bitsHalf subtraction and full subtraction 1 bit and N bits
Sequential circuitsSwitching timeSet-reset fl ip-fl op (RS)RST fl ip-fl opD fl ip-fl opJK fl ip-fl opT fl ip-fl opLatches and fl ip-fl opsParallel registersShift registersDeterministic or non-deterministic counters
Memory conceptionRandom access memory
Operating principle of RAMThe RAM organizationThe RAM reading cycleThe RAM writing cycleThe RAM reading-modifying-writing cycleReading or writing in the page modeSynchronized accessesFIFO and FILO accesses
Assembling RAM blocksDifferences between SRAM and DRAM
DRAMFMPEDOBEDOSDRAMDDR SDRAMDDR II
SRAM and cachesThe cache’s utilityData location in time and spaceDirect correspondenceAssociative correspondenceReading data (hit cache and miss cache)Cache levels (inclusive and exclusive functioning)
ROMsOperating principles of the ROMOrganization of the ROMThe ROM reading cycleThe PROMEPROM and EEPROMProgrammable logical circuits (PAL, SPLD, EPLD, CPLD, FPGA)
The CPU and its environmentALU and internal registers conception
Setting up the elements of an ALU 1 bits (adder, comparator, AND, OR…)Elements necessary to choose the operationSetting up data registersElements necessary to choose the data registerALU interconnection – internal registers: data buses
Time management and outside connectionsThe quartz crystal and its piezoelectricity propertiesQuartz clocksProcessor sequencerSetting up the ordinal counterSetting up the addresses registersConnection of the internal addresses bus with the central storage through the external address busConnection of the internal data bus with the central storage through the external address bus
Instructions for set linkingSet linking notionsImplantation of the set linking in the processor in the instructions decoderThe processor control internal bus
CPU operatingDescription of the CPU operating through a case studyThe 4004 case fi gure
CPU programming: Assembler level 18086 presentation
8086 external view8086 internal viewGeneral registersIndex registers and pointer registersSegmentation registersIP registerThe state register
Presentation of the EMU 8086 environmentThe programming environmentThe execution environmentThe assembly and opcode notionThe execution
Basic handlingAddition, subtraction with or without carry-valueMultiplication and divisionDirect addressing and addressing through register
JumpsConditional and non conditional jumpsThe CMP instructionThe LOOP instruction and CX register
The microprocessor programming: assembler level 2Video memory (case of CGA card)
The monitorThe screen controllerThe organization and the direct handling of the video memory
ProceduresThe PROC and ENDP directivesThe CALL and RET instructionsSafeguarding the information in the stack (PUSH instruction)Recovering the information in the stack (POP instruction)
Variables manipulation Character chainingArrays
Interruptions
SUPINFO - 1 (L1)
- 31 -
Interruptions principlePositioning the pointer and writing character chainsThe keyboard management
Introduction to PCIT industry certifi cations
Education and certifi cationsCompTIA A+ certifi cationEUCIP certifi cation
Describe a PCCases and power supplies
CasesPower supplies
Internal componentsMotherboardsCPUsCooling systemsROM and RAMAdapter cardsStorage drivesInternal cables
Ports and cablesInput devicesOutput devicesSystem resources and their purposes
Safe lab procedures and tool useSafe working conditions and procedures
Potential hazards for usersEquipment protection from damage and data lossProtecting environment from contamination
Tools and software used with PC componentsHardware toolsSoftware toolsOrganizational tools
Proper tool useAntistatic wrist strapAntistatic matVarious and toolsCleaning materials
Computer assemblyOpen the caseInstall the power supplyInstall the components to the motherboard and install the motherboard
CPU and heat sink/fan assemblyRAMMotherboard position
Install internal drivesInstall drives in external bays
Optical driveFloppy drive
Install adapter cardsNICWireless NICVideo adapter card
Internal cablesPower cablesData cables
Re-attach the side panels and connect external cablesRe-attach the side panels to the caseConnect external cables to the computer
Boot the computer for the fi rst timeBeep codesBIOS setup
Basics of preventive maintenance and troubleshootingPurpose of preventive maintenanceSteps of the troubleshooting process
Purpose of data protectionGather data from the customerVerify the obvious issuesTry quick solutions fi rstGather data from he computerEvaluate the problem and implement the solution
Fundamental operating systemsPurpose of an operating system
Characteristics of modern operating systemsOperating system concepts
Comparison of operating systemsDesktop operating systemsNetwork operating systems
Determine operating system based on customer needsApplications and environments compatible with an operating systemMinimum hardware requirements
Install an operating systemHard drive setup proceduresHard drive preparationInstall the operating system using default settingsAccount creationInstallation completionCustom installation optionsBoot sequence fi les and registry fi lesManipulate operating system fi lesDirectory structures
Navigate a GUI (Windows)Manipulate items on the desktopControl panel appletsAdministrative toolsInstall, navigate and uninstall an applicationUpgrading an operating system
Common preventive maintenance techniques for operating systemsCreate a preventive maintenance planSchedule a taskBackup the hard drive
Troubleshooting operating systemsTroubleshooting processCommon problems and solutions
Fundamentals laptops and portable devicesDescribe laptops and other portable devices
Some common uses of laptopsSome common uses of PDAs and smartphones
Components of a laptopExternal componentsInternal componentsDocking station
Compare and contrast desktop and laptop componentsMotherboardsCPUsPower managementExpansion capabilities
Confi gure laptopsPower settingsSafe installation and removal of laptop components
Different mobile phone standardsCommon preventive maintenance techniques for laptops and portable devices
Appropriate cleaning proceduresOperating environments
Troubleshoot laptops and portable devicesTroubleshooting processCommon problems and solutions
Fundamental printers and scannersTypes of printers currently available
Characteristics and capabilities of printersPrinter to computer interfacesLaser printersImpact printersInkjet printersSolid-ink printersOther printer types
Installation and confi guration process for printersSet up a printerPower and connect the device using a local or network portInstall and update the device driver, fi rmware and RAMConfi guration options and default settingsOptimize printer performancePrint a test pageShare a printer
Types of scanners currently availableScanner types, resolution and interfacesAll-in-one devices
COMPUTING CULTURE 16 h.
SUPINFO - 1 (L1)
32
Flatbed scannersHandheld scannersDrum scanners
Installation and confi guration process for scannersPower and connect a scannerInstall and update the device driverConfi guration options and default settings
Common preventive maintenance techniques for printers and scannersPrinter maintenanceScanner maintenance
Troubleshoot printers and scannersTroubleshooting processCommon problems and solutions
Fundamentals networksPrinciples of networking
Computer networksBenefi ts of networking
Types of networksLANWANWLANPeer-to-peer networksClient/server networks
Basic networking concepts and technologiesBandwidth and data transmissionIP addressingDHCPInternet protocols and applicationsICMP
Physical components of a networkNetwork devicesNetwork cables
LAN topologies and architecturesLAN topologiesLAN architectures
Standards organizationsEthernet standards
Cabled Ethernet standardsWireless Ethernet standards
OSI and TCP/IP data modelsTCP/IP modelOSI modelCompare OSI and TCP/IP
Confi gure a NIC and a modemInstall and update a NIC driverAttach computer to existing networkInstall a modem
Characteristics of other technologies used to establish connectivityTelephone technologiesPower line communicationBroadbandVoIP
Common preventive maintenance techniques used for networksTroubleshooting processCommon network problems and solutions
Fundamental securityWhy security is important?Security threats
Viruses, worms, TrojansWeb securityAdware, spyware and graywareDenial of serviceSpam and popup windowsSocial engineeringTCP/IP attacksHardware deconstruction and recycling
Security proceduresBasic local security policyTasks required protecting physical equipmentWays to protect dataWireless security techniques
Common preventive maintenance techniques for securityUpdate signature fi les for anti-virus and anti-spyware softwareInstall operating systems service packs and security patches
Troubleshoot securityTroubleshooting processCommon problems and solutions
Communication skillsRelationship between communication and troubleshootingGood communication skills and professional behaviour
Determine the computer problem of the customerDisplay professional behaviour with the customerFocus the customer on the problem during the callUse proper netiquetteImplement time and stress management techniquesObserve Service Level AgreementsFollow business policies
Ethics and legal aspectsCall centre environment and technician responsibilities
Call centre environmentLevel-one technician responsibilitiesLevel-two technician responsibilities
C Language – level 1Language presentation
Language families – history and evolutionDevelopment principle of a C programC program structure (instruction, instruction void, bloc, commentary)Brief presentation of GCC and Visual Studio
DataNotions of variable and affectationThe Void typeThe char, unsigned char, short, unsigned short typesThe int, unsigned int, long, unsigned long typesThe fl oat, double and long double typesThe defi ned by #defi ne constantsThe defi ned by const constantsThe “sizeof” operator
Basic operationsThe notion of expressionThe arithmetic operations (+,-,*,/,%,+=,-=,*=,/=,%=,++,--)The logical operations (&,|,^,”,<<,>>,&=,|=,<<=,>>=)The relational operators (==,!=,>,<,>=,<=)Type conversionComplex expressions and priorities between operators
Control structuresThe “if…else” structure and the conditional operator (?)The “switch…case” structure and the breakThe “for” structure and the sequential operator (,)The “while” structure
The “do…while” structureThe gotoThe continue
C language – level 2Functions
Function notion (the signature, the body, the importance of the main)The notion of passage through valueThe notion of life-span and of variable reach
Standard libraryThe entry-exit notionThe printf functionThe entry-exit formattingThe scanf functionExample: writing and using of the Euclidian2distance function
Development modularizationThe module notionThe project notionThe Makefi le fi le creationThe header fi les and the body fi lesThe headers protection using #ifdef, #defi ne, #endif
C Language – Level 3Complex data structure
The structuresThe unionsThe enumerationsThe arrays and the indexation operatorThe user type declaration using typedef
WEB AND DEV TECHNOLOGIES: C LANGUAGE
52 h.
SUPINFO - 1 (L1)
- 33 -
Functions and complex dataFunctions and structuresFunctions and unionsFunctions and arraysImplantation of lists and stacks using arraysThe listThe FIFO stackThe FILO stack
C Language – Level 4Pointers
The address pointerThe pointer notionThe creation of a pointer and the * operatorThe & operatorThe pointers and the structures (the operator ->)Arithmetic of pointersAllocation and freeing the memory
Pointers and complex typesThe array pointersThe chain of characters pointersThe structure and union pointersThe pointer arraysThe pointer pointers
Functions and pointersThe notion of passage through addressThe function pointersThe recursive functions
Lists and trees implantationThe variable size listThe chained and double-chained listThe chained by indirection list The binary tree
C language – 5Files
The fi les notion The text fi leThe binary fi le
File managementThe FILE typeOpening and closing a fi le (fopen and fclose)Reading and writing a character (fgetc and fputc)Reading and writing a chain of characters (fgets and fputs)Reading and writing of a formatted chain of characters (fscanf and fprintf)Location in a fi le (fseek)
Socket managementCommunicating through socket principleThe server socket (creation, bind, listen, accept)The client socket (creation, connect)Reading and writing a chain of characters (read and write)Blocking socket and non-blocking socket (fnctl)
C Language – 6Development modularization
The .a fi le creationThe .so fi le creationThe .dll fi le creation
The program and its environmentThe parameter passage from the command lineThe variables environmentThe BIOS and the OS interruption call from a program
Pre-processorThe macrosThe conditional compilation
Additional optimizationsThe memory classes (auto, register, extern and static)The code documentation with doxygen
Discover event-driven programmingHistory of the languagesEvent-driven programming versus procedural programming
Object programming, a basis of event-driven programmingObject notionClass notionObject membersEncapsulation notionsInheritance notions and class hierarchyPolymorphism notions
Build your fi rst event-driven programming application with Visual Basic 2005Defi nition of the user interface WinformAssociated event-driven programming model Life cycle of an application, part of event-driven programming
Visual Basic 2005 and .NET Framework 2.0The .Net Framework 2.0: Basis of OOP – event-driven programming in VB2005What kind of applications are built in event-driven programming – OOPVisual Basic 2005 language
FunctionalitiesOperatorsConditional instructions
Repetition loopsError managementWhat’s new in Visual Basic 2005 language?
Event-driven programming and OOP in the contemporary developmentsEvent-driven programming, OOP and Winform
Frame of Winform projectWinform controlsThe event-driven model of Winform
Event-driven programming, OOP and WebformFrame of Webform projectWebform controlsThe event-driven model of Webform
Event-driven programming, OOP and MobilFormFrame of MobilForm projectMobilForm controlsThe event-driven model of MobilForm
Integrate your events to your business objects
EVENT-DRIVER PROGRAMMING 34 h.
CISCO TECHNOLOGIES: CCNA 1 AND 2 50 h.
Introduction to networksNetwork connection
IntroductionMeasure unitsThroughput and bandwidthBasics on computers
Main componentsPeripheralsBackplane components
Numbering systemsThe different numbering systemsConversions
Network terminologyPANLAN
MANWANSANVPN
OSI and TCP/IP modelsOSI model
CharacteristicsLayersPDU (Protocol Data Unit)
TCP/IP modelCharacteristicsLayersComparison with the OSI model
Layer 1: Medias and network devicesSignal
SUPINFO - 1 (L1)
34
PropagationAttenuationRefl ectionNoiseDispersionJitterLatencyCollisions
Types of mediasCopperCoaxialFibreWireless
Layer 1 devicesHub & repeaterCollision domain
TopologiesBusRingStarHierarchicalMeshed
Layer 2: Ethernet technologiesIntroduction to Ethernet
LAN technologyEthernet technologyEthernet in the OSI model
Ethernet processFramesCollision problemCSMA/CDHalf & Full Duplex
Layer 2: Ethernet switchingCollision domain
Defi nitionSegmentation
Segmentation of a LANSegmentation devicesFrame switchingSpanning Tree
Layer 3: IP protocolPrinciple
Main conceptsRouted and routing protocols
IP protocolIP addressingDifferent IP addressesClassesSpecifi c ranges
IP address managementBOOTPDHCPARP & RARPICMP
Layer 3: SubnettingSubnetting purpose
Principle and purposeStructure of an IP addressDefault subnet mask
Calculation methodGeneral method2n-2 ruleMagic number
Layer 3: Introduction to routingPrinciples
Switching typesRouter
Broadcast domainBroadcast domain
Routing table and best path determinationPrincipleRouting processPath determinationRouting typeAS - IGP & EGPStatic routingDynamic routing
Layer 4, 5, 6 and 7Layer 4: Transport layer
UDPTCP
Layer 5: Session layerPurpose
Layer 6: Presentation layerFormatEncryptionCompression
Layer 7: Application layerPrincipleDNSHTTPFTPTelnetSNMP
SNTPWAN networks
Defi nitionsDefi nitionsMain characteristicsWAN devicesWAN normsPhysical layerData link layer
WAN technologiesCircuit switched servicesPacket/cell switched servicesDedicated servicesOther services
Introduction to routersPresentation of a Cisco router
Internal componentsExternal routers
Physical pluggingLAN and WAN interfacesConfi guration access
Cisco IOS operating systemPrinciple and specifi cationsCommand modesHelp systemAdvanced editing commandsCommand historyConfi guration fi les
Basic router confi gurationShow commands
Command listingBasic commands
Date and timeHostname and name resolutionDescription and connection banner
Access to the routerPasswordsHTTP serverMain conceptsLoopback interfacesEthernet interfacesSerial interfaces
Information and access to other devicesCDP protocol
TheoryConfi gurationVerifi cation
Telnet protocolTheoryConfi guration and use
Startup process and IOS managementStartup process
Boot sequenceBoot system commandsConfi guration registerSETUP mode
IOS managementMain conceptsFile system managementRXBoot mode
RoutingFundamentals of routing
Routing and switching functionsForwarding processRouting table(s)
Static and dynamic routing, convergence, routing loops and solutionsStatic and dynamic routing, characteristics and comparisonConvergenceRouting loopsFinite state metricSplit HorizonRoute Poisoning
SUPINFO - 1 (L1)
- 35 -
CHECK POINT TECHNOLOGIES: CCSPA 20 h.
General aspects of the network securityThe Check Point network security
The four main principlesPurpose of the Check Point security
Risks and vulnerabilitiesThreats and vulnerabilitiesBudget managementStrategies, solutions and countermeasures
Network attacksIntrusion and attack typesAttack techniques
BaseliningIntrusion test
Security policiesThe perpetual process of security (Security Wheel)Objectives of security policySecurity policies
Types of security policiesMethodsApply a security policyManage security policies
Operational securityOPSEC lawKnow his opponentSecurity controls
Effi cient communication on securityObjectivesNeeds in term of trainingTrainingNeeds on term of communication
Business Continuity PlanConception of a BCPTest of a BCPLife cycle of a BCPScenariosCommon scenarios Rare scenarios
Access controlAccess control modelsAccess control methods and managementIdentifi cation and authenticationAccess control technologies
CryptographyA brief historyHow the cipher works?
Cipher algorithmsDesign of secured network architecture
Principle of secured designEconomy mechanismFail-Safe DefaultsComplete mediationOpen DesignPrivilege separationThe least privilegeLeast common mechanismPsychological acceptancePrinciple and reality
EquipmentsSwitchRouterFirewallProxyIDS/IPSVPN
Secured network architectureIsolate servers from usersAccess restrictionGateway security
Security for small size networksRemote Offi ce / Branch Offi ceSecurity questions for ROBOSecurity needs for ROBOSecurity solutions for ROBORemote usersSecurity questions for small corporationsSecurity conditions for small corporationsSecurity solutions for small corporations
Intranets, extranets and virtual corporationsIntranetsEnterprise private networksThe defense per levelAuditsUse of cryptographyImplement access control models
MonitoringPrinciple of workingSNMP
IntroductionProcessMIBSNMP – Security is Not My Problem
Triggered updatesHold-down timers
Distance vector and link state routing, interior and exterior routing, autonomous systemsDistance vectorLink stateAutonomous systems, IGP and EGP
Default confi guration, static routing and state visualizationCommands and confi guration
RIP protocolTheory
Main conceptsProcess
Confi gurationCommandsConfi guration process
Verifi cationState visualization commandsDebugging commands
TheoryMain conceptsProcess
Confi gurationCommandsConfi guration process
Verifi cationState visualization commandsDebugging commands
Troubleshooting and ICMP protocolTheory
Features
Verifi cation commandsMessage typesEcho Request/ReplyDestination UnreachableParameter Problem and Source QuenchRedirect/Change RequestTimestamp Request/ReplyInformation Request/Reply, Address Mask Request/Reply, Router Discovery/Solicitation
Common problems and debuggingCommands and verifi cationCommon problems and the OSI modelDebugging
Password recovery process for a routerProcess and commands
ACLsTheory
FundamentalsWildcard mask
Standard ACLTheory and commandsApplication and debugging
Extended ACLTheory and commandsApplication and debugging
Named ACLTheory and commandsApplication and debugging
SUPINFO - 1 (L1)
36
Web developmentPresentation and history of Internet
IntroductionHistoryThe standardsThe client/server model
Protocols and standardsW3CThe validationWhy a standard?
HTML, XHTML & CSSPresentation of the descriptive language
Descriptive languageThe differencesThe advantages
HTML languageThe (X)HTMLLayoutArrayFrameForm
Development, installation and maintenance of an internet site
How install IISHow confi gure IISManaging of IIS
CSS, ergonomics and accessibilityWeb designCSS
JavaScriptIntroduction and syntax
PresentationBasic syntax
FunctionsIntroductionDeclarationUsing
Advanced JavaScriptFormsEventsObjects modelling
DOMIntroduce the D.O.M.Manipulate an HTML page
WEB AND DEV TECHNOLOGIES: HTML and Javascript
40 h.
NagiosPresentation of NagiosGeneralitiesArchitectureMost widely used features
Use of Centreon with NagiosGeneralitiesFeatures
Installing Centreon
PrerequisiteInstallationConfi guration
Use of CentreonHome pageMonitoringReportingOreon viewsIdentity fi les
IntroductionLinux history
What is UNIX?Why UNIX?UNIX philosophyLinux’s birthLinux distributions
Mandriva’s historyLicenses
Open Source and proprietary softwareFree Software and licenses
The fi lesystem hierarchy//usr/var
Shell introductionIntroduction
Shell descriptionShell descriptionThe ShellUse help
Basic commandsFiles and folders manipulationsRead a fi leFilename and globing
FilenamesFile types
GlobingVIm Editor
Start VImCommand modeInsert Mode
EmacsUsing the editorBasics keyboard commands
Archiving and compress with gzip, bzip2 and tar The tar command gzipbzip2
File research fi nd command slocate - locate
Pipes and Redirections StandardsRedirectionsPipes
Users and groups management The users
The /etc/passwd fi le The /etc/shadow fi le
GroupsUser management commands
Adding an user Deleting an user To change an user’s password Displaying user information
Group management commands Adding a group Deleting a group Modifying an account secondary group Displaying information on groups
Identity switching The Userdrake utility
Permissions management
LINUX TECHNOLOGIES: Mandriva Certifi ed User (MCU)
50 h.
