90
Escuela reconocida por los líderes mundiales de la industria que otorga un Bachelor (Licenciatura) y Masters Mundialmente reconocidos Institución de enseñanza superior privada fundada en 1965, Miembro de SUPINFO Internacional Universities Escuela presente en el mundo entero ® o e Escuela mundial especializada en las Tecnologías de la Información supinfo.com Desde 1965

Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

Escuela reconocida por los líderes mundiales de la industria que otorga un Bachelor (Licenciatura) y Masters Mundialmente reconocidos

Institución de enseñanza superior privada fundada en 1965, Miembro de SUPINFO Internacional Universities

Escuela presente en el mundo entero

®o e

Escuela mundial especializada en las Tecnologías de la Información

supinfo.comDesde 1965

Page 2: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 2 -

Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras escuelas SUPINFO en el mundo.

* Mapa de las escuelas SUPINFO en el horizonte 2008-2011

La elección de la Movilidad internacional

Sarah, estudiante de 3° curso de ingeniería en SUPINFO Canadá en Montreal, ha comenzado su 1° curso de estudios en SUPINFO París y ha efectuado su 2° curso en SUPINFO UK en Londres:

“Cada año se puede elegir un país diferente para estudiar y esto es una verdadera ventaja. El programa no cambia, pero sí el idioma de enseñanza. El año que viene pienso matricularme en SUPINFO EE.UU. en San Francisco, porque estudiar en los EE.UU. a este precio ¡es una oportunidad única! En el último año probablemente me iré a China o a los Emiratos Árabes Unidos.”

SUPINFOLa escuela de informática mundial,

líder en Europa

FRANCEBordeauxBrestCaenClermont-FerrandGrenobleLilleLimogesLyonMaconMarseilleMetzMontpellierNantesNiceOrleansParisReimsRennesSaint-MaloStrasbourgToulouseToursTroyesValenciennes

UNITED KINGDOMLondon

ITALYCatana (Sicily)

MilanRome

CANADAMontrealTorontoVancouver

USASan Francisco

MEXICOMexico City

COSTA RICASan Jose

MOROCCOCasablancaFezMarrakechRabatTangier

REUNIONSaint-Benoit

SOUTH AFRICA

MAURITIUS

UNITED ARAB EMIRATESAbu DhabiDubai

CHINABeijingHong KongTianjinQingdaoZhenjiang

RUSMosc

Saint Petersb

GUADELOUPE

BRAZILRio de Janeiro

São Paulo

MARTINIQUELe Lamentin

BELGIUMBrussels

The Worldwidehool of Computing

#1 in France

SPAINMadrid

PORTUGALLisbon

TUNISIATunis

Page 3: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 3 -

El sector de las Tecnologías de la Información es el sector en Francia que recluta a más de la mitad de los jóvenes ingenieros. En efecto, el ingeniero informático ocupa un puesto central en la empresa. Interviene en cuanto a la concepción de soluciones de carácter tecnológico para el tratamiento de la información. Se encarga de la concepción y organización de departamentos informáticos enteros, de la arquitectura e integración de las

de la gestión de personal.

Según datos elaborados por la consultora International en tecnología IDC, hay más puestos que personas disponibles en el sector tecnológico.

Esta carencia se observa sobre todo en el área de redes y tecnología de aplicada a Internet, en donde para el 2010 se

de 2.000.000 de especialistas en áreas de IT (Information Technology). Europa, Medio Oriente y África, serán las áreas con mayor escasez, y Latinoamérica en segundo lugar.

Fuente: http://isri.com.ar/academiacisco

Las empresas ya no se equivocan: los ingenieros en informática, al contrario de los prejuicios, cuyo ejercicio de su función en Francia así como en la mayor parte de los otros países del mundo, no se encuentra controlado o reglamentado por un consejo profesional o una comisión de títulos, no son solamente

en Francia por un “título de ingeniero diplomado”. Tampoco son unos “súper técnicos” o simples “expertos” principalmente

En este sector muy particular de las TIC, los primeros están a menudo considerados como poseedores de un saber demasiado general, no pragmático y no productor de valor mientras que los otros se encuentran amenazados por

competencias extranjeras más baratas basadas en Asia o en los países de Europa del Este. Los buenos ingenieros en informática, como se forman en SUPINFO, no solamente son

también de una verdadera pericia, un saber vivir, y un saber transmitir. Se convierten entonces en verdaderos arquitectos capaces de concebir, innovar y dirigir las tecnologías en el interés de la empresa.

Una encuesta realizada sobre los puestos ocupados por más de 5000 antiguos alumnos de SUPINFO pone de relieve que nuestros ingenieros en informática, que a menudo han sido ya reclutados antes de su salida de la escuela, presentan una gran movilidad, y una riqueza de carrera muy importante en empresas del mundo entero. Así, es muy natural que un ingeniero SUPINFO pase rápidamente, cuando no es él mismo creador de una empresa, de la función de ingeniero jefe de proyecto a la de director general pasando por todos los niveles de la jerarquía: director de los sistemas de la información, director de la producción e incluso director de marketing, comercial o también director de recursos humanos.

Es porque SUPINFO supo integrar estas exigencias del mercado actual que hoy la escuela considera que es una estupenda oportunidad, resultado de ello: no hay en las empresas casi ninguna función que ya no sea accesible a un ingeniero SUPINFO.

Alick MOURIESSEPresidente

Marianne BELISDirectora Académica

Page 4: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 4 -

¿Qué empleo para el día de mañana? 3

La informática y los empleos del sector digital 6

La primera Gran Escuela de informática en Francia 7

Una escuela amistosa y humana 9

Una enseñanza general y especializada en informática 10

La innovación en el corazón de la formación del ingeniero 12

La informática al servicio de la pedagogía 13

Una escuela reconocida por los líderes mundiales 16

Los laboratorios pedagógicos, acelerador del saber 17

Las certifi caciones, el reconocimiento de los profesionales 18

Consejo de Perfeccionamiento: SUPINFO Advisory Board (SAB) 19

Y además de los estudios, un montón de experiencias 20

¿Cómo matricularse en una de las escuelas SUPINFO? 21

El programa SUPINFO 22

SUPINFO Global Network (SGN) 14

Una función idéntica a la de la empresa 15

La carrera SUPINFO 11

Los testimonios de los profesionales 8

Page 5: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 5 -

P.7

P.21

Encuesta TNS Sofres 2007 sobre las escuelas de informática en

en el mundo entero

Simplicidad y adaptabilidad garantizadasTodas las especialidades están integradas

en los gastos de la carrera

Una red informática mundialDigna de una transnacional

P.11

P.17

P.14

Page 6: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 6 -

Entre las empresas que contratan a los ingenieros SUPINFO, se encuentran las Entre las empresas que contratan a los ingenieros SUPINFO, se encuentran las r que tienen como centro de interés los empleos de la informática. Son en primer

lugar los constructores de ordenadores (IBM, HP, Sun…) y los editores de programas (Microsoft, Oracle…). Luego intervienen las Sociedades de Servicios en Ingeniería

implantar, integrar, poner en marcha y mantener el sistema de la información de las so-

compañías usuarias: PME, PMI, grandes grupos internacionales o administrativos, en el seno de sus Direcciones Informáticas.

rdefensa nacional, constructores aeronáuticos, industria petrolera, operadores de telecomunicaciones, industrias del automóvil, sector ferroviario, gran distribución, laboratorios farmacéuticos, turismo, medioambiente, humanitario, todos los sectores de la investigación

Tasa de Colocación: el 100%

Salario a la contratación: a partir de 35 000 €

Testimonios de antiguos alumnos: www.supinfo.com/video-es

El 100% de los ingenieros SUPINFO al obtener su título han sido ya contratados a la salida de la escuela. Estas excelentes cifras, las debemos al hecho de que contrariamente a muchas otras escuelas de ingenieros francesas con una tendencia generalista donde el lastre pedagógico tradicional permanece incluso después del ciclo preparatorio (fuerte presión de las asignaturas teóricas fundamentales como las matemáticas y la física), SUPINFO ha entendido las

informática al terminar una carrera, SUPINFO forma hoy en Francia y en el mundo basándose en el modelo internacional de “Master of Science”, a jóvenes apasionados por la informática inmediatamente operacionales en las empresas al salir de la escuela con un alto nivel técnico y muy competente en gestión de empresas. Esto es exactamente lo que las empresas esperan.

Page 7: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 7 -

SUPINFO, The International Institute of Information Technology, es el nuevo nombre de la Escuela Superior de Informática de Paris antiguamente llamada ‘E.S.I”, establecimiento fundado en 1965, reconocido por el Estado francés por el decreto del 10 de enero de 1972.SUPINFO es una escuela de informática mundial que dispone de su propia red mundial dedicada a las tecnologías de la información. En Francia, SUPINFO se convirtió en la primera escuela de informática tanto en el nivel de número de estudiantes matriculados como en el nivel de la cobertura nacional con 28 escuelas, repartidas en todo el territorio y en los departamentos de Ultramar. Es una de las pocas Grandes Escuelas de informática donde el estudio de las tecnologías de la información es el núcleo central de la formación del ingeniero desde el primer año después del bachillerato. Escuela especializada con vocación generalista en materia de informática, integra a su carrera todas las especialidades que componen la informática de hoy, como se utiliza en las empresas: ingeniería

de datos, tecnologías Internet e Intranet, de decisión, ERP, multimedia. Una recién encuesta realizada en Francia en el 2007 por TNS Sofres demuestra claramente que SUPINFO goza también de una de las mejores imágenes por parte de las empresas de más de 50 asalariados, llegando incluso a la cabeza en materia de notoriedad espontánea y asistida. Estudio consultable en: www.supinfo.com/tns2007-es

En el corazón del concepto pedagógico de la escuela, el compartir las competencias llevó al cuerpo profesoral a

integrar la acción de los alumnos dentro del proceso de aprendizaje. Es la adquisición del “saber transmitir”. Los alumnos ingenieros están seleccionados y formados con anticipación en las tecnologías que les apasionan, eso además de la carrera tradicional. Reciben, durante el verano una formación especial para asistir a los profesores. Sus acciones en clase, añadidas a las que adquieren en los laboratorios pedagógicos de la escuela son particularmente apreciadas por los otros alumnos que encuentran así, en cualquier momento, una preciosa ayuda para entender mejor algunos conceptos y ciertas técnicas. Reconocidos por las empresas, estos alumnos ingenieros asistentes de los profesores tienen la oportunidad de exponer en todas las escuelas de la red en Europa, Asia, África y América, el contenido de sus trabajos. Reciben cada año premios internacionales y para los mejores una beca de estudios

Saint-MaloCaen Metz

TroyesStrasbourg

LyonGrenoble

Mâcon

Orléans

ToursNantes

Rennes

Limoges

MarseilleMontpellier

NiceToulouse

Lille

Valenciennes

Brest

Reims

Paris

BordeauxClermont-Ferrand

Mapa de las escuelas SUPINFO : www.supinfo.com/mapa-escuela

Mapa de las escuelas SUPINFO 2008 en Francia y Ultramar, Una cobertura única

SUPELEC INSALyon

Polytech SUPINFO

7,47,3 7,3

7,2

Según un sondeo TNS SOFRES en Francia realizado en el 2007 acerca de las empresas con más de 50 asalariados, SUPINFO llega al 4° puesto respecto a la opinión global de

un 7,2/10. Ver: www.supinfo.com/tns2007

Según otra encuesta independiente realizada en 2008 por Ifop y la revista 01 Informatique colocan a SUPINFO en el 3° puesto de las escuelas preferidas de las grandes empresas (más de 500 empleados).

Este artículo puede consultarlo en: www.supinfo.com/ifop2008 (en francés)

Guadalupe

Martinica

Reunión

Page 8: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 8 -

Eric BOUSTOULLERPresidente Director General de Microsoft Francia y Vicepresidente de Microsoft Internacional: “Contamos con más de cinco años de colaboración muy fuerte y estratégica con SUPINFO. Esta colaboración se sitúa por supuesto al nivel de la educación, de la pedagogía pero va más allá. SUPINFO se ha convertido en una de las encrucijadas, mejor dicho, son los mejores en Francia cuando se habla de las tecnologías Microsoft. Allí se encuentran los mejores laboratorios, los ingenieros que son sin duda los más competentes hoy acerca de nuestras tecnologías y forman parte de los más cotizados en el mercado laboral. Son muy cotizados por todas las empresas, medianas o grandes, pero también por las sociedades de servicios que nos piden regularmente alumnos en prácticas o ingenieros. Si uno busca informaciones sobre nuestras tecnologías, nuestras soluciones de hoy y de mañana solo basta con visitar las Web de SUPINFO. ”

Dominique van DETHResponsable de programas para la Educación Oracle Francia:“Con SUPINFO, nosotros tenemos en común, compartir los conocimientos, el espíritu de equipo y

Francia y en el exterior, SUPINFO es un colaborador ineludible para la formación de especialistas Oracle que podrán adaptarse a las evoluciones de las empresas. ”

Jane LEWISArea Academy Manager, Cisco UK: “SUPINFO es hoy en día nuestro colaborador n°1 en Europa en la enseñaza superior con todos los estudiantes formados en nuestras tecnologías y la

cada año. La excelencia de su formación corresponde a su reactividad a responder a las necesidades del mercado en tiempo real: SUPINFO ha inmediatamente entendido la importante necesidad de tener profesionales formados en seguridad y redes inalámbricas y dispensa una formación de primer plano en estas tecnologías de punta. ”

Richard RAMOSDirector Educación Investigación, Apple Europa: “Creo que la carrera propuesta por SUPINFO va por delante de su tiempo. ”

Gilles LESAGEDirector Educación Investigación, IBM Francia: “Vendemos tecnología, pero SUPINFO va a vendernos los talentos que forman y que necesitaremos para dirigir o trabajar en nuestra empresa el día del mañana.”

Eric MAHÉResponsable de nuevas tecnologías, Sun Francia :“Cuando Sun seleccionó la lista de las escuelas prioritarias para el lanzamiento de su programa Campus Ambassador en Francia, SUPINFO se posicionó a la cabeza de la lista de todos los establecimientos nacionales.”

Mickaël OHANAManaging Director, CrossKnowledge:“SUPINFO es una de las primeras escuelas de ingenieros en Francia en comprender e integrar el desarrollo de las competencias en gestión de empresas en su carrera. Con las soluciones de formación en línea CrossKnowledge, los estudiantes pueden acceder a los mejores contenidos en gestión de empresas, en todo el mundo y cuando lo deseen.SUPINFO no prepara solamente ingenieros en informática de excelencia sino también a futuros gerentes de excelencia.”

Hervé COUTURIERExecutive VP, Product Group, Business Objects, an SAP Company:“Estamos encantados de haber puesto en marcha una colaboración con la escuela SUPINFO.La creación de un módulo en Business Intelligence y en particular la familiarización con nuestros productos permitirá a los alumnos de SUPINFO aprender un dominio de la informática aún poco enseñado a los alumnos ingenieros. Es también un excelente medio para Business Objects para formar lo antes posible a numerosos ingenieros en sus tecnologías y atraerlos a sus centros de desarrollo.”

Más testimonios (IBM, Apple, Sun, Novell, Microsoft, Cisco...) página 13 y 18

Page 9: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

SUPINFO es una escuela que se preocupa por establecer unaverdadera relación entre los estudiantes, el cuerpo profesoral, la administración de la escuela y el mundo laboral. El conjunto del equipo pedagógico y los antiguos alumnos son muy sensibles a los valores de la escuela: espíritu de equipo, solidaridad, compartir los conocimientos, diversidad de opiniones, tolerancia, respeto de todas las diferencias, de todas las religiones, espíritu deempresa, esfuerzos compartidos y cuestionamiento permanente. A lo largo de sus estudios, gracias a los medios pedagógicospuestos a su disposición, a las actividades enlazadas con la vidade la escuela, el estudiante SUPINFO exalta su personalidad, adquiere más seguridad y eleva su potencial. Las ocasiones, paradivertirse también son numerosas: animación de seminariosttecnológicos, SUPINFO Winter Night, Brunch de Navidad, Añonuevo Chino, viajes de esquí, seminarios de integración, Fiesta de la música, SUPINFO Spring Break…

La escuela permite no solamente a los estudiantes dar rienda suelta a su pasión por las aplicaciones prácticas de las asignaturasinformáticas que reciben sino que permite también a todo alumnoingeniero SUPINFO intervenir en empresas hasta dos días a lasemana además de prácticas durante el verano obligatorias al

puesto que todas las prácticas en empresas de dos días a lasemana son, en general, muy bien remuneradas.

y Porque las tecnologías de la información progresan muyrápidamente, el ciclo preparatorio ofrece una alternativapragmática a los alumnos que no desean sufrir las presiones de las

. matemáticas y de la física impuestas por las carreras tradicionales.r En un medio ambiente de trabajo humano basado en compartir

los conocimientos, totalmente diferente del “espíritu de lasoposiciones” o semanas de programación intensiva, los alumnos

, una enseñanza muy rica en asignaturas informáticas (sistemas,redes, programación, bases de datos). Todas las especialidadesestán naturalmente integradas a la carrera, entonces no hay máselecciones que hacer en el curso de la carrera y cada uno conserva la certidumbre de adaptarse fácilmente a las necesidades del

r mercado cualquiera que sea su orientación. Así puede abordarsus estudios con más serenidad y progresar hacia la primerapráctica en empresa con fuertes conocimientos técnicos.

- 9 -

Page 10: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 10 -

Todas las especialidades que componen la informática de hoy y de mañana están integradas en la carrera de SUPINFO:

análisis de datos, tecnologías Internet e intranet, multimedia. La enseñanza de la Escuela tiene como meta la preparación teórica y práctica para el ejercicio de la profesión de ingeniero en el área de las ciencias del tratamiento de la información. También, la formación SUPINFO se completa con conocimientos de enseñanza general: formación internacional en ciencias humanas, economía, derecho, gestión y management. Entonces no hay optativas que escoger durante la carrera. Todos los ingenieros SUPINFO tienen todos los conocimientos.Encuentre el programa detallado en la página 23.

Las prácticas constituyen la herramienta principal de la construcción del proyecto profesional y son obligatorias a partir del primer año del ciclo preparatorio. Esta larga inmersión en la empresa permite poner en práctica y completar los

La práctica está seguida por la redacción de un informe y de una presentación de éste durante la cual se evalúan no solamente las competencias técnicas sino también las capacidades del alumno en la comunicación.

Prácticas en SUPINFO 1 y 2: 3 meses en análisis de concepción

Prácticas en SUPINFO 3, 4 y 5: de 3 a 4 meses (6 meses durante el quinto año en concepción y realización completa de proyectos de sistemas y redes o de ingeniería de programación

de estudios sobre un tema aprobado permite la obtención del International Master of Science SUPINFO.

SUPINFO ha iniciado un programa de colaboración con las empresas permitiéndole a cada alumno ingeniero, a partir del ciclo de ingeniería, intervenir en la empresa hasta dos días a la semana. Estas colaboraciones aportan una verdadera riqueza a la empresa tanto por el ritmo de trabajo impuesto como por la continuidad de las misiones efectuadas. En efecto, el ritmo escolar, basado en el año escolar, no le conviene forzosamente a una empresa: nuestros alumnos efectúan prácticas de tres meses en empresa cada verano pero ¿cómo hacer para acelerar el aprendizaje de la “pericia” de los estudiantes, el resto del año?

competencias de los estudiantes durante todo el año escolar 2 días a la semana a partir del 1° año del ciclo de ingeniería. Son estos mismos estudiantes que pueden luego efectuar sus prácticas de verano en el seno de estas mismas empresas, durante 3 meses a tiempo completo.

Ventajas de la colaboración en la empresa2 días a la semana

Las empresas ya no tienen que conformarse con la temporada de las prácticas: las empresas pueden encontrar competencias SUPINFO en cualquier momento.

Tampoco tienen que conformarse con la duración de las prácticas: si una práctica tiene que prolongarse más allá del

con la escuela para que el alumno en prácticas pueda seguir su formación durante el año escolar siguiente.

El alumno en colaboración en el seno de la empresa

¡Estas colaboraciones constituyen una fuente de

El contenido de las misiones que le incumben al alumno ingeniero es cuidadosamente estudiado por la escuela y la empresa. Permite completar algunos proyectos de la escuela por proyectos concretos realizados en el seno de la empresa por un colaborador.

de precontratación para los estudiantes y las empresas.

La búsqueda de una práctica sigue siendo un excelente entrenamiento para la búsqueda de un empleo, los estudiantes pueden efectuarla por sus propios medios pero también gracias a la Escuela que pone a su disposición paneles de anuncios y un servidor Intranet con las ofertas de prácticas que se reciben regularmente.

Page 11: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 11 -

Cada año de estudio puede efectuarse en una escuela diferente de la red mundial SUPINFO.*

Mandriva y Novell están incluidas en los gastos de estudios sin suplemento alguno.

*

años de estudios universitarios, Técnico

Matemáticos

años de estudios universitarios, Bachelor,

Diplomatura, Licenciatura

año de estudios universitarios, Técnico

Matemáticos

2° año Ciclo de Ingeniería 1 día a la semana en la

empresa

1° año Ciclo preparatorio 1 día a la semana en la

empresa

3° año Ciclo de Ingeniería2 días a la semana en la

empresa

4° año Ciclo de Ingeniería 2 días a la semana en la

empresa

5° año Ciclo de Ingeniería2 días a la semana en la

empresa

SUPIN

FO

Luego de 3 o 4 años después del bachillerato

Page 12: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 12 -

OSUPINFO asegura una lucha activa contrala obsolescencia del material y de los

vanguardista de la Escuela. Su parqueinformático representa una replica de losambientes heterogéneos encontrados en

las empresas. Es actualizado regularmente al ritmo de las evolucionesttecnológicas. Se compone de varias aulas multimedia tanto para losttrabajos prácticos como para las clases, con un conjunto importantede servidores: Sun, HP, Apple, AS400, IBM, HP y Dell, quedadisponible en permanencia incluso fuera de las clases sin límitealguno.