SUPINFO - 1 (L1)
- 37 -
Owner Changing a fi le’s ownership Changing the owner group Three types of permissions Modifying permissions
UmaskSpecial rights
SUID SGID Sticky bit
DrakPerm Access Control Lists (ACL)
Disks management Hard-disk
Partitions Access to storage devices Disk quotas Management of IDE devices
Process management What’s a process? Send signals to processes Background, foreground and detachment Modify Scheduler priority Task manager The crontab command The crontab system fi le The at command
Network management PreambleManual hardware confi guration
Kernel confi guration The ndiswrapper solution
Network confi guration Command-line confi guration Network confi guration with DrakConnect Troubleshooting tools
Sed and Awk Sed
IntroductionUsing sed Commands
Awk IntroductionUsing awk Display and variables FunctionsPatternsBegin and End Conditional structures
Scripting with Bash IntroductionScript creation and invocation
Script creation Script invocation
Comment and background tasks Return value at the end of the execution Shell-script command
Simple commands Composed commands
Print on the screen Keyboard input The select command Redirections of standard input/output Variables and parameters
Variables Parameters
Mathematical calculation Conditional structures
ConditionsTests Integer tests Strings tests Tests combinations Structure If ... Then ... Else Structure Until
Other executive structures For structure Case structure Trap structure
FunctionsThe X server
IntroductionThe X-window architecture and its limits The XFree86 project The Xorg project
Confi guration Generate a confi g fi le Edit a confi g fi le
Running the X server X-Distant
Local X-Distant The XFree86 and X.org confi guration Display distant applications Display an entire environment
Mandriva Tools DrakxConf Confi gure your KDE desktop Confi gure your Gnome desktop
Software installation PreambleMandriva’s approach
How to obtain packages? Package installation and removing Creation of a rpm from RPM sources RPMDrake
Libraries and dependences Debian approach
Installation, removing, information, updating Creation of a deb fi le from the dsc sources
Gentoo’s approach Installation, removing, information on packages Installation from sources
Virtual machines Emulation and Virtualization
IntroductionVocabulary Virtualization Emulation with wine Conclusion
The Linux kernelWhat is a kernel? Kernel compilation and installation
Why recompile the kernel? The kernel modules Before starting... Kernel compilation Confi guration Compilation
Kernel installation Kernel installation
Bootloader confi guration Modules management
Presentation of Windows VistaMicrosoft Client OS Historical anterior to Vista Minimum requirements Vista Editions Installing Windows Vista Clean installationUpdatingMigrationActivation
Windows Vista DeploymentACT 5.0 and ACM
ACT 5.0?Requirements ACT 5.0What is ACM?
Deployment of Windows VistaDefi nition
MICROSOFT TECHNOLOGIES: Windows Vista & Windows Server 2003
52 h.
SUPINFO - 1 (L1)
38
What WIM?Presentation of deployment toolsLite Touch / Zero Touch InstallationLTI/ZTI
Windows PE and WDSWindows PEWindows Deployment Service (WDS)
User Migration with USMT Defi nitionMigration planWindows Easy Transfer
Administration of Windows VistaTools
Software and functionalityStart process
BIOSWindows Boot Manager» (bootmgr.exe)«Boot Confi guration Data»Start of Windows Vista (winload.exe)
Resolution of problemsDriversConfi gurationStartUp Repair Tool (STR)
Backup and restoreBackupRestoreBackup plan
Hard disk confi gurationFile System
File System of VistaNTFS transactional and XPS
PartitionEFSBitlocker Drive Encryptions
User confi guration and remote accessUser environment
ExplorerAeroShadow Copies
Remote administrationPresentationInvitationAssistShut down a session
Find and indexIndexTag and meta-data
VISTA and the networkConfi guration TCP/IP
Confi gurationClassWifi VPNTools TCP/IPNaming contextFirewall
FirewallAdvance FirewallCreate Rules
IPSec NAP
NAP ClientNAPConfi guration of NAP
CollaborationN.L.A
What is N.L.A?MobilityConnect a Video projector
Implementation of Microsoft Windows VistaAnalyze
EventAuditPerformance Diagnostic ConsoleMicrosoft UpdateCheck disk
PerformancesI/O prioritySuperFetchReadyBoost / Ready Drive
Introduction to Administering Accounts and ResourcesPresentation of Windows Server 2003
Managing the roles of your serverIdentifying the Windows Server 2003 product rangeDescribing a directory serviceThe Active Directory terminologyFunctioning of the process to open a session
Installing and confi guring administration toolsUsing the principle administration toolsManipulating the MMCResolving problems linked to the administration toolsCreation of organization unitsUsing the organization unitsSetting up a hierarchic structureNaming your organization unitsManipulating objectsManipulating a domain objectMoving a domain object
Managing User and Computer AccountsManaging user accounts
Storing user accountsIdentifying user accountsManaging the password strategiesModifying the account attributesUsing an account modelActivating or deactivating an accountReinitializing a password
Managing computer accountsHow are computer accounts used and located?Managing the computer accounts’ optionsModifying the accounts’ attributesActivating or deactivating an accountReinitializing computer accounts
Finding accounts in Active DirectoryUsing the different types of searchUsing a personalized requestSaving requests
Managing GroupsCreating groupsUsing the different types of groupHow the functional level of the domain modifi es the behaviour of the groupsUniversal groups functionLocal domain groups functionLocal groups functionNaming and locating the groupsModifying the groupsUsing the groupsManaging the interweaving of the groupsOptimizing the interweaving strategiesModifying the extent and the type of a groupDefi ning a group managerUsing the groups by defaultHow to use the groups by default on member serversHow to use the groups by default on Active DirectoryHow the systems groups are formed
Managing Access to ResourcesManaging access to resources
How do authorizations work?The standard and special authorizations
Managing access to public fi lesUsing public fi lesManaging the public fi lesPublishing a public fi le
Managing the sharing authorizationsConnecting to a public fi leAccessing the fi les and folders using the NTFS authorizationsThe advantages of NTFSThe NTFS authorizationsBehaviour during a copy or a moveThe NTFS inheritanceThe effective authorizationsThe sharing authorizations password and NTFSUsing the cache out of connectionUsing the fi les out of connectionSynchronizing the fi les out of connectionThe cache options out of connection
Implementing PrintingPresentation of printing in Windows Server 2003
Types of clients allowed printingPrinting functioning Installing and sharing printersThe printer typesNecessary material confi gurationInstallation and sharing a local printer
SUPINFO - 1 (L1)
- 39 -
Installing and sharing a network printerManaging the access to the printersThe shared printers’ authorizationsManaging authorizationsManaging the pilots of the printersDescribing a printer pilotInstalling printer pilots
Adding printer pilots for other operating systemsManaging Printing
Changing the location of the printing spoolerDescription of a printing spoolerChanging the location of the spoolerDefi nition of the printing prioritiesDefi nition of a printing priorityPlanning the printers’ availabilityPrinters’ availabilityAdditional instructionsConfi guring a printing poolHow printing pools workConfi guring a printing pool
Managing Access to Objects in Organizational UnitsStructure of the organizational unitsStructure of the organizational unitsUtilization modes of the organizational units to group objects and making the management more effi cientThe two principle objectives of an OU hierarchyDelegating the control of the organizational unitsDescription of the organizational units control delegationControl delegation assistant
Managing the access to the objects in organizational unitsConfi guring the group policy parameters
Introduction to group policiesPresentation of the GPO parametersAttributing scripts with the group policy
Describing a group policyDescribing the confi guration parameters for users and computersDefi nition of the parameters of a local computer policyImplementing objects of a group policy in a domain
Tools to create objects of group policyDescription of the management of the objects of group policy in a domainDescription of a link of an object of group policyManaging the deployment of a group policyImpact of the existence of confl icting objects of a group policyBlocking the deployment of the group policy object
Attributes of a group policy object linkConfi guration procedure of the group policy applicationFiltering the deployment of a group policy object
Managing the User Environment Using Group PolicyConfi guring parameters of group policy
Why use a group policy?What are activated and deactivated parameters of group policy?Attribution of scripts with the group policyWhat are the script parameters of group policy?Attributing scripts procedure with a group policy
Confi guring the fi les redirectionWhat is fi le redirection?
Files which can be redirectedParameters required confi guring the fi les’ redirectionSecurity considerations for confi guring the fi les redirectionDetermining the applied group policy objectsWhat is Gpupdate?What is Gpresult?Describing a group strategy reportDescribing group policy modellingDescribing the group policy results
Implementing Administrative Templates and Audit PolicyOverview of security in Windows Server 2003
Describing users’ rightsUsers’ rights and authorizationsUsers’ rights attributed to predefi ned groups
Using security models to protect computers and testy the security strategy of computersWhat is security strategy?Describing security modelsDescribing the parameters of security modelsDescribing the confi guration tool and security analysis
Audit confi gurationDescribing the auditDescribing the audit strategyType of events to auditInstructions on planning an audit strategyRecommendations for an audit confi guration
Management of the security journalsDescribing the journal fi les
Current security eventsManagement tasks of security journals
Preparing to manage a serverPresentation of Windows Server 2003
Introduction to maintaining a Microsoft Windows Server 2003 environment Group Memberships Used to Administer a ServerWhat Is the Run As Command?Confi guring the shortcuts associated with the Run As commandWhat Is Computer Management?Role of MMC in Remote Administration
Confi guring Remote Desktop to Administer a ServerWhat Is Remote Desktop for Administration?Why Use Remote Desktop for Administration?What Are the Requirements?What Are Client Preferences?
Managing Remote Desktop ConnectionsPreviewWhat Are Timeout Settings for Remote Desktop Connections?What Is Terminal Services Manager?
Introduction to Monitoring Server PerformancePresentation of the analysis of the server’s performance
Why Monitor Performance?Guidelines for Establishing a Baseline
Performing Real-Time and Logged MonitoringWhat Is Real-Time and Logged Monitoring?What Is Task Manager?Why Monitor Servers Remotely
Confi guring and Managing Counter Logs What Is a Counter Log?Counter Log File FormatsWhy Schedule Counter Logs?
Confi guring AlertsPreviewWhat Is an Alert?
The Primary Server SubsystemsPreview
Why Monitor Server Memory?How to Identify and Resolve Memory BottlenecksWhat Is Processor Usage?How to Identify and Resolve Processor BottlenecksWhy Monitor Disks?How to Identify and Resolve Disk BottlenecksWhat Is Network Usage?How to Identify and Resolve Network Bottlenecks
Guidelines for Using Counters and ThresholdsPreviewGuidelines for Using Counters and ThresholdsBest Practice for Monitoring Server Performance. PreviewBest Practice for Monitoring Server Performance
Confi guring Device Driver Signing OptionsPreview
What Is a Device?What Is a Device Driver?What Are Device Driver Properties?What Is a Signed Device Driver?Group Policy Setting for Unsigned Device DriversWhat Is Group Policy Management Console?
Using Device Driver Rollback PreviewWhat Is Device Driver Rollback?Uninstalling Devices and Device Drivers
Working with Disk ManagementWorking with Basic DisksWorking with Dynamic DisksPreparing Disks when Upgrading to Windows ServerManaging DisksDefragmenting Volumes
Working with Basic and Dynamic Disks Preparing Disks when Upgrading to Windows ServerDefragmenting VolumesWorking with Basic and Dynamic Disks Organizing a Basic DiskCreating Partitions and Drives on a Basic Disk Adding a Basic DiskConverting from a Basic Disk to a Dynamic DiskOrganizing a Dynamic DiskCreating a VolumeMoving Dynamic Disks
Preparing Disks When Upgrading to Windows ServerPreparing Disks
Disk ManagementPreview
SUPINFO - 1 (L1)
40
Viewing Disk Status and PropertiesExtending a Volume or PartitionDeleting a Volume or PartitionChanging a Drive LetterCreating a Mount Point
Defragmenting VolumesPreviewUsing Disk DefragmenterUsing Defrag.exe
Managing File Compression Preview
What Is File Compression?What Is File Compression?Effects when Moving and Copying Compressed FilesBest Practice for Compressing Files
Confi guring File Encryption PreviewWhat Is EFS Encryption? How to Encrypt a File or a Folder Effects when Moving and Copying Encrypted Files
Implementing Disk QuotasWhat is disk quota?What Are Disk Quota Settings?
Preparing for disaster recovery Preview
What is disaster recovery?Guidelines for preparing for disaster recovery
Backing-up data and scheduling backup jobsPreviewOverview of backing up dataWho can back up data?What is System State Data?What is the backup utility?Types of backupWhat is ntbackup?What is an Automated System Recovery Set?What is a scheduled backup job?Best practice for backup
Restoring data and confi guring shadow copiesPreviewWhat is restoring data?Checklist for restoring data
What are shadow copies?Previous versions client software for shadow copiesShadow copy schedulingWhat is restoring Shadow Copies?Best practice for using shadow copies
Selecting a disaster recovery method PreviewWhat is safe mode?What are safe mode options?What is the recovery console? What is a Windows Startup Disk? How boot fi les function?What are server disaster recovery tools?
Introduction to Software Update ServicesPreviewWhat Is Windows Update?What Is Automatic Updates?Comparison of Windows Update and Automatic UpdatesWhat Is Software Update Services?Software Update Services Process
Installing and Confi guring Software Update ServicesWhat Are Software Update Services Server Distribution Points?
Required Servers Confi gurations for the SUS servicesHow to Install and Confi gure Software Update ServicesAutomatic Updates Confi gurationHow to Confi gure Automatic UpdatesGuidelines for Testing Content for a Software Update Services Environment
Managing a Software Update Services InfrastructureSoftware Update Services Administration Web SiteHow Synchronization WorksHow to Synchronize Software Update Services ContentSoftware Update Services LogsWhat Is a Synchronization Log?What Is an Approval Log?How to Review and Approve Software Update Services LogsWhat to Back Up and Restore for Software Update ServicesHow to Back Up and Restore Software Update Services
IntroductionIntroduction
What is an Oracle?What is a RDBMS? Features offered by Oracle
Basic OrdersRetrieving Data Using a SQL statement
What is a SELECT statement?Arithmetic expressionsOther SQL possibilitiesUsing iSQL*Plus
Restricting and ordering data How to restrict data?Comparison conditionLogical conditionsHow to sort data?Substitution variables
Single-Row functionSQL functions Number functionsCharacter functionsConversion functionsGeneral functionsConditional expressions
Reporting Aggregated Data Using the Group FunctionsOverviewCreating groups of dataRestricting group results
Advanced recoveryDisplaying Data from Multiple Tables
OverviewType of joinsQualifying ambiguous column namesNatural join
The ON clauseNon-equijoinsOuter joinsCross Joins
Using Subqueries to Solve QueriesOverviewGuidelinesSubqueries overviewSingle-row subqueriesMultiple-row subqueries
Using the Set operatorsOverviewUnion operatorsIntersect operatorsMinus operatorsSet Operators Guidelines
DML and DDLManipulating data
Insert UpdateDeleteTruncate Commit and Rollback Read consistency
Using DDL Statements to Create and Manage TablesObjects and Data TypesManaging tablesAdvanced CreationNOT NULLUNIQUEPRIMARY KEYFOREIGN KEYCHECKHow to use
ORACLE TECHNOLOGIES: SQL 10G 46 h.
SUPINFO - 1 (L1)
- 41 -
Creating Other Schema ObjectsViewsSequencesIndexSynonymsManaging Objects with Data Dictionary views
Controlling User AccessPresentationSystem PrivilegesManaging Users Object PrivilegesRevoking PrivilegesRole
Managing Schema ObjectsAltering a Table
Adding a column Modifying a column Dropping a column The SET UNUSED option
Managing constraints Adding a constraint Deleting a constraint Activating a constraint Cascading Constraints
Managing indexes Creating an index Function based index Removing the index
External tables Flashback Table Creating an external table Querying the external tables
Manipulating Large Data SetsManipulating data using subqueries
Inserting with a subquery Updating with a subquery Deleting rows with a subquery The WITH CHECK OPTION keyword
Multitable insertsOverview INSERT ALL INSERT FIRST Conditional INSERT Pivoting INSERT
MERGE Other Large Data Sets Manipulations
Flashback Version Query The VERSIONS BETWEEN clause
Generating Reports by Grouping DataReview of Group Functions
Syntax of Group functions GROUP BY HAVING
Advanced Group Functions ROLLUP OperatorCUBE OperatorGROUPING OperatorGROUPING SETS OperatorComposite columns Concatenated groupings
Date data typeTime Zones
TIME_ZONE Different Timestamps
TimestampPresentationDifferent Possibilities
INTERVAL PresentationDifferent Possibilities
Conversion FunctionEXTRACTTZ_OFFSETTIMESTAMP ConversionTime Interval Conversion
Hierarchical retrieval and regular expressionsHierarchical retrieval
Overview Hierarchical statementWalking the treeFormat display
Regular expression support PresentationMeta characters REGEXP functions Using the REGEXP functions Check Constraints with Regular ExpressionsExpressions
IntroductionApple a success storyWhat is a Mac?What is Mac OS?
The different evolutions for Mac OSPresentation of Mac OS X
System InstallationMaterial requirement for Mac OS XPartitioningInstallation procedure Mac OS X installationSetup assistant
Migration assistant Network confi guration Registration
System User environmentGraphical interface
Menu barApple menu
DockExpose DashboardSpotlight searching toolFinder
Finder windowWindows controls switchesAutomatic folder openingHome folders 17New folder typesThe trash
Mac OS X settings
System preferencesSystem profi ler Software updateReports
Applicative environmentMac OS X applications management
Applications accessApplication install Application uninstallForce to quit an applicationUNIX commands
The different application types on Mac OS XApplicative environment Cocoa and carbon Classic4.2.4. Java BSD / x11
Tasks automator ApplescriptAutomatorCron usage
The Mac OS X fi le systemBasic concepts
Path types Invisible fi lesThe fhs according to apple
The system folder, users and resources The folder systemThe user folder Priority of users’ resources
File system format FormatsDisk utility
APPLE TECHNOLOGIES: MAC OS X Client 30 h.
SUPINFO - 1 (L1)
4242
The disk images Disk image burning
Fork resources, packages and extensions Fork resources BundlesFiles extensions
Utilities in commands lines for the fi lesUNIX utilitiesApple specifi c utilitiesSpotlight
Users and permissions managementUser’s types
Normal userAdministrator System administrator (root)
User’s accountsUser account creationForgotten password recoveryUser account modifi cation Rights restrictions Login items User account deletion Login options
Fast user switchingConceptsExternal devices and fast user switchingClassic and fast user switching
Access authorizations Authorizations for fi les Authorizations for foldersAuthorizations editionIgnore authorizations Advanced authorizations (ACL)Keychain ConceptsKeychain management
FilevaultWhy fi levault?Filevault activation Master password Password recoverySecured virtual memory
NetworkSetting up the network Mac OS X
Defi nitions ProtocolsNetwork status Network confi guration Network ports Network port confi guration VPN connection802.1x confi guration Troubleshooting Network diagnostic Network utility
Access network services Service discoveryConnect to a server Disconnect from serverAutomatic connection to a serverAccessing LDAP directory servicesKerberos ticket authenticating
Sharing and remote controlResources sharing
Sharing pane of system preferences AFP sharing (apple fi ling protocol)
File sharing via SMB (samba)File sharing via FTP (fi le transfer protocol) Web sharingRemote loginApple eventsInternet connection sharing and fi rewall use Printer sharing
Remote login SshApple remote desktop
Processor time sharing: xgrid Peripherals
Supported ports System profi lerPeripherals classDriversVolumes ejection Universal access Troubleshooting
Printing service Printing on Mac OS X Printing process Addition of a new printer Modifying the printer informationPrinting service creation Network printing
Printing on a printer shared by windows Printing on an IP printerSpool management
Print setup and print«print setup…» «print…»
PDF workfl ow Save a document as a postscriptCommand line printing Fax support Printing on classicTroubleshooting
Boot sequence BootROMPOST: defi nition Presentation of the Open FirmwareForth languageThe nodes The arborescenceCommand Line Interface Open Firmware password Boot keys analysis
BootXDefi nitionBootX missionsBootX icons and status
XNUKernel defi nition XNU internals Mach 3.0 presentation Mach managementBSD implementationBSD management
System initializationLaunchd introductionLaunchd functionalitieslaunchctl useThe fl aunchd.conf fi le
SUPINFO - 1 (L1)
- 43 -
MatrixMatrix language: defi nition and vocabulary
Defi nitionNotationsOther defi nitionsParticular matrix: lines and columnsOperations on the matrix
Equal matrixAdding two matrix: calculation rulesMultiplying a matrix by a real numberMultiplying two matrix between themselvesMultiplying two matrix between themselves – 2The transpose of a matrix
Square matrixDefi nition, vocabulary and exampleOperations on the square matrixParticular square matrix: identity, diagonal, symmetricDeterminant of a square matrixCalculation properties of the determinantDevelopment: minor; cofactor, adjugate matrixDeterminant calculation in Dimension 2Determinant calculation in Dimension 3Determinant calculation in Dimension 3 (2)An insight into the practical uses of the determinant
Inversion of a square matrixDefi nitionCalculation rules and examplePropertiesCalculation methods of the inverse of a square matrix
Linear equations system with real coeffi cientsDefi nitions and elementary properties
Defi nitions and vocabularyPropertiesMatrix notation of a linear system
The various forms of systemSquare linear systemsHomogeneous linear systemsTriangular linear systemsTriangular linear systems: particular casesTriangular systems with a null diagonalStaggered linear systems
Resolution of a linear equation systemResolution of a staggered systemResolution of a staggered system (2)Resolution using the Pivot de Gauss Method
Resolution using the Pivot de Gauss Method (2)The different forms of system following elementary transformations: interpretation and solutionThe different forms of system following elementary transformations: interpretation and solution (2)Linear systems and inverse matrix
The CRAMER systemDefi nition, presentationPropertiesCase fi gure 1Case fi gure 2Case fi gure 3
Reduction (diagonalisation) of square matrixEigenvalues and Eigenvectors of the square matrix
Defi nition of the square matrix Eigen-elements: Eigenvalue and EigenvectorDetermination of the Eigenvalues of a square matrix: method and exampleDetermination of the Eigenvectors of a square matrix: method and examplePracticePractice (2)
The Eigen-elements propertiesPropertiesConsequences
Diagonalisation of the square matrixDefi nition: similar matrixDefi nition: diagonal matrixStudy – remarkConsequence – conclusion: diagonalisation of a matrixExample 1Example 2Particular case of the symmetric matrix
Diagonalisation applicationsGraphs theory applications
Calculation of the nth exponentiation of a diagonal matrix: properties/demonstrationExistence of an n size path in a graphExistence of an n size path in a graph (2)
How does Google work?Analogy between the search mode in Google and the Eigenvector determinationGoogle and the Eigenvector
LINEAR ALGEBRA 34 h.
Introduction to object modellingHistorical reason behind object modelling
A short reminder of computing evolutionThe software complexityThe progressive management of the complexityThe limits of structured programming
Contributions of object modellingThe encapsulation notionThe abstraction notionThe modularity notionSummary
A few basic concepts in object modellingThe notion of object
The object anatomyThe visibility and encapsulation notions (+ and – indicators)Sending messages between objects
The notion of classThe class seen as an abstraction of the objectsThe class properties and methods ($ visibility indicator)The object seen as a class instance
Relations between classesThe associationThe aggregationThe compositionThe inheritanceOverloading and redefi ning notionsThe multiple inheritance problem shown through the use of the graphThe abstract and polymorphism class notions
Gathering class in packetsThe packet notionThe friend function notion (the ~ visibility indicator)
Summary regarding the member’s access of a class
OBJECT MODELING 16 h.
Introduction to MERISEHistory
The originsMeriseMerise (2)Data modelling today
VocabularyOrganization and systemThe information systemModel, Merise and analysis
Basic principles of MeriseThe life cycle
MERISE MODELING 16 h.
SUPINFO - 2 (L2)
44
The abstraction cycleThe decision cyclePresentation of the 6 Merise models
The Merise approachThe techniqueThe approachThe stepsThe course perimeter
The MCDIntroduction
MCDEntityAssociationPeculiar associations
Complete the modelCardinalityDimensionsUsual forms
Inter-associations constraintsVarious situationsPartitionExclusionTotalityInclusion
Properties’ constraintsSpecialization/generalization of entitiesSpecialization constraints
From MCD to physical modelIntroduction
The MLD, the MPDApproachAn example tableFormalism
From MCD to MLDRule 1Rule 2Rule 3Rule 4Rule 5Rule 5 (2)Rule 6Reminder of the rules
The MPDWhy an additional step?The reverse-engineeringThe various modelling and generation toolsBases migration
PROBABILITIES 38 h.
Combinatorial and countingTerminology of combinatorial analysis
Bijection and factorialPermutationArrangement and examplesArrangement and examples (2)Combinations and examplesCombinations and examples (2)Remarks
Properties of combiningCombinations’ propertiesExample 1Example 2
The Pascal triangleExampleSchemeCalculation methods, utilization, examples
Newton binomialTheorem and formulaDefi nitionExample 1Example 2
Probabilities on an achieved setProbabilities language: vocabulary of events
Basic vocabularyBasic vocabulary (2)Infi nite possibilitiesEvents logic: reminder on the set theory
Probabilities on a complete setIntuitive approach of the probability notionTheoretical defi nition of a probability Probability propertiesProbability properties (2)SummaryEquiprobability: defi nition and example
Conditional probabilitiesIntroduction through an exampleDefi nitionConsequences and propertiesExample 1Example 2Total probabilities formulaTotal probabilities: a reminder of the defi nition of a partitionFormula of the total probabilitiesTotal probabilities: Practice
Independent eventsDefi nition: 2 events caseTheoremPropertiesRemarkSeveral independent events case
Discrete random variable
Defi nition and Probability law of a discrete random variableDefi nitionA reminder of the existence conditions of a probability lawProbability law of a random discrete variableRepartition function of a random discrete variable: defi nitionRepartition function of a random discrete variable: exampleRepartition function of a random discrete variable: properties
Expectation of a random discrete variableDefi nitionExampleProperties of the expectation in a discrete caseVariants and standard deviation of a random discrete variableDefi nition of a variant of a random discrete variableDefi nition of the standard deviation of a random discrete variableVariant propertiesStandard deviation propertiesLinear combination of 2 random variables in an independent case
Probabilities law of usual discretesBernoulli law
Defi nitionUtilization exampleProperties
Bionomical distributionDefi nition n°1 and explanation of the formulaDefi nition n°2 and notationProperties: general characteristicsAddition of 2 binomial random variablesIntervention scope of the binomial distributionPractice
Poisson of parameter distributionIntroductionDefi nition and notationProperties: general characteristicsAddition of 2 independent Poisson random variablesPoisson distribution table: readingIntervention scope of the Poisson distributionAdvantages of the Poisson distributionPractice
Continuous random variables Defi nitionsIntroduction, presentation, study frameworkDefi nition of a random variableProbabilities on an interval and consequenceRepartition function and continuous random variable densityRepartition function: defi nitionConsequences and notations
Repartition function: propertiesProbability density: defi nitionProbability density: propertiesGraph interpretation
Characteristic parameters of a continuous random variableExpectancies
SUPINFO - 2 (L2)
- 45 -
Variants and propertiesStandard deviation and properties
Probability laws continue usualExponential law of parameter
Defi nitionProbability densityRepartition functionConsequences, theoremParameters: maximum likelihood, variants and standard deviationLaw signifi cationPractice
Normal distribution or Gaussian distributionProbability density and repartition functionGraph representation
Characteristic parameters: maximum likelihood, variants, standard deviationNormal distribution “central limit theorem”
Defi nitionConsequence: density and repartition functionVariants, maximum likelihood and standard deviation of the centred limit normal distribution random variableVariable changes/construction (method)Fundamental properties of the repartition function N law (0,1) and related schemesCalculation methodReading the Law N table (0,1)Different cases and methods: PracticeComplements and intervention scope of the Law N (0,1)
Statistics with 1 variable: presentation (descriptive statistics)Statistic: history, usefulness and objectives
A few quotes / defi nitionsHistoryStatistics and probabilitiesReason for the statistic
Basis terminology: defi nitionsPopulation, individual statisticSampleCharacter and variable (+2 types of variables)Quantitative variableQualitative variable
Defi nition and notationsEffective and total effectiveValue and class frequency Cumulated effectiveCumulated frequencySummary
Data representations and graphical representationArrayGraph: introduction/signifi cationGraph: various types of diagrams Graph: cumulative effectives diagramGraph: cumulative frequencies diagramGraph: histogram
Statistics with 1 variable: characteristic and (descriptive statistics)Position parameters
The modeThe averageThe median: discrete variable caseThe median: classed variable case
Dispersion parametersExampleAreaVarianceStandard deviationQuartileDecileRemarks and complementary vocabulary
Statistics with 2 variables (descriptive statistics)Introduction and reminders
Introduction and remindersDefi nitionsData presentationExample
Sampling of data points and average pointsPoints sampling: defi nition and representation
ExamplesExamples (2)Average points: defi nitionExamples
Refi ned adjustment –Graphical methodsPresentation – adjustmentsDefi nitionRule adjustingRefi ned adjustment using the Mayer straight line: principle, defi nition, remarks, example
Refi ned adjustment – Least squares methodVariance remindersDefi nition of the CovariancePrinciple and defi nition of the Least squares methodScheme
Equation of the linear regression of Y in x and of X in yExamplesSummaryLinear correlation coeffi cients: defi nitionLinear correlation coeffi cients: graph interpretationPractice
Sampling theory (Inferential statistics)Presentation
Presentation, object of the samplingDefi nitions
SamplingEstimationSamples constitutionVarious types of samples: with or without discountRemarkExampleImportant remarkIntroduction to the next module
Sampling distribution (Interferential statistics)Sampling of averages
IntroductionExampleAverage calculationSchemePropertiesAverage ruleAverage maximum likelihoodAverage standard deviationRemarks
Sampling of frequenciesPresentationSchemeDefi nitionMaximum likelihood and standard deviation of the frequencyFrequency distribution and theorem
Punctual estimate (interferential statistics)Punctual estimate of an average
PrincipleNotationPropositionExample
Punctual estimate of a frequencyPrincipleDefi nition/notationPropositionExample
Punctual estimate of a variance and of a standard deviationIntroduction/presentationProperties Nota BeneExampleSummaryRemark
Estimate by confi dence intervalPrinciples and objectives
PrincipleNotations
Estimate by confi dence interval of an averageStudy frameworkDemonstrationDefi nition 1Defi nition 2
STATISTICS 36 h.
SUPINFO - 2 (L2)
- 46 -
Remarkable values and confi dence thresholdExtension if the population does not follow a Normal distributionExtension if the standard deviation is unknown
Estimate of a frequency by confi dence intervalSimulation PracticeEstimate intervalBut…
In factUsual exceptionsRemark
Global overview: punctual estimate and by confi dence intervalSummary graph
Level 1: PROFESSIONAL SITUATIONS - AVANCEDAgreeing to meet
Deal with a business call. Assist the caller and take their name and number. Arrange an appointment and respond to their questions.
Business callsYou make arrangements to have a stand at a trade fair. Explain your requirements in detail.
The company standSpeak to a client at a trade fair. Detail the features of your product and convince the client of its merits. Arrange an appointment for a product demonstration.
Comparing productsConvince someone of the quality of your product.
Making a saleYou meet a client who would like to place an order. Discuss product type and price. Negotiate the discount. Agree the delivery date.
NegotiatingNegotiate the specifi c details of an order. Convince your client to choose your product over that of your competitor.
Trouble with ordersReply to a dissatisfi ed customer. Apologize for problems and try to fi nd a compromise.
After-sales serviceDeal with an angry customer. Attempt to fi nd solutions to their problems. Arrange assistance
Handling an invoiceYou phone a client whose invoice is overdue. Ask when payment can be expected and arrange terms.
Deferring paymentFind a solution with a customer whose payment is overdue.
Organizing a stayA client would like to pay your company a visit. Give advice on where to stay and leisure-time activities. Ask for details of the trip
Welcoming visitorsAsk practical questions about a client’s visit. Propose various leisure-time activities to be included in the visitor’s itinerary.
The training courseSet up training programs. Organize a training workshop; decide on the sort of training required and who will need training.
Job searchAt a recruitment agency. Look for jobs in management. Talk about your professional experience. Go for an interview
Starting a new jobFirst day at a new job. Sign the contract, settle into your offi ce, meet your colleagues. Talk business.
Level 1: EVERYDAY SITUATIONS – ADVANCEDA car trip
You go on a car trip. Express your agreement/disagreement and reach a compromise. Describe the features of a car. Ask for precise directions.
On the motorwayGive advice about the way someone is driving. Ask for petrol at a petrol station and have a conversation with a police offi cer.
At the airportCheck in your bags at the airport and state your seating preferences. Go through customs.
On the planeAsk questions about what happens during the course of a fl ight. Ask the fl ight attendant for various items you need during your journey. Pick up your luggage on arrival.
At the stationYou want to buy a train ticket. Say what kind of ticket you want and ask for the departure and arrival time of a train.
On the trainYou take the train. Speak to the ticket inspector and reply to his questions. Make conversation with another passenger.
Customs checksYou go through the formalities at customs. Show your passport and respond to the questions posed by the customs offi cer.
The luggage searchYou declare goods at customs. Respond to the customs offi cer
Hotel reservationsYou need a hotel room for the night. Explain which kind of room you would like and enquire about meal times and the cost of your stay.
Staying in a hotelEnquire about hotel facilities. Talk about your hotel stay.
A tour of the townYou go on a guided tour of a town. Ask questions about the different buildings you encounter while sightseeing.
A tour of the castleYou take a tour of a medieval castle. Ask questions about the castle and express your feelings about your visit.
Level 2: PROFESSIONAL SITUATIONS - AVANCED +At reception
You are a hotel receptionist. Accommodate guests’ wishes and answer their questions.Hotel service
Find solutions to guests’ problems. Use grammatical forms indicating politeness.Serving customers
You are a waiter/waitress. Welcome customers and take their order. Apologize for problems.
Bad serviceRespond to customer questions and deal with complaints in a restaurant.
Sales assistantYou are a sales assistant in a department store. Deal with customers and explain where certain products can be found. Help a customer buy a product.
Electrical goodsHelp a customer purchase a product by giving advice and answering their questions. Respond to a customer complaint.
A new bank accountAsk and answer questions in order to open a new bank account.
Banking operationsYour cashpoint card and chequebook have been stolen. Explain the situation and discover what can be done to resolve it.
Hot off the pressYou are working as a journalist. Show visitors round the newspaper offi ces. Answer questions about the profession. A breaking story.
Travel agentsYou are working as a travel agent. Enquire about what kind of holiday people want. Outline the choices they have and make suggestions.
Welcoming touristsYou are a tourist guide. Take your clients on a tour of London and describe the sights. Accompany a VIP to the airport.
Airline workers You work in the airline industry. Give information about fl ights and safety procedures to airline passengers.
Train and ferry jobsProvide travel information to rail and ferry passengers. Explain problems and give advice.The architect
You are designing a house. Explain your ideas to the architect. Go over the blueprints, the price of the construction and the building process.
Foreign language: BRITISH ENGLISH 2 70 h.
SUPINFO - 2 (L2)
- 47 -
GRAPHS THEORY 40 h.
Graphs theoryIntroduction and generalities on the graphs theory
Defi nitions and objectivesOrigins and developmentApplication domainExamples of problems resolved with graphsAlgorithms addressed in this lesson
Graph elementsMathematical representationFigurative representation: directed graph and undirected graphEquivalence notion between a directed graph and an undirected graphSimple graph, multiple graphs and graph without loopGraph orderDegree and half-degreePractice
Graph properties and special graphsRefl exivity and symmetry
Transitivity and transitive closingDecomposing a graph in levelsComplete graph, partial graph and under-graphBipartite graphPlanar graphValued graphClique and stableTree and tree view
Choice of algorithm and notions in algorithmic complexityAnalysis methodology of a given problemModelling and algorithmic choiceAlgorithmic complexity notions and examples
Relations modelling and connectivity studyJourney in the graph
Notion of the journey in a graphThe chainThe pathThe cycleThe circuit
Properties of the path in the graphElementary pathSimple pathHamiltonian pathEulerian pathPath in the widthPath in the deepnessPractice
Connectivity and specifi c connectivity proprietiesConnectivityStrong connectivityStrongly connected componentsPractice
Representation modes for computer implementationAdjacency relationAdjacency listPredecessor and successor notionIncidence relationIncidence matrixPractice
Path minimization problemsIntroduction and generalities
Introduction to the path searching problemUnder-optimality conceptThe shortest path search methodPositive or negative valuation of a graphThe most important algorithm families
Search for the shortest path: Dijkstra algorithmObjectives of the algorithm, framework and utilization constraintsThe research concept of Dijkstra’s algorithmDefi nition of the algorithmUtilization exampleApplications
Search for the shortest path: Bellman algorithmObjectives of the algorithm, framework and utilization constraintsThe research concept of the Bellman-Ford and Bellman-Kalaba algorithmDefi nition of the algorithmUtilization exampleApplications
Search for the shortest path: Floyd algorithmObjectives of the algorithm, framework and utilization constraintsThe research concept of the Floyd-Warshall algorithm
Defi nition of the algorithmUtilization exampleApplications
Spanning minimization problemsIntroduction and generalities
Introduction to the problem of optimal spanning searchDefi nitionsTrees and tree viewsDefi nitions and properties of trees and tree views
Construction of a maximum spanning forest and of a cycle baseObjectives of the algorithm, framework and utilization constraintsConcept of the algorithmDefi nition of the algorithmUtilization exampleApplications
Minimum spanning tree: Prim’s algorithmObjectives of the algorithm, framework and utilization constraintsConcept of the Prim’s algorithmDefi nition of the algorithmUtilization examplesApplications
Minimum spanning tree: Kruskal’s algorithmObjectives of the algorithm, framework and utilization constraintsConcept of the Kruskal’s algorithmDefi nition of the algorithmUtilization exampleApplications
Scheduling problemsIntroduction and generalities
Presentation of scheduling problems and project managementConstraints linked to the scheduling projectAn optimization problem: the optimization criterionsCritical path, critical task and risk margin notionsThe principal resolving methods for scheduling problems
Scheduling: P.E.R.T. method algorithmObjectives of the algorithm, framework and utilization constraintsResolution concept using the P.E.R.T. methodDefi nition of the algorithmUtilization example: workings project
Scheduling: M.P.T. method algorithmObjectives of the algorithm, framework and utilization constraintsResolution concept using the M.P.T. methodDefi nition of the algorithmUtilization example: workings project
ApplicationsExample: Decomposing a graph into levelsExample: resolution using the P.E.R.T. methodExample: resolution using the M.P.T method
Flow problems and path fi ndingIntroduction, defi nitions and generalities
PresentationDefi nitionsThe basic concept: the conservation distribution (KIRCHOFF)Maximal fl ow, compatible fl ow and complete fl owTwo resolution approaches
Flow problems: search for the best pathObjectives of the algorithm, framework and utilization constraintsResolution concept using the Ford-Fulkerson method: improvement pathDefi nition of the algorithmUtilization example
Flow problems: creation of a separation graphObjectives of the algorithm, framework and utilization constraintsResolution concept using the Ford-Fulkerson method: separation graphDefi nition of the algorithmUtilization example
ApplicationsEnergy distribution networkTransport networkAffectation problem
Various problemsDecision problem: core concept
Objectives of the algorithm, framework and utilization constraintsConcept of the algorithmDefi nition of the algorithmUtilization example and applications
Maximum couplingObjectives of the algorithm, framework and utilization constraintsConcept of the algorithm
SUPINFO - 2 (L2)
- 48 -
Defi nition of the algorithmUtilization example and applications
Colouring of edges: Welsh-Powel algorithmObjectives of the algorithm, framework and utilization constraintsConcept of the Welsh-Powel algorithmDefi nition of the algorithmUtilization example and applications
B-trees: Research algorithm
Defi nitionElementary operations on B-treesResearch algorithm on a B-treeUtilization example and applications
An introduction to operating systemIntroduction
What is an operating system?Why study them?History: 1st generationHistory: 2nd generationHistory: 3rd generationHistory: UNIXHistory: micros computersHistory: DOS/Windows
Computer architecture: a reminderSimplifi ed representation of the computerFunctional representationKernel mode and user modeThe instruction setMemory protectionPerformancesThe system calls
Sorting the operating systemsThe monolithic systemsThe nanokernel systemsThe layer systemsRemote procedure callsOther systemsSummary
Basic elements of the systemDefi nitions
ProgramProcessState of the processResources
Process operationsCreationDestructionWait/Wake-upSuspend/ResumeSwitching priorities
Process and threadsThe process tableThe process structureThe thread conceptComparison between process and thread
MechanismsRegistersContext commutationInterruptPriority, masking and disarming interrupt
Inter-process communicationLocking and deadlocking
A concrete examplePossible defi nitions of the critical section, remaining sectionGeneralization of the problem and study relevanceNecessary criterions for a valid solutionFirst algorithmic solutionOver-courtesyThe Dekker algorithmThe Peterson algorithmThe test and set instructionThe necessity to use other methods
Deleting active waitDefi nition of a semaphoreMutual exclusion semaphoreSynchronization semaphoreGeneralization: the dateThe deadlocking riskThe producer/consumer model with one boxThe producer/consumer model with n boxThe dining Philosophers problem
The monitorsApplications to the preceding problems
SignalsDefi nition and contextPresentation of the various signalsSending signalsUsing signals for programmingA precise exampleMessages on Windows
PipesDefi nition and contextThe call systemThe pipes implementationThe pipes utilizationRedirectionsSynchronization with pipesExample: SIGPIPE signalThe named pipes
SchedulingDefi nitions
The problemThe need
MechanismsElementary algorithmsExtended algorithmsMix algorithmsOptimization
Current OS diffi cultiesThe priority changesMulti-users managementMulti-processors managementService quality
Heuristic assessmentPrincipleMethodConclusion
Memory managementThe memories hierarchyThe memory segmentsShared memory Loading the program in the memory
Organization of the physical memoryPagingConsequences on the programmingSegmentationOrganization of the process memoryComparison between paging and segmentationSegmented paged memory
File managementGeneralities
The fi le conceptNaming the fi lesFile typesCommand and executable fi lesThe access typesThe attributesOperation on C fi les
Files System ManagementHistory of the FSMThe different FSMOverview of the tree viewDe-fragmentationGoing from one FSM to the otherThe future for FSM
Entries/Exits managementGeneralities
Types of peripheral devisesDMA, channels
OPERATING SYSTEM 48 h.
SUPINFO - 2 (L2)
- 49 -
Peripheral devises drivingEntries/exits buffers
Exploitation system and I/OPositioningSE/ES communicationThe ES from the SE point of view
A few precise examplesThe hardwareThe hardware schedulingThe SSF algorithmThe clockThe terminalThe keyboard case
Securing the operating systemSecurity of O/S
The need for securityThe UNIX integrated access controlThe Windows integrated access controlThe stack overfl owing technique
The protectionMaterial mechanismsSoftware mechanisms
Your role in securityThe administrator’s roleThe project manager’s roleThe developer’s roleThe user’s role
COMMUNICATION 14 h.Basic communication tools
Develop your empathyDevelop your argumentationAsking questionsUsing rephrasingThe infl uence of your «perception fi lter»Identify your own style of communicationReinforce your listening skillsGetting to know the different styles of communication
Assertiveness and self-confi denceWhat is self-confi dence?How to ask for things and say noHow to be assertive in diffi cult situations
Resolving team problemsHow to get everyone in a large meeting to join in, thanks to the Post-it® methodThree techniques to help you run meetings effi ciently
Leading a brainstorming session
PROJET MANAGEMENT 6 h.
Transverse ManagementWhat is transverse management?Developing cooperative behaviour
Asserting your leadership in a non-hierarchical relationshipPreparing a convincing presentationNetworking
TEAM MANAGEMENT 4 h.