El conjunto de ordenadores estáenteramente conectado a la red delestablecimiento gracias a Cisco con un alto

r, débito con una apertura hacia el exterior,para asegurar los mejores débitos paranavegar en la Web o descargar (un accesoVPN se encuentra disponible desde la casa del alumno).

Lazos permanentes que permiten a los estudiantes de SUPINFOde otros países del mundo trabajar con los mismos recursos y en las mismas condiciones que en Francia. Todos los proyectos debenrealizarse por los alumnos en inglés desde el primer año permitiendoa los estudiantes trabajar en binomio en los otros países parafavorecer el aprendizaje de la gestión de equipos internacionalesen el mundo.

Portal de e-learning utilizando la tecnología Campus-Booster desarrollado en el seno de SUPINFO.

Además del groupware, el alumno ingeniero tiene acceso a un importante número de aplicaciones proporcionadas por la escuela.

SUPINFO ha generalizado el uso de Tablet PC en la escuela. Todos los profesores disponen de un Tablet PC con acceso inalámbrico a la red de la escuela y al Campus-Booster. Esta herramienta les permitirá transmitir su saber durante las clases. El Tablet PC reemplaza entonces la pizarra tradicional y todo lo que se escribe es difundido en una gran pantalla. Además, el uso de esta herramienta facilitará la interacción directa con las clases de los centros a distancia.

Progresivamente, los estudiantes, padres y profesores pueden bajar un catálogo cada día más completo de los cursos del programa SUPINFO y descargarlos en su portátil numérico vídeo del tipo iPod, Archos o Zune. Los estudiantes pueden entonces repasar sus cursos donde lo deseen.

En su ordenador portátil personal, es posible asistir las 24 horas a la enseñanza multimedia disponible en la red interna de la Escuela. Durante estas sesiones, los profesores utilizan el sonido, el vídeo y demostraciones visuales para dar formaciones completas integrando teorías y ejercicios prácticos.

la plataforma Tell me more online: Inglés británico, inglés americano, español, español de Latinoamérica, alemán, francés, italiano, holandés, chino, japonés…

plataforma Crossknowledge.

En su ordenador portátil, gracias al VPN SUPINFO (Virtual Private Network) es posible acceder las 24 horas en todo el mundo a todos los recursos pedagógicos de la escuela a distancia, y con una buena seguridad.Esta tecnología emula su presencia en los locales de SUPINFO donde sea que se encuentre en el mundo.

Page 13: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 13 -

Para la Dirección académica de SUPINFO, demasiadas formaciones para informáticos utilizan aún métodos tradicionales de enseñanza: clases magistrales en grupos y exposiciones. Sin embargo, las poblaciones concernidas están abiertas a la utilización del conjunto de las técnicas modernas de enseñanza y el contenido mismo de estas formaciones en informática se adapta particularmente bien a estos métodos.Enseñanza por medio del ordenador, (e-learning), gran disponibilidad de documentos técnicos en los puestos informáticos, amplia elección de programas informáticos y herramientas de programación, utilización de sitios pedagógicos en la red interna de la Escuela, sistemas de búsqueda avanzada, cursos multimedia disponibles en permanencia integran vídeos, sonidos y demostraciones visuales. En SUPINFO, todas estas tecnologías están de ahora en adelante integradas al sistema pedagógico. A estas se les añade la utilización intensiva de las mensajerías electrónicas (e-mail y mensajería instantánea) que permite mantener una comunicación apropiada con los profesores, tutores o asistentes pedagógicos. También, la generalización de los trabajos efectuados en laboratorios y publicados en el sitio intranet de la Escuela permite difundir mejor los estudios y el saber de cada uno.Es el trabajo de equipo que transmite el espíritu de la escuela.

proyectores. Así, todas las aulas están equipadas de un sistema multimedia de video proyección conectado a la red informática de la Escuela. A eso se le agrega demostraciones en directo, ejemplos, documentos, ejercicios TPs publicados en la red del establecimiento. El conjunto de esta base de conocimientos se encuentra disponible en permanencia las 24 horas a todos los estudiantes del establecimiento.

El conjunto de los recursos informáticos del establecimiento forman parte del polo sistemas de información llamado también “SUPINFO Information Systems” o simplemente SIS. En el seno de este polo, un equipo controlado por el equipo administrativo de la Escuela se une particularmente a la gestión de los recursos unidos a la pedagogía. Este equipo está constituido desde siempre por estudiantes asistentes que actúan bajo el control de la Dirección Pedagógica. Particularmente dinámicos, verdaderamente apasionados, poseen sólidos conocimientos técnicos o generales y

demuestran rigor y profesionalismo. En el transcurso de su carrera, varios años pasados en el SIS aportan a estos estudiantes el dominio de la administración de los sistemas y de las redes heterogéneas a las cuales se agrega una fuerte experiencia de la organización de un servicio informático. Para sostener la alimentación en información de todos los puestos de trabajo de los estudiantes, un arsenal de más de 100 servidores está movilizado. Contienen varios millones de gigabytes de datos que circulan a una alta velocidad sobre una red ultra moderna.

Desde hace varios años, SUPINFO ha iniciado con el acuerdo de IBM-Lenovo y Apple, un programa de equipamiento de los alumnos ingenieros de todos sus establecimientos con un ordenador portátil individual Lenovo Thinkpad o Apple con una tarifa muy especial. Todos los equipos están naturalmente equipados de una interfaz de red inalámbrica.

“La división de los ordenadores personales IBM, ahora Lenovo ha iniciado desde hace

tiempo búsquedas en relación con estos temas, particularmente para sus necesidades propias en materia de formación.

revolución al lado de SUPINFO además, en su caso, la herramienta informática no es solamente una herramienta de trabajo si no también una herramienta de investigación. Nosotros pensamos que el equipamiento de los estudiantes SUPINFO con un ordenador portátil individual representa un extra para los estudiantes al igual que en las Grandes Escuelas de Comercio y las mejores universidades americanas.”

Gilles LESAGEDirector Educación e InvestigaciónIBM Francia

“Las clases Apple impartidas en SUPINFO, la preparación

diferentes proyectos llevados a cabo con los alumnos ingenieros SUPINFO y los equipos de Apple Europa en

Paris y San Francisco, nos permiten, apreciar el dinamismo de una escuela que ofrece una combinación única de pericia y herramientas pedagógicas para el éxito y el futuro de sus estudiantes.”

Richard RAMOS - SUPINFO Promoción 1988 Director de Educación e Investigación Apple Francia

permitir a los estudiantes SUPINFO equiparse de un portátil Mac Os X a una tarifa especial. Una máquina revolucionaria, a la vez Mac y PC gracias al procesador Intel, que permite pasar de un sistema de explotación Mac Os y Windows o linux en el mismo ordenador portátil.

-50 %

Reducción generalmente consta

tada

-15 %

Reducción generalmente consta

tada

Page 14: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

100 Mbps

8 Mbps

8 Mbps

8 Mbps

To SUPINFO UK

To SUPINFO USA

To Africa

To SUPINFO Italy

To SUPINFO Belgium

To SUPINFO United Arab Emirates

To SUPINFO China

Internet

Lille

Nice

Strasbourg

Grenoble

2,1 Gbps8 Mbps

10 Mbps

100 MbpsValenciennes

10 Mbps

Metz

100 Mbps

Troyes

20 Mbps

10 Mbps

100 Mbps

100 Mbits

Macon

Lyon

100 Mbps100 Mbps

Marseille

100 Mbps

Montpellier

100 Mbps

100 Mbps

Toulouse

Clermont-Ferrand

100 Mbps

Bordeaux

10 Mbps

Tours

100 Mbps

Orléans

Saint-Malo10 MbpsBrest

10 MbpsCaen 10 Mbps

10 Mbps

Rennes

MReims

10 Mbps

Nantes

100 Mbps

10 Mbps

Limoges

2Mbps

1

SGN euParis backbone

- 14 -

entre todos los sitios

Internet

diferentes sitios

(antiguos alumnos, estudiantes, profesores, asalariados y otros colaboradores)

El SGN (SUPINFO Global Network) es una red privadamundial, transcontinental e independiente de la educación, única en su género. Es administrada por un equipo joven y dinámico del SIS, esencialmente compuesto por estudiantesSUPINFO que aprovechan esto para entrenarse en laadministración de una red de una gran envergadura.

El SGN es una red informática mundial equivalente a lasgrandes redes de las empresas actuales. Une actualmente a4 continentes y está basada en un 100% en equipos Cisco. Gracias a nuestro colaborador Nº1 Mundial en equipos de telecomunicación, ofrece una calidad de servicio, una seguridad y una disponibilidad óptima, indispensablespara el uso intensivo de los recursos pedagógicos para losestudiantes y sus profesores pero también para todos loscolaboradores y los antiguos alumnos de SUPINFO a travésdel mundo. En todos los centros de SUPINFO, la red de cable, se ve prolongada naturalmente de manera inalámbrica por el SWN (SUPINFO Wireless Network) gracias a la decenade terminales WiFi Cisco repartidos en los establecimientos. Son millones de usuarios que, cada día, utilizan esta red paraencontrar, no importa el centro donde se encuentren, loscursos, consultar sus notas, dialogar con compañeros, trabajar en la red en proyectos, visualizar vídeos y, claro está, llamar.Las conexiones entre los sitios se basan en la red MPLS de

Equant (Orange Business) y ofrecen posibilidades de controles de calidad de servicios avanzados. Los estudiantes puedenigualmente conectarse al SGN en todos lados del mundo, gracias a un VPN (Virtual Private Network) y a 4 puntos deentrada (EMEA - Europa Medio Oriente y África, América, Asia, Océano Índigo). Ellos disponen también así de un accesoa todos los recursos pedagógico de la escuela a distancia, y

Internet). Mejor, el SGN transmite también todos los datosmultimedia de los sistemas de control de SUPINFO. La telefonía sobre IP (VoIP) entre todos los estudiantes esposible, la vídeo conferencia y el control de acceso son partede los datos que cambian todos los días en el SGN. La red esaccesible en los diferentes centros de SUPINFO por mediode enchufes presentes en todas las mesas de las aulas, perotambién inalámbrica, gracias al SWN (SUPINFO WirelessNetwork) y a sus 180 puntos de acceso. Un estudiante puedeviajar a todos los centros estando siempre conectado a lamisma red, puede entonces trabajar sin ningún problema delocalización. Cada centro se articula alrededor del corazónde la red gigabites, permitiendo así a todos los estudiantes

el número de usuarios conectados.

Page 15: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 15 -

El SIS (SUPINFO Information Systems) se encarga de los recursos informáticos del establecimiento. Con funcionamiento idéntico al de una empresa, los responsables del SIS aseguran la gestión, el mantenimiento y la evolución del parque para los laboratorios tecnológicos, el cuerpo profesoral, las asociaciones y los servicios administrativos de la Escuela. Una disponibilidad máxima de sus recursos está asegurada en la óptica de una orientación de servicios muy marcados y conformes a la misión pedagógica de SUPINFO.El SIS asegura el buen funcionamiento de los servicios del groupware:Mensajería, anuario en línea de todos los estudiantes, agendas de grupos personalizadas, foro de discusión: news, páginas Web y e-mail personales con tantos apodos como quiera, acceso a los suportes de las clases, etc. El sistema de mensajería “Corporate” de la Escuela

de las comunicaciones, la posibilidad de

acuse de recibo. El sistema de agendas de grupo interfaz de la mensajería que permite a los estudiantes y a la

de las disponibilidades de cada uno y reservar salas o material pedagógico. El sistema queda disponible desde el exterior del establecimiento vía un simple navegador Internet.

Varios laboratorios tienen a su disposición una impresionante

de un soporte especial en término de material. Estos son, el laboratorio Management, el laboratorio bases de datos Oracle, el laboratorio red Cisco

y Security, el laboratorio Sun, el laboratorio Linux, el laboratorio Mandriva, los laboratorios de las Tecnologías Microsoft y .Net, los laboratorios Apple e IBM. En el seno de los laboratorios, los estudiantes están

encargados de estudios reales y deben no solamente llevar a cabo trabajos de investigación importantes pero también asegurar la comunicación del fruto de sus investigaciones por los intermediarios de publicaciones de reportes y para la animación de seminarios internos.

Lenovo con tarifa reducida

las licencias

(vía VPN)

en la mensajería

a la Web

en Internet

vídeos proyectores

gratuitas al mundo entero

recursos de la red global SGN. Los tiempos de espera (ping) y el ancho de banda están garantizados con una calidad de servicio único en el mundo de la educación.También, con una conexión Internet central que garantiza un ancho de banda de más de 2,1 Gbps (¡o sea el equivalente a más de 100

labo-apple.comlabo-cisco.comlabo-dotnet.comlabo-ibm.comlabo-linux.comlabo-mandriva.comlabo-microsoft.comlabo-oracle.comlabo-sun.comlabo-security.com

Page 16: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 16 -

La información constituye el trabajo de Oracle: cómo administrarla, utilizarla,

compartirla, protegerla. Inicialmente presente en las bases de datos, Oracle es ahora un editor de programas completos presentes en las diferentes áreas: bases de datos, middleware, business intelligence, aplicaciones de gestión y colaboración. La gestión de la información con los programas Oracle permite a las empresas medir los resultados, mejorar los procesos operacionales y comunicar

Oracle procedió también a numerosas adquisiciones que completan la oferta. Todos los productos están gradualmente abiertos a los estándares e integrados entre ellos según la “Application Integration Architecture” y el acercamiento SOA.Eje central de un programa europeo de Responsabilidad Social de la Empresa, el enfoque Educación de Oracle propone innovadores programas de formación que motivan al desarrollo de las competencias profesionales e informáticas. Así, Oracle Academy ha sido integrada en la carrera en más de 1500 establecimientos de enseñanza en la región EMEA.SUPINFO es uno de los pioneros en este programa en Francia, al lado del Master en Bases de Datos de Sophia-Antipolis y de la Universidad Paris 1 Sorbonne. Con el OAI, Oracle pone a la disposición de los estudiantes SUPINFO, los recursos de Oracle Educación. Así, la Escuela propone a sus estudiantes

Professional y les proporciona, en el marco de una utilización pedagógica en la Escuela y para sus ordenadores personales, el conjunto de los productos Oracle para los servidores y las herramientas de concepción y de desarrollo (Oracle Designer

SUPINFO y Oracle, el número de usuarios es limitado. Además, el soporte electrónico Oracle MetaLink se encuentra a la disposición de los profesores en permanencia. Así dotados, los

Oracle DBA (DataBase Administrator) que integra los ejes siguientes: Introduction to Oracle servers, Oracle Database Administration, Backup and Recovery Workshop, Performance Tuning Workshop, a las cuales SUPINFO agregará pronto las

Developer/Designer.

de SUPINFO, a cooperar para abrir las mejores oportunidades

ha permitido la creación del Laboratorio SUPINFO de las Tecnologías Oracle, www.labo-oracle.com cuyas realizaciones son hoy mundialmente reconocidas.

En el dominio de los sistemas de explotación UNIX y la plataforma Java, Sun Microsystems y SUPINFO

ha concluido una colaboración con una meta pedagógica: SUPINFO ha integrado en su programa cursos sobre las tecnologías Sun y creado un laboratorio en su seno que está dedicado a las tecnologías Sun Solaris y Java. La misión del Laboratorio SUPINFO de las Tecnologías Sun está

“System Administrator Solaris”, “Network Administrator Solaris”, “Programmer for Java 2 Platform”, “Developer for Java 2 Platform”, “Enterprise Architect for Java 2 Platform”, y “Enterprise Edition (J2EE) Technology.”

“Cuando Sun seleccionó la lista de las escuelas prioritarias para el lanzamiento de su programa Campus Ambassador en Francia, SUPINFO se posicionó a la cabeza de la lista de todos los establecimientos nacionales. La cooperación entre SUPINFO y Sun ya era fructífera y los primeros resultados del programa

de SUPINFO era… sencillamente la mejor.”

Eric MAHÉResponsable de nuevas tecnologías, Sun France

Page 17: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

Apple Computer y SUPINFO han construido las bases de una colaboración a largo plazo cuyos objetivos son:

de la enseñanza de las tecnologías Apple Mac OS X, la elección de servidores Apple Xserve en el seno del sistema de información de la Escuela,

por vocación animar a la comunidad de los desarrolladores y especialistas de sistemas Apple Mac OS X y a divulgar y democratizar estas tecnologías puesta a la disposición, soportes de formaciones, documentaciones técnicas, foros, artículos y astucias al igual que los otros portales de laboratorios pedagógicos de la escuela,

de material Apple a precios extremadamente competitivos, (-15% generalmente constatados)

programas libres en asociación con Apple,

las prácticas realizadas por los estudiantes SUPINFO en Apple Computer en Francia, en Bélgica y en Escocia.

administración de SUPINFO y de Apple Computer para crear el Laboratorio Apple de la Escuela. La colaboración con la Escuela nos ha permitido ser invitados por Apple Computer a la WWDC, la Worldwide Developers Conferencia que tuvo lugar en San Francisco. Terminar así el primer año de ingeniería es para nosotros la ocasión de reanudar desde el inicio de las clases, con muchos proyectos para esta colaboración.”

Matthieu DUCROS, Vincent LE NORMAND BERNIER

Con El Laboratorio SUPINFO de

una enseñanza variada sobre los sistemas de explotación y subraya su interés por el mundo de los programas libres.SUPINFO y Mandriva se han asociado para crear un curso de

las tecnologías GNU/Linux.

permite a quien lo desee validar conocimientos técnicos en adecuación con las necesidades crecientes de las empresas en competencias Linux.

al mercado profesional, está puesta a la disposición de los estudiantes de SUPINFO con la meta de formar a ingenieros a la punta de los avances tecnológicos y será enseñada en el seno de SUPINFO por los formadores del Laboratorio SUPINFO de las Tecnologías Linux.Está igualmente disponible en la formación profesional.

Microsoft es el líder mundial del programa para los ordenadores. Hoy,

la empresa desarrolla, comercializa y presenta una larga gama de productos y servicios: sistemas de explotación por estación de trabajo o servidores (Windows Vista o Windows Server), sistemas para servidores de empresas (Microsoft Exchange, plataformas .Net, etc.). La mayoría de estas herramientas, por haber sido elegidas por los usuarios, representan hoy verdaderos estándares en el mercado.

“Hoy, la Web del Laboratorio SUPINFO de las Tecnologías Microsoft, www.labo-microsoft.com, se ha convertido en la Web francófona N°1 en nuestras tecnologías con más de 2 millones de páginas leídas al mes.”

Laurent ELLERBACHResponsable de Relaciones con La Enseñanza Superior en Informática Microsoft División Empresas y Educación

estudiantes propuesto por SUPINFO está basado en un acuerdo

Microsoft. Este programa ofrece un complemento de formación técnica y práctica acerca de las tecnologías Microsoft a los estudiantes del ciclo de ingeniería. La Escuela asegura además la

de la informática.

Con el laboratorio SUPINFO de las

un acuerdo mundial con NOVELL, para hacer de SUSE Linux

de SUPINFO.

SUPINFO tiene una reputación excepcional para ofrecer una carrera internacional a sus estudiantes franceses a través del mundo y eso trae también una gran valorización

formados sobre la plataforma Linux, hoy la más completa del mercado.”

Volker SMIDPresidente Europa y Medio Oriente de NOVELL

En el marco de esta colaboración, más de 10.000 estudiantes SUPINFO serán formados sobre SUSE Linux Enterprise del 2008 al 2013. La carrera SUSE Linux Enterprise será también parte integral del programa académico de SUPINFO y todos los estudiantes de la escuela pasarán el examen práctico que les

- 17 -

®o e

Page 18: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 18 -

Una sólida preparación a las expectativas del mercado como lo subraya justamente la campaña de comunicación pública de la empresa: “La gran parte de datos que transitan hoy en Internet pasan por Cisco”. Líder de las tecnologías y de los equipos de redes de alto nivel, Cisco es actualmente un actor esencial en el mundo de las telecomunicaciones y de las

redes digital de transporte de informaciones. El constructor juega un papel cada día más importante en el dominio de la interconexión de redes locales (LAN) y a distancia (WAN) al nivel de las grandes empresas pero también de las PME PMI, principalmente como creador de elementos agrupadores de redes (hubs, switchs, puentes, routers etc.).

Hoy, el laboratorio de las tecnologías Cisco, creado por la escuela, publica regularmente artículos particularmente apreciados por el mundo de la educación y los profesionales de las Telecomunicaciones y de la red. El sitio www.labo-cisco.com permite igualmente, a través de Cisco

oportunidades reales para los jóvenes diplomados. Gracias a estas colaboraciones, la Escuela se dota de herramientas y medios hasta aquí reservados a los profesionales de la formación informática. Un material y programas costosos son puestos sin reservas a la disposición de los estudiantes acompañados por programas de formación y seguimiento del cuerpo profesoral. Una larga elección de documentos y soportes pedagógicos de renombre están disponibles para asegurar un perfecto dominio de las tecnologías enseñadas (DVD, CD-ROM, vídeos, soportes de clases multimedia, ejercicios, exámenes electrónicos). Los

autorizados por NCS Pearson VUE (Virtual University Entreprises) y Prometric.

“Uno se dio cuenta que había una carencia de personas competentes en tecnologías de Redes y hay que saber que SUPINFO es una de las escuelas más grandes a nivel de la formación sobre las tecnologías de Redes. El Laboratorio Cisco de SUPINFO es un escaparate para nosotros. SUPINFO es nuestro primer colaborador en Francia tanto en número de estudiantes formados en nuestras

Christophe DOLINSEKArea Academy ManagerCisco Francia

otorgadas.”

Stéphane MARTIGNONSales Channel Europe Middle East & AfricaNCS Pearson VUE

Page 19: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 19 -

La pedagogía de SUPINFO es el resultado de una búsqueda permanente en la que se implican las empresas, los estudiantes y elLa pedagogía de SUPINFO es el resultado de una búsqueda permanente en la que se implican las empresas, los estudiantes y elcuerpo profesoral. Este último está compuesto en un 80% de ingenieros con experiencia profesional o de profesionales comprometidosen la búsqueda aplicada. Selecciona y forma los alumnos ingenieros que se convierten entonces sus asistentes pedagógicos en los laboratorios. Ellos integran naturalmente en sus enseñanzas las innovaciones relativas a las tecnologías

.del mercado. SUPINFO ha creado un Consejo de Perfeccionamiento llamado “SUPINFO Advisory Board” (SAB).Entre sus miembros activos uno cuenta la administración de la Escuela representada por su Presidente, el Director Académico, elDirector de los Estudios, los antiguos alumnos, los profesores, los delegados de los alumnos y los numerosos representantes decolaboradores de la industria informática Son tantos colegios que por sus competencias intrínsecas enriquecen el conjunto deprocedimientos del establecimiento.

www.supinfo.com/sab.

“Las clases Apple impartidas en SUPINFO, la preparación a las

llevados a cabo con los alumnos ingenieros SUPINFO y los equipos de Apple Europa en Paris y San Francisco, nos permiten, apreciar el dinamismo de una escuela que ofrece una combinación única de pericia y herramientas pedagógicas para el éxito y el futuro de sus estudiantes.”

Richard RAMOS - SUPINFO Promoción 1988Director de Educación e InvestigaciónApple Francia

Alick MouriesseSUPINFO Presidente

Eric Boustouller

Presidente Director General de Microsoft Francia y

Vicepresidente de Microsoft Internacional

Page 20: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 20 -

Cada escuela SUPINFO dispone de un espacio de descanso amistoso que incluye ping-pong, billar, futbolín y en algunos centros, gimnasios para musculación.

SUPINFO Family es un servicio de asistencia informática a domicilio impartida por SUPINFO, la escuela de informática líder en Francia. Este servicio está dirigido a todas las edades y conviene entonces a toda la familia. Porque SUPINFO cuenta cada año con más ingenieros en informática en toda Francia, deseamos poner su saber y pericia al alcance de cada uno a través de SUPINFO Family, sin ningún tipo de compromiso, de abono o gastos de inscripción.El personal se compone entonces de alumnos ingenieros previamente formados y

darles consejos o también enseñarles a utilizar diariamente un MAC o un PC. Los alumnos ingenieros SUPINFO son remunerados y pueden ganarse más de 2000 € al año por medio día de intervención a la semana.

SUPINFO Family propone también programas de clases particulares personalizadas destinadas a los niños, estudiantes, adultos o jubilados para adquirir conocimientos informáticos indispensables (acceso a Internet y búsquedas en la Web, utilización de una mensajería electrónica, chatear, Word, Excel, gestión del puesto de trabajo y de archivos, fotos y música, protección contra los virus informáticos, grabación de CD o de DVD).

SUPINFO.

El departamento Professional Services de SUPINFO, también llamado “PSO” forma parte del polo SBN de la escuela, el SUPINFO Business Network, una doble

vocación: económica y pedagógica. Sus áreas de actividad se basan a la vez en las necesidades de las empresas y las enseñanzas de SUPINFO: ingeniería de programas, multimedia, sistemas y redes, etc. SBN / PSO permite a los estudiantes de la escuela realizar proyectos informáticos. En el transcurso de las misiones, los estudiantes entran en contacto con empresas y mejoran su inserción en el ambiente profesional. Finalmente; los proyectos SBN / PSO les permiten a algunos alumnos asegurar sus ingresos durante su escolaridad.

SUPINFOBUSINESS NETWORKProfessional Services Organization Department

El polo de la comunidad de SUPINFO (SCO - SUPINFO Community) incluye varios departamentos dedicados a la

gestión de la vida de la escuela, a las animaciones y a los deportes. Estos departamentos son administrados por el conjunto de los estudiantes SUPINFO. Su meta es animar la vida de los centros nacionales e internacionales a través de múltiples actividades lúdicas y deportivas. Agrupan estudiantes para actividades tanto internas como externas a la escuela.

S C OC o m m u n i t y

Page 21: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 21 -

Fecha de creación: 1965

Área: Informática

Estatus: Colaboraciones estratégicas con las instituciones diplomáticas, colectividades territoriales y representaciones nacionales einternacionales: Cámaras de Comercios y de Industrias Regionales, ayuntamientos, comunidades de aglomeraciones, consejosgenerales, consejos regionales, embajadas.

Visa y Sello: I (Bachillerato +5 años, Ingeniero, Master). Master of Science international.

Duración de la carrera: 5 años después del Bachillerato. Ciclo Preparatorio incluido (SUPINFO 1 y 2): 2 años después del

Coste de la escolaridad: Todo incluido cualquiera que sea el año: 4990 € al año de contado o 5190 € al año en pagosescalonados (sin incluir la seguridad social).

Financiamiento: honor del Consejo Regional y del Consejo General.

Las admisiones en SUPINFO se realizan exclusivamente en línea en:

www.supinfo.com/es

Los gastos de dossier son de 50€ pagables directamente en línea.

dossier será transmitido a la comisión de admisión SUPINFO, la cual se reúne cada semana a partir del mes de noviembre, cada año. En el caso de una admisibilidad se le tendrá al tanto por correo postal y por correo electrónico, usted podrá luego prematricularse en uno de los centros de su preferencia en Francia o en el mundo.

Los gastos de escolaridad son de 4990€ al año. Estos gastos no deben representar un obstáculo para un estudiante meritorio para proseguir sus estudios,

préstamos bancarios, prácticas remuneradas en empresas, actividades en el departamento de los servicios profesionales de SUPINFO, acuerdo de colaboración SUPINFO Empresas y para las regiones, bajo ciertas condiciones, becas regionales o departamentales y préstamos de honor. Siendo reconocida por el Estado francés, la escuela recibe a estudiantes becados de la enseñanza superior.

Una colaboración con el banco HSBC ofrece a los estudiantes SUPINFO ventajas excepcionales, consúltelas pinchando aquí:

www.supinfo.com/fi nanciamiento

La inscripción, de un alumno es válida por un año escolar y se realiza en dos momentos:

Después de una decisión de admisibilidad por la comisión de admisión (todas las admisiones se hacen de ahora en adelante según el dossier, sin examen y bajo reserva de la obtención de un título (bachillerato o universitario)) La preinscripción permite

pago para pagar sus gastos de escolaridad. La preinscripción se materializa con el boletín de preinscripción y con un pago inicial de 1000€.

candidatos directamente admisibles y preinscritos que pueden entonces inscribirse inmediatamente. Los candidatos admisibles bajo reserva de la obtención de un título (bachillerato o título universitario) y preinscritos tienen su plaza reservada hasta el 15 de julio (fecha límite). Cuando están en posesión de sus resultados, tienen que comunicarlos a SUPINFO en 15 días. En caso de éxito, se vuelven inmediatamente

caso de la no aprobación, no pueden ser admitidos en SUPINFO y su pago inicial le será reembolsado.

La inscripción se materializa con el boletín de inscripción y el primer pago de los gastos de escolaridad, según el modo de pago elegido:

los 1000€ de preinscripción.

Page 22: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

22

Con una actitud resueltamente vanguardista y siempre al acecho de la integración de nuevas tecnologías en el seno de su programa, la Escuela Superior de Informática propone a lo largo de su carrera, todas las especialidades informáticas que el ingeniero generalista SUPINFO debe adquirir, dominar y poner al día con el paso del tiempo…

Este programa es validado en el Consejo de perfeccionamiento en presencia de los profesores,

de actores mayores de la industria informática pero también representantes del Ministerio de Educación

Nacional y de representantes de grandes empresas usuarias de sistemas de información en función de los avances de la búsqueda así como de la escogencia de mercado. Dada la evolución rápida de las tecnologías y de repercusiones sobre la enseñanza, el programa está regularmente actualizado.

SUPINFO, al disponer de un programa de intercambios y de colaboración a nivel Europeo e Internacional, ha adoptado el sistema europeo de transferencia de créditos llamados ECTS (European Credit Transfer System).

Este sistema forma parte del programa SOCRATES ERASMUS de la Comunidad Europea en el dominio de la enseñanza superior.

Los ECTS permiten a SUPINFO reforzar su dimensión Europea e Internacional rindiendo transparente sus programas de enseñanza para todos los estudiantes, tanto nacionales como extranjeros y facilitando su movilidad. Los ECTS contribuyen entonces al reconocimiento académico internacional del título de SUPINFO.

Cada año de estudio en SUPINFO, desde el primer año del ciclo preparatorio hasta el último año del ciclo de ingeniería, permiten validar 60 créditos ECTS. Los 5 años de la carrera SUPINFO permiten entonces obtener los 300 créditos ECTS necesarios a la validación de un Master of Science europeo.

El programa detallado y las fi chas ECTS se encuentran disponibles en:www.supinfo.com/ects-es

El Programa SUPINFO y el sistema ECTS

Page 23: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

Institución de enseñanza superior privada fundada en 1965

ContenidoPedagógico

®o e

Escuela presente en el mundo entero

Page 24: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 24 -

SUPINFO - 1 (L1) 25

SUPINFO - 2 (L2) 43

SUPINFO - 3 (L3) 59

SUPINFO - 4 (M1) 71

SUPINFO - 5 (M2) 79

Page 25: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 25 -

Introduction and Generalities about AlgorithmicPresentation

Presentation, history of the languagesDefi nitionsGoalsHistoryProgram implementation programNotions in instructionsNotions in sequencingNotions in sequencing interruptionsThe 3 sequencesEntries conventions

Data structurePresentationThe 5 structures of elementary dataKey words, syntax, operators and associated symbolsElementary operations: statement, initialization, assignment statement and re-assignmentAdvanced data structuresResolved problems

Algorithmic structurePresentationRepetitive structures and conditional structuresRepetitive instructionsRepetitive instruction “as long as”Repetitive instructions “repeat until” and “repeat as long as”Repetitive instruction “for”Conditional instructionsConditional instructions “if…then” and “if …then…or else”Conditional instructions “case among” and “case among by default” (and variants)Resolved problems

Program structurePresentationMain programProgram modularityProcedure and functionThe qualities of a computer program

Advanced algorithmic structureConditional instructions: If…then and Case…among (and variants)Statement: if…then

Statement: is… then… or elseStatement: case…amongStatement: case…among…by defaultDiverse statements

Repetitive instructions: as long as and repeat (and variants)PresentationInstruction: as long asInstruction: repeat…untilInstruction: repeat…as long asEarly exit from loopNested loops

Repetitive instructions: forPresentationInstruction: forEarly exit from loopPersistence in a loopLoop with variable rangesLoop with variable step valueLoops with fi xed rangesLoops with nested ranges

Instructions to break overlapping sequencesProblem resolution 1Problem resolution 2Problem resolution 3Problem resolution 4

Advanced data structure: linear structuresArrays

PresentationArrays and array dimensionsBasic operationsExample

StacksPresentationBasic operationsAssociated primitivesPrimitive algorithmsExample

QueuesPresentationBasic operationsAssociated primitivesPrimitive algorithmsExampleImplementing using arrays

ListsPresentationBasic operationsAssociated primitivesPrimitive algorithmsExampleImplementation using arrays

Advanced program structureProgram modelling

PresentationProgram dividing into modulesModules representation in a graph

Main program, function and proceduresPresentationMain programFunctionProcedureMemory organization: reminderPointersGlobal variable and local variableFormal parameter and real parameter

RecursionDefi nitionCorrespondence between repetitive instruction and recursionAdvantages and constraints attached to recursionAssociated data structure: the stackExample

Global approach for the resolution of a problemProblem acknowledgmentData structures fi tting the problemAlgorithmic structures studyMain program, procedures and functionsPotential use of recursionProgram validation

Advance data structure: non-linear structures and fi lesRecordings

PresentationSimple recordings: basic operationsNested recordings: basic operationsExample

GraphsPresentationBasic operationsAssociated primitivesExample

TreesPresentationBasic operationsAssociated primitivesExample

FilesPresentationBasic operationsAssociated primitivesExample

Dynamic data structureData chainingDefi nitionData representation in memoryAdvantages and disadvantages

Data chaining: list representationPresentationSingle chained listDouble chained listLooped listImplementation of a single chained list using an arrayImplementation of a double chained list using an array

Data chaining: graph representationPresentation

ALGORITHMIC 62 h.

SUPINFO - 1 (L1)

Page 26: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

26

Adjacency relation and adjacency listsPredecessor and successor notionsIncidence relationUtilization example

Data chaining: tree representationPresentation

Adjacency relation and adjacency lists“father-son” and “brother” relations notionsUtilization example

ARITHMETIC AND CRYPTOGRAPHY 32 h.

Theoretical course in arithmetic: defi nitions, language, properties and main theoremsDivision in Z

IntroductionDefi nition, remarks and examplesElementary properties: proposition and remarkDivision algorithm in Z: theorem and defi nitionPrinciple of the division algorithm: Euclidian algorithmDivision algorithm: application example

Divisibility in ZGreatest common divisor (GCD): introductionGCD: theoremGCD calculation example using the Euclidian algorithmGCD calculation exampleGCD propertiesGCD and prime numbersExtended Euclidian algorithm and Bezout’s theoremDiophantine equationLeast common multiple of two integers: theorem and defi nitionLeast common multiple practical calculation

Prime numbersDefi nition and fi rst propertiesInteger factorization: existence, uniqueness and notationsArithmetic’s fundamental theorem and its applicationsInfi nitude of the prime numbers: function and a few famous prime numbersAlgorithmic aspects: Sieve of EratosthenesInteger search algorithmPrime decomposition application: a fi rst theoremPrime decomposition application: examplesPrime decomposition application: a second theoremPrime decomposition application: examples

CongruencySimulation PracticeTheorem and meaningDefi nition: “x congruent to y modulo n”RemarksNumeral systemNumeral system -2Applications

Introduction to cryptographyIntroduction – presentation

HistoryA few words: cryptology, cryptography and cryptanalysisThe role of arithmetic in cryptographyThe reasons for cryptographyThe goals of cryptography

Cryptography principlesPresentation – principleEncryption, decoding and keysSymmetric key and public key encryptionSymmetric keyPublic keyOne-way functions

Arithmetic and cryptographyEncryption of alphabetical characters

IntroductionCommon principles to all encryption modesMonographic encryption: the Julius Cesar cipherDecoding

Encryption by affi ne transformationDecoding and the Bezout theoremDecoding and the Bezout theorem – 2Affi ne transformation decoding using extended Euclidean algorithmAn example of cryptanalysisAn example of cryptanalysis - 2

Poly-graphical encryption (or block encryption)IntroductionEncryption systemEncryption system – 2DecodingThe crypto-analyst’s riposte

Encryption by arithmetic exponentiationPresentation of the encryption modeExponentiation encryption principleExampleEncryption’s exponential costDecoding: Fermat’s little theoremFermat’s little theorem – 2Decoding costCode resistance to cryptanalysisCode resistance to cryptanalysis - 2

“Public key cryptography“: the RSA systemThe public-key encryption systemBasic principleThe public-key system’s mechanismHow is the encryption done?Decoding principleEncryption and decoding costsThe impossible mission facing the crypto-analystConclusion

Activity themes Base switching

IntroductionFrom the decimal numeral system to the binary numeral systemFrom the binary numeral system to the decimal numeral systemCase when the base is the others power factorCase when the base is the others power factor – 2

Divisibility PresentationControl keysI.N.S.E.E. numberR.I.B. numberI.S.B.N. numberUPC codeRepartition of the terms of a sequence in an array

Affi ne encryptionAffi ne encryption principle: a reminderThe keys: encryption functionsDecoding functionsCryptanalysis

Error correction codesHAMMING correction codeHAMMING correction code – 2The correction limits

MATHEMATICS FOR FINANCIAL USE 32 h.

Reminders: Equations, Percentages1st and 2nd degree equation solving

1st degree equations: method and principle1st degree equations: examplesEquation products

Problem resolution through an equation: situation and methodProblem resolution through an equation: examples2nd degree equations2nd degree equations - 2

Linear systems (simple models) equation solving

SUPINFO - 1 (L1)

Page 27: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 27 -

Presentation – frameworkResolution methodResolution method - 2

PercentagesCalculating the % of a valueDetermining a %Adding or subtracting a %Calculating an indirect %Calculating successive %Calculating % by blocks

Simple interests (short term fi nancial operations)IntroductionWhat is a simple interest?Difference between simple interest and compound interestUses for simple interestsUses for compound interestsIn practice…

Basic defi nitionsSimple interest: defi nitionInvestment durationInterest rate: annual rates and periodic ratesRemarksProportional rateAverage rate of various investments

Calculation principlesNotationReturn on investment calculationReturn on investment if the duration is given in yearsReturn on investment if the duration is given in daysReturn on investment if the duration is given in monthsReturn on investment if the duration is given in trimestersExample 1Example 2In shortSimple interests applications

Compound interests (long term fi nancial operations)Interests and return on investment resulting from long term investment

Return on investment: defi nition and notationCalculation of the return on investment if the number of investment periods is an integer nExampleCalculation of the return on investment in the number of investment period is not completeApplication exampleReturn of interest on an investmentRemark

Investment capital determination (net value)1st method: formula2nd method: using the fi nancial tableExample 1Test: Practice

Investment rate calculation; calculation of an investment’s duration; equivalent rate

Calculation method of an investment rateExampleCalculation method of an investment’s durationExampleTest: Practice

Current value of a capital or of compounded interestsDefi nitionsSignifi cationCapitalization and realizationExamplePractice

Annual instalments: repayment (long term fi nancial operations)Annual instalmentCharacteristicsAnnual instalment periodicityExamplesNumber of payments in an annual instalmentPayments amount in an annual instalmentExampleDate of deferred annual instalments

Annual instalments capitalization and return on investmentCalculation methodInterpretationExamplesExceptional case of constant annual instalments: beginning of period annual instalmentsExceptional case of constant annual instalments: end of period annual instalments

Annual instalments repayment and net value of a loaned capitalRemindersRepayment instalments: defi nitionRepayment instalments: calculation methodNet value of a loaned capitalInterpretation: instalment/loanRemarkExampleExceptional case of constant annual instalments: beginning of period instalmentsExceptional case of constant annual instalments: end of period instalments

Determination of an annual instalment amount; determination of the duration of capitalization or of the repayment

How to determine the amount of the annual instalmentExampleDuration of the capitalization or of the repayment: calculation methodExamplePractice

Presentation - HistoryMathematical logic

A few historical factsNotions

PropositionsDefi nitionsTable of truthNegation of a propositionBinary connectorsBinary connectors – 2PropertiesProperties - 2

PredicatesIntroductionUsual quantifi ersMultiple quantifi ersQuantifi ers’ propertiesQuantifi ers’ properties – 2In shortPractice

Set language theoryIntroductionDefi nitionsSet cardinalSymbols: defi nitionSymbols: in short

Symbols: a reminder of the propertiesComplementsExample Cartesian product of two sets

ApplicationsDefi nition and basic terminology

FunctionsApplicationsImage setImage and premiseCardinal of the applications set

Direct image and inverse imageDefi nitionsPropositions

Injectivity, surjectivity and bijectivity Defi nitions and graph interpretationsDefi nitions and graph interpretations – 2Applications and fi nite setsApplications and fi nite sets – 2Examples

Compound applications and inverse applicationsCompound applications: defi nitions and propertiesInverse applications: defi nitions and properties

Binary relationsDefi nitions and basic terminology

Binary relation

SET THEORY 44 h.

SUPINFO - 1 (L1)

Page 28: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

28

Presentation of the various types of binary relationsSymmetryAnti-symmetryTransitivityPractice

Order theoryDefi nitionExamplesEquivalence relation

The principles of mathematical reasoning: the proof methodsVocabulary

Axioms and theoremsReasoning by AbsurdThe contraposition proposalThe contraposition proposal and the reciprocalThe counter-exampleThe recurrence

Proof method by recurrenceDefi nitionsThe recurrence principle evidenceAdvicesExample 1Example 2Practice

Proof method by absurdDefi nitionExamplePractice

Boolean algebraDefi nitions and properties

Major axioms of the Boolean algebraPrimordial remarkMain propertiesMain properties - 2The MORGAN lawsEquivalence between Boolean algebra and the propositions language and sets languageStop and think: Practice

Boolean functionsIntroduction, defi nitions2 variables Boolean functions3 variables Boolean functionsMain properties of the Boolean functionsMain properties of the Boolean functions

Canonical writings of a Boolean functionVocabularyVocabulary - 2Notations and representationsConjunctionsConjunctions - 2DisjunctionsDisjunctions - 2Properties of canonical writingsExample and link with computingIn short

Graphical representation of Boolean functions: Karnaugh diagramPrinciple, conventionPrinciple, convention - 2Boolean expression diagram: complementary, product, additionPracticeCartesian product of two sets

EVERYDAY SITUATIONS - INTERMEDIATE +Window-shopping

You go into town to shop with a friend. Give your opinion about which products to buy.The fi tting room

You go clothes shopping. Learn the name of items of clothing and compare them. Discuss size and colour.

Grocery shopsAsk for advice on ingredients and cooking while grocery shopping.

At the supermarketYou go food shopping with your child. Learn vocabulary related to products found in supermarkets.

An emergencySeek assistance for an injured person. Learn basic medical vocabulary.

At the doctor’sYou feel ill. Describe your symptoms and discuss treatments with a doctor.

A driving lessonFirst driving lesson. Get familiar with the car and its functions, the Highway Code and driving on the road.

PROFESSIONAL SITUATIONS – AVANCEDAgreeing to meet

Deal with a business call. Assist the caller and take their name and number. Arrange an appointment and respond to their questions.

Business callsYou make arrangements to have a stand at a trade fair. Explain your requirements in detail

The company standSpeak to a client at a trade fair. Detail the features of your product and convince the client of its merits. Arrange an appointment for a product demonstration.

Comparing productsConvince someone of the quality of your product.

Making a saleYou meet a client who would like to place an order. Discuss product type and price. Negotiate the discount. Agree the delivery date.

NegotiatingNegotiate the specifi c details of an order. Convince your client to choose your product over that of your competitor.

Trouble with ordersReply to a dissatisfi ed customer. Apologise for problems and try to fi nd a compromise.

After-sales serviceDeal with an angry customer. Attempt to fi nd solutions to their problems. Arrange assistance

Handling an invoiceYou phone a client whose invoice is overdue. Ask when payment can be expected and arrange terms.