PERSONAL EFFICIENCY 11 h.
Develop your emotional intelligenceWhat is emotional intelligence?Understanding emotions to master them betterHow to control your emotions
Strengthen your creativityWalt Disney and the art of making ideas a realityAnalyzing a complex problem by using an “issue tree”Boost your thinking power with the help of mind maps
FINANCIAL MECHANISMS 15 h.
The building blocks of fi nancial analysisHow to analyze an income statementHow to analyze a “by-function” format income statementWhat is the scissors effect?How to calculate a company’s breakeven point
What are breakeven analysis and operating leverage?What is working capital?Financial analysis of working capitalUnderstanding the cash fl ow statementHow to analyze a cash fl ow statement- Financial statement analysis
MARKETING PRINCIPLES 10 h.
Introducing marketingWhat is marketing?Researching your market
Consumer behaviourUnderstanding segmentationWhat does it mean to be client-oriented?
SUPINFO - 2 (L2)
- 50 -
C++ Language level 1 Language presentation
History and evolution of the C++ languageChanges under GCC and Dev C++
Syntactic changesThe bool typeThe referenceOther changes (variables declaration, commentaries, const…)
Improvement in functions implantationThe functions overloadingThe arguments by defaultThe passage by reference
C++ Language level 2Classes
The declaration of a class in the header (properties and methods)The encapsulation principle and the visibility indicatorsThe methods overloadingClass implantation in the body (:: operator)Instantiation of a classAccess to the members of a classExample: writing of a character class
Canonical form of CoplianThe pointer type properties and the Coplian canonical formThe constructorThe copy constructor The type conversion constructorThe destructorThe affectation operatorExample: modifying the character class
Other characteristicsThe statistical propertiesThe statistical methodsExample: modifying the character class
C++ Language level 3Dynamic boards of objects
The object array creation by the operator newThe destruction of an array by the Delete operator
The friend function notionThe friend function notion
The operators overloadThe overload rulesThe indexation operatorThe arithmetic operatorsThe comparison operatorsThe redirection operators
C++ Language level 4Inheritance
The inheritance link mechanismMultiple inheritance and associated problemsThe access control to the basic classesThe over-defi nition of the methodsThe access to the members of a mother classExample: writing of the Hero and Enemy classes who inherit of Character
PolymorphismVirtualThe virtual pure methodsThe abstract classThe polymorphism notionExample: management of a Character array (Hero and Enemy)
C++ Language level 5The namespace
The namespace principleUsing namespaceThe namespace aliasesThe utilization of the namespace elements (utilization of using)
TemplatesThe templates principleThe functions templatesThe class templatesThe instantiation of the class templates
Error managementThe exception mechanism principleBringing up an exceptionThe “try…catch…fi nally” blocExample: writing of the inaccessible character
C++ Language level 6Entry and exit by fl ows
Writing an entry on the standard exit with coutReading and entry on the standard entry with cin
Files management by fl owsThe ifstream class to read a fi leThe ofstream class to write a fi leExample: writing of a class allowing the reading of the confi guration fi le of the game
C++ Language level 7STL
General presentation of STLHandling the vector classHandling the Map classProcessing chain of characters
WEB AND DEV TECHNOLOGIES: C++ LANGUAGE
52 h.
CISCO TECHNOLOGIES: CCNA 3 AND 4 50 h.
Classless routingIntroduction to classless routing
Review of the classful routingPrinciples of classless routingPurpose of the classless routingClassless routing protocolsCommands
Classless routingCIDRVLSM
RIPv2 protocolRIPv2 specifi cations
Reviewing RIPv1Improvements
Confi gurationRIPv1 commandsRIPv2 commandsDebugging commands
OSPF protocolDefi nitions
Link state routingCharacteristics
OSPF processAreasHELLO protocolDR/BDR electionOSPF tables
Confi gurationGeneral commandsAuthentication commandsDebugging commands
EIGRP protocolDefi nitions
TermsHybrid routingCharacteristics
EIGRP processHELLO protocolDUAL algorithmLoad balancing
Confi gurationGeneral commandsAuthentication commandsDebugging commands
SUPINFO - 2 (L2)
- 51 -
Ethernet switchingEthernet networks
DuplexingCongestionLatency
LAN switchingCollision domain segmentationBroadcast domain segmentationLoad balancing
How a switch worksSwitching methodsMAC addresses learningFrame fi ltering
VLANsDefi nitions and principles
Static VLANsDynamic VLANsGeneral commandsDebugging commands
TrunkingPrinciplesISL protocolIEEE 802.1Q protocolGeneral commands
VTPPrinciplesVTP modesGeneral commands
Spanning-Tree protocolSpanning-Tree concepts
Defi nitionsPrinciples
Spanning-Tree processSTP statesSpanning-Tree processRSTP states
Spanning-Tree confi gurationGeneral commandsDebugging commands
LAN designConcepts of LAN design
Basic principleLAN conceptionLayer 1 conceptionLayer 2 conceptionLayer 3 conception
TroubleshootingCommands
State visualizationDebugging
Recovery and updateLost passwordsIOS updateRecovery and deletion of the IOS
NAT and PATPrivate and public addressing
Limits of IPv4Consequences
Address translationNAT principlePAT principle
Confi gurationCommandsConfi guration processVerifi cation
DHCPPrinciple of the DHCP
Usage context of the DHCPComparison between BOOTP and DHCPDHCP operationsDHCP relay
DHCP confi gurationCommandsConfi guration processVerifi cation
WAN networksDefi nitions
WAN networksTelecom providerDCE and DTECircuits
Equipments and devicesEquipments and devicesOrganization of a WAN link
WAN normsNormalization organizationsPhysical layer normsWAN encapsulations
Different WAN link types classifi cationPresentation of the different WAN link typesDedicated linksCircuit switched servicesPacket/cell switched services
WAN designCommunications over a WAN
Communication over a WANSelection criteria of a WAN service
First steps of the WAN conceptionMain objectivesFirst step of the conceptionMethods to evaluate the needsSensitivity test
Implement a hierarchical network3 layers model2 layers model1 layer model
PPP protocolProtocol study
CharacteristicsDistinct parts
Session establishmentPhase 1: EstablishmentPhase 2: QualityPhase 3: NCP confi gurationPhase 4: Closing
Authentication methodsPAP protocolCHAP protocol
Confi gurationCommandsPAP confi guration processCHAP confi guration process
ISDN technologyISDN technology overview
TechnologyNorms
TermsDevices and points of referenceNormsISDN frames
Usage and implementationISDN applicationDial on Demand Routing (DDR)
Confi gurationCommandsConfi guration process
Frame Relay technologyFrame Relay technology
Technology overviewLMI interface & DLCI
Internal process, switching table and forwarding processFrame Relay mapSwitching table
SubinterfacesPoint-to-point subinterfacesMultipoint subinterfaces
Confi gurationCommandsConfi guration process
Initiation to network administrationWorkstations and servers
WorkstationsServersMicrosoft WindowsUNIX and LinuxApple Mac OS
Network managementIntroduction to network managementNetwork management model and OSI
SNMP protocolIntroductionProcessMIBConfi gurationRMON
SyslogProcessConfi guration
SUPINFO - 2 (L2)
- 52 -
CHECK POINT TECHNOLOGIES: CCSA NGX
20 h.
HTTP server with Apache Remember on the HTTP protocol Compilation and installation Confi guration (the httpd.conf fi le) Starting, Stopping the server Advanced Confi guration
Security and privacy with OpenSSL™ IntroductionSSLv3 Used methods OpenSSL
Remote administration with OpenSSH™ IntroductionThe SSH client Key generation SSH Server SSH server administration
Secure copy (scp) Public key authentication X-Forwarding
TCP-Forwarding (Tunnelling) Sftp: Secure FTP
The X Server IntroductionConfi guration Running the X server X-DistantMandriva ToolsSetup a FTP server with ProFTPd™
Introduction
What about the FTP protocol FTP and safety Introduction to virtual users Proftpd installation Executing the Proftpd server Virtual users Management Server management Using of SSL/TLS Conclusion
Network File System NFS/RPC presentation NFS client/server installation Server confi guration Administration/Maintenance of NFS server Using NFS client Conclusion
Implementing RAID Loop Devices RAID Introduction Soft RAID creation Using and RAID software confi guration Maintenance and monitoring
Databases overview PresentationRoles and functions of a DBMS The SQL Database fi les The DBMS Comparative Table Conclusion
Introduction to VPN-1 NGXArchitecture, process and deploymentSmart Console components
Security policiesObjectiveDefi nition of a security policy
Defi nition of a security policyDefi nition of a Rule BaseDefi nition of an IP Spoofi ngMulticastingRule Base creation
Command line optionsAdvanced features of a Rule BaseManagement of a Rule Base
Connection monitoring and network traffi cObjectivesSmartView TrackerSmartView MonitorEventia Reporter
SmartDefenseActive defense
SmartDefense componentsSmartDefense capabilities
SmartDefense activityDoS attackIP and ICMP protocol testTCP protocol testSuccessive events detectionWeb IntelligenceCentralized management against attacksOnline update
SmartDefense Storm Centre
Storm Centre integration in placeNetwork Address Translation
Understand the NATReview of the IP addressingDynamic NAT (hide)Static NAT
NAT confi gurationGeneral propertiesDynamic NAT confi gurationStatic NAT confi guration
Manual NATWhen to use the manual NATManual NAT confi guration
AuthenticationSession authenticationUser authenticationClient authenticationIntegrate LDAP with VPN-1 NGX
Export users from the NGX databaseLDAP user managementLDAP error recovery with SmartDashboard
Preventive backup$FWDIR/CONF$FWDIR/LIBLog fi les$FWDIR/LOGC and 5_0.C objectsRuleBase_5_0.FWSFWAUTH.ndbUser database exportBackup with the help of Export tool
LINUX TECHNOLOGIES:MANDRIVA Certifi ed Administrator (MCA)
56 h.
SUPINFO - 2 (L2)
- 53 -
Setup a MySQL™ server IntroductionInstallationConfi guration Use mysqladm
ReplicationTools SourcesConclusion
Introduction to PHPPresentation
Introduction to WebIntroduction to dynamic webHistory of PHP
Installation and confi gurationInstallationConfi gurationExtensions
PHP LanguageBasic syntax
Tags and commentsTypesVariablesConstantsPredefi ned constantsOperator
Control structuresif … elseif ... elseswitchWhile, do ... whileForForeachBreakContinue
FunctionsDeclaration of functionUse function
ArraysDeclarationUseArray functions
Creation of dynamic websitesGet data in a form
GET and POST method$_REQUEST variable$_FILES variable$GLOBALS, $_SERVER, $_ENV
Cookies and sessionsCookiesSessions
Advanced methodsHTTP header’s controlHTTP authentication
PHP functions’ libraryInput / Output
Standard outputBufferFiles
Include and requireIncludeRequire
Other functionsStringRegular expressionsEncoding and hashingErrors managementConfi guration
MySQLMySQL presentationConnections managementQueries’ settingsResults’ display
PHP and OOPThe basics
Reminds of OOP
SyntaxConstructorsAutoloading objectsVisibilityScope ResolutionStatic keyword
Advanced MethodsClass abstractionInterfacesOverloadingMagic methodsComparing objects
XML Syntax
An XML document…PrologueEncoding
Syntax rulesElementNestingRoot elementAttributeSpaceCommentCDATA
NamespaceNamespaces
Example: RSS fl owsRSSArticle.rss
Validation and XMLDTD
IntroductionSyntaxAttributeEntities
XSDIntroductionSyntaxSimple typesComplex types
XPathIntroduction
XpathNodesSyntax
Operator and functionsOperatorsFunctions
Stylesheet (CSS & XSL)Introduction
CSSXSL
XSLT transformationsBasic SyntaxControl structuresUsing XPATH functionsAJAX and PHPThe XMLHttpRequest objectPresentation and historyFunctioningProperties and methodsExampleSecurityInteractivity with PHP
WEB AND DEV TECHNOLOGIES: PHP & XML
68 h.
SUPINFO - 2 (L2)
- 54 -
Confi guring routing by using routing and remote access Enabling and confi guring the routing and remote access
What are routers?What are routing interfaces?What are routing protocols?What are routing tables?Why use windows server 2003 routing and remote access service?
Confi guring packet fi ltersWhat is packet fi ltering?How are applied packet fi lters?
Allocating IP addressing by using dynamic host confi guration protocolWhy use DHCP?
How DHCP allocates IP addressesHow the DHCP lease generation process worksHow the DHCP lease renewal process worksHow a DHCP server service is authorized
Confi guring a DHCP scopeWhat are DHCP scopes?Confi guring a DHCP reservationWhat is a DHCP reservation?Confi guring DHCP optionsWhat are DHCP options?How are DHCP server, scope and reserved client options applied?How are DHCP class-level options applied?
Confi guring a DHCP relay agentWhat is a DHCP relay agent?How does a DHCP relay agent work?How a DHCP relay agent uses hop countHow a DHCP relay agent uses boot threshold
Managing and monitoring DHCP serviceManaging a DHCP database
Overview of managing DHCPWhat is a DHCP database?How a DHCP database is backed up and restoredHow to back up and restore a DHCP database?How a DHCP database is reconciledHow to reconcile a DHCP database
Monitoring DHCPOverview of monitoring DHCPWhat are DHCP statistics?What is a DHCP audit log fi le?
How DHCP audit logging worksGuidelines for monitoring DHCP server performanceCommon performance counters for monitoring DHCP server performanceGuidelines for creating alerts for a DHCP server
Applying security guidelines for DHCPGuidelines for restricting an unauthorized user from obtaining a leaseGuidelines for restricting unauthorized non-Microsoft DHCP servers from leasing IP addressesGuidelines for restricting who can administer the DHCP serviceGuidelines for securing the DHCP database
Resolving namesViewing names on a client
How names are mapped to IP addresses?What are host names?What are NetBIOS names?How to view names on a client
Confi guring host name resolutionThe host name resolution processClient resolver cacheHosts fi le
Confi guring NetBIOS name resolutionNetBIOS name resolution processNetBIOS name cacheHow to view and release the NetBIOS name cacheBroadcastsLmhosts fi le
Resolving host names by using DNSInstalling the DNS server service
Overview of domain name systemWhat is a domain namespace?Standards for DNS namingHow to install the DNS server serviceConfi guring the properties for the DNS server serviceWhat are the components of a DNS solution?
What is a DNS query?How a recursive query worksHow iterative queries workHow forwarders workHow DNS server caching works
Confi guring DNS zonesHow DNS data is stored and maintainedWhat are resource records and record types?What is a DNS zone?What are DNS zone types?How to change a DNS zone typeWhat are forward and reverse lookup zones?Confi guring DNS zone transfersHow DNS zone transfers workHow DNS notify works
Confi guring DNS dynamic updatesWhat are dynamic updates?How DNS clients register and update their own resource records by using dynamic updatesHow to confi gure DNS manual and dynamic updatesWhat is an active directory-integrated DNS zone?How active directory-integrated DNS zones use secure dynamic updatesConfi guring a DNS client
How preferred and alternate DNS servers workHow suffi xes are appliedDelegating authority for zonesWhat is delegation of a DNS zone?
Managing and monitoring domain name system (DNS)Confi guring the time-to-live value (TTL)
How the time-to-live value worksHow to confi gure the time-to-live valueConfi guring aging and scavengingWhat are aging and scavenging parameters?How aging and scavenging work
Integrating DNS with winsHow to integrate DNS with WINSTesting the DNS server confi gurationHow simple and recursive queries workHow to test the DNS server confi guration
Verifying that a resource record exists by using nslookup, dnscmd and dnslintWhy verify that a resource record exists?NslookupdnscmddnslintHow to verify that a resource record exists by using nslookup, dnscmd, and dnslint
Monitoring DNS server performanceGuidelines for monitoring DNS server performance by using the performance consoleWhat is a DNS event log?What is DNS debug logging?
Resolving NetBIOS names by using windows internet name service (WINS)Installing and confi guring a WINS server
The components of winsWhat is a NetBIOS node type?How a WINS client registers and releasesNetBIOS namesHow burst handling worksHow a WINS server resolves NetBIOS namesHow to install the WINS serviceHow to confi gure burst handling
Managing records in WINSPresentation of a client recordWhat is a static mapping?How to add a static mapping entryMethods for fi ltering and viewing records in WINSHow to fi lter WINS records
Confi guring WINS replicationHow WINS replication worksHow push replication worksHow pull replication worksWhat is push/pull replication?WINS replication partner propertiesHow to confi gure WINS replication
Managing the WINS databaseWhy back up a WINS database?How to back up and restore a WINS database
MICROSOFT TECHNOLOGIES: NETWORK INFRASTRUCTURE
50 h.
SUPINFO - 2 (L2)
- 55 -
What are simple deletion and tombstoned deletion of records?How to delete a WINS recordWhat are dynamic and offl ine compacting?How to compact a WINS databaseHow scavenging worksHow to scavenge the WINS databaseHow a WINS database is checked for consistencyHow to check for consistency on a WINS databaseGuidelines for decommissioning a WINS serverHow to decommission a wins server?
Securing network traffi c by using IPSec and certifi catesImplementing IPSec
What is IPSec?How IPSec secures traffi cWhat is an IPSec security policy?How IPSec policies work together
Implementing IPSec with certifi catesWhat is a certifi cate?Uses of certifi catesWhy use certifi cates with IPSec to secure network traffi c?Monitoring IPSec securityIP security monitorHow to stop and start the IPSec services
Confi guring network accessIntroduction to network access infrastructure
Components of a network access infrastructureConfi guration requirements for a network access serverWhat is a network access client?What are network access authentication and authorization?Available methods of authentication
Confi guring a VPN connectionVPN connection workingEncryption protocols for VPN connectionConfi guration requirements for a VPN serverConfi guring a remote access connection
How remote access network works?Confi guring a wireless connection
Overview of wireless network accessWireless standardsAuthentication methods for wireless networksConfi guration requirements of a windows XP professional client for wireless network accessControlling user access to a networkUser account dial-in permissionsWhat is a remote access policy?What is a remote access policy profi le?Remote access policies treatment
Centralizing network access authentication and policy management by using IASWhat is radius?What is IAS?How centralized authentication works
Managing and monitoring network accessManaging the network access services
Guidelines for managing network access servicesConfi guring logging on a network access serverRouting and remote access type of loggingAuthentication and accounting logging recordingLog fi les for specifi c connectionsCollecting and monitoring network access data Why collect performance data? Tools for collecting network access data
ORACLE TECHNOLOGIES: PL/SQL 46 h.
Variables and Executable Section in PL/SQLIntroduction to PL/SQL
What is PL/SQL? Different types of PL/SQL block Programming environments
Declaring PL/SQL Variables Presentation of PL/SQL variables Different types of PL/SQL variables %TYPE attributes Bind variables Substitution variablesUser Variable
Writing Executable Statements Identify PL/SQL block SQL functions in PL/SQL Nested BlockOperators in PL/SQL Programming Guidelines
SQL Statement and Logical StructuresInteracting with the Oracle server
SQL statements in PL/SQL Data manipulation in PL/SQL SQL cursors
Writing Control Structures view IF condition CASE Expression NULL values Basic loops WHILE loops FOR loops Nested Loops
Composite Data Type and Explicit CursorsWorking with Composite Data Types
OverviewPL/SQL RecordsPL/SQL Collections
Using Explicit CursorsPresentation
Controlling Explicit CursorsCursors and RecordsCursor FOR LoopsExplicit Cursors AttributesCursors with ParametersCursors with Subqueries
ExceptionsCatching Exceptions
What is an exception?Exception TypesPredefi ned Oracle Server ErrorsNon-Predefi ned Oracle Server Errors User-Defi ned Exceptions
Exceptions PropagationPropagation in the subblockThe RAISE_APPLICATION_ERROR procedure
Procedures, functions and packagesCreating Stored Procedures
What is a Procedure?What are Parameters?IN ParameterOUT ParameterParameters PassingInvoking ProceduresProcedures and ExceptionsProcedures Information
Creating Stored Functions What is a Function?Creating FunctionsFunction in SQL ExpressionsRemove a FunctionFunctions InformationProcedures versus Functions
Creating Stored PackagesOverviewComponents of a PackageCreating a PackageInvoking PackagesRemoving Packages
SUPINFO - 2 (L2)
- 56 -
Introduction and historyThe origin of Java
Birth and evolution of Java Advantages and drawbacks of JavaJava versions
Java framework mechanismJava Virtual MachineExecution phases
Java Syntax - Bases & naming conventionsBase syntax
HandlersPrimitive data typeReference data type
Expressions and operatorsSimple and conditional expressionsIteration expressionOperators
ArraysOperation on arraysBidimensionnal arrays
Difference with C++Common thingsDifference
Classes – Concepts and inheritanceCreate your fi rst application
File and naming conventions
Constructors and initializationLaunching the application
Properties and methodsOperator «.» Variables MethodsThe «this» pointerPackages and import management
Garbage CollectorDeleting instances
Objects conceptAggregationInheritanceAccessibility concept Abstraction and interfaces concept
Error management - ExceptionsConcept
Defi nitionMechanism
Throwing an ExceptionThe “throws” keywordThe “throw” keywordPersonalized Exceptions
Dynamic arrays - Collections Comparison Arrays/Collections
Differences and similaritiesThe different Collection types
SUN TECHNOLOGIES:JAVA Standard Edition (SCJP) 60 h.