Deferring paymentFind a solution with a customer whose payment is overdue.

Organising a stay

A client would like to pay your company a visit. Give advice on where to stay and leisure-time activities. Ask for details of the trip.

Welcoming visitorsAsk practical questions about a client’s visit. Propose various leisure-time activities to be included in the visitor’s itinerary.The training course

Set up training programmes. Organise a training workshop, decide on the sort of training required and who will need training.

Job searchAt a recruitment agency. Look for jobs in management. Talk about your professional experience. Go for an interview.Starting a new job First day at a new job. Sign the contract, settle into your offi ce, and meet your colleagues. Talk business.

EVERYDAY SITUATIONS - ADVANCEDA car trip

You go on a car trip. Express your agreement/disagreement and reach a compromise. Describe the features of a car. Ask for precise directions.

On the motorwayGive advice about the way someone is driving. Ask for petrol at a petrol station and have a conversation with a police offi cer.

At the airportCheck in your bags at the airport and state your seating preferences. Go through customs.

On the planeAsk questions about what happens during the course of a fl ight. Ask the fl ight attendant for various items you need during your journey. Pick up your luggage on arrival.

At the stationYou want to buy a train ticket. Say what kind of ticket you want and ask for the departure and arrival time of a train.

On the trainYou take the train. Speak to the ticket inspector and reply to his questions. Make conversation with another passenger.

Customs checksYou go through the formalities at customs. Show your passport and respond to the questions posed by the customs offi cer

The luggage searchYou declare goods at customs. Respond to the customs offi cer

Hotel reservationsYou need a hotel room for the night. Explain which kind of room you would like and enquire about meal times and the cost of your stay.

Staying in a hotelEnquire about hotel facilities. Talk about your hotel stay.

A tour of the townYou go on a guided tour of a town. Ask questions about the different buildings you encounter while sightseeing.

Foreign language: BRITISH ENGLISH 1 70 h.

SUPINFO - 1 (L1)

Page 29: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 29 -

A tour of the castleYou take a tour of a medieval castle. Ask questions about the castle and express your feelings about your visit

FINANCIAL MECHANISMS 15 h.

Introduction to fi nanceWhat is a balance sheet?What is an income statement?

What is a «by-function» income statement? (IFRS standard)Intermediate marginsUnderstanding consolidation

PROJECT MANAGEMENT 15 h.

Project managementDefi ning a project and everyone’s role in itUsing milestones to conduct a projectSplitting up your projectOrganizing a project and negotiating for resourcesLaunching a project, ensuring the conditions for its success

Controlling your projectClosing your projectManaging project riskManaging human factors in projectsPost-project change management

PERSONAL SKILLS 4 h.Manage your stress

What is stress?Analyze and assess your stressFacing up to the typical stresses of being a manager

PERSONAL EFFICIENCY 17 h.

Formulating your goalsWhat is a good goal?Fix your goals clearly to reach them better

Boost your everyday effectivenessRemembering betterTaking effective notesCommunicating powerfully by email

Time managementAnalyze the organization of your work and your prioritiesRecognize the factors in time-wastingUse the tools for planning and rememberingHow to deal with everyday interruptionsHow to manage trouble-makers

Building a high-performance teamWhat is a team?The 4 stages of team developmentLaying your team’s foundationCreating a united teamDeveloping team performance

Managing ideas in your teamGetting ideas to emergeHelping ideas to materializeMaking the most of your innovative colleaguesHelping develop complex ideas in your company

Effective meetingsHow to prepare your meetings by using the CPA methodHow to keep your meetings under control from the very startMastering presentation supportsHow to run meetings effi cientlyHow to conclude your meetings

Managing interpersonal disputesUnderstanding the process of confl ictHow to say things are wrong using the DESC methodDealing with a crisis situationUsing transactional analysis in confl ict managementUsing transactional analysis in confl ict management

TEAM MANAGEMENT 24 h.

COMPUTER ARCHITECTURE 80 h.

The mathematic conceptsDigital advantages

Continuous data and discrete data notions From continuous to discrete: the Sampling notionFrom discrete to continuousContinuous data scope (analogical electronics, loud-speakers…)Discrete data scope (numerical electronics, encryption…)

Binary arithmetic

History of binary numbersFrom binary positive binary integer to positive decimal integerFrom positive decimal integer to binary positive integerAdding two positive binary integerSubtracting two positive binary integer (direct method)Negative binary integer coding Subtracting two positive binary integer (adding of the opposite)Multiplying two binary integer

SUPINFO - 1 (L1)

Page 30: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

30

Dividing two binary integersOther encryptions

Real binary numbers with position-locked commaReal binary numbers with fl oating comma (IEEE 754 coding)Adding and subtracting two coded real binary numbers following the IEEE 754 codingMultiplying and dividing two coded real binary numbers following the IEEE 754 codingHexadecimal codingOctal coding and DCB codingCharacter coding (EBCDIC, ASCII, UNICODE)

Boole’s algebraWenn diagrams and operations on the wholePredicates and associated operationsSynthesis: truth table of the various operatorsPresentation of George BooleDefi nition and properties of the operators +, xThe duality principle and the Morgan lawAnalogies between the operators -,? And / applied to the predicates and the operators +,x (using the truth tables)The = operatorThe Karnaugh tables

Logical gates construction Semiconductor materials

A reminder of the electronic structure of the matterAtomic orbital and their fi llingMaterials classifi cationEnergy bandsConductor materials, insulating materials, semiconductor materialsPresentation of silicium, boron and phosphorPositive dopingNegative doping

Semiconductor electronic componentsDiodeBipolar transistor (BJT)Field effect transistor (JFET)Field effect transistor (MOSTFET)The TTL logic and the CMOS logic

Gates constructionThe AND gateThe OR gateThe NO gateThe NO-AND gateThe NO-OR gateThe Exclusive OR gateThe 3 states gate

Industrial processes for semiconductors conceptionThe wafer creation (pellets and production of silicium) and of masksSubstratum creation (epitaxy, oxidation and varnishing)Doping zones creationIonic implantation and depositsOxidation and interconnection within a single layerPolishing and interconnection between the layersInspection and test

Logical gates interconnection in electronic circuitsCombinatorial circuits

EncoderDecoderMultiplexerDemultiplexerComparatorParity controlHalf adder and full adder 1 bit and N bitsHalf subtraction and full subtraction 1 bit and N bits

Sequential circuitsSwitching timeSet-reset fl ip-fl op (RS)RST fl ip-fl opD fl ip-fl opJK fl ip-fl opT fl ip-fl opLatches and fl ip-fl opsParallel registersShift registersDeterministic or non-deterministic counters

Memory conceptionRandom access memory

Operating principle of RAMThe RAM organizationThe RAM reading cycleThe RAM writing cycleThe RAM reading-modifying-writing cycleReading or writing in the page modeSynchronized accessesFIFO and FILO accesses

Assembling RAM blocksDifferences between SRAM and DRAM

DRAMFMPEDOBEDOSDRAMDDR SDRAMDDR II

SRAM and cachesThe cache’s utilityData location in time and spaceDirect correspondenceAssociative correspondenceReading data (hit cache and miss cache)Cache levels (inclusive and exclusive functioning)

ROMsOperating principles of the ROMOrganization of the ROMThe ROM reading cycleThe PROMEPROM and EEPROMProgrammable logical circuits (PAL, SPLD, EPLD, CPLD, FPGA)

The CPU and its environmentALU and internal registers conception

Setting up the elements of an ALU 1 bits (adder, comparator, AND, OR…)Elements necessary to choose the operationSetting up data registersElements necessary to choose the data registerALU interconnection – internal registers: data buses

Time management and outside connectionsThe quartz crystal and its piezoelectricity propertiesQuartz clocksProcessor sequencerSetting up the ordinal counterSetting up the addresses registersConnection of the internal addresses bus with the central storage through the external address busConnection of the internal data bus with the central storage through the external address bus

Instructions for set linkingSet linking notionsImplantation of the set linking in the processor in the instructions decoderThe processor control internal bus

CPU operatingDescription of the CPU operating through a case studyThe 4004 case fi gure

CPU programming: Assembler level 18086 presentation

8086 external view8086 internal viewGeneral registersIndex registers and pointer registersSegmentation registersIP registerThe state register

Presentation of the EMU 8086 environmentThe programming environmentThe execution environmentThe assembly and opcode notionThe execution

Basic handlingAddition, subtraction with or without carry-valueMultiplication and divisionDirect addressing and addressing through register

JumpsConditional and non conditional jumpsThe CMP instructionThe LOOP instruction and CX register

The microprocessor programming: assembler level 2Video memory (case of CGA card)

The monitorThe screen controllerThe organization and the direct handling of the video memory

ProceduresThe PROC and ENDP directivesThe CALL and RET instructionsSafeguarding the information in the stack (PUSH instruction)Recovering the information in the stack (POP instruction)

Variables manipulation Character chainingArrays

Interruptions

SUPINFO - 1 (L1)

Page 31: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 31 -

Interruptions principlePositioning the pointer and writing character chainsThe keyboard management

Introduction to PCIT industry certifi cations

Education and certifi cationsCompTIA A+ certifi cationEUCIP certifi cation

Describe a PCCases and power supplies

CasesPower supplies

Internal componentsMotherboardsCPUsCooling systemsROM and RAMAdapter cardsStorage drivesInternal cables

Ports and cablesInput devicesOutput devicesSystem resources and their purposes

Safe lab procedures and tool useSafe working conditions and procedures

Potential hazards for usersEquipment protection from damage and data lossProtecting environment from contamination

Tools and software used with PC componentsHardware toolsSoftware toolsOrganizational tools

Proper tool useAntistatic wrist strapAntistatic matVarious and toolsCleaning materials

Computer assemblyOpen the caseInstall the power supplyInstall the components to the motherboard and install the motherboard

CPU and heat sink/fan assemblyRAMMotherboard position

Install internal drivesInstall drives in external bays

Optical driveFloppy drive

Install adapter cardsNICWireless NICVideo adapter card

Internal cablesPower cablesData cables

Re-attach the side panels and connect external cablesRe-attach the side panels to the caseConnect external cables to the computer

Boot the computer for the fi rst timeBeep codesBIOS setup

Basics of preventive maintenance and troubleshootingPurpose of preventive maintenanceSteps of the troubleshooting process

Purpose of data protectionGather data from the customerVerify the obvious issuesTry quick solutions fi rstGather data from he computerEvaluate the problem and implement the solution

Fundamental operating systemsPurpose of an operating system

Characteristics of modern operating systemsOperating system concepts

Comparison of operating systemsDesktop operating systemsNetwork operating systems

Determine operating system based on customer needsApplications and environments compatible with an operating systemMinimum hardware requirements

Install an operating systemHard drive setup proceduresHard drive preparationInstall the operating system using default settingsAccount creationInstallation completionCustom installation optionsBoot sequence fi les and registry fi lesManipulate operating system fi lesDirectory structures

Navigate a GUI (Windows)Manipulate items on the desktopControl panel appletsAdministrative toolsInstall, navigate and uninstall an applicationUpgrading an operating system

Common preventive maintenance techniques for operating systemsCreate a preventive maintenance planSchedule a taskBackup the hard drive

Troubleshooting operating systemsTroubleshooting processCommon problems and solutions

Fundamentals laptops and portable devicesDescribe laptops and other portable devices

Some common uses of laptopsSome common uses of PDAs and smartphones

Components of a laptopExternal componentsInternal componentsDocking station

Compare and contrast desktop and laptop componentsMotherboardsCPUsPower managementExpansion capabilities

Confi gure laptopsPower settingsSafe installation and removal of laptop components

Different mobile phone standardsCommon preventive maintenance techniques for laptops and portable devices

Appropriate cleaning proceduresOperating environments

Troubleshoot laptops and portable devicesTroubleshooting processCommon problems and solutions

Fundamental printers and scannersTypes of printers currently available

Characteristics and capabilities of printersPrinter to computer interfacesLaser printersImpact printersInkjet printersSolid-ink printersOther printer types

Installation and confi guration process for printersSet up a printerPower and connect the device using a local or network portInstall and update the device driver, fi rmware and RAMConfi guration options and default settingsOptimize printer performancePrint a test pageShare a printer

Types of scanners currently availableScanner types, resolution and interfacesAll-in-one devices

COMPUTING CULTURE 16 h.

SUPINFO - 1 (L1)

Page 32: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

32

Flatbed scannersHandheld scannersDrum scanners

Installation and confi guration process for scannersPower and connect a scannerInstall and update the device driverConfi guration options and default settings

Common preventive maintenance techniques for printers and scannersPrinter maintenanceScanner maintenance

Troubleshoot printers and scannersTroubleshooting processCommon problems and solutions

Fundamentals networksPrinciples of networking

Computer networksBenefi ts of networking

Types of networksLANWANWLANPeer-to-peer networksClient/server networks

Basic networking concepts and technologiesBandwidth and data transmissionIP addressingDHCPInternet protocols and applicationsICMP

Physical components of a networkNetwork devicesNetwork cables

LAN topologies and architecturesLAN topologiesLAN architectures

Standards organizationsEthernet standards

Cabled Ethernet standardsWireless Ethernet standards

OSI and TCP/IP data modelsTCP/IP modelOSI modelCompare OSI and TCP/IP

Confi gure a NIC and a modemInstall and update a NIC driverAttach computer to existing networkInstall a modem

Characteristics of other technologies used to establish connectivityTelephone technologiesPower line communicationBroadbandVoIP

Common preventive maintenance techniques used for networksTroubleshooting processCommon network problems and solutions

Fundamental securityWhy security is important?Security threats

Viruses, worms, TrojansWeb securityAdware, spyware and graywareDenial of serviceSpam and popup windowsSocial engineeringTCP/IP attacksHardware deconstruction and recycling

Security proceduresBasic local security policyTasks required protecting physical equipmentWays to protect dataWireless security techniques

Common preventive maintenance techniques for securityUpdate signature fi les for anti-virus and anti-spyware softwareInstall operating systems service packs and security patches

Troubleshoot securityTroubleshooting processCommon problems and solutions

Communication skillsRelationship between communication and troubleshootingGood communication skills and professional behaviour

Determine the computer problem of the customerDisplay professional behaviour with the customerFocus the customer on the problem during the callUse proper netiquetteImplement time and stress management techniquesObserve Service Level AgreementsFollow business policies

Ethics and legal aspectsCall centre environment and technician responsibilities

Call centre environmentLevel-one technician responsibilitiesLevel-two technician responsibilities

C Language – level 1Language presentation

Language families – history and evolutionDevelopment principle of a C programC program structure (instruction, instruction void, bloc, commentary)Brief presentation of GCC and Visual Studio

DataNotions of variable and affectationThe Void typeThe char, unsigned char, short, unsigned short typesThe int, unsigned int, long, unsigned long typesThe fl oat, double and long double typesThe defi ned by #defi ne constantsThe defi ned by const constantsThe “sizeof” operator

Basic operationsThe notion of expressionThe arithmetic operations (+,-,*,/,%,+=,-=,*=,/=,%=,++,--)The logical operations (&,|,^,”,<<,>>,&=,|=,<<=,>>=)The relational operators (==,!=,>,<,>=,<=)Type conversionComplex expressions and priorities between operators

Control structuresThe “if…else” structure and the conditional operator (?)The “switch…case” structure and the breakThe “for” structure and the sequential operator (,)The “while” structure

The “do…while” structureThe gotoThe continue

C language – level 2Functions

Function notion (the signature, the body, the importance of the main)The notion of passage through valueThe notion of life-span and of variable reach

Standard libraryThe entry-exit notionThe printf functionThe entry-exit formattingThe scanf functionExample: writing and using of the Euclidian2distance function

Development modularizationThe module notionThe project notionThe Makefi le fi le creationThe header fi les and the body fi lesThe headers protection using #ifdef, #defi ne, #endif

C Language – Level 3Complex data structure

The structuresThe unionsThe enumerationsThe arrays and the indexation operatorThe user type declaration using typedef

WEB AND DEV TECHNOLOGIES: C LANGUAGE

52 h.

SUPINFO - 1 (L1)

Page 33: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 33 -

Functions and complex dataFunctions and structuresFunctions and unionsFunctions and arraysImplantation of lists and stacks using arraysThe listThe FIFO stackThe FILO stack

C Language – Level 4Pointers

The address pointerThe pointer notionThe creation of a pointer and the * operatorThe & operatorThe pointers and the structures (the operator ->)Arithmetic of pointersAllocation and freeing the memory

Pointers and complex typesThe array pointersThe chain of characters pointersThe structure and union pointersThe pointer arraysThe pointer pointers

Functions and pointersThe notion of passage through addressThe function pointersThe recursive functions

Lists and trees implantationThe variable size listThe chained and double-chained listThe chained by indirection list The binary tree

C language – 5Files

The fi les notion The text fi leThe binary fi le

File managementThe FILE typeOpening and closing a fi le (fopen and fclose)Reading and writing a character (fgetc and fputc)Reading and writing a chain of characters (fgets and fputs)Reading and writing of a formatted chain of characters (fscanf and fprintf)Location in a fi le (fseek)

Socket managementCommunicating through socket principleThe server socket (creation, bind, listen, accept)The client socket (creation, connect)Reading and writing a chain of characters (read and write)Blocking socket and non-blocking socket (fnctl)

C Language – 6Development modularization

The .a fi le creationThe .so fi le creationThe .dll fi le creation

The program and its environmentThe parameter passage from the command lineThe variables environmentThe BIOS and the OS interruption call from a program

Pre-processorThe macrosThe conditional compilation

Additional optimizationsThe memory classes (auto, register, extern and static)The code documentation with doxygen

Discover event-driven programmingHistory of the languagesEvent-driven programming versus procedural programming

Object programming, a basis of event-driven programmingObject notionClass notionObject membersEncapsulation notionsInheritance notions and class hierarchyPolymorphism notions

Build your fi rst event-driven programming application with Visual Basic 2005Defi nition of the user interface WinformAssociated event-driven programming model Life cycle of an application, part of event-driven programming

Visual Basic 2005 and .NET Framework 2.0The .Net Framework 2.0: Basis of OOP – event-driven programming in VB2005What kind of applications are built in event-driven programming – OOPVisual Basic 2005 language

FunctionalitiesOperatorsConditional instructions

Repetition loopsError managementWhat’s new in Visual Basic 2005 language?

Event-driven programming and OOP in the contemporary developmentsEvent-driven programming, OOP and Winform

Frame of Winform projectWinform controlsThe event-driven model of Winform

Event-driven programming, OOP and WebformFrame of Webform projectWebform controlsThe event-driven model of Webform

Event-driven programming, OOP and MobilFormFrame of MobilForm projectMobilForm controlsThe event-driven model of MobilForm

Integrate your events to your business objects

EVENT-DRIVER PROGRAMMING 34 h.

CISCO TECHNOLOGIES: CCNA 1 AND 2 50 h.

Introduction to networksNetwork connection

IntroductionMeasure unitsThroughput and bandwidthBasics on computers

Main componentsPeripheralsBackplane components

Numbering systemsThe different numbering systemsConversions

Network terminologyPANLAN

MANWANSANVPN

OSI and TCP/IP modelsOSI model

CharacteristicsLayersPDU (Protocol Data Unit)

TCP/IP modelCharacteristicsLayersComparison with the OSI model

Layer 1: Medias and network devicesSignal

SUPINFO - 1 (L1)

Page 34: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

34

PropagationAttenuationRefl ectionNoiseDispersionJitterLatencyCollisions

Types of mediasCopperCoaxialFibreWireless

Layer 1 devicesHub & repeaterCollision domain

TopologiesBusRingStarHierarchicalMeshed

Layer 2: Ethernet technologiesIntroduction to Ethernet

LAN technologyEthernet technologyEthernet in the OSI model

Ethernet processFramesCollision problemCSMA/CDHalf & Full Duplex

Layer 2: Ethernet switchingCollision domain

Defi nitionSegmentation

Segmentation of a LANSegmentation devicesFrame switchingSpanning Tree

Layer 3: IP protocolPrinciple

Main conceptsRouted and routing protocols

IP protocolIP addressingDifferent IP addressesClassesSpecifi c ranges

IP address managementBOOTPDHCPARP & RARPICMP

Layer 3: SubnettingSubnetting purpose

Principle and purposeStructure of an IP addressDefault subnet mask

Calculation methodGeneral method2n-2 ruleMagic number

Layer 3: Introduction to routingPrinciples

Switching typesRouter

Broadcast domainBroadcast domain

Routing table and best path determinationPrincipleRouting processPath determinationRouting typeAS - IGP & EGPStatic routingDynamic routing

Layer 4, 5, 6 and 7Layer 4: Transport layer

UDPTCP

Layer 5: Session layerPurpose

Layer 6: Presentation layerFormatEncryptionCompression

Layer 7: Application layerPrincipleDNSHTTPFTPTelnetSNMP

SNTPWAN networks

Defi nitionsDefi nitionsMain characteristicsWAN devicesWAN normsPhysical layerData link layer

WAN technologiesCircuit switched servicesPacket/cell switched servicesDedicated servicesOther services

Introduction to routersPresentation of a Cisco router

Internal componentsExternal routers

Physical pluggingLAN and WAN interfacesConfi guration access

Cisco IOS operating systemPrinciple and specifi cationsCommand modesHelp systemAdvanced editing commandsCommand historyConfi guration fi les

Basic router confi gurationShow commands

Command listingBasic commands

Date and timeHostname and name resolutionDescription and connection banner

Access to the routerPasswordsHTTP serverMain conceptsLoopback interfacesEthernet interfacesSerial interfaces

Information and access to other devicesCDP protocol

TheoryConfi gurationVerifi cation

Telnet protocolTheoryConfi guration and use

Startup process and IOS managementStartup process

Boot sequenceBoot system commandsConfi guration registerSETUP mode

IOS managementMain conceptsFile system managementRXBoot mode

RoutingFundamentals of routing

Routing and switching functionsForwarding processRouting table(s)

Static and dynamic routing, convergence, routing loops and solutionsStatic and dynamic routing, characteristics and comparisonConvergenceRouting loopsFinite state metricSplit HorizonRoute Poisoning

SUPINFO - 1 (L1)

Page 35: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 35 -

CHECK POINT TECHNOLOGIES: CCSPA 20 h.

General aspects of the network securityThe Check Point network security

The four main principlesPurpose of the Check Point security

Risks and vulnerabilitiesThreats and vulnerabilitiesBudget managementStrategies, solutions and countermeasures

Network attacksIntrusion and attack typesAttack techniques

BaseliningIntrusion test

Security policiesThe perpetual process of security (Security Wheel)Objectives of security policySecurity policies

Types of security policiesMethodsApply a security policyManage security policies

Operational securityOPSEC lawKnow his opponentSecurity controls

Effi cient communication on securityObjectivesNeeds in term of trainingTrainingNeeds on term of communication

Business Continuity PlanConception of a BCPTest of a BCPLife cycle of a BCPScenariosCommon scenarios Rare scenarios

Access controlAccess control modelsAccess control methods and managementIdentifi cation and authenticationAccess control technologies

CryptographyA brief historyHow the cipher works?

Cipher algorithmsDesign of secured network architecture

Principle of secured designEconomy mechanismFail-Safe DefaultsComplete mediationOpen DesignPrivilege separationThe least privilegeLeast common mechanismPsychological acceptancePrinciple and reality

EquipmentsSwitchRouterFirewallProxyIDS/IPSVPN

Secured network architectureIsolate servers from usersAccess restrictionGateway security

Security for small size networksRemote Offi ce / Branch Offi ceSecurity questions for ROBOSecurity needs for ROBOSecurity solutions for ROBORemote usersSecurity questions for small corporationsSecurity conditions for small corporationsSecurity solutions for small corporations

Intranets, extranets and virtual corporationsIntranetsEnterprise private networksThe defense per levelAuditsUse of cryptographyImplement access control models

MonitoringPrinciple of workingSNMP

IntroductionProcessMIBSNMP – Security is Not My Problem

Triggered updatesHold-down timers

Distance vector and link state routing, interior and exterior routing, autonomous systemsDistance vectorLink stateAutonomous systems, IGP and EGP

Default confi guration, static routing and state visualizationCommands and confi guration

RIP protocolTheory

Main conceptsProcess

Confi gurationCommandsConfi guration process

Verifi cationState visualization commandsDebugging commands

TheoryMain conceptsProcess

Confi gurationCommandsConfi guration process

Verifi cationState visualization commandsDebugging commands

Troubleshooting and ICMP protocolTheory

Features

Verifi cation commandsMessage typesEcho Request/ReplyDestination UnreachableParameter Problem and Source QuenchRedirect/Change RequestTimestamp Request/ReplyInformation Request/Reply, Address Mask Request/Reply, Router Discovery/Solicitation

Common problems and debuggingCommands and verifi cationCommon problems and the OSI modelDebugging

Password recovery process for a routerProcess and commands

ACLsTheory

FundamentalsWildcard mask

Standard ACLTheory and commandsApplication and debugging

Extended ACLTheory and commandsApplication and debugging

Named ACLTheory and commandsApplication and debugging

SUPINFO - 1 (L1)

Page 36: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

36

Web developmentPresentation and history of Internet

IntroductionHistoryThe standardsThe client/server model

Protocols and standardsW3CThe validationWhy a standard?

HTML, XHTML & CSSPresentation of the descriptive language

Descriptive languageThe differencesThe advantages

HTML languageThe (X)HTMLLayoutArrayFrameForm

Development, installation and maintenance of an internet site

How install IISHow confi gure IISManaging of IIS

CSS, ergonomics and accessibilityWeb designCSS

JavaScriptIntroduction and syntax

PresentationBasic syntax

FunctionsIntroductionDeclarationUsing

Advanced JavaScriptFormsEventsObjects modelling

DOMIntroduce the D.O.M.Manipulate an HTML page

WEB AND DEV TECHNOLOGIES: HTML and Javascript

40 h.

NagiosPresentation of NagiosGeneralitiesArchitectureMost widely used features

Use of Centreon with NagiosGeneralitiesFeatures

Installing Centreon

PrerequisiteInstallationConfi guration

Use of CentreonHome pageMonitoringReportingOreon viewsIdentity fi les

IntroductionLinux history

What is UNIX?Why UNIX?UNIX philosophyLinux’s birthLinux distributions

Mandriva’s historyLicenses

Open Source and proprietary softwareFree Software and licenses

The fi lesystem hierarchy//usr/var

Shell introductionIntroduction

Shell descriptionShell descriptionThe ShellUse help

Basic commandsFiles and folders manipulationsRead a fi leFilename and globing

FilenamesFile types

GlobingVIm Editor

Start VImCommand modeInsert Mode

EmacsUsing the editorBasics keyboard commands

Archiving and compress with gzip, bzip2 and tar The tar command gzipbzip2

File research fi nd command slocate - locate

Pipes and Redirections StandardsRedirectionsPipes

Users and groups management The users

The /etc/passwd fi le The /etc/shadow fi le

GroupsUser management commands

Adding an user Deleting an user To change an user’s password Displaying user information

Group management commands Adding a group Deleting a group Modifying an account secondary group Displaying information on groups

Identity switching The Userdrake utility

Permissions management

LINUX TECHNOLOGIES: Mandriva Certifi ed User (MCU)

50 h.

SUPINFO - 1 (L1)

Page 37: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 37 -

Owner Changing a fi le’s ownership Changing the owner group Three types of permissions Modifying permissions

UmaskSpecial rights

SUID SGID Sticky bit

DrakPerm Access Control Lists (ACL)

Disks management Hard-disk

Partitions Access to storage devices Disk quotas Management of IDE devices

Process management What’s a process? Send signals to processes Background, foreground and detachment Modify Scheduler priority Task manager The crontab command The crontab system fi le The at command

Network management PreambleManual hardware confi guration

Kernel confi guration The ndiswrapper solution

Network confi guration Command-line confi guration Network confi guration with DrakConnect Troubleshooting tools

Sed and Awk Sed

IntroductionUsing sed Commands

Awk IntroductionUsing awk Display and variables FunctionsPatternsBegin and End Conditional structures

Scripting with Bash IntroductionScript creation and invocation

Script creation Script invocation

Comment and background tasks Return value at the end of the execution Shell-script command

Simple commands Composed commands

Print on the screen Keyboard input The select command Redirections of standard input/output Variables and parameters

Variables Parameters

Mathematical calculation Conditional structures

ConditionsTests Integer tests Strings tests Tests combinations Structure If ... Then ... Else Structure Until

Other executive structures For structure Case structure Trap structure

FunctionsThe X server

IntroductionThe X-window architecture and its limits The XFree86 project The Xorg project

Confi guration Generate a confi g fi le Edit a confi g fi le

Running the X server X-Distant

Local X-Distant The XFree86 and X.org confi guration Display distant applications Display an entire environment

Mandriva Tools DrakxConf Confi gure your KDE desktop Confi gure your Gnome desktop

Software installation PreambleMandriva’s approach

How to obtain packages? Package installation and removing Creation of a rpm from RPM sources RPMDrake

Libraries and dependences Debian approach

Installation, removing, information, updating Creation of a deb fi le from the dsc sources

Gentoo’s approach Installation, removing, information on packages Installation from sources

Virtual machines Emulation and Virtualization

IntroductionVocabulary Virtualization Emulation with wine Conclusion

The Linux kernelWhat is a kernel? Kernel compilation and installation

Why recompile the kernel? The kernel modules Before starting... Kernel compilation Confi guration Compilation

Kernel installation Kernel installation

Bootloader confi guration Modules management

Presentation of Windows VistaMicrosoft Client OS Historical anterior to Vista Minimum requirements Vista Editions Installing Windows Vista Clean installationUpdatingMigrationActivation

Windows Vista DeploymentACT 5.0 and ACM

ACT 5.0?Requirements ACT 5.0What is ACM?

Deployment of Windows VistaDefi nition

MICROSOFT TECHNOLOGIES: Windows Vista & Windows Server 2003

52 h.

SUPINFO - 1 (L1)

Page 38: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

38

What WIM?Presentation of deployment toolsLite Touch / Zero Touch InstallationLTI/ZTI

Windows PE and WDSWindows PEWindows Deployment Service (WDS)

User Migration with USMT Defi nitionMigration planWindows Easy Transfer

Administration of Windows VistaTools

Software and functionalityStart process

BIOSWindows Boot Manager» (bootmgr.exe)«Boot Confi guration Data»Start of Windows Vista (winload.exe)

Resolution of problemsDriversConfi gurationStartUp Repair Tool (STR)

Backup and restoreBackupRestoreBackup plan

Hard disk confi gurationFile System

File System of VistaNTFS transactional and XPS

PartitionEFSBitlocker Drive Encryptions

User confi guration and remote accessUser environment

ExplorerAeroShadow Copies

Remote administrationPresentationInvitationAssistShut down a session

Find and indexIndexTag and meta-data

VISTA and the networkConfi guration TCP/IP

Confi gurationClassWifi VPNTools TCP/IPNaming contextFirewall

FirewallAdvance FirewallCreate Rules

IPSec NAP

NAP ClientNAPConfi guration of NAP

CollaborationN.L.A

What is N.L.A?MobilityConnect a Video projector

Implementation of Microsoft Windows VistaAnalyze

EventAuditPerformance Diagnostic ConsoleMicrosoft UpdateCheck disk

PerformancesI/O prioritySuperFetchReadyBoost / Ready Drive

Introduction to Administering Accounts and ResourcesPresentation of Windows Server 2003

Managing the roles of your serverIdentifying the Windows Server 2003 product rangeDescribing a directory serviceThe Active Directory terminologyFunctioning of the process to open a session

Installing and confi guring administration toolsUsing the principle administration toolsManipulating the MMCResolving problems linked to the administration toolsCreation of organization unitsUsing the organization unitsSetting up a hierarchic structureNaming your organization unitsManipulating objectsManipulating a domain objectMoving a domain object

Managing User and Computer AccountsManaging user accounts

Storing user accountsIdentifying user accountsManaging the password strategiesModifying the account attributesUsing an account modelActivating or deactivating an accountReinitializing a password

Managing computer accountsHow are computer accounts used and located?Managing the computer accounts’ optionsModifying the accounts’ attributesActivating or deactivating an accountReinitializing computer accounts

Finding accounts in Active DirectoryUsing the different types of searchUsing a personalized requestSaving requests

Managing GroupsCreating groupsUsing the different types of groupHow the functional level of the domain modifi es the behaviour of the groupsUniversal groups functionLocal domain groups functionLocal groups functionNaming and locating the groupsModifying the groupsUsing the groupsManaging the interweaving of the groupsOptimizing the interweaving strategiesModifying the extent and the type of a groupDefi ning a group managerUsing the groups by defaultHow to use the groups by default on member serversHow to use the groups by default on Active DirectoryHow the systems groups are formed

Managing Access to ResourcesManaging access to resources

How do authorizations work?The standard and special authorizations

Managing access to public fi lesUsing public fi lesManaging the public fi lesPublishing a public fi le

Managing the sharing authorizationsConnecting to a public fi leAccessing the fi les and folders using the NTFS authorizationsThe advantages of NTFSThe NTFS authorizationsBehaviour during a copy or a moveThe NTFS inheritanceThe effective authorizationsThe sharing authorizations password and NTFSUsing the cache out of connectionUsing the fi les out of connectionSynchronizing the fi les out of connectionThe cache options out of connection

Implementing PrintingPresentation of printing in Windows Server 2003

Types of clients allowed printingPrinting functioning Installing and sharing printersThe printer typesNecessary material confi gurationInstallation and sharing a local printer

SUPINFO - 1 (L1)

Page 39: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 39 -

Installing and sharing a network printerManaging the access to the printersThe shared printers’ authorizationsManaging authorizationsManaging the pilots of the printersDescribing a printer pilotInstalling printer pilots

Adding printer pilots for other operating systemsManaging Printing

Changing the location of the printing spoolerDescription of a printing spoolerChanging the location of the spoolerDefi nition of the printing prioritiesDefi nition of a printing priorityPlanning the printers’ availabilityPrinters’ availabilityAdditional instructionsConfi guring a printing poolHow printing pools workConfi guring a printing pool

Managing Access to Objects in Organizational UnitsStructure of the organizational unitsStructure of the organizational unitsUtilization modes of the organizational units to group objects and making the management more effi cientThe two principle objectives of an OU hierarchyDelegating the control of the organizational unitsDescription of the organizational units control delegationControl delegation assistant

Managing the access to the objects in organizational unitsConfi guring the group policy parameters

Introduction to group policiesPresentation of the GPO parametersAttributing scripts with the group policy

Describing a group policyDescribing the confi guration parameters for users and computersDefi nition of the parameters of a local computer policyImplementing objects of a group policy in a domain

Tools to create objects of group policyDescription of the management of the objects of group policy in a domainDescription of a link of an object of group policyManaging the deployment of a group policyImpact of the existence of confl icting objects of a group policyBlocking the deployment of the group policy object

Attributes of a group policy object linkConfi guration procedure of the group policy applicationFiltering the deployment of a group policy object

Managing the User Environment Using Group PolicyConfi guring parameters of group policy

Why use a group policy?What are activated and deactivated parameters of group policy?Attribution of scripts with the group policyWhat are the script parameters of group policy?Attributing scripts procedure with a group policy

Confi guring the fi les redirectionWhat is fi le redirection?

Files which can be redirectedParameters required confi guring the fi les’ redirectionSecurity considerations for confi guring the fi les redirectionDetermining the applied group policy objectsWhat is Gpupdate?What is Gpresult?Describing a group strategy reportDescribing group policy modellingDescribing the group policy results

Implementing Administrative Templates and Audit PolicyOverview of security in Windows Server 2003

Describing users’ rightsUsers’ rights and authorizationsUsers’ rights attributed to predefi ned groups

Using security models to protect computers and testy the security strategy of computersWhat is security strategy?Describing security modelsDescribing the parameters of security modelsDescribing the confi guration tool and security analysis

Audit confi gurationDescribing the auditDescribing the audit strategyType of events to auditInstructions on planning an audit strategyRecommendations for an audit confi guration

Management of the security journalsDescribing the journal fi les

Current security eventsManagement tasks of security journals

Preparing to manage a serverPresentation of Windows Server 2003

Introduction to maintaining a Microsoft Windows Server 2003 environment Group Memberships Used to Administer a ServerWhat Is the Run As Command?Confi guring the shortcuts associated with the Run As commandWhat Is Computer Management?Role of MMC in Remote Administration

Confi guring Remote Desktop to Administer a ServerWhat Is Remote Desktop for Administration?Why Use Remote Desktop for Administration?What Are the Requirements?What Are Client Preferences?

Managing Remote Desktop ConnectionsPreviewWhat Are Timeout Settings for Remote Desktop Connections?What Is Terminal Services Manager?

Introduction to Monitoring Server PerformancePresentation of the analysis of the server’s performance

Why Monitor Performance?Guidelines for Establishing a Baseline

Performing Real-Time and Logged MonitoringWhat Is Real-Time and Logged Monitoring?What Is Task Manager?Why Monitor Servers Remotely

Confi guring and Managing Counter Logs What Is a Counter Log?Counter Log File FormatsWhy Schedule Counter Logs?

Confi guring AlertsPreviewWhat Is an Alert?

The Primary Server SubsystemsPreview

Why Monitor Server Memory?How to Identify and Resolve Memory BottlenecksWhat Is Processor Usage?How to Identify and Resolve Processor BottlenecksWhy Monitor Disks?How to Identify and Resolve Disk BottlenecksWhat Is Network Usage?How to Identify and Resolve Network Bottlenecks

Guidelines for Using Counters and ThresholdsPreviewGuidelines for Using Counters and ThresholdsBest Practice for Monitoring Server Performance. PreviewBest Practice for Monitoring Server Performance

Confi guring Device Driver Signing OptionsPreview

What Is a Device?What Is a Device Driver?What Are Device Driver Properties?What Is a Signed Device Driver?Group Policy Setting for Unsigned Device DriversWhat Is Group Policy Management Console?

Using Device Driver Rollback PreviewWhat Is Device Driver Rollback?Uninstalling Devices and Device Drivers

Working with Disk ManagementWorking with Basic DisksWorking with Dynamic DisksPreparing Disks when Upgrading to Windows ServerManaging DisksDefragmenting Volumes

Working with Basic and Dynamic Disks Preparing Disks when Upgrading to Windows ServerDefragmenting VolumesWorking with Basic and Dynamic Disks Organizing a Basic DiskCreating Partitions and Drives on a Basic Disk Adding a Basic DiskConverting from a Basic Disk to a Dynamic DiskOrganizing a Dynamic DiskCreating a VolumeMoving Dynamic Disks

Preparing Disks When Upgrading to Windows ServerPreparing Disks

Disk ManagementPreview

SUPINFO - 1 (L1)

Page 40: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

40

Viewing Disk Status and PropertiesExtending a Volume or PartitionDeleting a Volume or PartitionChanging a Drive LetterCreating a Mount Point

Defragmenting VolumesPreviewUsing Disk DefragmenterUsing Defrag.exe

Managing File Compression Preview

What Is File Compression?What Is File Compression?Effects when Moving and Copying Compressed FilesBest Practice for Compressing Files

Confi guring File Encryption PreviewWhat Is EFS Encryption? How to Encrypt a File or a Folder Effects when Moving and Copying Encrypted Files

Implementing Disk QuotasWhat is disk quota?What Are Disk Quota Settings?

Preparing for disaster recovery Preview

What is disaster recovery?Guidelines for preparing for disaster recovery

Backing-up data and scheduling backup jobsPreviewOverview of backing up dataWho can back up data?What is System State Data?What is the backup utility?Types of backupWhat is ntbackup?What is an Automated System Recovery Set?What is a scheduled backup job?Best practice for backup

Restoring data and confi guring shadow copiesPreviewWhat is restoring data?Checklist for restoring data

What are shadow copies?Previous versions client software for shadow copiesShadow copy schedulingWhat is restoring Shadow Copies?Best practice for using shadow copies

Selecting a disaster recovery method PreviewWhat is safe mode?What are safe mode options?What is the recovery console? What is a Windows Startup Disk? How boot fi les function?What are server disaster recovery tools?

Introduction to Software Update ServicesPreviewWhat Is Windows Update?What Is Automatic Updates?Comparison of Windows Update and Automatic UpdatesWhat Is Software Update Services?Software Update Services Process

Installing and Confi guring Software Update ServicesWhat Are Software Update Services Server Distribution Points?

Required Servers Confi gurations for the SUS servicesHow to Install and Confi gure Software Update ServicesAutomatic Updates Confi gurationHow to Confi gure Automatic UpdatesGuidelines for Testing Content for a Software Update Services Environment

Managing a Software Update Services InfrastructureSoftware Update Services Administration Web SiteHow Synchronization WorksHow to Synchronize Software Update Services ContentSoftware Update Services LogsWhat Is a Synchronization Log?What Is an Approval Log?How to Review and Approve Software Update Services LogsWhat to Back Up and Restore for Software Update ServicesHow to Back Up and Restore Software Update Services

IntroductionIntroduction

What is an Oracle?What is a RDBMS? Features offered by Oracle

Basic OrdersRetrieving Data Using a SQL statement

What is a SELECT statement?Arithmetic expressionsOther SQL possibilitiesUsing iSQL*Plus

Restricting and ordering data How to restrict data?Comparison conditionLogical conditionsHow to sort data?Substitution variables

Single-Row functionSQL functions Number functionsCharacter functionsConversion functionsGeneral functionsConditional expressions

Reporting Aggregated Data Using the Group FunctionsOverviewCreating groups of dataRestricting group results

Advanced recoveryDisplaying Data from Multiple Tables

OverviewType of joinsQualifying ambiguous column namesNatural join

The ON clauseNon-equijoinsOuter joinsCross Joins

Using Subqueries to Solve QueriesOverviewGuidelinesSubqueries overviewSingle-row subqueriesMultiple-row subqueries

Using the Set operatorsOverviewUnion operatorsIntersect operatorsMinus operatorsSet Operators Guidelines

DML and DDLManipulating data

Insert UpdateDeleteTruncate Commit and Rollback Read consistency

Using DDL Statements to Create and Manage TablesObjects and Data TypesManaging tablesAdvanced CreationNOT NULLUNIQUEPRIMARY KEYFOREIGN KEYCHECKHow to use

ORACLE TECHNOLOGIES: SQL 10G 46 h.

SUPINFO - 1 (L1)

Page 41: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 41 -

Creating Other Schema ObjectsViewsSequencesIndexSynonymsManaging Objects with Data Dictionary views

Controlling User AccessPresentationSystem PrivilegesManaging Users Object PrivilegesRevoking PrivilegesRole

Managing Schema ObjectsAltering a Table

Adding a column Modifying a column Dropping a column The SET UNUSED option

Managing constraints Adding a constraint Deleting a constraint Activating a constraint Cascading Constraints

Managing indexes Creating an index Function based index Removing the index

External tables Flashback Table Creating an external table Querying the external tables

Manipulating Large Data SetsManipulating data using subqueries

Inserting with a subquery Updating with a subquery Deleting rows with a subquery The WITH CHECK OPTION keyword

Multitable insertsOverview INSERT ALL INSERT FIRST Conditional INSERT Pivoting INSERT

MERGE Other Large Data Sets Manipulations

Flashback Version Query The VERSIONS BETWEEN clause

Generating Reports by Grouping DataReview of Group Functions

Syntax of Group functions GROUP BY HAVING

Advanced Group Functions ROLLUP OperatorCUBE OperatorGROUPING OperatorGROUPING SETS OperatorComposite columns Concatenated groupings

Date data typeTime Zones

TIME_ZONE Different Timestamps

TimestampPresentationDifferent Possibilities

INTERVAL PresentationDifferent Possibilities

Conversion FunctionEXTRACTTZ_OFFSETTIMESTAMP ConversionTime Interval Conversion

Hierarchical retrieval and regular expressionsHierarchical retrieval

Overview Hierarchical statementWalking the treeFormat display

Regular expression support PresentationMeta characters REGEXP functions Using the REGEXP functions Check Constraints with Regular ExpressionsExpressions

IntroductionApple a success storyWhat is a Mac?What is Mac OS?