GuidelinesOverloadingUsing Forward DeclarationsPersistent StateTables of Records and PackagesPL/SQL Wrapper
Using Oracle-supplied PackagesDBMS_OUTPUT PackageUTL_FILE PackageHTP PackageUTL_MAIL PackageDBMS_SCHEDULER PackageCreating a job
Dynamic SQL and MetadataDynamic SQL
OverviewNative Dynamic SQLCursors and Dynamic Execution DBMS_SQL Package
MetadataMetadata API FETCH_XXX SubprogramsSET_FILTER ProcedureBrowsing APIs
Design Considerations for PL/SQL CodeStandardizing Constants and Exceptions
Constant StandardizingExceptions Standardizing
TransactionsLocal subprogramsDefi ning and Invoking the RightsAutonomous TransactionsRETURNING Clause
Bulk BindingOverviewUsing Bulk Binding BULK COLLECT INTO
Performance Using NOCOPY Using PARALLEL_ENABLE
Managing DependenciesLocal and Remote Dependencies
Understanding DependenciesLocal Dependencies
Remote DependenciesCheck Modes
Timestamp ModeSignature Mode
RecompilationOverviewSuccessful RecompilationUnsuccessful Recompilation
LOBsDifferentiate LOBS
What is a LOB?BLOB CLOBBFILEDIRECTORY object
Manipulating LOBs DBMS_LOB packageAdding dataSelecting dataRemoving dataTemporary LOBs
TriggersPresentation of Triggers
What are Triggers?DML TriggersStatements and Triggers INSTEAD OF TriggersManaging Triggers
Applications for TriggersDDL TriggersCALL StatementBenefi ts of Triggers Trigger Information
PL/SQL CompilationType of compilation
OverviewNativeInterpretedCompilation Information
PLSQL_WARNINGSDBMS_WARNINGSUsing DBMS_WARNINGS
SUPINFO - 2 (L2)
- 57 -
The List The Set The Map The Tree
Utile classesThe Iterator The Enumerator The Comparator
Java 5 new featuresThe genericThe “for each” instruction
Architecture Java 2 Standard EditionMethodologies of development
PackagesClassesMethodsDesign patterns
Software architectureUsual project organizationMVC conceptBusiness layerService layerApplication layerPresentation layer
Graphical interfaces - Swing (bases)Base concepts
OriginArchitecture
ContainersHigh level containersMains containersSpecifi ed container
Simple componentLabel ButtonSelection componentEvent managementPositioning managementText componentSpecifi ed component
Concurrent processes - Les ThreadsUsing process
ConceptThe Thread class
Use and executionStopping a ThreadAvailable methodsSharing variablesPrioritySynchronization
Runnable interfaceAdvantages and uses
Graphical interfaces - Swing (advances)Architecture
Internal mechanism
Swing project organizationAdvanced component
List componentTable componentTree componentModel systemRenderer systemEditor system
Advanced conceptsPositioningEventsSwing concurrency management
Complementary toolsSwingLabs projectsOther open source projectsSome graphical development IDE
Input/Output – I/O and Socket Reading & Wrinting - Input/Output
ConceptThe File classThe byte streamThe character streamThe object and the serialized streamsThe compressed stream
Client-server applications - Les Sockets Concept and mechanismServerSocket classSocket classInetAddress class
Database access - JDBCMain concept
ArchitectureDefault process
Opening and closing connectionLoading driverEstablish a connectionClosing a connection
Processing SQL requestsStatementsPrepared Statements Callable Statements Access type
Retrieving an d modifying resultsThe ResultSetMetadata The ResultSet Transaction management
Naming services and directories – JNDINaming concept
Directory conceptJNDI
Packages presentationNaming operationsDirectory operationsSchema operation
Review of OOPGeneral defi nitions
What is OOPWhat is an object? What is a class?HeritageProtocols
ClassesConceptUtilization
MethodsConceptUtilization
VariablesLocal variable, global one, instance one, class one
Cocoa and Objective-CPiece of history
Cocoa originObjective-C
Cocoa Environment Mac OS X integrationCocoa characteristicsThe « Foundation » Framework The « Application Kit » Framework
Why using Objective-C?Objective-C syntax
CommentariesMelting pot between code / declarations New types and valueDynamic typeClasses and objectsFunctions and methodsThe messagesThe keywordsThe instance variables gooPolymorphism
Developer toolsXCode 2.4
APPLE TECHNOLOGIES:Initiation to the COCOA development
20 h.
SUPINFO - 2 (L2)
- 58 -
Interface Builder 2.5The utilities
Cocoa memory management Review of the memory management in C languageMemory principle in Objective-C: reference countingManagement messages from the reference countingManual management of the memory
Framework FoundationNSObjectNSStringNSArrayNSMutableArrayNSDictionary and NSMutableDictionary
The classes in Objective-CClasses’ creation
Class declarationClass implementation
Class creation with Interface Builder Outlets and actions
Defi nitionsOutlets and Actions in XCodeOutlets and Actions in Interface Builder
Rules and habits in Cocoa The MVC paradigmThe controllerThe categoriesThe other Apple frameworks
The AppKit WebkitNSApplicationNSWindows and NSViewNSResponderNSControl
SUPINFO - 2 (L2)
- 59 -
IntroductionCompiling
Why study compiling?The compiler notionCompilers optionsThe interpreters
VocabularyThe different analysisLanguages and syntaxes notionsThe grammarsDescribing the grammars
TreesTrees: a reminderDerivation and reductionDerivation tree
Lexical analysisIntroduction
The terminalsThe separatorsThe identifi ersRelations between lexical analyser and syntax analyserAn example using Fortran
RobotsThe different robotsFirst exampleApplication to the languageLexical robotsRegular expressions
AnalysisAscending analysisDescending analysisPredictive analysis
LEXHistoryPresentationFile structureExampleLEX regular expressions
Syntax analysisIntroduction and recursive descent
A reminder in descending and ascending analysisConclusionThe principal methodsPresentationAn example
SynthesisThe operator’s priority method
PresentationAn exampleSynthesis
LR methodPresentationAn exampleSynthesis
YACCHistoryPresentationFile structureExampleYACC regular expressions
Semantic analysisIntroduction
PresentationReach of the identifi ers
ControlType controlOverloadingFunction and polymorphic operators
Table of symbolsConstructionCrossing
Data scouring in the texts corpusDefi nitions
Classifi cation etc.Classifi cation/Clustering
Creation of documents classesIn a supervised mannerFlat or hierarchy classesGoogle exampleSeparated classes/ Venn diagram
Vector representation of documentsAutomatic classifi cationOther classifi cationsExample
In summary
COMPILING 40 h.
Basic conceptsOverview
Origins and developmentConcepts and methodsDomains of research and practical applicationsKnowledge representationThe Turing test approach
Symbolic AIFormal languages for thoughtFirst-order logicPropositional logic Application to the blocks world
Solving problems by searchingRepresentation of a problem in the state spaceSearch strategiesApplications: the labyrinth, the 8-puzzle
Intelligent agents Agents and environmentsThe structure of agents
Expert SystemsOverview
Structure of the ESThe knowledge baseThe inference engine
Production rulesStructure of the production rules
System based on production rulesThe inference engine
Strategies of reasoningForward-chaining algorithmBackward-chaining algorithmThe functioning of the inference engine
The management of uncertainty in expert systemsTypes of uncertaintiesCombining uncertain facts and rules
Functional programming: the LISP languageBasic elements
Symbolic expressionsStructure of the languagePrimitive functionsPredicatesInternal representation of listsInput-output functions
Control structuresIf and Cond functionsRecursive functions Iterative functions
Complex functionsApply, MapcarLambda-expressionsMacro functions
Symbolic operations
ARTIFICIAL INTELLIGENCE 50 h.
SUPINFO - 3 (L3)
- 60 -
Derivation of algebraic expressionsExploration of treesExploration of state space Applications in LispWorks: the labyrinth, the 8-puzzle
Logical programming: the Prolog languageProgram structure
The clauses: facts and rulesTypes of variablesBuilt-in predicatesThe Goal
Fundamental mechanismsQuestioning and unifi cationThe backtracking The primitives FAIL and CUTThe negation in PrologDynamic data basesForeign languages interface (link with C)
Recursivity and listsThe recursive schemeExample of recursive functions
Structure and unifi cation of listsApplications (in SWI Prolog)
Operational research (the traveling salesman)Expert Systems (forward and backward chaining)Program PERT (tasks management)Fractals (graphical representation)
Neural networksOverview
History and developmentThe neuro-physiological modelThe mathematical model
The PerceptronThe learning algorithmApplication to logical functionsImplementation of the learning algorithm in C++Program for the recognition of alpha-numerical charactersThe limitations of the perceptron
Multi-layer networks The principle of backpropagationThe implementation of a multi-layer network
Fundamental security notionsThe basics of security
Security objectivesComplementary conceptsPrinciplesRisk managementSecured development notions
An introduction to cryptologyDefi nitionsFundamental notions (history, Kerckhoffs’s principal, vocabulary)Symmetric cryptologyAsymmetric cryptologyCondensingNumeric signatureConfi dence in a public keyKey management infrastructure (PKI)
Systems’ securityAccess control
From authentication to authorisationAccess control typesAuditStrong authentication
Network securityTCB notions, Monitor Reference notions and Security Kernel notionsSecurity modelsCommon criterions (CC)Threats (hidden channels, steganography, backdoors)Trusted Solaris*BSDLinuxWindows
Material architecturesPhysical securityCompromising signals (TEMPEST)ChipsCrypto accelerator cardsNew CPU instructionsTPM
ApplicationsData basesWeb applicationsPortalsNumeric rights managementOffi ce automation applicationsOn board systemsWeb services
Security tools against Malware (malicious software) Malware
VirusWormTrojan horseSpywareRootkitHypervirusMeans of prevention
ToolsAnti virusAnti spywareVulnerability scannersSecurity managementPatch managementFiles encryption
Network securityReminders
OSI layersThreats on lower layersThreats on network equipmentReminder TCP/IPGood practice
FirewallReminder on fi rewallsPackets fi ltrationSPI (Stateful Packet Inspection)Applicative fi rewallsTypical architecture of a business fi rewall (DMZ, NAT)Personal fi rewalls
Intrusion detection and preventionIDSIPSIDS/IPS: host or network, kernel or notCommon problemsDetection and escape techniquesProduct examplesHistoric signature rulesNormalisationHoney pots
ProtocolsIntroduction / IPSec remindersAHESPIntroduction / VPN remindersPPTPL2TP / IPSecSSL/TLSSSH
Applications for network securityQuarantine
Quarantine of remote accessesQuarantine LAN (NAP/NAC)
WiFiAvailable security options (including weaknesses of WEP, VPN…)History802 1xRADIUSEAP – TLSPEAP – EAP – TLSWPA802.11i (WPA2)Set up example: Windows
INFORMATION SYSTEMS SECURITY 16 h.
SUPINFO - 3 (L3)
- 61 -
ADVANCED OPERATING SYSTEM 40 h.
Fundamental operating system notionsThe system’s basic elements
Defi nitionsOperations on the processesProcesses tableComparison process/threadThe mechanismsThe OS families
Inter-process communicationDisplay of the problematic, vocabularySimple algorithms solutionsThe Dekker and Peterson algorithmOther methods and critic of the preceding solutionsThe semaphoresThe monitorsSignals and messagesThe pipesOther mechanisms and comparisons
SchedulingDefi nitionsAlgorithmsOptimizationMulti-user managementMulti-processor managementHeuristic evaluation
Memory and fi lesMemory: Hierarchy, dividing and sharingPagingSegmentationSegmented paged memoryGeneralities about the fi lesThe physical storing of the fi lesThe SGFOther elements of the system
Distributed systemsDefi nitions and examples
GeneralitiesConceptual objectives of distributed systemsDNS exampleX500 directory
Micro-kernels and subsystemsParadigmMicro-kernels genesisObjectives of the conception of micro-kernelsPersonalitiesExampleModularisation effects
Objects systemsObjectsInvocationProblem resolvingTendencies
Basic abstractionsArchitecture of a distributed systemActors/tasks/processChorusEvolution of the address space model
Distributed algorithmsDefi nitions
Orders, global state, clocks, synchronization
Control in distributed systemsResumption in distributed systems
Aspects of distributed applicationsCooperation typesElementary communication modelsCausal dependencyReliable diffusion models and group communicationOrder proprieties linked to bugs
Global state of a distributed systemPast and coherent disconnectionsDetermination of a coherent global stateModels
Breakdown toleranceConcepts
Basic concepts on running securityBreakdown classifi cationVarious types of redundanciesMain problems with breakdown toleranceSynthesis
In practiceCausal dating and vector clocksTotal order using logical clocksLaying down distributed resumption dotsCase study: cooperative calculation and replicated object
ApplicationsRemote Method Invocation
Introduction to RMIRMI layers structureRMI architectureSetting up RMIExample
CorbaIntroductionThe ORBCommon Object Service Specifi cationCase study
The DCE of OSEDefi nitionThe DC architectureThe organization in cellsThe RPC under DCEThe RPC runtimeStubs generationDistributed File SystemAccess to DFS fi lesCoherence management
Amoeba and MachProcessesVirtual memoryThe kernelTransparencyMach presentationUtilizationSpecifi citySet up
A few systems’ specifi citiesOwner systemsThe real time systemsThe on board systemsThe mobile systems
Foreign language: AMERICAN ENGLISH 3 70 h.
Level 1: EVERYDAY SITUATIONS - INTERMEDIATE +An Emergency
Seek assistance for an injured person. Learn basic medical vocabulary and parts of the body.
At the Doctor’sDescribe your symptoms and discuss treatment options.
CorrespondenceLearn vocabulary for letter writing: writing paper, ink, envelopes.
At the Post Offi ceLearn vocabulary to do with the postal service: sending a parcel, express delivery, registered mail, metered mail, stamp collecting.
Banks and ATMs
Learn how to explain a problem and learning vocabulary to do with banks: credit card, expiration date, commission, etc.
Paying a BillLearn about different means of paying for something: by check, in cash, etc.
Level 1&2: PROFESSIONAL SITUATIONS - INTERMEDIATEREADING DOCUMENTS
Job ApplicationLetter to Human ResourcesThe Leaving Party Letter of Recommendation
WRITING DOCUMENTSSecurity Rules
SUPINFO - 3 (L3)
- 62 -
SUPINFO - 3 (L3)
PEOPLE MANAGEMENT 7 h.
Succeeding as an occasional trainerRunning a training session: how to prepare for itBuilding a path for your training session
Using teaching techniques effectivelySuccessfully running a training courseAdapting teaching principles to the learners’ profi le
PERSONAL SKILLS 5 h.
Alternative decision-makingWhat is a decision?
The limits of decision relationship modelsHints for better decisions making
SELLING/NEGOTIATION 21 h.
Selling your ideasHow to fi nd the arguments you needAdding strength to your argumentsQuestions that make people say yesHow to ask questions that lead to a “yes” answerHow to respond when faced with objectionsMastering ways to reply to objectionsHow to diagnose other people’s key motivations?How to adapt effectively to other people’s motivations
Closing your deals: an introductionSome deal-closing techniques
Successful negotiationWork out your negotiating styleHow to avoid haggling or positional bargainingUnderstanding the mutual gains approach sMaintaining a good working relationship when negotiatingGetting ready to negotiate
FINANCIAL MECHANISMS 10 h.
Understanding fi nancial instrumentsWhat is a share?How shares are valuedWhat is a bond?
Valuing bonds - the underlying principlesWhat is an option?What determines the value of an option?
MARKETING PRINCIPLES 17 h.
Build your “marketing mix”What is the marketing mix?Analyzing your productsChoosing your pricing policyUnderstanding the key ideas of distributionUnderstanding the basics of communication
Understanding the basics of advertisingFixing and applying a marketing strategy
Choosing the correct market positioning for your productAudit your marketing programDetermine your marketing strategyCreate your marketing plan
The SurveyAdvice
MEETINGSInstructionsDelaysDelays (Speaking)
PROFESSIONAL INTERACTIONProspective CustomerProspective Customer (Speaking)Contract SettlementsAbout the ProjectAbout the Project (Speaking)Company PresentationCompany Presentation (Speaking)Sales ContactSales Contact (Speaking)Job Interview
SOCIALIZING
Company HistoryCompany History (Speaking)
Level 2: EVERYDAY SITUATIONS - ADVANCEDLiving in America
Reply to general questions about your daily life in the US: Where do you live? What is your job? What are your hobbies?
Seeing the USATalk about different means of transportation, lifestyles and pastimes.
The Post Offi ceLearn to ask questions, to give your address, to pick up a package and to buy stamps at the post offi ce.
Seminar PlanningReserve a hotel room. Organize a seminar, set the date and number of participants, choose the services required. Arrange for payment.
Insurance & BankingLearn vocabulary related to the world of insurance and banking (coverage, life insurance, cash transfer, account number).
- 63 -
SUPINFO - 3 (L3)
Introduction to securityCharacteristicsRisks
Internal threatsExternal threatsConfi guration weaknesses
AttacksReconnaissance attacksAccess attacksDoS attacks
VulnerabilitiesOperating systemsProtocolsConfi guration
Security policySecurity Wheel
Secure the information systemMonitor the information systemTestImprovement
Cisco Self DefendingSAFENACCisco Self DefendingCS MARS
Basic router securityAccounts managementPrivileged modesNetwork services
Dedicated appliancesDevice characteristics
Technical characteristicsProcess of an ASA systemCut-through proxy
Introduction to PIX and ASAFirst steps with the PIX/ASACommunication translationConfi guration via ASDM
Packet switchingStatic routing caseDynamic routingVLANs
Access controlAAA
TACACSRADIUSTACACS Vs RADIUS
802.1XPrincipleState and interfaces802.1X work processSwitch confi guration
Identity controlStatic passwordsSingle use passwords and access cardsElectronic certifi catesBiometry
ACSBasic principleCisco Secure ACS for WindowsCisco secure ACS for UNIX
IOS FirewallAuthentication Proxy
Client/server architecture principlePropertiesAAA confi guration
Filtering on routersPacket fi lteringState fi lteringURL fi ltering
Cisco IOS Firewall CBACCBAC confi guration
Advanced use of the PIX/ASAACLs
Defi nitionACLs confi gurationVerifi cations
Object groupingConfi guration
Network object groupService object groupProtocol object groupICMP object groupNested object groupsExample of a startup confi guration
Modular security policiesSwitch security
Switch waterproofi ngVLANs protection
VLAN HoppingPrivate VLANs vulnerabilities
Spanning Tree protectionThreatsCountermeasure
InstallationMac OS X Tiger versions
Mac OS X Server unlimited licenceMac OS X Server 10 clients
Hardware considerationsXserve G5Xserve Cluster NodeXserve RAIDXserve Intel
Installation preparationLocal installationRemote installation
Mac OS X Server Admin ToolsGeneral tools overview
Where can you download them?Gateway Setup AssistantQTSS PublisherServer AssistantServer MonitorSystem Image Utility
Xgrid AdminServer Admin
OverviewLocal confi gurationRemote confi guration
Workgroup ManagerOverviewLocal confi gurationRemote confi guration
Open DirectoryIntroduction to Open Directory
Presentation and historyKDC and SASL
Node setupOpen Directory states
Connection to a directory serviceOpen Directory MasterOpen Directory replica
Advanced setupUser management
Network ServicesDHCP: Dynamic Host Confi guration Protocol
What is the DHCP?DHCP confi guration under Mac OS X Server
DNS: Domain Name SystemWhat is the DNS?DNS Confi guration under Mac OS X Server
Permissions and AuthenticationWorkgroup Manager
APPLE TECHNOLOGIES: MAC OS X Server 30 h.
CISCO TECHNOLOGIES: Network Security 1 28 h.
- 64 -
User accountsGroup accountsShare points and Workgroup ManagerPermissionsACL
File ServiceProtocolsCreation of a share point
How-toPermissionsHow to enable the different protocols?
Apple File ServicesPermissionsConfi guration
WindowsPermissionsLockingGuestsServer Name and WorkgroupAdvanced settingsLogging
NFSHow does it work?LockingSecurityServer Admin
FTPConfi gurationServer AdminFile conversionMessagesAdvanced settingsLoggingMonitoring
Comparison of the different protocolsCase sensitivity problems
PrintingPrinting on Mac OS XProtocolsPrinting queuePrinter management
SharingManagementMonitoringQuotasPool printers
Printing service limitsWeb Services
Internet ServicesApache confi gurationConfi guring a dynamic server
Realms and WebDAVProxy server
Confi guring the proxy serverMonitoring Web services
Quicktime Streaming Server (QTSS)Working principlePreparing the mediaManaging QTSS
Firewall & NATFirewall
What is a fi rewall?How to confi gure the Mac OS X Server fi rewall?
Network Address Translation (NAT)What is a NAT?How to confi gure the NAT on Mac OS X Server?
Accounts managementClient management and toolsClients’ management conceptsUser accounts
Home folderMobile accountsLogin and logout synchronizationBackground Sync
User groupsGroup creationAssigning a user to a groupGroup folder
Computers listsComputers lists creationHost computers
Preferences managementPreferencesHow to apply preferences?Preferences managementApplications’ preferences deployment
Network views managementNetBoot and Network Install
ConceptProcessDiagramShadow fi lesSupported clientsConfi guration
Disk image creationParticular case: NetInstallNetboot server administrationImages activationClients fi lteringClient confi guration
Clients monitoring
MICROSOFT TECHNOLOGIES: Active Directory 30 h.
Introduction to the Active Directory infrastructureThe Architecture of Active Directory
PreviewWhat Does Active Directory Do?The Logical Structure of Active DirectoryThe Physical Structure of Active DirectoryWhat Are Operations Masters?
How Active Directory WorksWhat is a Directory Service?What is a Scheme?What is the Global Catalogue?What are Distinguished and Relative Distinguished Names?