The different evolutions for Mac OSPresentation of Mac OS X

System InstallationMaterial requirement for Mac OS XPartitioningInstallation procedure Mac OS X installationSetup assistant

Migration assistant Network confi guration Registration

System User environmentGraphical interface

Menu barApple menu

DockExpose DashboardSpotlight searching toolFinder

Finder windowWindows controls switchesAutomatic folder openingHome folders 17New folder typesThe trash

Mac OS X settings

System preferencesSystem profi ler Software updateReports

Applicative environmentMac OS X applications management

Applications accessApplication install Application uninstallForce to quit an applicationUNIX commands

The different application types on Mac OS XApplicative environment Cocoa and carbon Classic4.2.4. Java BSD / x11

Tasks automator ApplescriptAutomatorCron usage

The Mac OS X fi le systemBasic concepts

Path types Invisible fi lesThe fhs according to apple

The system folder, users and resources The folder systemThe user folder Priority of users’ resources

File system format FormatsDisk utility

APPLE TECHNOLOGIES: MAC OS X Client 30 h.

SUPINFO - 1 (L1)

Page 42: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

4242

The disk images Disk image burning

Fork resources, packages and extensions Fork resources BundlesFiles extensions

Utilities in commands lines for the fi lesUNIX utilitiesApple specifi c utilitiesSpotlight

Users and permissions managementUser’s types

Normal userAdministrator System administrator (root)

User’s accountsUser account creationForgotten password recoveryUser account modifi cation Rights restrictions Login items User account deletion Login options

Fast user switchingConceptsExternal devices and fast user switchingClassic and fast user switching

Access authorizations Authorizations for fi les Authorizations for foldersAuthorizations editionIgnore authorizations Advanced authorizations (ACL)Keychain ConceptsKeychain management

FilevaultWhy fi levault?Filevault activation Master password Password recoverySecured virtual memory

NetworkSetting up the network Mac OS X

Defi nitions ProtocolsNetwork status Network confi guration Network ports Network port confi guration VPN connection802.1x confi guration Troubleshooting Network diagnostic Network utility

Access network services Service discoveryConnect to a server Disconnect from serverAutomatic connection to a serverAccessing LDAP directory servicesKerberos ticket authenticating

Sharing and remote controlResources sharing

Sharing pane of system preferences AFP sharing (apple fi ling protocol)

File sharing via SMB (samba)File sharing via FTP (fi le transfer protocol) Web sharingRemote loginApple eventsInternet connection sharing and fi rewall use Printer sharing

Remote login SshApple remote desktop

Processor time sharing: xgrid Peripherals

Supported ports System profi lerPeripherals classDriversVolumes ejection Universal access Troubleshooting

Printing service Printing on Mac OS X Printing process Addition of a new printer Modifying the printer informationPrinting service creation Network printing

Printing on a printer shared by windows Printing on an IP printerSpool management

Print setup and print«print setup…» «print…»

PDF workfl ow Save a document as a postscriptCommand line printing Fax support Printing on classicTroubleshooting

Boot sequence BootROMPOST: defi nition Presentation of the Open FirmwareForth languageThe nodes The arborescenceCommand Line Interface Open Firmware password Boot keys analysis

BootXDefi nitionBootX missionsBootX icons and status

XNUKernel defi nition XNU internals Mach 3.0 presentation Mach managementBSD implementationBSD management

System initializationLaunchd introductionLaunchd functionalitieslaunchctl useThe fl aunchd.conf fi le

SUPINFO - 1 (L1)

Page 43: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 43 -

MatrixMatrix language: defi nition and vocabulary

Defi nitionNotationsOther defi nitionsParticular matrix: lines and columnsOperations on the matrix

Equal matrixAdding two matrix: calculation rulesMultiplying a matrix by a real numberMultiplying two matrix between themselvesMultiplying two matrix between themselves – 2The transpose of a matrix

Square matrixDefi nition, vocabulary and exampleOperations on the square matrixParticular square matrix: identity, diagonal, symmetricDeterminant of a square matrixCalculation properties of the determinantDevelopment: minor; cofactor, adjugate matrixDeterminant calculation in Dimension 2Determinant calculation in Dimension 3Determinant calculation in Dimension 3 (2)An insight into the practical uses of the determinant

Inversion of a square matrixDefi nitionCalculation rules and examplePropertiesCalculation methods of the inverse of a square matrix

Linear equations system with real coeffi cientsDefi nitions and elementary properties

Defi nitions and vocabularyPropertiesMatrix notation of a linear system

The various forms of systemSquare linear systemsHomogeneous linear systemsTriangular linear systemsTriangular linear systems: particular casesTriangular systems with a null diagonalStaggered linear systems

Resolution of a linear equation systemResolution of a staggered systemResolution of a staggered system (2)Resolution using the Pivot de Gauss Method

Resolution using the Pivot de Gauss Method (2)The different forms of system following elementary transformations: interpretation and solutionThe different forms of system following elementary transformations: interpretation and solution (2)Linear systems and inverse matrix

The CRAMER systemDefi nition, presentationPropertiesCase fi gure 1Case fi gure 2Case fi gure 3

Reduction (diagonalisation) of square matrixEigenvalues and Eigenvectors of the square matrix

Defi nition of the square matrix Eigen-elements: Eigenvalue and EigenvectorDetermination of the Eigenvalues of a square matrix: method and exampleDetermination of the Eigenvectors of a square matrix: method and examplePracticePractice (2)

The Eigen-elements propertiesPropertiesConsequences

Diagonalisation of the square matrixDefi nition: similar matrixDefi nition: diagonal matrixStudy – remarkConsequence – conclusion: diagonalisation of a matrixExample 1Example 2Particular case of the symmetric matrix

Diagonalisation applicationsGraphs theory applications

Calculation of the nth exponentiation of a diagonal matrix: properties/demonstrationExistence of an n size path in a graphExistence of an n size path in a graph (2)

How does Google work?Analogy between the search mode in Google and the Eigenvector determinationGoogle and the Eigenvector

LINEAR ALGEBRA 34 h.

Introduction to object modellingHistorical reason behind object modelling

A short reminder of computing evolutionThe software complexityThe progressive management of the complexityThe limits of structured programming

Contributions of object modellingThe encapsulation notionThe abstraction notionThe modularity notionSummary

A few basic concepts in object modellingThe notion of object

The object anatomyThe visibility and encapsulation notions (+ and – indicators)Sending messages between objects

The notion of classThe class seen as an abstraction of the objectsThe class properties and methods ($ visibility indicator)The object seen as a class instance

Relations between classesThe associationThe aggregationThe compositionThe inheritanceOverloading and redefi ning notionsThe multiple inheritance problem shown through the use of the graphThe abstract and polymorphism class notions

Gathering class in packetsThe packet notionThe friend function notion (the ~ visibility indicator)

Summary regarding the member’s access of a class

OBJECT MODELING 16 h.

Introduction to MERISEHistory

The originsMeriseMerise (2)Data modelling today

VocabularyOrganization and systemThe information systemModel, Merise and analysis

Basic principles of MeriseThe life cycle

MERISE MODELING 16 h.

SUPINFO - 2 (L2)

Page 44: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

44

The abstraction cycleThe decision cyclePresentation of the 6 Merise models

The Merise approachThe techniqueThe approachThe stepsThe course perimeter

The MCDIntroduction

MCDEntityAssociationPeculiar associations

Complete the modelCardinalityDimensionsUsual forms

Inter-associations constraintsVarious situationsPartitionExclusionTotalityInclusion

Properties’ constraintsSpecialization/generalization of entitiesSpecialization constraints

From MCD to physical modelIntroduction

The MLD, the MPDApproachAn example tableFormalism

From MCD to MLDRule 1Rule 2Rule 3Rule 4Rule 5Rule 5 (2)Rule 6Reminder of the rules

The MPDWhy an additional step?The reverse-engineeringThe various modelling and generation toolsBases migration

PROBABILITIES 38 h.

Combinatorial and countingTerminology of combinatorial analysis

Bijection and factorialPermutationArrangement and examplesArrangement and examples (2)Combinations and examplesCombinations and examples (2)Remarks

Properties of combiningCombinations’ propertiesExample 1Example 2

The Pascal triangleExampleSchemeCalculation methods, utilization, examples

Newton binomialTheorem and formulaDefi nitionExample 1Example 2

Probabilities on an achieved setProbabilities language: vocabulary of events

Basic vocabularyBasic vocabulary (2)Infi nite possibilitiesEvents logic: reminder on the set theory

Probabilities on a complete setIntuitive approach of the probability notionTheoretical defi nition of a probability Probability propertiesProbability properties (2)SummaryEquiprobability: defi nition and example

Conditional probabilitiesIntroduction through an exampleDefi nitionConsequences and propertiesExample 1Example 2Total probabilities formulaTotal probabilities: a reminder of the defi nition of a partitionFormula of the total probabilitiesTotal probabilities: Practice

Independent eventsDefi nition: 2 events caseTheoremPropertiesRemarkSeveral independent events case

Discrete random variable

Defi nition and Probability law of a discrete random variableDefi nitionA reminder of the existence conditions of a probability lawProbability law of a random discrete variableRepartition function of a random discrete variable: defi nitionRepartition function of a random discrete variable: exampleRepartition function of a random discrete variable: properties

Expectation of a random discrete variableDefi nitionExampleProperties of the expectation in a discrete caseVariants and standard deviation of a random discrete variableDefi nition of a variant of a random discrete variableDefi nition of the standard deviation of a random discrete variableVariant propertiesStandard deviation propertiesLinear combination of 2 random variables in an independent case

Probabilities law of usual discretesBernoulli law

Defi nitionUtilization exampleProperties

Bionomical distributionDefi nition n°1 and explanation of the formulaDefi nition n°2 and notationProperties: general characteristicsAddition of 2 binomial random variablesIntervention scope of the binomial distributionPractice

Poisson of parameter distributionIntroductionDefi nition and notationProperties: general characteristicsAddition of 2 independent Poisson random variablesPoisson distribution table: readingIntervention scope of the Poisson distributionAdvantages of the Poisson distributionPractice

Continuous random variables Defi nitionsIntroduction, presentation, study frameworkDefi nition of a random variableProbabilities on an interval and consequenceRepartition function and continuous random variable densityRepartition function: defi nitionConsequences and notations

Repartition function: propertiesProbability density: defi nitionProbability density: propertiesGraph interpretation

Characteristic parameters of a continuous random variableExpectancies

SUPINFO - 2 (L2)

Page 45: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 45 -

Variants and propertiesStandard deviation and properties

Probability laws continue usualExponential law of parameter

Defi nitionProbability densityRepartition functionConsequences, theoremParameters: maximum likelihood, variants and standard deviationLaw signifi cationPractice

Normal distribution or Gaussian distributionProbability density and repartition functionGraph representation

Characteristic parameters: maximum likelihood, variants, standard deviationNormal distribution “central limit theorem”

Defi nitionConsequence: density and repartition functionVariants, maximum likelihood and standard deviation of the centred limit normal distribution random variableVariable changes/construction (method)Fundamental properties of the repartition function N law (0,1) and related schemesCalculation methodReading the Law N table (0,1)Different cases and methods: PracticeComplements and intervention scope of the Law N (0,1)

Statistics with 1 variable: presentation (descriptive statistics)Statistic: history, usefulness and objectives

A few quotes / defi nitionsHistoryStatistics and probabilitiesReason for the statistic

Basis terminology: defi nitionsPopulation, individual statisticSampleCharacter and variable (+2 types of variables)Quantitative variableQualitative variable

Defi nition and notationsEffective and total effectiveValue and class frequency Cumulated effectiveCumulated frequencySummary

Data representations and graphical representationArrayGraph: introduction/signifi cationGraph: various types of diagrams Graph: cumulative effectives diagramGraph: cumulative frequencies diagramGraph: histogram

Statistics with 1 variable: characteristic and (descriptive statistics)Position parameters

The modeThe averageThe median: discrete variable caseThe median: classed variable case

Dispersion parametersExampleAreaVarianceStandard deviationQuartileDecileRemarks and complementary vocabulary

Statistics with 2 variables (descriptive statistics)Introduction and reminders

Introduction and remindersDefi nitionsData presentationExample

Sampling of data points and average pointsPoints sampling: defi nition and representation

ExamplesExamples (2)Average points: defi nitionExamples

Refi ned adjustment –Graphical methodsPresentation – adjustmentsDefi nitionRule adjustingRefi ned adjustment using the Mayer straight line: principle, defi nition, remarks, example

Refi ned adjustment – Least squares methodVariance remindersDefi nition of the CovariancePrinciple and defi nition of the Least squares methodScheme

Equation of the linear regression of Y in x and of X in yExamplesSummaryLinear correlation coeffi cients: defi nitionLinear correlation coeffi cients: graph interpretationPractice

Sampling theory (Inferential statistics)Presentation

Presentation, object of the samplingDefi nitions

SamplingEstimationSamples constitutionVarious types of samples: with or without discountRemarkExampleImportant remarkIntroduction to the next module

Sampling distribution (Interferential statistics)Sampling of averages

IntroductionExampleAverage calculationSchemePropertiesAverage ruleAverage maximum likelihoodAverage standard deviationRemarks

Sampling of frequenciesPresentationSchemeDefi nitionMaximum likelihood and standard deviation of the frequencyFrequency distribution and theorem

Punctual estimate (interferential statistics)Punctual estimate of an average

PrincipleNotationPropositionExample

Punctual estimate of a frequencyPrincipleDefi nition/notationPropositionExample

Punctual estimate of a variance and of a standard deviationIntroduction/presentationProperties Nota BeneExampleSummaryRemark

Estimate by confi dence intervalPrinciples and objectives

PrincipleNotations

Estimate by confi dence interval of an averageStudy frameworkDemonstrationDefi nition 1Defi nition 2

STATISTICS 36 h.

SUPINFO - 2 (L2)

Page 46: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 46 -

Remarkable values and confi dence thresholdExtension if the population does not follow a Normal distributionExtension if the standard deviation is unknown

Estimate of a frequency by confi dence intervalSimulation PracticeEstimate intervalBut…

In factUsual exceptionsRemark

Global overview: punctual estimate and by confi dence intervalSummary graph

Level 1: PROFESSIONAL SITUATIONS - AVANCEDAgreeing to meet

Deal with a business call. Assist the caller and take their name and number. Arrange an appointment and respond to their questions.

Business callsYou make arrangements to have a stand at a trade fair. Explain your requirements in detail.

The company standSpeak to a client at a trade fair. Detail the features of your product and convince the client of its merits. Arrange an appointment for a product demonstration.

Comparing productsConvince someone of the quality of your product.

Making a saleYou meet a client who would like to place an order. Discuss product type and price. Negotiate the discount. Agree the delivery date.

NegotiatingNegotiate the specifi c details of an order. Convince your client to choose your product over that of your competitor.

Trouble with ordersReply to a dissatisfi ed customer. Apologize for problems and try to fi nd a compromise.

After-sales serviceDeal with an angry customer. Attempt to fi nd solutions to their problems. Arrange assistance

Handling an invoiceYou phone a client whose invoice is overdue. Ask when payment can be expected and arrange terms.

Deferring paymentFind a solution with a customer whose payment is overdue.

Organizing a stayA client would like to pay your company a visit. Give advice on where to stay and leisure-time activities. Ask for details of the trip

Welcoming visitorsAsk practical questions about a client’s visit. Propose various leisure-time activities to be included in the visitor’s itinerary.

The training courseSet up training programs. Organize a training workshop; decide on the sort of training required and who will need training.

Job searchAt a recruitment agency. Look for jobs in management. Talk about your professional experience. Go for an interview

Starting a new jobFirst day at a new job. Sign the contract, settle into your offi ce, meet your colleagues. Talk business.

Level 1: EVERYDAY SITUATIONS – ADVANCEDA car trip

You go on a car trip. Express your agreement/disagreement and reach a compromise. Describe the features of a car. Ask for precise directions.

On the motorwayGive advice about the way someone is driving. Ask for petrol at a petrol station and have a conversation with a police offi cer.

At the airportCheck in your bags at the airport and state your seating preferences. Go through customs.

On the planeAsk questions about what happens during the course of a fl ight. Ask the fl ight attendant for various items you need during your journey. Pick up your luggage on arrival.

At the stationYou want to buy a train ticket. Say what kind of ticket you want and ask for the departure and arrival time of a train.

On the trainYou take the train. Speak to the ticket inspector and reply to his questions. Make conversation with another passenger.

Customs checksYou go through the formalities at customs. Show your passport and respond to the questions posed by the customs offi cer.

The luggage searchYou declare goods at customs. Respond to the customs offi cer

Hotel reservationsYou need a hotel room for the night. Explain which kind of room you would like and enquire about meal times and the cost of your stay.

Staying in a hotelEnquire about hotel facilities. Talk about your hotel stay.

A tour of the townYou go on a guided tour of a town. Ask questions about the different buildings you encounter while sightseeing.

A tour of the castleYou take a tour of a medieval castle. Ask questions about the castle and express your feelings about your visit.

Level 2: PROFESSIONAL SITUATIONS - AVANCED +At reception

You are a hotel receptionist. Accommodate guests’ wishes and answer their questions.Hotel service

Find solutions to guests’ problems. Use grammatical forms indicating politeness.Serving customers

You are a waiter/waitress. Welcome customers and take their order. Apologize for problems.

Bad serviceRespond to customer questions and deal with complaints in a restaurant.

Sales assistantYou are a sales assistant in a department store. Deal with customers and explain where certain products can be found. Help a customer buy a product.

Electrical goodsHelp a customer purchase a product by giving advice and answering their questions. Respond to a customer complaint.

A new bank accountAsk and answer questions in order to open a new bank account.

Banking operationsYour cashpoint card and chequebook have been stolen. Explain the situation and discover what can be done to resolve it.

Hot off the pressYou are working as a journalist. Show visitors round the newspaper offi ces. Answer questions about the profession. A breaking story.

Travel agentsYou are working as a travel agent. Enquire about what kind of holiday people want. Outline the choices they have and make suggestions.

Welcoming touristsYou are a tourist guide. Take your clients on a tour of London and describe the sights. Accompany a VIP to the airport.

Airline workers You work in the airline industry. Give information about fl ights and safety procedures to airline passengers.

Train and ferry jobsProvide travel information to rail and ferry passengers. Explain problems and give advice.The architect

You are designing a house. Explain your ideas to the architect. Go over the blueprints, the price of the construction and the building process.

Foreign language: BRITISH ENGLISH 2 70 h.

SUPINFO - 2 (L2)

Page 47: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 47 -

GRAPHS THEORY 40 h.

Graphs theoryIntroduction and generalities on the graphs theory

Defi nitions and objectivesOrigins and developmentApplication domainExamples of problems resolved with graphsAlgorithms addressed in this lesson

Graph elementsMathematical representationFigurative representation: directed graph and undirected graphEquivalence notion between a directed graph and an undirected graphSimple graph, multiple graphs and graph without loopGraph orderDegree and half-degreePractice

Graph properties and special graphsRefl exivity and symmetry

Transitivity and transitive closingDecomposing a graph in levelsComplete graph, partial graph and under-graphBipartite graphPlanar graphValued graphClique and stableTree and tree view

Choice of algorithm and notions in algorithmic complexityAnalysis methodology of a given problemModelling and algorithmic choiceAlgorithmic complexity notions and examples

Relations modelling and connectivity studyJourney in the graph

Notion of the journey in a graphThe chainThe pathThe cycleThe circuit

Properties of the path in the graphElementary pathSimple pathHamiltonian pathEulerian pathPath in the widthPath in the deepnessPractice

Connectivity and specifi c connectivity proprietiesConnectivityStrong connectivityStrongly connected componentsPractice

Representation modes for computer implementationAdjacency relationAdjacency listPredecessor and successor notionIncidence relationIncidence matrixPractice

Path minimization problemsIntroduction and generalities

Introduction to the path searching problemUnder-optimality conceptThe shortest path search methodPositive or negative valuation of a graphThe most important algorithm families

Search for the shortest path: Dijkstra algorithmObjectives of the algorithm, framework and utilization constraintsThe research concept of Dijkstra’s algorithmDefi nition of the algorithmUtilization exampleApplications

Search for the shortest path: Bellman algorithmObjectives of the algorithm, framework and utilization constraintsThe research concept of the Bellman-Ford and Bellman-Kalaba algorithmDefi nition of the algorithmUtilization exampleApplications

Search for the shortest path: Floyd algorithmObjectives of the algorithm, framework and utilization constraintsThe research concept of the Floyd-Warshall algorithm

Defi nition of the algorithmUtilization exampleApplications

Spanning minimization problemsIntroduction and generalities

Introduction to the problem of optimal spanning searchDefi nitionsTrees and tree viewsDefi nitions and properties of trees and tree views

Construction of a maximum spanning forest and of a cycle baseObjectives of the algorithm, framework and utilization constraintsConcept of the algorithmDefi nition of the algorithmUtilization exampleApplications

Minimum spanning tree: Prim’s algorithmObjectives of the algorithm, framework and utilization constraintsConcept of the Prim’s algorithmDefi nition of the algorithmUtilization examplesApplications

Minimum spanning tree: Kruskal’s algorithmObjectives of the algorithm, framework and utilization constraintsConcept of the Kruskal’s algorithmDefi nition of the algorithmUtilization exampleApplications

Scheduling problemsIntroduction and generalities

Presentation of scheduling problems and project managementConstraints linked to the scheduling projectAn optimization problem: the optimization criterionsCritical path, critical task and risk margin notionsThe principal resolving methods for scheduling problems

Scheduling: P.E.R.T. method algorithmObjectives of the algorithm, framework and utilization constraintsResolution concept using the P.E.R.T. methodDefi nition of the algorithmUtilization example: workings project

Scheduling: M.P.T. method algorithmObjectives of the algorithm, framework and utilization constraintsResolution concept using the M.P.T. methodDefi nition of the algorithmUtilization example: workings project

ApplicationsExample: Decomposing a graph into levelsExample: resolution using the P.E.R.T. methodExample: resolution using the M.P.T method

Flow problems and path fi ndingIntroduction, defi nitions and generalities

PresentationDefi nitionsThe basic concept: the conservation distribution (KIRCHOFF)Maximal fl ow, compatible fl ow and complete fl owTwo resolution approaches

Flow problems: search for the best pathObjectives of the algorithm, framework and utilization constraintsResolution concept using the Ford-Fulkerson method: improvement pathDefi nition of the algorithmUtilization example

Flow problems: creation of a separation graphObjectives of the algorithm, framework and utilization constraintsResolution concept using the Ford-Fulkerson method: separation graphDefi nition of the algorithmUtilization example

ApplicationsEnergy distribution networkTransport networkAffectation problem

Various problemsDecision problem: core concept

Objectives of the algorithm, framework and utilization constraintsConcept of the algorithmDefi nition of the algorithmUtilization example and applications

Maximum couplingObjectives of the algorithm, framework and utilization constraintsConcept of the algorithm

SUPINFO - 2 (L2)

Page 48: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 48 -

Defi nition of the algorithmUtilization example and applications

Colouring of edges: Welsh-Powel algorithmObjectives of the algorithm, framework and utilization constraintsConcept of the Welsh-Powel algorithmDefi nition of the algorithmUtilization example and applications

B-trees: Research algorithm

Defi nitionElementary operations on B-treesResearch algorithm on a B-treeUtilization example and applications

An introduction to operating systemIntroduction

What is an operating system?Why study them?History: 1st generationHistory: 2nd generationHistory: 3rd generationHistory: UNIXHistory: micros computersHistory: DOS/Windows

Computer architecture: a reminderSimplifi ed representation of the computerFunctional representationKernel mode and user modeThe instruction setMemory protectionPerformancesThe system calls

Sorting the operating systemsThe monolithic systemsThe nanokernel systemsThe layer systemsRemote procedure callsOther systemsSummary

Basic elements of the systemDefi nitions

ProgramProcessState of the processResources

Process operationsCreationDestructionWait/Wake-upSuspend/ResumeSwitching priorities

Process and threadsThe process tableThe process structureThe thread conceptComparison between process and thread

MechanismsRegistersContext commutationInterruptPriority, masking and disarming interrupt

Inter-process communicationLocking and deadlocking

A concrete examplePossible defi nitions of the critical section, remaining sectionGeneralization of the problem and study relevanceNecessary criterions for a valid solutionFirst algorithmic solutionOver-courtesyThe Dekker algorithmThe Peterson algorithmThe test and set instructionThe necessity to use other methods

Deleting active waitDefi nition of a semaphoreMutual exclusion semaphoreSynchronization semaphoreGeneralization: the dateThe deadlocking riskThe producer/consumer model with one boxThe producer/consumer model with n boxThe dining Philosophers problem

The monitorsApplications to the preceding problems

SignalsDefi nition and contextPresentation of the various signalsSending signalsUsing signals for programmingA precise exampleMessages on Windows

PipesDefi nition and contextThe call systemThe pipes implementationThe pipes utilizationRedirectionsSynchronization with pipesExample: SIGPIPE signalThe named pipes

SchedulingDefi nitions

The problemThe need

MechanismsElementary algorithmsExtended algorithmsMix algorithmsOptimization

Current OS diffi cultiesThe priority changesMulti-users managementMulti-processors managementService quality

Heuristic assessmentPrincipleMethodConclusion

Memory managementThe memories hierarchyThe memory segmentsShared memory Loading the program in the memory

Organization of the physical memoryPagingConsequences on the programmingSegmentationOrganization of the process memoryComparison between paging and segmentationSegmented paged memory

File managementGeneralities

The fi le conceptNaming the fi lesFile typesCommand and executable fi lesThe access typesThe attributesOperation on C fi les

Files System ManagementHistory of the FSMThe different FSMOverview of the tree viewDe-fragmentationGoing from one FSM to the otherThe future for FSM

Entries/Exits managementGeneralities

Types of peripheral devisesDMA, channels

OPERATING SYSTEM 48 h.

SUPINFO - 2 (L2)

Page 49: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 49 -

Peripheral devises drivingEntries/exits buffers

Exploitation system and I/OPositioningSE/ES communicationThe ES from the SE point of view

A few precise examplesThe hardwareThe hardware schedulingThe SSF algorithmThe clockThe terminalThe keyboard case

Securing the operating systemSecurity of O/S

The need for securityThe UNIX integrated access controlThe Windows integrated access controlThe stack overfl owing technique

The protectionMaterial mechanismsSoftware mechanisms

Your role in securityThe administrator’s roleThe project manager’s roleThe developer’s roleThe user’s role

COMMUNICATION 14 h.Basic communication tools

Develop your empathyDevelop your argumentationAsking questionsUsing rephrasingThe infl uence of your «perception fi lter»Identify your own style of communicationReinforce your listening skillsGetting to know the different styles of communication

Assertiveness and self-confi denceWhat is self-confi dence?How to ask for things and say noHow to be assertive in diffi cult situations

Resolving team problemsHow to get everyone in a large meeting to join in, thanks to the Post-it® methodThree techniques to help you run meetings effi ciently

Leading a brainstorming session

PROJET MANAGEMENT 6 h.

Transverse ManagementWhat is transverse management?Developing cooperative behaviour

Asserting your leadership in a non-hierarchical relationshipPreparing a convincing presentationNetworking

TEAM MANAGEMENT 4 h.

PERSONAL EFFICIENCY 11 h.

Develop your emotional intelligenceWhat is emotional intelligence?Understanding emotions to master them betterHow to control your emotions

Strengthen your creativityWalt Disney and the art of making ideas a realityAnalyzing a complex problem by using an “issue tree”Boost your thinking power with the help of mind maps

FINANCIAL MECHANISMS 15 h.

The building blocks of fi nancial analysisHow to analyze an income statementHow to analyze a “by-function” format income statementWhat is the scissors effect?How to calculate a company’s breakeven point

What are breakeven analysis and operating leverage?What is working capital?Financial analysis of working capitalUnderstanding the cash fl ow statementHow to analyze a cash fl ow statement- Financial statement analysis

MARKETING PRINCIPLES 10 h.

Introducing marketingWhat is marketing?Researching your market

Consumer behaviourUnderstanding segmentationWhat does it mean to be client-oriented?

SUPINFO - 2 (L2)

Page 50: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 50 -

C++ Language level 1 Language presentation

History and evolution of the C++ languageChanges under GCC and Dev C++

Syntactic changesThe bool typeThe referenceOther changes (variables declaration, commentaries, const…)

Improvement in functions implantationThe functions overloadingThe arguments by defaultThe passage by reference

C++ Language level 2Classes

The declaration of a class in the header (properties and methods)The encapsulation principle and the visibility indicatorsThe methods overloadingClass implantation in the body (:: operator)Instantiation of a classAccess to the members of a classExample: writing of a character class

Canonical form of CoplianThe pointer type properties and the Coplian canonical formThe constructorThe copy constructor The type conversion constructorThe destructorThe affectation operatorExample: modifying the character class

Other characteristicsThe statistical propertiesThe statistical methodsExample: modifying the character class

C++ Language level 3Dynamic boards of objects

The object array creation by the operator newThe destruction of an array by the Delete operator

The friend function notionThe friend function notion

The operators overloadThe overload rulesThe indexation operatorThe arithmetic operatorsThe comparison operatorsThe redirection operators

C++ Language level 4Inheritance

The inheritance link mechanismMultiple inheritance and associated problemsThe access control to the basic classesThe over-defi nition of the methodsThe access to the members of a mother classExample: writing of the Hero and Enemy classes who inherit of Character

PolymorphismVirtualThe virtual pure methodsThe abstract classThe polymorphism notionExample: management of a Character array (Hero and Enemy)

C++ Language level 5The namespace

The namespace principleUsing namespaceThe namespace aliasesThe utilization of the namespace elements (utilization of using)

TemplatesThe templates principleThe functions templatesThe class templatesThe instantiation of the class templates

Error managementThe exception mechanism principleBringing up an exceptionThe “try…catch…fi nally” blocExample: writing of the inaccessible character

C++ Language level 6Entry and exit by fl ows

Writing an entry on the standard exit with coutReading and entry on the standard entry with cin

Files management by fl owsThe ifstream class to read a fi leThe ofstream class to write a fi leExample: writing of a class allowing the reading of the confi guration fi le of the game

C++ Language level 7STL

General presentation of STLHandling the vector classHandling the Map classProcessing chain of characters

WEB AND DEV TECHNOLOGIES: C++ LANGUAGE

52 h.

CISCO TECHNOLOGIES: CCNA 3 AND 4 50 h.

Classless routingIntroduction to classless routing

Review of the classful routingPrinciples of classless routingPurpose of the classless routingClassless routing protocolsCommands

Classless routingCIDRVLSM

RIPv2 protocolRIPv2 specifi cations

Reviewing RIPv1Improvements

Confi gurationRIPv1 commandsRIPv2 commandsDebugging commands

OSPF protocolDefi nitions

Link state routingCharacteristics

OSPF processAreasHELLO protocolDR/BDR electionOSPF tables

Confi gurationGeneral commandsAuthentication commandsDebugging commands

EIGRP protocolDefi nitions

TermsHybrid routingCharacteristics

EIGRP processHELLO protocolDUAL algorithmLoad balancing

Confi gurationGeneral commandsAuthentication commandsDebugging commands

SUPINFO - 2 (L2)

Page 51: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 51 -

Ethernet switchingEthernet networks

DuplexingCongestionLatency

LAN switchingCollision domain segmentationBroadcast domain segmentationLoad balancing

How a switch worksSwitching methodsMAC addresses learningFrame fi ltering

VLANsDefi nitions and principles

Static VLANsDynamic VLANsGeneral commandsDebugging commands

TrunkingPrinciplesISL protocolIEEE 802.1Q protocolGeneral commands

VTPPrinciplesVTP modesGeneral commands

Spanning-Tree protocolSpanning-Tree concepts

Defi nitionsPrinciples

Spanning-Tree processSTP statesSpanning-Tree processRSTP states

Spanning-Tree confi gurationGeneral commandsDebugging commands

LAN designConcepts of LAN design

Basic principleLAN conceptionLayer 1 conceptionLayer 2 conceptionLayer 3 conception

TroubleshootingCommands

State visualizationDebugging

Recovery and updateLost passwordsIOS updateRecovery and deletion of the IOS

NAT and PATPrivate and public addressing

Limits of IPv4Consequences

Address translationNAT principlePAT principle

Confi gurationCommandsConfi guration processVerifi cation

DHCPPrinciple of the DHCP

Usage context of the DHCPComparison between BOOTP and DHCPDHCP operationsDHCP relay

DHCP confi gurationCommandsConfi guration processVerifi cation

WAN networksDefi nitions

WAN networksTelecom providerDCE and DTECircuits

Equipments and devicesEquipments and devicesOrganization of a WAN link

WAN normsNormalization organizationsPhysical layer normsWAN encapsulations

Different WAN link types classifi cationPresentation of the different WAN link typesDedicated linksCircuit switched servicesPacket/cell switched services

WAN designCommunications over a WAN

Communication over a WANSelection criteria of a WAN service

First steps of the WAN conceptionMain objectivesFirst step of the conceptionMethods to evaluate the needsSensitivity test

Implement a hierarchical network3 layers model2 layers model1 layer model

PPP protocolProtocol study

CharacteristicsDistinct parts

Session establishmentPhase 1: EstablishmentPhase 2: QualityPhase 3: NCP confi gurationPhase 4: Closing

Authentication methodsPAP protocolCHAP protocol

Confi gurationCommandsPAP confi guration processCHAP confi guration process

ISDN technologyISDN technology overview

TechnologyNorms

TermsDevices and points of referenceNormsISDN frames

Usage and implementationISDN applicationDial on Demand Routing (DDR)

Confi gurationCommandsConfi guration process

Frame Relay technologyFrame Relay technology

Technology overviewLMI interface & DLCI

Internal process, switching table and forwarding processFrame Relay mapSwitching table

SubinterfacesPoint-to-point subinterfacesMultipoint subinterfaces

Confi gurationCommandsConfi guration process

Initiation to network administrationWorkstations and servers

WorkstationsServersMicrosoft WindowsUNIX and LinuxApple Mac OS

Network managementIntroduction to network managementNetwork management model and OSI

SNMP protocolIntroductionProcessMIBConfi gurationRMON

SyslogProcessConfi guration

SUPINFO - 2 (L2)

Page 52: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 52 -

CHECK POINT TECHNOLOGIES: CCSA NGX

20 h.

HTTP server with Apache Remember on the HTTP protocol Compilation and installation Confi guration (the httpd.conf fi le) Starting, Stopping the server Advanced Confi guration

Security and privacy with OpenSSL™ IntroductionSSLv3 Used methods OpenSSL

Remote administration with OpenSSH™ IntroductionThe SSH client Key generation SSH Server SSH server administration

Secure copy (scp) Public key authentication X-Forwarding

TCP-Forwarding (Tunnelling) Sftp: Secure FTP

The X Server IntroductionConfi guration Running the X server X-DistantMandriva ToolsSetup a FTP server with ProFTPd™

Introduction

What about the FTP protocol FTP and safety Introduction to virtual users Proftpd installation Executing the Proftpd server Virtual users Management Server management Using of SSL/TLS Conclusion

Network File System NFS/RPC presentation NFS client/server installation Server confi guration Administration/Maintenance of NFS server Using NFS client Conclusion

Implementing RAID Loop Devices RAID Introduction Soft RAID creation Using and RAID software confi guration Maintenance and monitoring

Databases overview PresentationRoles and functions of a DBMS The SQL Database fi les The DBMS Comparative Table Conclusion

Introduction to VPN-1 NGXArchitecture, process and deploymentSmart Console components

Security policiesObjectiveDefi nition of a security policy

Defi nition of a security policyDefi nition of a Rule BaseDefi nition of an IP Spoofi ngMulticastingRule Base creation

Command line optionsAdvanced features of a Rule BaseManagement of a Rule Base

Connection monitoring and network traffi cObjectivesSmartView TrackerSmartView MonitorEventia Reporter

SmartDefenseActive defense

SmartDefense componentsSmartDefense capabilities

SmartDefense activityDoS attackIP and ICMP protocol testTCP protocol testSuccessive events detectionWeb IntelligenceCentralized management against attacksOnline update

SmartDefense Storm Centre

Storm Centre integration in placeNetwork Address Translation

Understand the NATReview of the IP addressingDynamic NAT (hide)Static NAT

NAT confi gurationGeneral propertiesDynamic NAT confi gurationStatic NAT confi guration

Manual NATWhen to use the manual NATManual NAT confi guration

AuthenticationSession authenticationUser authenticationClient authenticationIntegrate LDAP with VPN-1 NGX

Export users from the NGX databaseLDAP user managementLDAP error recovery with SmartDashboard

Preventive backup$FWDIR/CONF$FWDIR/LIBLog fi les$FWDIR/LOGC and 5_0.C objectsRuleBase_5_0.FWSFWAUTH.ndbUser database exportBackup with the help of Export tool

LINUX TECHNOLOGIES:MANDRIVA Certifi ed Administrator (MCA)

56 h.

SUPINFO - 2 (L2)

Page 53: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 53 -

Setup a MySQL™ server IntroductionInstallationConfi guration Use mysqladm

ReplicationTools SourcesConclusion

Introduction to PHPPresentation

Introduction to WebIntroduction to dynamic webHistory of PHP

Installation and confi gurationInstallationConfi gurationExtensions

PHP LanguageBasic syntax

Tags and commentsTypesVariablesConstantsPredefi ned constantsOperator

Control structuresif … elseif ... elseswitchWhile, do ... whileForForeachBreakContinue

FunctionsDeclaration of functionUse function

ArraysDeclarationUseArray functions

Creation of dynamic websitesGet data in a form

GET and POST method$_REQUEST variable$_FILES variable$GLOBALS, $_SERVER, $_ENV

Cookies and sessionsCookiesSessions

Advanced methodsHTTP header’s controlHTTP authentication

PHP functions’ libraryInput / Output

Standard outputBufferFiles

Include and requireIncludeRequire

Other functionsStringRegular expressionsEncoding and hashingErrors managementConfi guration

MySQLMySQL presentationConnections managementQueries’ settingsResults’ display

PHP and OOPThe basics

Reminds of OOP

SyntaxConstructorsAutoloading objectsVisibilityScope ResolutionStatic keyword

Advanced MethodsClass abstractionInterfacesOverloadingMagic methodsComparing objects

XML Syntax

An XML document…PrologueEncoding

Syntax rulesElementNestingRoot elementAttributeSpaceCommentCDATA

NamespaceNamespaces

Example: RSS fl owsRSSArticle.rss

Validation and XMLDTD

IntroductionSyntaxAttributeEntities

XSDIntroductionSyntaxSimple typesComplex types

XPathIntroduction

XpathNodesSyntax

Operator and functionsOperatorsFunctions

Stylesheet (CSS & XSL)Introduction

CSSXSL

XSLT transformationsBasic SyntaxControl structuresUsing XPATH functionsAJAX and PHPThe XMLHttpRequest objectPresentation and historyFunctioningProperties and methodsExampleSecurityInteractivity with PHP

WEB AND DEV TECHNOLOGIES: PHP & XML

68 h.

SUPINFO - 2 (L2)

Page 54: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 54 -

Confi guring routing by using routing and remote access Enabling and confi guring the routing and remote access

What are routers?What are routing interfaces?What are routing protocols?What are routing tables?Why use windows server 2003 routing and remote access service?

Confi guring packet fi ltersWhat is packet fi ltering?How are applied packet fi lters?

Allocating IP addressing by using dynamic host confi guration protocolWhy use DHCP?

How DHCP allocates IP addressesHow the DHCP lease generation process worksHow the DHCP lease renewal process worksHow a DHCP server service is authorized

Confi guring a DHCP scopeWhat are DHCP scopes?Confi guring a DHCP reservationWhat is a DHCP reservation?Confi guring DHCP optionsWhat are DHCP options?How are DHCP server, scope and reserved client options applied?How are DHCP class-level options applied?

Confi guring a DHCP relay agentWhat is a DHCP relay agent?How does a DHCP relay agent work?How a DHCP relay agent uses hop countHow a DHCP relay agent uses boot threshold

Managing and monitoring DHCP serviceManaging a DHCP database

Overview of managing DHCPWhat is a DHCP database?How a DHCP database is backed up and restoredHow to back up and restore a DHCP database?How a DHCP database is reconciledHow to reconcile a DHCP database

Monitoring DHCPOverview of monitoring DHCPWhat are DHCP statistics?What is a DHCP audit log fi le?

How DHCP audit logging worksGuidelines for monitoring DHCP server performanceCommon performance counters for monitoring DHCP server performanceGuidelines for creating alerts for a DHCP server

Applying security guidelines for DHCPGuidelines for restricting an unauthorized user from obtaining a leaseGuidelines for restricting unauthorized non-Microsoft DHCP servers from leasing IP addressesGuidelines for restricting who can administer the DHCP serviceGuidelines for securing the DHCP database

Resolving namesViewing names on a client

How names are mapped to IP addresses?What are host names?What are NetBIOS names?How to view names on a client

Confi guring host name resolutionThe host name resolution processClient resolver cacheHosts fi le

Confi guring NetBIOS name resolutionNetBIOS name resolution processNetBIOS name cacheHow to view and release the NetBIOS name cacheBroadcastsLmhosts fi le

Resolving host names by using DNSInstalling the DNS server service

Overview of domain name systemWhat is a domain namespace?Standards for DNS namingHow to install the DNS server serviceConfi guring the properties for the DNS server serviceWhat are the components of a DNS solution?

What is a DNS query?How a recursive query worksHow iterative queries workHow forwarders workHow DNS server caching works

Confi guring DNS zonesHow DNS data is stored and maintainedWhat are resource records and record types?What is a DNS zone?What are DNS zone types?How to change a DNS zone typeWhat are forward and reverse lookup zones?Confi guring DNS zone transfersHow DNS zone transfers workHow DNS notify works

Confi guring DNS dynamic updatesWhat are dynamic updates?How DNS clients register and update their own resource records by using dynamic updatesHow to confi gure DNS manual and dynamic updatesWhat is an active directory-integrated DNS zone?How active directory-integrated DNS zones use secure dynamic updatesConfi guring a DNS client

How preferred and alternate DNS servers workHow suffi xes are appliedDelegating authority for zonesWhat is delegation of a DNS zone?

Managing and monitoring domain name system (DNS)Confi guring the time-to-live value (TTL)

How the time-to-live value worksHow to confi gure the time-to-live valueConfi guring aging and scavengingWhat are aging and scavenging parameters?How aging and scavenging work

Integrating DNS with winsHow to integrate DNS with WINSTesting the DNS server confi gurationHow simple and recursive queries workHow to test the DNS server confi guration

Verifying that a resource record exists by using nslookup, dnscmd and dnslintWhy verify that a resource record exists?NslookupdnscmddnslintHow to verify that a resource record exists by using nslookup, dnscmd, and dnslint

Monitoring DNS server performanceGuidelines for monitoring DNS server performance by using the performance consoleWhat is a DNS event log?What is DNS debug logging?

Resolving NetBIOS names by using windows internet name service (WINS)Installing and confi guring a WINS server

The components of winsWhat is a NetBIOS node type?How a WINS client registers and releasesNetBIOS namesHow burst handling worksHow a WINS server resolves NetBIOS namesHow to install the WINS serviceHow to confi gure burst handling

Managing records in WINSPresentation of a client recordWhat is a static mapping?How to add a static mapping entryMethods for fi ltering and viewing records in WINSHow to fi lter WINS records

Confi guring WINS replicationHow WINS replication worksHow push replication worksHow pull replication worksWhat is push/pull replication?WINS replication partner propertiesHow to confi gure WINS replication

Managing the WINS databaseWhy back up a WINS database?How to back up and restore a WINS database

MICROSOFT TECHNOLOGIES: NETWORK INFRASTRUCTURE

50 h.