Examining Active DirectoryActive Directory ManagementActive Directory ManagementActive Directory Administrative Snap-ins and Tools
Implementation of a forest and Active Directory structureCreating a Forest and Domain Structure
Requirements for Installing Active DirectoryThe Active Directory Installation ProcessHow to Troubleshoot the Installation of Active Directory
Examining Active Directory Integrated DNSDNS and Active Directory Namespaces
What Are Active Directory Integrated Zones?What Are SRV Resource Records?
How Client Computers Use DNS to Locate Domain Controllers and ServicesRaising Forest and Domain Functional Levels
What Is Forest and Domain Functionality?Requirements for Enabling New Windows Server 2003 Features
Creating Trust RelationshipsTypes of TrustsWhat Are Trusted Domain Objects?How Trusts Work in a Forest?How Trusts Work Across Forests?
Creating and Managing Organizational UnitsIntroduction to Managing Organizational Units
Methods for Creating and Managing Organizational UnitsDelegating Administrative Control for Organizational Units
What Is Delegation of Administrative Privileges?Organizational Unit Administrative Tasks
Planning an Organizational Unit StrategyThe Organizational Unit Planning ProcessOrganizational Factors that Affect an Organizational Unit StructureGuidelines for Planning an Organizational Unit StructureGuidelines for Delegating Administrative Control
Implementing user, group and computer accountsManaging user accounts
Account typesGroup typesLocal domain groups
SUPINFO - 3 (L3)
SUPINFO - 3 (L3)
Global groupsUniversal groupsImplementing UPN suffi xesDefi ning a main user nameFinding and resolving the name suffi xes’ confl icts
Planning a strategy for user, group and computer accountsDefi nition and history of SIDMoving objectsA few practical tips
Planning the Active Directory auditThe reasons behind auditing the access to Active DirectoryAnalysis instructions of the Active Directory modifi cations
Implementation of a group policyCreating and Confi guring GPOs
PreviewWhy Specify a Domain Controller for Managing GPOs?What Are WMI Filters?What Is Loopback Processing?When Is Group Policy Applied?
Managing GPOs What Is a Copy Operation?What Is a Backup Operation?What Is a Restore Operation?What Is an Import Operation?
Verifying and Troubleshooting Group PolicyCommon Problems with Implementing Group Policy
Delegating Administrative Control of Group PolicyDelegation of GPOsDelegation of Group Policy for a Site, Domain, or Organizational UnitDelegation of WMI Filters
Deploying and managing software using group policy confi guring and maintaining Software
Introduction to Managing Software DeploymentThe Software Installation and Maintenance Process Defi nition of Windows Installer
Deploying, confi guring and maintaining SoftwareDefi ning a copy operationDefi ning a save operationDefi ning restore operationDefi ning an import operation
Troubleshooting Software DeploymentCommon problems link to implementing group policy
Delegating the administrative control of group policyDelegating GPOsDelegating group policy for a site, domain or organizational unitDelegating WMI fi lters
Planning a Software Deployment Strategy using group policyPresentation of the software deployment management
Software installation and maintenance processDefi nition of Windows Installer
Deployment, confi guration and maintenance of the softwareOverview of the software deployment processAllocating and publishing softwareCreating a distribution place for softwareUsing GPO to deploy softwareDefault options for software installationModifying the software installation options
Resolving problems linked to software deploymentCommon problems linked to the use of GPO in software deploymentFinding the cause of the problemResolving the software installation problems while using the GPO
Planning a software deployment strategyPlanning instructions for software distributionPlanning instructions for software deployment using GPOSoftware maintenance planning instructions
Implementing sites to manage the replication of Active DirectoryIntroduction to Active Directory Replication
Replication of Linked Multi-value AttributesWhat Are Active Directory Partitions?What Is Replication Topology?Automatic Generation of Replication TopologyGlobal Catalogue and Replication of Partitions
Creating and Confi guring SitesWhat Are Sites and Subnet Objects?What Are Site Links?Replication within Sites vs. Replication between SitesWhy Disable Default Bridging of All Site Links?
Managing Site TopologyWhat Is a Bridgehead Server?What Is the Inter-site Topology Generator?
Troubleshooting Replication FailuresCommon Replication ProblemsWhat Is Replication Monitor?What Is the Repadmin Tool?What Is the Dcdiag Tool?
Implementing the placement of domain controllersImplementing the Global Catalogue in Active Directory
Review of a Global Catalogue ServerCustomize a Global Catalogue ServerWhat Is Universal Group Membership Caching?Determining the Placement of Domain Controllers in Active DirectoryWhat Is Active Directory Sizer?Parameters for Active Directory Sizer
Planning the Placement of Domain ControllersGuidelines for Placing Domain ControllersGuidelines for Placing Global Catalogue ServersGuidelines for Enabling Universal Group Membership CachingGuidelines for Placing Active Directory Integrated DNS Servers
Managing operations mastersIntroduction to Operations Master Roles
What Is the Schema Master?What Is the Domain Naming Master?What Is the PDC Emulator?What Is the RID Master?What Is the Infrastructure Master?
Transferring and Seizing Operations Master RolesOperation Master Roles TransfersWhen to Seize Operations Master Roles
Planning the Placement of Operations MastersGuidelines for Placing Operations Masters Guidelines for Placing the Schema MasterGuidelines for Placing the Domain Naming MasterGuidelines for Placing the PDC Emulator Master Guidelines for Placing the RID MasterGuidelines for Placing the Infrastructure MasterGuidelines for Seizing Operations Masters Roles
Active Directory maintenanceThe Active Directory Database and Log Files
Description of the Active Directory fi lesMoving and Defragmenting the Active Directory Database
How to defragment the Active Directory Database and Log FilesBacking Up and Restoring Active DirectoryComponents of the System State DataHow to Back Up Active Directory?Backing Up and Restoring Active Directory
Planning for Monitoring Active DirectoryOverview of Monitoring Active Directory Events to Monitor
Performance Counters to MonitorGuidelines for Monitoring Active Directory
Discovering the .NET Framework 2.0Introducing the .NET platform 2.0
NET FrameworkNET ServicesVisual Studio 2005
Overview of the .NET Framework 2.0
The Common Language RuntimeClass library Common System TypesDeveloping Client side applications Developing Server side applications Web Applications and Web Services
NET TECHNOLOGIES:C# & ADO.NET development
56 h.
- 65 -
- 66 -
Introducing the Oracle Database AdministrationIntroduction to DBA1
Oracle ProductsRelational Database SystemsStructured Query LanguageTasks of an Oracle Database Administrator
Oracle ArchitectureStorageLogical StructuresThe Data DictionaryDatabase/Grid Control
Installing Oracle Database 10g Software and Creating a DatabasePreface
System requirementsOptimal Flexible ArchitectureSetting Environment variables
Oracle Universal InstallerLaunching OUIConfi guring Oracle
Creating a Database on installEnd of InstallationCreating an Oracle Database Overview of DBCACreate a Database
Windows Application ADO .NET: data and XML
Pro and cons of the .NET Framework 2.0Support for Internet norms Using unifi ed application models Extensible classes .NET 2.0 new features
Fundamentals of C# 2.0Overview of C# 2.0
Structure of a C# 2.0 program Input/OutputGood Patterns Compiling, executing, debug
Data typesIntegrated Data TypesCreating Data TypesConverting typesComparing Value types and Reference typesReferences as method parametersNullable TypesObject Hierarchy
Instructions and TablesInstructionsConditional statementsIterative InstructionsSwitch instructionsIntroducing arrays
Exception handlingUsing methodsUsing parametersErrors managementException handling
Object Oriented Programming and C# 2.0Fundamentals of OOP C#2.0
Objects and classes Class vs StructuresEncapsulationStatic data, static methodsC# 2.0 and object oriented programmingObject oriented systems.
Property and indexerWhat is a property?What is an indexer?
InheritanceClass derivationMethods implementationInterfaces implementationUsing InterfacesUsing abstract classes
C# 2.0: GenericsGeneric classesGeneric MethodsGeneric constraint typesGeneric overloading
Advanced C# 2.0Overloading, delegates, events
Operators OverloadingDelegatingEvents
IteratorsIntroducing iteratorsImplementing iterators
Generics iteratorsAttributes
Introduction attributesImplementing attributes
Windows FormsIntroducing Windows Forms
Creating a project, architecturing the solutionReferencesEntry pointsApplication and Application ContextStarting and stopping the applicationThe AssemblyInfo.cs fi le
Forms, Controls and Drag&DropModal Forms and non-modal formsEventsDelegatesEventHandlersWindows Forms ControlsUser ControlsMenusDrag & Drop
GDI+ and printingGDI+: Basics GDI+: The Graphics classGDI+: Pens and BrushesGDI+: Images and TextsPrinting: PrintDocumentPrinting: PrintPreviewDialogPrinting: PrintDialog
Confi guration fi le and deploymentConfi guration: PresentationConfi guration: CreationConfi guration: Using a confi g fi leConfi guration: RedirectionDeployment: Creating a projectDeployment: Using a projectDeployment: Advanced concepts
ADO .NET 2.0Introduction
General ConceptHistoricWhy ADO.Net (1.x and 2.0)?General use and namespaces
ProviderGeneral conceptPro and cons of the providerDbProviderFactory object
Connected modeOverviewConnection (DbConnection)Request (DbCommand)Reading (DbDataReader)Parameters (DbParameter)Transactions (DbTransaction)Stored Procedures
Offl ine ModeDataSetDbDataAdapterDataSet and DbDataAdapter TypeAdvanced Concepts
ORACLE TECHNOLOGIES: DBA 1 & DBA 2 52 h.
SUPINFO - 3 (L3)
- 67 -
SUPINFO - 3 (L3)
Other actions with DBCAManaging the Database
Controlling the DatabaseManaging ToolsStartup StagesShutdown ModesInitialization Parameter FilesUsing Database Control
Storage StructuresWhat are Tablespaces and Data Files?Managing Tablespaces
Administering Users and Managing Schema ObjectsAdministering Users
Creating an UserProfi le and UsersAuthenticating UsersPrivilegesAssigning Quota to UsersRoles
Managing Schema ObjectsSchemasGuidelines for Objects ManagementData TypesManaging TablesIndexes ViewsSequences
Managing DataData Pump
Manipulating Data through SQLData Pump Export Data Pump Import Directory Objects
SQL*Loader PresentationThe SQL*Loader Control FileMethods for Loading Data Loading Data
Oracle Database SecurityParameters and privileges
Database SecuritySecurity ParametersPrivileges
Profi les FeaturesManaging Profi les
AuditMonitoring for Suspicious Activity Standard Database AuditingValue-based AuditingFine-Grained Auditing (FGA)
Oracle Net ServicesOracle Net Listener
Defi nitionListener ManagementListener CreationRegistering Database
Names ResolutionIntroductionMethods of ConnectionsConfi guring Connections
Oracle Net Manager PresentationConfi gurationsOracle Net Connectivity
Oracle Shared ServersSessions
Dedicated Server ProcessShared Server ProcessSGA and PGA
Shared Servers Confi guration PresentationDISPATHERS SHARED_SERVERS MAX_SHARED_SERVERS CIRCUITS SHARED_SERVER_SESSIONS
Monitoring Shared ServersVerifying Shared Server SetupData Dictonary ViewsChoosing a Connection TypeWhen Not to Use Shared Server
Monitoring and ManagementPerformance Monitoring
PresentationOptimizationsHow to get Information?
Proactive MaintenanceManaging ThresholdsSQL Tuning and Access AdvisorsAutomatic Workload Repository Automatic Database Diagnostic Monitor
Undo ManagementConcepts
Undo Data Transactions and Undo DataStoring Undo Information
Undo ManagementAdministering UndoUndo RetentionUndo Tablespaces
Backup and RecoveryConcepts
PresentationType of failures
DBAs Common TasksThe DBA in the Company
How DBAs Spend Their Time?Introduction to the DBAs Common Tasks
Using Globalization Support Customize language-dependentSpecify Different Linguistic Sorts for QueriesRetrieve Data that Matches a Search String Ignoring Case or Accent DifferencesObtain Globalization Support Confi guration Information
Controlling Access to the Oracle ListenerSecure the listenerEnable TCP valid node checkingRemove default EXTPROC entryAdd a Separate Listener to Handle External Procedure Calls
Confi guring Recovery ManagerManaging RMAN
Describe the RMAN repository and recovery catalogDescribe the Media Management Library InterfaceConfi gure Database Parameters that Affect RMANChange RMAN default settings with CONFIGURE
Using Recovery ManagerUse the RMAN BACKUP CommandManage the backups with RMAN
Diagnostic sourcesUse Various Files for Diagnostic PurposesUse Enterprise Manager to View AlertsAdjust Thresholds for Tracked MetricsControl the Size and Location of Trace Files
Managing Data RecoveryRecovering from Noncritical Losses
Recover Temporary TablespaceCreation Recover a Redo Log Group MemberRecover Index TablespacesRecover Read-only TablespacesRe-create the password fi le
Database RecoveryRecover the Control FileExplain reasons for Incomplete RecoveryDescribe Incomplete Recovery MethodologyRecover the Database to a Specifi c Point-In-Time
Flashback Database Describe Flashback Database ArchitectureConfi guring Flashback DatabaseMonitor the Flashback DatabaseUsing the Enterprise Manager Recovery Wizard
Recovering from User ErrorsPerform Flashback OperationsManage the Recycle BinUsing Flashback Versions QueryFlashback TablesPerform Transaction Level Recovery
- 68 -
Setup DHCP and DNS servers Introduction, DNS/DHCP basics Installation of a DHCP server
InstallationConfi guration RelayLaunching and tests
Installation of a DNS Server Reminding of the DNS concept Concept of fully qualifi ed domain name BIND installation Bind DLZ Files sharing with SAMBA™
Overview Requirements
SambaHistoryDaemonsNew features
The SMB Protocol The SMB format
NetBIOS Protocol NetBIOS operation
Using client smbmountnmblookupfi ndsmb Smb4kServer confi guration The different sections:
The global section Homes sections Printers and print$ Sections Netlogon section Shares sections
smb.conf fi le validity User management SWAT
InstallationUsing SWAT Using Samba as a Domain Controller Creating folders on Samba server
Modifi cation in smb.conf Adding computers accounts
Directories services with OpenLDAP™ Presentation
What is a directory? Directory X.500
LDAP an access protocol to the directories simplifi ed and functional The model of information
Basic element of the directory Attributes of an object Classes of objects and heritage Access to information
The naming model Installation
Necessary for the installation Recovery sources or binaries Compilation and installation by sources
Confi guration The slapd.conf fi le Launching and stop of the slapd service The client fi le confi guration
Directory use Defi nition of schema and DIT Defi nition of slapd.conf and executing the server DIT loading in the directory Search and handling in the DIT Graphic customer of exploration
Using LDAP for a centralized authentication Modify /etc/nsswitch.conf Updating PAM authentication system Updating ldap.conf Replication of LDAP directory What is the replication? Course of a process of replication Installation of the replication
Secure authentication with Kerberos™ IntroductionGlossary How Kerberos works
Kerberos’s advantages How Kerberos works
Confi gure Kerberos Confi gure the server Confi gure a Kerberos client
ConclusionFirewalling with iptables
IntroductionConceptsNetFilter
InstallationKernel part: Netfi lter Administration part: IPtables How to use IPtables The FILTER table
How to save and load rules Main commands OptionsNAT (Network Address Translation)
Kernel options ICMP related options IP related options
Introduction to messaging systemsComponents’ presentation
Different services Single or multi-servers systems
On one server On several servers (sender -> receiver)
Mail User Agent MailThunderbird and the others
Mail Transfer Agent SendmailPostfi x Qmail
Mail Delivery Agent FormatThe different MDA SendmailMaildrop
Services SMTP POP (Post Offi ce Protocol) IMAP (Internet Mail Access Protocol)
Filters
LINUX TECHNOLOGIES: MCU, MCA & CLE 40 h.
SUPINFO - 3 (L3)
Database Storage ManagementMonitoring Storage
Statistics and Views Advisory FrameworkMonitoring and Managing Storage
Automatic Storage Management
ConceptASM InstanceASM and Database ControlASM Group DiskASM FilesMigrating Database to ASM Storage
- 69 -
SUPINFO - 3 (L3)
Introduction to Java Enterprise EditionJavaEE concept
OriginGoalsArchitecture
ComponentsFrameworks Project management toolsApplication servicesEJB component
Dynamic Web development - Servlet, JSP & TaglibServlets
ConceptsMechanismCreationConfi guration Request responsesSession managementCookies managementsContext managementLinking management
Java Server PagesConceptsSpecifi c syntaxImplicit objectsObject and properties manipulation action managementRedirect and include action management
TagLibsConceptTagLib fullnessMechanismHandler tag usesPersonalized tag creation
MVC 2 framework – StrutsProblematic
Servlets/JSP issuesMVC solution
StrutsMVC system applicationFramework structureAction creationForm creationStruts taglib useInternationalizationForm validation systemTemplate use: tiles
Distributed applications - RMI Presentation
Problematic and originAPI and characteristics and composition
RMI uses
Stubs and Skeletons Object references and transportRemote method callingRegister and Naming Client/server linkRemote objectsCompilation and execution RMI ExceptionSecurity Specifi city (dynamic loading, garbage collector,…)
Remote processing - Web ServicesConcept and mechanism
Problematic and characteristic ConceptProtocol details: SOAP
Web Service deploymentTools Web Service basic deployment WSDL Default client creationDeployment detailsUDDI directory serviceSecurity
Java 2 Mobile Edition basesIntroduction
History ConceptCDLC confi gurationMIDP profi le
MidletDefi nition How to create a Midlet Midlet states
User interfacesPresentationWhich packages? High level interfacesMenusLow level interfacesMultimedia
Advanced Java 2 Mobile EditionHigh level 2D interfaces
GameCanvasLayer TiledLayer SpriteLayerManager
ConnectivityWirelessBluetooth
SUN TECHNOLOGIES: Java Web and Mobile 40 h.
Active Spam Killer Bogofi lter DspamAntivirusClam AV Owner solutions
Optional services Webmails
Squirrelmail
IMP
Mailman
Mailing lists
Sympa
GPG
- 70 -
IntroductionThe XNA Framework
PresentationWhy XNA?
XNA InstallationPrerequisitesXBOX360 deployment
XNA: 2DDrawing a sprite
Simple spriteSprite with transparencySprites collisions
Using inputsKeyboard
MouseJoypad
SoundXACTSound Integration
XNA: 3DDrawing primitives
Coordinate systemDrawing
ModelsDrawing a modelAnimation and modelsModel’s picking
Special EffectsParticle renderingParticle engine
.NET TECHNOLOGIES: XNA 12 h.
SUPINFO - 3 (L3)
- 71 -
SUPINFO - 4 (M1)
CORPORATE LAWS 30 h.
An introductionSources and economic sectorsCorporate bodyChoice of legal structuresTrade litigation
Corporate common lawCorporate contractAdhesion to the instrument of incorporationSocial bodiesCorporate dissolution
PartnershipsGeneral partnership
Limited partnershipPrivate company (Ltd)
Defi nition and constitutionAssociated rightsCompany administrationCollective decisions
Public company (Plc)Defi nition and constitutionAssociated rightsCompany administrationCollective decisions
Other company forms
Defi nition and composition of an ERPERP defi nition, basic functionsPresentation of an ERP example (Baan ERP): the enterprises’ functions as seen through the ERPDefi ning the parameters of ERP versus specifi c developments programming Main differences between modular software and software packagesConstituents of an ERP Technical architecture: customer connections, hosts, network, storage, administrationFunctional modulesIntegrating the ERP to other inter/extern applications
ERP MarketImportance of the ERP in the IT fi eld todayMain publishers and integrators, segmentation by area, size of the enterprise, status of the ERP solutionsClients’ typology, types of enterprises, sectors and models by sector (examples of sector adapted solutions)
Life of an ERP ProjectProject constituents (human, organization, technical factors)The ERP project phases: pre-survey or framing, preparation, execution, provisioning and supportEstablishment methodology of the ERPProject organisation: works supervision/work supervision, integration, data migration, change managementExample of project constructionStart-up approaches: big bang, by module, by unitHow to carry through the evolution of an application architecture: an example in the aviation industryExample of the budgetary structure of an ERP structure: material costs, external costs, licensing
costs, integration costs, internal costs,Can ROI (return on investment) be calculated?Risks and key factors for success
Plan a modifi cation, one key factor of the success of an ERP projectOppositions, actors,Planning to conduct change: communication planning and training planningExample of change-conducive plan
Care of ERPTransferring the integrator’s team competences to the customer’s teamsDefi nition, organization and implementation of the Competency and Support CentreProblems arising from version changesOutsourcing: materials, support, maintenance (off-shore with front-offi ce and back-offi ce)
Other specialized software packagesSCM supply chain managementCRM customer relation managementEAIConclusionsAdvantages and disadvantages of the ERPsWhat roles can a SUPINFO engineer play in the set-up and maintenance of an ERP?What future for ERPs? Technological advances of the ERPs: new service oriented architectures
EAI/ERP 16 h.
Please note that the detail of the program is different in each country and therefore adapted to suit local needs.
Introduction of UML languageHistorical reason for the establishment of a pattern
A short reminder of the computing evolutionThe software complexityThe progressive management of the complexityThe limits of structured programming
Contribution of the establishment of a patternThe encapsulation principleThe abstraction principleThe modularity principleSynthesis
Historical aspects of the establishment of a patternGrady Booch and OODIvar Jacobson and OOSEJohn Rumbaugh and OMTThe arrival of UML
Uses casesDiagram description
The objective of this diagramThe syntactic elements
Case study
Needs formulationDiagram example and high-level utilization caseDiagram example and low-level utilization case
Classes’ diagramsDiagram description
The objective of this diagramThe syntactic elements
Case studyA few design patternsClasses diagram example
Packets diagramsDiagram description
The objective of this diagramThe syntactic elements
Case studyPackets diagram example
Objects diagramsDiagram description
The objective of this diagramThe syntactic elements
Case study
UML MODELING 20 h.
- 72 -
Niveau 1 : PROFESSIONAL SITUATIONS - ADVANCEDFlight InformationPlane ReservationsSeminar PlanningDelegatesA New JobJob PromotionsInsurance & BankingMarket ResearchHelpful ContactsLiving in America
READING DOCUMENTSExecutive Committee MeetingThe Complaint
WRITING DOCUMENTSThe Year in ReviewThe ResponseThe ResignationHotel Brochure
MEETINGSCompany Strategy Company Strategy (Speaking)
PRESENTATION & SPEECHESPoliciesSite VisitSOCIALIZINGAt the RestaurantAt the Restaurant (Speaking)
PROFESSIONAL INTERACTIONBusiness NegotiationsBusiness Negotiations (Speaking)Delivery TimeDelivery Time (Speaking)
The OrderThe Order (Speaking)The Trade ShowThe Trade Show (Speaking)A Project Update
Niveau 2 : PROFESSIONAL SITUATIONS – EXPERTAn AppointmentBusiness CallsThe Company StandComparing ProductsMaking a SaleNegotiatingTrouble with OrdersAfter-sales ServicePaying a BillOrganizing a StayWelcoming VisitorsHandling an Invoice
PROFESSIONNAL INTERACTIONThe ProjectLegal Advice
READING DOCUMENTSThe Press Article
PRESENTATION AN SPEECHESProduct AnalysisThe Decision
SOCIALIZINGBetween MeetingsThe EconomyBetween Meetings
MEETINGSDepartment RestructureClient Negotiations
Foreign language: AMERICAN ENGLISH 4 70 h.
Managing for the fi rst timeA basic grounding in effective people managementTaking stock of your role as a managerDrawing up the identity card for your unitCarrying out a diagnosis of your teamTaking stock of your teamThe golden rules for being successful in a new managerial role
Succeeding to management interviewsSucceed to a professional interviewAccomplish a useful feedbackReact to a non-respect of the rulesReact to a poor performanceCongratulate a colleague
PEOPLE MANAGEMENT 15 h.
MARKETING PRINCIPLES 11 h.
Objects diagram exampleCommunication diagram
Diagram descriptionThe objective of this diagramThe syntactic elements
Case studyCommunication diagram example
State-transition diagramDiagram description
The objective of this diagramThe syntactic elements
Case studyState-transition diagram example
Sequence diagramsDiagram description
The objective of this diagram
The syntactic elementsCase study
Sequence diagram exampleActivity diagrams
Diagram descriptionThe objective of this diagramThe syntactic elements
Case studyActivity diagram example
Components and spread out diagramsDiagram description
The objective of this diagramThe syntactic elements
Case studyThe components and spread out diagram example
SUPINFO - 4 (M1)
- 73 -
STRATEGY 31 h.
FINANCIAL MECHANISMS 18 h.
Fundamentals of fi nancial managementManagement Control: managing performanceTransfer prices and responsibility centresWhat is a cost?Cost price: from partial costs to full costsCost price: from full costs to the ABC method
Understanding the sources of value creation: ROCE and EVAUnderstanding the principles of the forecasting processConstructing and managing a budgetFrom broad strategy to daily management with the Balanced ScorecardPreparing your operating report
SELLING/NEGOTIATION 9 h.
Selling big projectsImproving your understanding of your prospect’s situationMotivate your target by raising problems that need resolvingIncrease your target’s motivation by asking implication questions
Master large project selling with the help of a real-world exampleStimulate the other side’s interest with questions about results they hope forAdapt your “pitch” to your target’s express needs
SUPPLY CHAIN MANAGEMENT 6 h.
The basics of supply chain managementWhat is the supply chain?The best way to guide fl ows in the supply chain
The supply chain and client satisfactionThe supply chain and the relationship with suppliersThe supply chain and decisions about industrial structure
The fundamentals of a company’s strategyWhat is a company’s strategy?Guidelines for drawing up a strategic projectMastering SWOT analysisAnalyzing market dynamicsBuilding your strategy at the business levelWhat is a cost strategy?Conducting a cost strategy successfullyWhat is differentiation strategy?Conducting a differentiating strategy successfullyThe value chain and competitive advantage
Analyzing your competitive positionValue creation and strategy
Understanding corporate strategyWhat is corporate strategy?The keys to the success of a corporate strategy
Understanding the theory of resourcesTheory of competitive advantage by Michael PorterThe limits of Porter’s modelRedefi ning strategy through the theory of resources
Intrusion Detection and Prevention TechnologyOverview of Intrusion Detection and PreventionInspection EngineCisco IDS and IPS Devices
Confi gure Network Intrusion Detection and PreventionCisco IOS Intrusion Prevention SystemConfi gure Attack Guards on the PIX/ASAConfi gure Intrusion Prevention on the PIX/ASAConfi gure Shunning on the PIX/ASA
Encryption and VPN TechnologyEncryption BasicsIntegrity BasicsImplementing Digital Certifi catesVPN TopologiesVPN TechnologiesIPSec
Confi gure Site-to-Site VPN Using Pre-shared KeysPrepare a Router for Site-to-Site VPN using Pre-shared KeysConfi gure a Router for IKE using Pre-shared KeysConfi gure a Router with IPSec using Pre-shared KeysTest and Verify the IPSec Confi guration of the RouterConfi gure a PIX/ASA Site-to-Site VPN using Pre-shared Keys
Confi gure Site-to-Site-VPN Using Digital Certifi catesConfi gure CA Support on a Cisco RouterConfi gure an IOS Router Site-to-Site VPN using Digital Certifi catesConfi gure a PIX/ASA Site-to-Site VPN using Digital Certifi cates
Confi gure Remote Access VPNIntroduction to Cisco Easy VPNConfi gure the Easy VPN ServerConfi gure Easy VPN Remote for the Cisco VPN ClientConfi gure Easy VP Remote for Access RoutersConfi gure the PIX/ASA as an Easy VPN ServerConfi gure a PIX/ASA as an Easy VPN ClientConfi gure the ASA to support WebVPN
Secure Network Architecture and ManagementLayer 2 Security Best PracticesSDM Security AuditRouter Management Center (MC)Simple Network Management Protocol (SNMP)
PIX/ASA Contexts, Failover and ManagementConfi gure a PIX/ASA to Perform in Multiple Context ModeConfi gure PIX/ASA FailoverConfi gure Transparent Firewall ModePIX/ASA Management
CISCO TECHNOLOGIES: Network Security 2 28 h.
SUPINFO - 4 (M1)
- 74 -
Presentation of exchange 2007 Previous versions of exchange server New features of exchange server 2007 roles
Mailbox roleClient access roleHub transport roleEdge transport role Unifi ed messaging roleEditions and cal for exchange server 2007
Architecture for exchange server 2007Installation of exchange 2007
Requirement of exchange 2007 installationMinimal requirement to execute exchange 2007 Considerations on the material and the performancesSoftware requirements
Exchange and active directory interactions Active directory preparation to deploy exchange server 2007
Directory preparation in a one-domain infrastructure.Exchange server 2007 silent installation
Exchange server 2007 installation wizard.Exchange server 2007 installation without wizard
Checks after an exchange server 2007 installationExchange server best practices analyser (exbpa)
Migration to exchange server 2007Confi guring mailbox server roles
Administration toolsExchange management console (emc) Exchange management shell and Microsoft windows powershell Exchange management shell commands
Implementing mailbox server roles Introduction to the mailbox server role post-Installation tasks Storage groups and databases Process of managing data on a mailbox server Data storage technology options
Managing public folder databasesPublic folders
Public folder replication Managing data on a mailbox server
Managing recipient objects Introducing recipient objects
What are recipient objects? The different recipient object types Managing mailboxes Introducing mailbox management Examples of mailbox user management Moving mailboxes Mailbox confi guration options Deleting mailboxes
Managing distribution groups IntroductionReminder on active directory group types Selecting between group typesActive directory group scope
Managing dynamic distribution group PresentationConditions and fi lters Managing mail contact PresentationUsesManaging mail-enabled public folders PresentationUsesPublic folder permissions
Managing e-mail address and address lists Managing e-mail address policies
PresentationWhat are accepted domains? Confi guring accepted domains Authoritative domains Relay domainsDelete an accepted domain: What are e-mail address policies?
MICROSOFT TECHNOLOGIES: Exchange Server 26 h.
SUPINFO - 4 (M1)
Introduction to the VoIPVoIP
DescriptionHistoryComparison with the traditional telephonyVoIP actorsThe future: Everything over IP
Protocols linked to the VoIPRTPRTCPSIPMGCPCisco SCCPH.323
SIP protocolDefi nitions
Defi nitionsArchitecture
User AgentsProxy ServerRegistrar ServerRedirect Server
SIP methodsSIP messagesSIP headerSDP headerSIP requestsSIP responsesPredefi ned SIP message list
SIP exchangesSIP transactionsSIP dialogsTypical transactions and dialogs
VoIP equipmentsSubscriber side equipments
IP telephonesAdapters for analog telephoneIP telephony software
Provider side equipmentsPABX and IPBXIP/TDM gatewaysSIP servers
Network infrastructure supporting the VoIPInterconnecting VoIP and traditional telephony
Interconnect VoIP and traditional telephonyLAN infrastructure
QoS and VLANsSecurityVoIP and wireless networks
WAN infrastructureQoSSecurityNAT/PATReliability and availability of WAN links
Implementation over different media and WAN technologies
VOIP TECHNOLOGIES:Study and Implementation
20 h.
- 75 -
.NET TECHNOLOGIES: ASP.NET 2.0 & WEB Services
40 h.
ASP.NET 2 Basics (Web Applications)Introducing ASP.NET
OverviewPage framework
Master-pagesStyle, Skin, ThemesWebparts
Server ControlsGeneralities Introducing a few controlsClient/Server interactionPostBackControl validation
Confi guration fi lesFile organizationUpdating an application
ASP.NET 2 Advanced conceptsUser defi ned server controls
BasicsCreation of a user controlUsing events
Data accessDataBindingDataSource typesObjectDataSource
Data displayDebug, Trace, Cache
Debugging an applicationUsing Trace informationCache managementCache dependency
Customization and navigationCustomizationNavigation controls
Web applications securityUser managementIIS authenticationMembershipsUsing rolesOut-of-the-box server controls (Login, LoginView)
Web ServicesGeneralities
Introducing web servicesSOAP protocolWSDL format
Web services and .NETCreation of a web servicesDeployment of web servicesUsing web servicesCreation of a transparent proxy
Managing address lists Presentation of address lists Use
Managing global address lists PresentationUse
Managing offl ine address books PresentationOffl ine address book distribution Use
Managing client access Introduction to managing client access
Presentation of the client access server role (cas) Client access use
Managing pop3 and imap4 access Differences between pop3 and imap4 Activation and authorization pop3 Activation and authorization imap4
Outlook 2007 / exchange 2007 AutodiscoverImplementing outlook web access PresentationConfi guration Implementing outlook anywhere PresentationConfi guration Activesync
Messages routing Introduction to routing
Exchange connector Hub site Installation with an exchange server 2003 Transport rules Transport rules agent Edge rules agent
Rules management Mail transmission in an exchange 2007 organization Role edge server Confi guration of an edge server EdgesyncSolving routing problems Hosted exchange services
High availability, backup, and recovery High availability LcrPresentationWorks Cluster exchange 2007 SccCcrHow ccr works InstallationBackup exchange server 2007 Type of backup Backup data Method of backup How backup Recover exchange server 2007 Emergency recovery Partial restoration
Maintaining the messaging system Implementing change management Microsoft operations framework Updating exchange servers Maintenance tools EseutilIsintegExchange console
SUPINFO - 4 (M1)
- 76 -
Installing SUN Solaris 10Introduction to Solaris 10
History Solaris versions: from version 9 to version 10Installing Solaris 10
Step by stepConfi guration exampleAssistance
Managing the fi lesytem Introduction
PrerequisitesHard disk functioningThe FHS
Disk managementCreating partitionsFormattingAssembling and disassembling volumes
Packages managementIntroduction to the principle of packages
Package structureThe /var/sadm/install/contents fi lePackages format
Administering the packages
IntroductionPackages conversionDisplaying information on the packagesAdding an applicationRepairing an applicationErasing an application
Adding an application using the spool directoryTransferring packagesUpdating
Basic operationsBootROM
Introduction to BootROMBootROM commandsIdentifying the start up peripherals
Start up and shutdown sequences SMF - Service Management Facility Start up sequenceShutdown sequence
User and security management Characteristic of the users’ management compared to Linux
Users’ base system managementManagement of the accounts
Management of the fi les of initialization
SUN TECHNOLOGIES: Solaris 1 30 h.
SUPINFO - 4 (M1)
Introduction to Java Enterprise EditionJavaEE concept
OriginGoalsArchitecture
ComponentsFrameworks Project management toolsApplication servicesEJB component
Java Enterprise Edition (JavaEE) ArchitectureConcepts
Enterprise architecture problematic Complex architectureWeak coupling and strong coherency
JavaEE architectureLayer ArchitectureBusiness layerApplication layerPresentation layerMVC concept implementationLinking layers
Java Server FacesIntroduction
JSP issuesJSF characteristics JSF position into an n-tiers applicationJSF site examples
JSF basesComponent conceptCommon attributesBehaviourComponents and JavaBeans linksUnifi ed Expression Language Life cycle
Base tagsDisplayEntryLinksButtonsCheckboxesRadio buttonsArrays
Server confi gurationJavaBean declarationsNavigation
Java Server Faces - advancedBehaviours
ActionListenerValueChangerListener ConversionValidation
Advanced conceptsInternationalization (I18n) Message managementJavaEE integration (resources injection)
FaceletsIntroductionPage structure JSFC Template View templatingComponent templating Facelets tags
Business logic encapsulation - EJB 3Framework presentation
HistoryConcepts
Session BeansCreationDeployment
Entity BeansCreationRelationsDeploymentEntityManager
Message Driven BeanThe JMS APICreation
EJB relationsInjection conceptJava building tool: ANTPresentationConceptsConfi guration fi le
Simple actionsTargets TasksVariables
Complex actionsClassical targetPersonalized taskXDoclet
SUN TECHNOLOGIES: Java Entreprise 30 h.
- 77 -
The IBM companyCompany presentation
OriginHistory
ActivitiesHistorical activitiesServices
Product presentationHighlighted productsOther products
IBM todayDetails
AS/400 & OS/400 The hardware: AS/400
Introduction system historyHardware architectureAS/400 different modelsSupported operating systems and their specifi cityAS/400 today uses
The software: OS/400Introduction and operating system historyOS/400 basic conceptOS/400 system connectionControl languageDB2/400, integrated data base
WebSphere Application ServerIntroduction
What is an application server?Introduction to SOAStand-alone environmentDistributed environmentInstallationPackaging
InstallationProfi les
MigrationAdministration clients
Administration consolewsadminCommand lineAntAdministration tools
ArchitectureEnvironment typesServers, nodes, cellsServer typesContainersEnvironment variablesJDBC resources
Application managementDevelopment and deploymentInstallation and confi gurationUpdatesApplication Server Toolkit
WebSphere Application Server - advancedSecurity
WebSphere security modelHigh availabilityAdministrative security
MessagingMessaging architectureSecurityWebSphere MQ
High availability and load managementLoad balancingData replication serviceHigh availability
Performance ViewerPresentationUses
IBM TECHNOLOGIES 40 h.
Advanced 2DAdvanced collision
Pixel collisionDrawing texts
The SpriteFont Class2d within 3D environment
BillboardingShaders and XNA
Shaders basicsIntroductionPixel shaderVertex shader
Using shadersVertex lightning
Textures operationsNormal mapping
Post-process effectsBloom
XNA PhysicsIntroduction
Why a physic engine?NewtonInstalling Newton
ModelsSphereCube
CollisionsAnswering a collision
.NET TECHNOLOGIES: Advanced XNA 12 h.
SUPINFO - 4 (M1)
Security of the systemIntroductionSupervising access to the system Characteristic of the change Security controlSupervising the FTP, rclient and SSH accessesControlling the access to the dataControlling permissions
Printing managementAdministering the printing servers
IntroductionPresentation to the basic principles of network printingConfi guring the printing servicesSupervising the printing servicesStarting and stopping the LP impression serviceSpecifying the chosen printerUsing the LP impression service
Client’s confi gurationBackup management
UFSPresentation of UFSBackupRestore
ZFSPresentation of ZFSBackupRestore
Basic networksNetwork confi guration
IntroductionIfconfi gConfi guring the networks interfacesUsing DHCP
- 78 -
DB2 UDB – basis and clientPresentation of DB2 editions
Mono user editionMulti user editionDeveloper editionPortable editionDB2 for z/OS and iSeries
Basis conceptsDB2 / Oracle architecture InstancesDatabasesContainersTables spaces (bufferpools)DB2 Naming conventions Base elements
DB2 ClientPresentation of client typesClient Confi guration Client Server communication TypeCommunications confi guration
DB2 UDB – Server and advance confi gurationDB2 ServerDefault confi gurationRemote server confi guration
Native XML data storagePresentationValidation
PHP Developing with DB2Zend engineSpecifi c functions
Logging Log typesLogging typesMirror logLog reading
Security managementSecurity modelsAuthenticationAuthorizations
Tivoli Identity Manager – logic and organizationTivoli history
HistoryConceptsToday
’Identity Access Manager (IAM) conceptsConceptsPossibilities
Tivoli Identity Manager (TIM) How TIM responds to IAM needs
TIM organization and architectureTIM confi guration
Tivoli Identity Manager – implementationIBM Tivoli Manager features
BasicsAdvanced
ImplementationConfi gurationInteraction with other architecture applicationsUse cases
LotusHistory and presentation
PresentationHistory
Lotus, a collaboration toolsBase conceptsPresentation
Directory servicesServer confi guration Security and access
Calendar and messaging serversDomino server confi gurationNotes confi gurationiNotesGroupwaresUser securityPlugins
MainframeHistory and macro-computer concept
Uses and conceptHistory and marketing overviewToday
Different editionzSeriesSystem z9
Operating systems and virtual systemsVirtual system of systems presentationPossibilities
Advanced operationsMaintenanceUpgradeSecurity
SUPINFO - 4 (M1)
- 79 -
BUSINESS CREATION 30 h.
The basicIntroduction
NotaThe key points
The ideaThe right questionsThe technologic approach
The marketMarket typologyThe customers
The activity and the preliminary studyDefi nitionsKey pointsInformation searchBrief study
From idea to product or serviceThe confrontation
Identifying the actorsThe confrontationThe protection
ConstraintsThe product typeThe productionThe imageThe distributionThe market and the regulationThe means
The project lifespan and analysisPersonality, potential and environmentMotivation, objective and competenceThe deciding moment
The business planRole of the business plan
The roleThe market study
The stages of the market studyThe surveyGalvanizing the sales The price policy
The business planThe planThe contents
The contents (2)
The beginningsSales
IntroductionThe buildingsThe documentsThe commercial activity
FinancesThe fi nances and the planning
Recruitment and suppliersDefi ning the functionsThe suppliersThe staff
Information systemsThe choice of the systemThe activity indicatorsFollow-up and controls
The incorporation certifi cation and the costsThe application form
The administrative bodiesThe contentsThe cost
State aidsSocial aids
The social aidsFinancial aids
The fi nancial aidsFiscal aids
The fi scal aidsAdditional aids
Specifi c aids
Start-UpsThe specifi cities
The investmentsParticular statuses The risks
Project presentation
The enterprise problematicThe information systemThe globalization of the exchangesThe decisional role within the information system
From infocenter to datawarehouseThe infocenterInfocenter: set of dataData warehouseOrientation subject (data warehouse, datamart)Integrated dataHistorised dataNon volatile data
The decision-making projectThe menThe human environmentA project based approach
The success factorsThe technical projectStudy of what’s thereThe data modelsThe ETLThe SGBDThe restitution toolsTechnical architecture
ModellingThe fact tablesThe dimension tablesThe aggregates tablesMetrologyVolumetricThe time
DATA WAREHOUSE:Concepts and architecture 16 h.
COMPUTING AND MULTIMEDIA LAW 40 h.Introduction to computing law
Defi nitionDefi nitionProblematic
CharacteristicsSources and applicable law
National sourcesInternational sources
SUPINFO - 5 (M2)
- 80 -
Applicable civil lawApplicable criminal lawProof
Computing litigationOut of court settlementMediation
Research methodologyObjectivesPrinciples: sources’ multiplication, hierarchy and confrontation
Digital copyrightCopyright protection
Intellectual property and digital creationsProtection conditionsMoral rightExploitation rights
Copyright exemptionsWorks not covered by copyrightThe technical copy exceptionThe private copyThe question of downloading
Ethic and computingDefi nition
SoftwareSoftware protection
Defi nition of softwareDifferences with other types of creationsProtection conditionsProtection of the presentationData protectionProtection of the software
Precautions in relation with the websiteCompulsory informationDeclaration obligationsReferencingCivil responsibilities of the contents’ suppliersPenal responsibilities of the contents’ suppliers
Website creation contractLegal nature of the contractProvider’s obligationsClient’s obligationsThe contract clauses
Domain nameDomain name defi nitionAcquiring a domain nameThe domain name litigationThe domain name litigation (2)
SoftwareCopyright protection of the software
The protection conditionsThe software protection systemThe copyright attributionThe copyright protection litigation
Protection of the software with a patentThe European proposalArgumentation
Software contractsThe software creation contractThe software adaptation contract
The software edition contractDatabases
Database protectionLegal defi nition of a databaseFree data, appropriated dataStructure copyrightContents copyright
The world according to GoogleThe Google phenomenonThe Google activities
The Microsoft caseFreedoms and Internet
Freedom of speechFreedom of speechLimits to speech freedom
Individual freedomsImage representation rightCorrespondence secrecy rightOther freedoms
Employee freedomCyber-surveillance of the employeesUtilization of Internet in the workplace
E-commerce freedomThe principle of e-commerce freedomThe exceptions to e-commerce freedom
Freedoms and internet (2)The protection of the cyber-consumer
E-commerce and the right to retractImplementation delays
Canvassing cyber-consumersCanvassing and spammingCyber advertising
Cyber crimeIntrusion in the systemsManipulations in the systemsRepression
Cyber crime (2)The illicit gathering of personal dataThe illicit utilization of personal dataOffences not specifi c to computing
Computing and multimedia contractsThe access providing contract
Defi nitionThe obligations of the access providerThe obligations of the subscriber
The hosting contractDefi nitionThe obligations of the hostThe obligations of the hosted
The referencing contractDefi nitionThe obligations of the referenced siteThe obligations of the search engine or of the directoryThe responsibilities of the search engine or of the directory
The other contractsThe e-commerce contract, setting upThe e-commerce contract, carrying outThe computing services contracts
IntroductionThe computing service
What is a computing service?What does producing services mean?Managing services?Driving by the processes?
Services managementThe SI actors, roles and responsibilitiesThe governance temple (ITIL, COBIT, CMMI, ISO…)The service centreThe maturity levelsThe driving of a service centre
What is ITIL?The ITIL context
The customers’ expectationsThe evolution towards a referentialA bit of history…
ITIL presentationThe ITIL conceptThe ITSMThe perimeters covered by ITIL
ITIL concretelyThe support service
The service DeskIncidents managementProblems managementChanges managementProduction management
ITIL FOUNDATION 24 h.
SUPINFO - 5 (M2)
- 81 -
SUPINFO - 5 (M2)
Confi guration managementDelivery service
Capacity managementAvailability managementContinuity managementFinancial managementService levels management
From ITIL to ISO/CEI 20000Introduction
PDCAProcess approachCustomer visionTransversalNormalisation contribution
PROFESSIONAL SITUATIONS - ADVANCEDADMINISTRATIVE & SECRETARIAL
Letter TemplateTravel ItineraryMinutes
AUTOMOTIVEVehicle InspectionVehicle RegistrationRecall Notice
BANKING & INSURANCECertifi cate of InsurancePromissory NoteTravel Insurance
HUMAN RESOURCESPersonnel Requisition FormJob Candidate EvaluationJob Offer LetterNotice of DismissalEmployee HandbookFair Labor Standards Act
SALES & MARKETINGInternal MemoCold Call ScriptSales Results PresentationCase StudyMarketing Strategy
AFTER-SALES & CUSTOMER SERVICECustomer Survey AssessmentLetter of ComplaintWarranty and Return Policy
ITInstallation GuideServer DescriptionThread Safety Issues
LEGALAttorney’s LetterCorporate BylawsGeneral Contract for ServicesPatent Law
Foreign language: AMERICAN ENGLISH 5 56 h.
Management stylesAdapting management to the independence of your staffHelping your staff to progress by using the correct management styleConducting delicate interviews successfully by using different management styles
The manager-coachPsychology in managementHow to improve your coaching by understanding people betterFundamental coaching toolsWhen should you coach? When should you manage?
DelegationWhat is delegation?What is the best way to delegate?Monitoring delegationWhat to do when a delegated mission goes wrong
Developing your staff’s skillsWhat is competence?Choosing which skills to develop your teamDeveloping skills through trainingDeveloping skills by delegatingGiving training feedbackDeveloping your team’s skills through individual coaching: the GROW approach
Organizing work so that it acts as trainingMotivating your staff
Identifying your staff members’ motivationHow to deal with demotivationHow to motivate your staff by using the V.I.E systemHow to effectively praise your staffHow to recognize passivity and overcome
Appraising your staffThe annual appraisal interview: a tiresome obligation or a constructive opportunity?The four golden rules for conducting annual appraisal interviewsHow to use the SMAC method to formulate pertinent objectives that motivate your staffHow to conduct appraisal interviewsHow to manage diffi cult appraisal situationsHow to monitor objectives agreed during appraisal interviewsHow to use the SMART method to formulate pertinent objectives that motivate your staff
PEOPLE MANAGEMENT 63 h.
Manage changeGetting to know what your change project really involvesSettling a suitable change strategyEnsuring success by understanding the stakeholders’ positionsOrganizing the change projectCommunicating about the change project
Motivating your team to support a changeSupporting your team members through changeSteering the change project on a daily basisChange leadership: some ethical issues
TEAM MANAGEMENT 12 h.
SUPINFO - 5 (M2)
- 82 -
Introduction to wireless networksPresentation
HistoryEvolution
EquipmentsNetwork equipmentsClient peripheralsSymbols
ArchitecturesAd HocInfrastructureOther technologies
IEEE 802.11 normsPresentation
IEEE 802 normsIEEE 802.11 norms
PHY layerPMD and PLCP layersChannels and frequencies
MAC layerCSMA/CARTS/CTSIFSServices
MAC architectureDCFPCFCoexistence
Radio technologyWave theory
Physical propertiesMeasures and units
Waves into a WLANScatteringMultipathPath LossAbsorption
ModulationModulation technicsFHSSDSSSOFDM
Wireless technologiesAdvantages
The “wire free” conceptInstallation
DrawbacksSecurityPerformances
FeaturesRedundancyLoad sharingRoamingScalability
AntennasPresentation
ProprietiesPolarization and radiationFresnel zoneDiversity
Antenna typesOmnidirectional antennasUnidirectional antennas
Rules and lawsETSI/FCCEIRP ruleARCEP rule
Cisco access pointsPresentation
ComparisonConnectionBVI interface
Confi guration de base
Default confi guration and resetConfi guration methodsBasic confi gurationInterface confi gurationServices
Advanced confi gurationHot StandbyRepeaterQoSVLAN
Verifi cationsState visualizationCDP
Cisco bridgesPresentation
ComparisonConnectionLEDs
Basic confi gurationDefault confi gurationConfi guration methodsBasic confi gurationInterface confi guration
Advanced confi gurationRepeaterRadio parametersAccess waysSystem confi guration
Verifi cationsState visualizationTroubleshooting
Wireless securitySecurity basics
Technologies presentationThreats classifi cationAttack methodsVerifi cations
First generation securityBasic securitySSIDWEPAuthentication
Second generation securityWPA and WPA2TKIP encryptionAES encryptionAuthentication typesIEEE 802.1X authenticationRADIUS infrastructure
Other methodsVPNVLANSpanning-Tree
Troubleshooting and Site SurveyTroubleshooting
General approachOSI model approachDiagnostic toolsSystem messagesEnterprise management
Basics of site surveyBasicsDesign of an access networkDesign of a point-to-point linkRequired devices
DocumentationDocumentationTools and utilitiesInfrastructure knowledgeStudy
Mounting and installingInstalling access pointsInstalling antennas
CISCO TECHNOLOGIES: Wireless 20 h.
SUPINFO - 5 (M2)
- 83 -
24 h..NET TECHNOLOGIES: Remoting 5 MDN
RemotingIntroduction
What is Remoting? Accessing distant objectsMarshallingMarshalling by value (serialization) Marshalling by reference Client side activation Server side activation Singleton / Singlecall Communication channels
ImplementationCreating Marshall by Value typesCreating Marshall by Reference typesClient’s side activation: server codeClient’s side activation: client code
Server’s side activation: Server codeServer’s side activation: client code Customising server objects.
Confi guration fi lesAdvantagesClient side confi guration: App.conf server Client side confi guration: App.conf client Server side confi guration: App.conf server Server side confi guration: App.conf client
Other Solution / Future solutionsWeb servicesDirect Socket confi gurationEnterprise services MSMQ Windows Communication Foundation
ORACLE TECHNOLOGIES: Oracle Database 10G: implement & administer a datawarehouse
20 h.
Data Warehouse Design Logical Versus Physical Design in Data WarehousesData Warehousing Schemas Data Warehousing Objects Physical Design in Data Warehouses Hardware and I/O Considerations
Data Warehousing Schemas Star Schema Model Snowfl ake Schema Model Tuning Star Queries Star Transformation Hints Star Transformation Hints Static Partition Pruning and Star Query Dynamic Partition Pruning and Star Query Dynamic Partition Pruning Determination
Partitioning Basics Supported partition types Rolling window operations Partition pruning Partitioning Using a Template
Extraction, Transportation, and Loading (Extraction and Transportation) ETL Tools Extraction Methods Logical Extraction Methods Physical Extraction Methods Change Data Capture Transportation Using Transportable Tablespaces Loading Mechanisms
ETL-Loading Load a formatted fl at fi le into an existing table with SQL*Loader Performing basic transformations while loading with SQL*Loader External tables using oracle_loader driver External tables using oracle_datapump driver Loading data with OCI and Direct-path APIs
ETL-Transformation Transformation Using SQL Transformation Using PL/SQL Transformation Using Table Functions Error Logging and Handling Mechanisms
Parallelism Concepts Parallel Operations Degree of Parallelism Parallel Execution Plan Operations That Can Be Parallelized The PARALLEL Clause Parallel Query Parallel DDL Performance Benefi ts of Parallel DML
Parallel Operations in Data Warehouses Automated Parallel Query Tuning Data Distribution and V$PQ_TQSTAT Object Statistics and V$PQ_TQSTAT
Materialized Views Materialized Views Overview Types of Materialized Views Nested Materialized Views Partitioned Materialized Views Refresh Methods and Modes Altering/Dropping Materialized Views Dimensions and Hierarchies Dimensions and the Data Dictionary
DimensionsCreating dimensions Validate dimensions data View dimension defi nition information Distinguish between dimensions and constraints
Materialized Views Refresh Refresh Methods and Modes Identifying Dependent MVs Conditions for Complete/Fast Refreshes Materialized View Logs Parallel Refreshes
Query Rewrite What Can Be Rewritten? Enabling Query Rewrite Join Compatibility Checks Common Joins PCT and Query Rewrite Query Rewrite using Multiple MVs Index Materialized Views
SQL Access Advisor DBMS_OLAP Advisory Procedures Workload Management and Sources RecommendationsWorkload Filters and Attribute Types Tuning of Manually Created Materialized Views Fast-Refreshable Materialized Views RECOMMEND_MVIEW_STRATEGY procedure
Data Warehousing System Management Statistics Collection Resumable Sessions Backup and Recovery Table Compression Security
SUPINFO - 5 (M2)
- 84 -
CISCO TECHNOLOGIES: IP Telephony Express
VoIPVoIP vs traditional telephony
Implement voice into an IP networkReal time voice into an IP networkPacket loss, delay and jitterGateways: features and uses
Challenges of the VoIPRequired bandwidth for the VoIP
IP phone presentationThe Cisco IP phone modelsConnect IP phones to the network
Installing with a single cableInstalling with multiple cablesInstalling with multiple switchesNetwork and protocol management
Cisco IP Communicator: an IP softphoneInstallation of the Cisco softphone
Prerequisites and installationInstallation prerequisites for the softphoneInstallation of Cisco IP Communicator
Confi guration of Cisco IP CommunicatorCisco IP Communicator interface
Call featuresIP phone interface descriptionCall establishment
Which are the steps?Point-to-point call
Dial planEvolving dial planA state of the art dial planHierarchical dial plansIntegrating an internal and public dial into the same plan
Class Of Restrictions (COR)IntroductionConfi gurationStep 1: Declaring class namesStep 2: Creating inbound class listsStep 3: Creating outbound class listsStep 4: Applying inbound class listsStep 5: Applying outbound class lists
Confi guring Cisco CallManager ExpressCME, options, process and parameters
GeneralitiesCME processing mode
Communication protocolsSCCP (Skinny Client control Protocol)H.323SIP
VLAN with CMEFlow separationVLAN confi gurationSpecifi c DHCP parameters confi gurationRestriction
Registering process of an IP telephone with CMEGeneralities
Registering processEphone and Ephone-dn
GeneralitiesEphone
GeneralitiesConfi gurationExample of a basic confi gurationExample of a multiple Ephones confi gurationExample of a multiple buttons and multiple Ephones confi guration
Ephone-dnSingle-line Ephone-dnDual-line Ephone-dnPrimary and secondary Ephone-dn with one numberShared Ephone-dnMultiple Ephone-dn on one EphonePreference and HuntstopOverlay Ephone-dn
CME fi lesGeneralitiesFile types
GUI fi lesCisco TAPI fi lesFirmware fi lesMusic on hold
Initial installation of telephonesManual installationAutomated installationPartially automated installationVerifi cations
GUI confi guration of the CMEPrerequisites
Create GUI administrators and users accountsGraphical confi guration interface
Access to the GUI interface“Administrator” interface“Phone user” interface
Call options confi gurationCall transfer confi gurationCall redirection confi gurationTelephone directoryPersonalized ringtonesMusic on holdIP phone display
Quality of Service (QoS)Introduction: what’s the Quality of Service?QoS principlesQoS mechanisms
QoS mode queues managementPQ mode queues managementCQ mode queues managementWFQ mode queues managementCBWFQ and LLQ mode queues managementCongestion detection
20 h.
- 85 -
Notes
Notes
- 86 -
Notes
- 87 -
- 88 -
Mapa de las escuelas SUPINFO : www.supinfo.com/mapa-escuelas
- 89 -
Tarjeta telefónica internacionalAcceso a una red mundial de 500 puntos estudiantes Servicio mundial de urgencia las 24 horas E-mail y voice-mailRevistas dedicadasTransportes NacionalesTransportes InternacionalesViajes y excursiones
HotelesOciosRestaurantes, bares, pubsCinesMuseosCambioVisaetc.
Además de los servicios externos, la tarjeta ISIC-SUPINFO es utilizada como control de acceso automático a ciertos establecimientos SUPINFO a través del mundo, al acceso a los espacios dedicados a las promociones, a los laboratorios. Ella integra progresivamente un sistema de monedero electrónico para la utilización de fotocopiadoras o el consumo de bebidas y golosinas.
Direcciones y teléfonos de todos los centros SUPINFO en Francia y en el mundo: www.supinfo.com/contacto
SUPINFO otorga a todos sus alumnos ingenieros una tarjeta de estudiante internacional que ofrece numerosas ventajas.Ser alumno ingeniero de una gran escuela como SUPINFO tiene sus ventajas: es reconocida por la UNESCO, la tarjeta ISIC-SUPINFO vale como atestación del estatus de estudiante en el mundo entero.Los alumnos ingenieros SUPINFO se aprovechan entonces de todas sus ventajas a nivel internacional y no solamente a nivel nacional, regional o local. Por ejemplo: los estudiantes Canadienses tienen derecho al 40% de descuento en los trenes.Con la Tarjeta ISIC-SUPINFO, un alumno ingeniero SUPINFO tendrá acceso a la misma reducción.
Pero esto no es todo. He aquí un vistazo de las otras ventajas unidas a la tarjeta ISIC-SUPINFOReducciones en el mundo entero en
Sede administrativa internacional52, rue de Bassano
F-75008 Paris - FRANCIA
Tel.: +33 (0)1 53 35 97 00 - Fax: +33 (0)1 53 35 97 01E-mail: [email protected]: www.supinfo.com
SSIAcow
burg
01 INFORMATIQUE9 TELECOMABEILLE ASSURANCEACCENTUREADECCOADP GSIAGF - ALLIANZAIR FRANCEALCATELALSTOMALTADIS - SEITAALTENALTIALTRANAMADEUSANDERSENAONIXARIANESPACEASTONAT&T ISTELATOSATTACHMATEAVAYA COMMUNICATION - LUCENTAXABANQUE WORMSBARCLAYS BANKBAYER PHARMABMC SOFTWAREBNP PARIBASBOUYGUESBOUYGUES TELECOMBRITISH PETROLEUMBULL INGENIERIEBUREAU VERITASBUSINESS OBJECTS SOFTWARECAISSE DE DEPOTS ET CONSIGNATIONSCAIXACANAL +CANAMCAPGEMINICARSLON WAGONS LITSCARREFOUR PROMODESCARTIER INTERNATIONALCAST SOFTWARECDC INFORMATIQUECEGETELCELIOCENCEPCERG FINANCECFAOCGACHRONOPOSTCICCISCOCNILCNP ASSURANCESCNRSCOCA COLA BEVERAGESCOFRAMICOMMISSION EUROPEENNECOMMUNICATION & SYSTEMESCOMPUTER ASSOCIATESCREDIT AGRICOLECREDIT LYONNAISCS TELECOMCSCDALET TECHNOLOGIESDANONEDARTYDASSAULT AVIATIONDASSAULT SYSTEMDELL COMPUTERDELOITTE & TOUCHE TOHMATSUDEXIA - CREDIT LOCAL DE FRANCEDHLDISNEYLAND PARISDOCUMENTUM SOFTWAREDUNLOPEADSEAGLE STAR VIEEASYNET
ECOLE NATIONALE SUPERIEURE DES TELECOMSEDFEDF GDF SERVICESEDSEMI MUSICETIETRALIEULER SFACEUROCOPTEREUROMASTEREXPERIANEXXON CHEMICALFININFOFNACFRAMATOMEFRANCAISE DE MAINTENANCEFRANCAISE DES JEUXFRANCE TELECOM - EQUANTFRANCE TELECOM R&DFRANCE TELEVISIONFUJITSU - ICL COMPUTERGANGEAC SOFTWAREGEMPLUS CARD INTERNATIONALGENERAL ELECTRICGENERALI FINANCESGFIGIATGIE CARTES BANCAIRESGROUPE ANDREGROUPE AZURGROUPE MALAKOFFHEWLETT PACKARD COMPUTERHISPANO SUIZAHSBC - CCFHUMMINGBIRDIBMIBM GLOBAL SERVICESIBM SOFTWAREINTELLICORP SOFTWAREINTELINTERNET PROFESSIONNELIPLANET - NETSCAPEIPPON TECHNOLOGIESIPROGRESS SOFTWAREJD EDWARDS SOFTWAREJET MULTIMEDIAJUNIPER NETWORKSKEYSTONEKRAFT JACOB SUCHARDL’OREALLABORATOIRE FOURNIERLALIQUELE MONDE INFORMATIQUELEROY MERLINLEXMARK INTERNATIONALLIGUE NATIONALE CONTRE LE CANCERLILLYLOGICA
MAC DONALD’S MACIFMANDRIVAMATRA - HACHETTEMAZARD & GUERARDMEDIAMETRIEMEDIAPOSTMEDICALE DE FRANCEMEGA INTERNATIONAL SOFTWAREMERANT SOFTWAREMETAMOR - GROUPE DECANMETROMETROPOLE TELEVISION - M6MICROSOFTMINISTERE DE LA JUSTICEMINISTERE DE L’AGRICULTUREMINISTERE DE L’ECONOMIE DES FINANCES ET DE L’INDUSTRIEMINISTERE DE L’EDUCATIONMINISTERE DE L’INTERIEURMINISTERE DES AFFAIRES ETRANGERESMORY TNTEMOTOROLAMUSEE DU LOUVREMUTUALITE FONCTION PUBLIQUENATEXIS - BANQUE POPULAIRENCR COMPUTERNESTLENET2SNETWORK APPLIANCENORTEL NETWORKSNOVELLOBERTHUR CSOCE GRAPHICSORACLE SOFTWAREORKEM NORSOLOROTISPAGES JAUNESPANASONICPARLEMENT EUROPEENPERSISTENCE SOFTWAREPFA ASSURANCESPHILIPS CONSUMER COMMUNICATIONPHILIPS ECLAIRAGEPHILIPS TRTPRICE WATHERHOUSE COOPERSPROCTER & GAMBLEPROGRESS SOFTWAREPSAPSA CITROENQUALIENCERANK XEROXRATPRENAULTRENAULT - DIACRETEK SOFTWAREREUTERSRHONE POULENC RORERRIB
ROUSSEL UCLAFRR DONNELEYSAGEMSAFETYNETSAINT GOBAINSAP SOFTWARESAPIENS SOFTWARESAS INSTITUTE SOFTWARESAUNIER DUVALSCC ALLIUMSCHLUMBERGER - SEMA GROUPSCHLUMBERGER INDUSTRIESSCHNEIDER ELECTRICSELLIGENT SOFTWARESEPSEPHORASFRSGS THOMSONSHELLSIEMENSSILICON GRAPHICS COMPUTERSILVERSTREAM SOFTWARESINFORSITASMABTPSNCFSNECMASOCIETE GENERALESOFINCOSOFTLAB SOFTWARESOFTWARE AGSOLVAYSOMEPOSTSOPRASOVACSPIESQL TECHSTERIASTERLING SOFTWARESTIME INTERMARCHESUN MICROSYSTEMSSYBASE SOFTWARESYMANTEC SOFTWARESYSTARTECHNIPTECSITF1THALESTHALES - SYSECATIBCO RESEAUXTIMELESSTMP WORLDWIDETOSHIBA COMPUTERTOTALTRANSICIELTRANSPACTRANSPORTS GRAVELEAUT-SYSTEMS SOLERI CIGELUNAMISUNESCOUNI EUROPEUNILEVERUNILOGUNISYSUNIVERS INFORMATIQUEURSSAFVALORISVALTECHVERRERIE CRISTALLERIE D’ARQUESVERSANT SOFTWAREVICTOIRE TELEMATIQUEVISA INTERNATIONALVIVENDIVIVENDI - SAURVOYAGES WASTEELSX AND MAILYVES ROCHER - SANOFIZIFF DAVIS
Sede administrativa internacional52, rue de Bassano - F-75008 Paris - FRANCIA
Tel.: +33 (0)1 53 35 97 00 - Fax: +33 (0)1 53 35 97 01E-mail: [email protected]