SUPINFO - 2 (L2)

Page 55: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 55 -

What are simple deletion and tombstoned deletion of records?How to delete a WINS recordWhat are dynamic and offl ine compacting?How to compact a WINS databaseHow scavenging worksHow to scavenge the WINS databaseHow a WINS database is checked for consistencyHow to check for consistency on a WINS databaseGuidelines for decommissioning a WINS serverHow to decommission a wins server?

Securing network traffi c by using IPSec and certifi catesImplementing IPSec

What is IPSec?How IPSec secures traffi cWhat is an IPSec security policy?How IPSec policies work together

Implementing IPSec with certifi catesWhat is a certifi cate?Uses of certifi catesWhy use certifi cates with IPSec to secure network traffi c?Monitoring IPSec securityIP security monitorHow to stop and start the IPSec services

Confi guring network accessIntroduction to network access infrastructure

Components of a network access infrastructureConfi guration requirements for a network access serverWhat is a network access client?What are network access authentication and authorization?Available methods of authentication

Confi guring a VPN connectionVPN connection workingEncryption protocols for VPN connectionConfi guration requirements for a VPN serverConfi guring a remote access connection

How remote access network works?Confi guring a wireless connection

Overview of wireless network accessWireless standardsAuthentication methods for wireless networksConfi guration requirements of a windows XP professional client for wireless network accessControlling user access to a networkUser account dial-in permissionsWhat is a remote access policy?What is a remote access policy profi le?Remote access policies treatment

Centralizing network access authentication and policy management by using IASWhat is radius?What is IAS?How centralized authentication works

Managing and monitoring network accessManaging the network access services

Guidelines for managing network access servicesConfi guring logging on a network access serverRouting and remote access type of loggingAuthentication and accounting logging recordingLog fi les for specifi c connectionsCollecting and monitoring network access data Why collect performance data? Tools for collecting network access data

ORACLE TECHNOLOGIES: PL/SQL 46 h.

Variables and Executable Section in PL/SQLIntroduction to PL/SQL

What is PL/SQL? Different types of PL/SQL block Programming environments

Declaring PL/SQL Variables Presentation of PL/SQL variables Different types of PL/SQL variables %TYPE attributes Bind variables Substitution variablesUser Variable

Writing Executable Statements Identify PL/SQL block SQL functions in PL/SQL Nested BlockOperators in PL/SQL Programming Guidelines

SQL Statement and Logical StructuresInteracting with the Oracle server

SQL statements in PL/SQL Data manipulation in PL/SQL SQL cursors

Writing Control Structures view IF condition CASE Expression NULL values Basic loops WHILE loops FOR loops Nested Loops

Composite Data Type and Explicit CursorsWorking with Composite Data Types

OverviewPL/SQL RecordsPL/SQL Collections

Using Explicit CursorsPresentation

Controlling Explicit CursorsCursors and RecordsCursor FOR LoopsExplicit Cursors AttributesCursors with ParametersCursors with Subqueries

ExceptionsCatching Exceptions

What is an exception?Exception TypesPredefi ned Oracle Server ErrorsNon-Predefi ned Oracle Server Errors User-Defi ned Exceptions

Exceptions PropagationPropagation in the subblockThe RAISE_APPLICATION_ERROR procedure

Procedures, functions and packagesCreating Stored Procedures

What is a Procedure?What are Parameters?IN ParameterOUT ParameterParameters PassingInvoking ProceduresProcedures and ExceptionsProcedures Information

Creating Stored Functions What is a Function?Creating FunctionsFunction in SQL ExpressionsRemove a FunctionFunctions InformationProcedures versus Functions

Creating Stored PackagesOverviewComponents of a PackageCreating a PackageInvoking PackagesRemoving Packages

SUPINFO - 2 (L2)

Page 56: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 56 -

Introduction and historyThe origin of Java

Birth and evolution of Java Advantages and drawbacks of JavaJava versions

Java framework mechanismJava Virtual MachineExecution phases

Java Syntax - Bases & naming conventionsBase syntax

HandlersPrimitive data typeReference data type

Expressions and operatorsSimple and conditional expressionsIteration expressionOperators

ArraysOperation on arraysBidimensionnal arrays

Difference with C++Common thingsDifference

Classes – Concepts and inheritanceCreate your fi rst application

File and naming conventions

Constructors and initializationLaunching the application

Properties and methodsOperator «.» Variables MethodsThe «this» pointerPackages and import management

Garbage CollectorDeleting instances

Objects conceptAggregationInheritanceAccessibility concept Abstraction and interfaces concept

Error management - ExceptionsConcept

Defi nitionMechanism

Throwing an ExceptionThe “throws” keywordThe “throw” keywordPersonalized Exceptions

Dynamic arrays - Collections Comparison Arrays/Collections

Differences and similaritiesThe different Collection types

SUN TECHNOLOGIES:JAVA Standard Edition (SCJP) 60 h.

GuidelinesOverloadingUsing Forward DeclarationsPersistent StateTables of Records and PackagesPL/SQL Wrapper

Using Oracle-supplied PackagesDBMS_OUTPUT PackageUTL_FILE PackageHTP PackageUTL_MAIL PackageDBMS_SCHEDULER PackageCreating a job

Dynamic SQL and MetadataDynamic SQL

OverviewNative Dynamic SQLCursors and Dynamic Execution DBMS_SQL Package

MetadataMetadata API FETCH_XXX SubprogramsSET_FILTER ProcedureBrowsing APIs

Design Considerations for PL/SQL CodeStandardizing Constants and Exceptions

Constant StandardizingExceptions Standardizing

TransactionsLocal subprogramsDefi ning and Invoking the RightsAutonomous TransactionsRETURNING Clause

Bulk BindingOverviewUsing Bulk Binding BULK COLLECT INTO

Performance Using NOCOPY Using PARALLEL_ENABLE

Managing DependenciesLocal and Remote Dependencies

Understanding DependenciesLocal Dependencies

Remote DependenciesCheck Modes

Timestamp ModeSignature Mode

RecompilationOverviewSuccessful RecompilationUnsuccessful Recompilation

LOBsDifferentiate LOBS

What is a LOB?BLOB CLOBBFILEDIRECTORY object

Manipulating LOBs DBMS_LOB packageAdding dataSelecting dataRemoving dataTemporary LOBs

TriggersPresentation of Triggers

What are Triggers?DML TriggersStatements and Triggers INSTEAD OF TriggersManaging Triggers

Applications for TriggersDDL TriggersCALL StatementBenefi ts of Triggers Trigger Information

PL/SQL CompilationType of compilation

OverviewNativeInterpretedCompilation Information

PLSQL_WARNINGSDBMS_WARNINGSUsing DBMS_WARNINGS

SUPINFO - 2 (L2)

Page 57: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 57 -

The List The Set The Map The Tree

Utile classesThe Iterator The Enumerator The Comparator

Java 5 new featuresThe genericThe “for each” instruction

Architecture Java 2 Standard EditionMethodologies of development

PackagesClassesMethodsDesign patterns

Software architectureUsual project organizationMVC conceptBusiness layerService layerApplication layerPresentation layer

Graphical interfaces - Swing (bases)Base concepts

OriginArchitecture

ContainersHigh level containersMains containersSpecifi ed container

Simple componentLabel ButtonSelection componentEvent managementPositioning managementText componentSpecifi ed component

Concurrent processes - Les ThreadsUsing process

ConceptThe Thread class

Use and executionStopping a ThreadAvailable methodsSharing variablesPrioritySynchronization

Runnable interfaceAdvantages and uses

Graphical interfaces - Swing (advances)Architecture

Internal mechanism

Swing project organizationAdvanced component

List componentTable componentTree componentModel systemRenderer systemEditor system

Advanced conceptsPositioningEventsSwing concurrency management

Complementary toolsSwingLabs projectsOther open source projectsSome graphical development IDE

Input/Output – I/O and Socket Reading & Wrinting - Input/Output

ConceptThe File classThe byte streamThe character streamThe object and the serialized streamsThe compressed stream

Client-server applications - Les Sockets Concept and mechanismServerSocket classSocket classInetAddress class

Database access - JDBCMain concept

ArchitectureDefault process

Opening and closing connectionLoading driverEstablish a connectionClosing a connection

Processing SQL requestsStatementsPrepared Statements Callable Statements Access type

Retrieving an d modifying resultsThe ResultSetMetadata The ResultSet Transaction management

Naming services and directories – JNDINaming concept

Directory conceptJNDI

Packages presentationNaming operationsDirectory operationsSchema operation

Review of OOPGeneral defi nitions

What is OOPWhat is an object? What is a class?HeritageProtocols

ClassesConceptUtilization

MethodsConceptUtilization

VariablesLocal variable, global one, instance one, class one

Cocoa and Objective-CPiece of history

Cocoa originObjective-C

Cocoa Environment Mac OS X integrationCocoa characteristicsThe « Foundation » Framework The « Application Kit » Framework

Why using Objective-C?Objective-C syntax

CommentariesMelting pot between code / declarations New types and valueDynamic typeClasses and objectsFunctions and methodsThe messagesThe keywordsThe instance variables gooPolymorphism

Developer toolsXCode 2.4

APPLE TECHNOLOGIES:Initiation to the COCOA development

20 h.

SUPINFO - 2 (L2)

Page 58: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 58 -

Interface Builder 2.5The utilities

Cocoa memory management Review of the memory management in C languageMemory principle in Objective-C: reference countingManagement messages from the reference countingManual management of the memory

Framework FoundationNSObjectNSStringNSArrayNSMutableArrayNSDictionary and NSMutableDictionary

The classes in Objective-CClasses’ creation

Class declarationClass implementation

Class creation with Interface Builder Outlets and actions

Defi nitionsOutlets and Actions in XCodeOutlets and Actions in Interface Builder

Rules and habits in Cocoa The MVC paradigmThe controllerThe categoriesThe other Apple frameworks

The AppKit WebkitNSApplicationNSWindows and NSViewNSResponderNSControl

SUPINFO - 2 (L2)

Page 59: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 59 -

IntroductionCompiling

Why study compiling?The compiler notionCompilers optionsThe interpreters

VocabularyThe different analysisLanguages and syntaxes notionsThe grammarsDescribing the grammars

TreesTrees: a reminderDerivation and reductionDerivation tree

Lexical analysisIntroduction

The terminalsThe separatorsThe identifi ersRelations between lexical analyser and syntax analyserAn example using Fortran

RobotsThe different robotsFirst exampleApplication to the languageLexical robotsRegular expressions

AnalysisAscending analysisDescending analysisPredictive analysis

LEXHistoryPresentationFile structureExampleLEX regular expressions

Syntax analysisIntroduction and recursive descent

A reminder in descending and ascending analysisConclusionThe principal methodsPresentationAn example

SynthesisThe operator’s priority method

PresentationAn exampleSynthesis

LR methodPresentationAn exampleSynthesis

YACCHistoryPresentationFile structureExampleYACC regular expressions

Semantic analysisIntroduction

PresentationReach of the identifi ers

ControlType controlOverloadingFunction and polymorphic operators

Table of symbolsConstructionCrossing

Data scouring in the texts corpusDefi nitions

Classifi cation etc.Classifi cation/Clustering

Creation of documents classesIn a supervised mannerFlat or hierarchy classesGoogle exampleSeparated classes/ Venn diagram

Vector representation of documentsAutomatic classifi cationOther classifi cationsExample

In summary

COMPILING 40 h.

Basic conceptsOverview

Origins and developmentConcepts and methodsDomains of research and practical applicationsKnowledge representationThe Turing test approach

Symbolic AIFormal languages for thoughtFirst-order logicPropositional logic Application to the blocks world

Solving problems by searchingRepresentation of a problem in the state spaceSearch strategiesApplications: the labyrinth, the 8-puzzle

Intelligent agents Agents and environmentsThe structure of agents

Expert SystemsOverview

Structure of the ESThe knowledge baseThe inference engine

Production rulesStructure of the production rules

System based on production rulesThe inference engine

Strategies of reasoningForward-chaining algorithmBackward-chaining algorithmThe functioning of the inference engine

The management of uncertainty in expert systemsTypes of uncertaintiesCombining uncertain facts and rules

Functional programming: the LISP languageBasic elements

Symbolic expressionsStructure of the languagePrimitive functionsPredicatesInternal representation of listsInput-output functions

Control structuresIf and Cond functionsRecursive functions Iterative functions

Complex functionsApply, MapcarLambda-expressionsMacro functions

Symbolic operations

ARTIFICIAL INTELLIGENCE 50 h.

SUPINFO - 3 (L3)

Page 60: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 60 -

Derivation of algebraic expressionsExploration of treesExploration of state space Applications in LispWorks: the labyrinth, the 8-puzzle

Logical programming: the Prolog languageProgram structure

The clauses: facts and rulesTypes of variablesBuilt-in predicatesThe Goal

Fundamental mechanismsQuestioning and unifi cationThe backtracking The primitives FAIL and CUTThe negation in PrologDynamic data basesForeign languages interface (link with C)

Recursivity and listsThe recursive schemeExample of recursive functions

Structure and unifi cation of listsApplications (in SWI Prolog)

Operational research (the traveling salesman)Expert Systems (forward and backward chaining)Program PERT (tasks management)Fractals (graphical representation)

Neural networksOverview

History and developmentThe neuro-physiological modelThe mathematical model

The PerceptronThe learning algorithmApplication to logical functionsImplementation of the learning algorithm in C++Program for the recognition of alpha-numerical charactersThe limitations of the perceptron

Multi-layer networks The principle of backpropagationThe implementation of a multi-layer network

Fundamental security notionsThe basics of security

Security objectivesComplementary conceptsPrinciplesRisk managementSecured development notions

An introduction to cryptologyDefi nitionsFundamental notions (history, Kerckhoffs’s principal, vocabulary)Symmetric cryptologyAsymmetric cryptologyCondensingNumeric signatureConfi dence in a public keyKey management infrastructure (PKI)

Systems’ securityAccess control

From authentication to authorisationAccess control typesAuditStrong authentication

Network securityTCB notions, Monitor Reference notions and Security Kernel notionsSecurity modelsCommon criterions (CC)Threats (hidden channels, steganography, backdoors)Trusted Solaris*BSDLinuxWindows

Material architecturesPhysical securityCompromising signals (TEMPEST)ChipsCrypto accelerator cardsNew CPU instructionsTPM

ApplicationsData basesWeb applicationsPortalsNumeric rights managementOffi ce automation applicationsOn board systemsWeb services

Security tools against Malware (malicious software) Malware

VirusWormTrojan horseSpywareRootkitHypervirusMeans of prevention

ToolsAnti virusAnti spywareVulnerability scannersSecurity managementPatch managementFiles encryption

Network securityReminders

OSI layersThreats on lower layersThreats on network equipmentReminder TCP/IPGood practice

FirewallReminder on fi rewallsPackets fi ltrationSPI (Stateful Packet Inspection)Applicative fi rewallsTypical architecture of a business fi rewall (DMZ, NAT)Personal fi rewalls

Intrusion detection and preventionIDSIPSIDS/IPS: host or network, kernel or notCommon problemsDetection and escape techniquesProduct examplesHistoric signature rulesNormalisationHoney pots

ProtocolsIntroduction / IPSec remindersAHESPIntroduction / VPN remindersPPTPL2TP / IPSecSSL/TLSSSH

Applications for network securityQuarantine

Quarantine of remote accessesQuarantine LAN (NAP/NAC)

WiFiAvailable security options (including weaknesses of WEP, VPN…)History802 1xRADIUSEAP – TLSPEAP – EAP – TLSWPA802.11i (WPA2)Set up example: Windows

INFORMATION SYSTEMS SECURITY 16 h.

SUPINFO - 3 (L3)

Page 61: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 61 -

ADVANCED OPERATING SYSTEM 40 h.

Fundamental operating system notionsThe system’s basic elements

Defi nitionsOperations on the processesProcesses tableComparison process/threadThe mechanismsThe OS families

Inter-process communicationDisplay of the problematic, vocabularySimple algorithms solutionsThe Dekker and Peterson algorithmOther methods and critic of the preceding solutionsThe semaphoresThe monitorsSignals and messagesThe pipesOther mechanisms and comparisons

SchedulingDefi nitionsAlgorithmsOptimizationMulti-user managementMulti-processor managementHeuristic evaluation

Memory and fi lesMemory: Hierarchy, dividing and sharingPagingSegmentationSegmented paged memoryGeneralities about the fi lesThe physical storing of the fi lesThe SGFOther elements of the system

Distributed systemsDefi nitions and examples

GeneralitiesConceptual objectives of distributed systemsDNS exampleX500 directory

Micro-kernels and subsystemsParadigmMicro-kernels genesisObjectives of the conception of micro-kernelsPersonalitiesExampleModularisation effects

Objects systemsObjectsInvocationProblem resolvingTendencies

Basic abstractionsArchitecture of a distributed systemActors/tasks/processChorusEvolution of the address space model

Distributed algorithmsDefi nitions

Orders, global state, clocks, synchronization

Control in distributed systemsResumption in distributed systems

Aspects of distributed applicationsCooperation typesElementary communication modelsCausal dependencyReliable diffusion models and group communicationOrder proprieties linked to bugs

Global state of a distributed systemPast and coherent disconnectionsDetermination of a coherent global stateModels

Breakdown toleranceConcepts

Basic concepts on running securityBreakdown classifi cationVarious types of redundanciesMain problems with breakdown toleranceSynthesis

In practiceCausal dating and vector clocksTotal order using logical clocksLaying down distributed resumption dotsCase study: cooperative calculation and replicated object

ApplicationsRemote Method Invocation

Introduction to RMIRMI layers structureRMI architectureSetting up RMIExample

CorbaIntroductionThe ORBCommon Object Service Specifi cationCase study

The DCE of OSEDefi nitionThe DC architectureThe organization in cellsThe RPC under DCEThe RPC runtimeStubs generationDistributed File SystemAccess to DFS fi lesCoherence management

Amoeba and MachProcessesVirtual memoryThe kernelTransparencyMach presentationUtilizationSpecifi citySet up

A few systems’ specifi citiesOwner systemsThe real time systemsThe on board systemsThe mobile systems

Foreign language: AMERICAN ENGLISH 3 70 h.

Level 1: EVERYDAY SITUATIONS - INTERMEDIATE +An Emergency

Seek assistance for an injured person. Learn basic medical vocabulary and parts of the body.

At the Doctor’sDescribe your symptoms and discuss treatment options.

CorrespondenceLearn vocabulary for letter writing: writing paper, ink, envelopes.

At the Post Offi ceLearn vocabulary to do with the postal service: sending a parcel, express delivery, registered mail, metered mail, stamp collecting.

Banks and ATMs

Learn how to explain a problem and learning vocabulary to do with banks: credit card, expiration date, commission, etc.

Paying a BillLearn about different means of paying for something: by check, in cash, etc.

Level 1&2: PROFESSIONAL SITUATIONS - INTERMEDIATEREADING DOCUMENTS

Job ApplicationLetter to Human ResourcesThe Leaving Party Letter of Recommendation

WRITING DOCUMENTSSecurity Rules

SUPINFO - 3 (L3)

Page 62: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 62 -

SUPINFO - 3 (L3)

PEOPLE MANAGEMENT 7 h.

Succeeding as an occasional trainerRunning a training session: how to prepare for itBuilding a path for your training session

Using teaching techniques effectivelySuccessfully running a training courseAdapting teaching principles to the learners’ profi le

PERSONAL SKILLS 5 h.

Alternative decision-makingWhat is a decision?

The limits of decision relationship modelsHints for better decisions making

SELLING/NEGOTIATION 21 h.

Selling your ideasHow to fi nd the arguments you needAdding strength to your argumentsQuestions that make people say yesHow to ask questions that lead to a “yes” answerHow to respond when faced with objectionsMastering ways to reply to objectionsHow to diagnose other people’s key motivations?How to adapt effectively to other people’s motivations

Closing your deals: an introductionSome deal-closing techniques

Successful negotiationWork out your negotiating styleHow to avoid haggling or positional bargainingUnderstanding the mutual gains approach sMaintaining a good working relationship when negotiatingGetting ready to negotiate

FINANCIAL MECHANISMS 10 h.

Understanding fi nancial instrumentsWhat is a share?How shares are valuedWhat is a bond?

Valuing bonds - the underlying principlesWhat is an option?What determines the value of an option?

MARKETING PRINCIPLES 17 h.

Build your “marketing mix”What is the marketing mix?Analyzing your productsChoosing your pricing policyUnderstanding the key ideas of distributionUnderstanding the basics of communication

Understanding the basics of advertisingFixing and applying a marketing strategy

Choosing the correct market positioning for your productAudit your marketing programDetermine your marketing strategyCreate your marketing plan

The SurveyAdvice

MEETINGSInstructionsDelaysDelays (Speaking)

PROFESSIONAL INTERACTIONProspective CustomerProspective Customer (Speaking)Contract SettlementsAbout the ProjectAbout the Project (Speaking)Company PresentationCompany Presentation (Speaking)Sales ContactSales Contact (Speaking)Job Interview

SOCIALIZING

Company HistoryCompany History (Speaking)

Level 2: EVERYDAY SITUATIONS - ADVANCEDLiving in America

Reply to general questions about your daily life in the US: Where do you live? What is your job? What are your hobbies?

Seeing the USATalk about different means of transportation, lifestyles and pastimes.

The Post Offi ceLearn to ask questions, to give your address, to pick up a package and to buy stamps at the post offi ce.

Seminar PlanningReserve a hotel room. Organize a seminar, set the date and number of participants, choose the services required. Arrange for payment.

Insurance & BankingLearn vocabulary related to the world of insurance and banking (coverage, life insurance, cash transfer, account number).

Page 63: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 63 -

SUPINFO - 3 (L3)

Introduction to securityCharacteristicsRisks

Internal threatsExternal threatsConfi guration weaknesses

AttacksReconnaissance attacksAccess attacksDoS attacks

VulnerabilitiesOperating systemsProtocolsConfi guration

Security policySecurity Wheel

Secure the information systemMonitor the information systemTestImprovement

Cisco Self DefendingSAFENACCisco Self DefendingCS MARS

Basic router securityAccounts managementPrivileged modesNetwork services

Dedicated appliancesDevice characteristics

Technical characteristicsProcess of an ASA systemCut-through proxy

Introduction to PIX and ASAFirst steps with the PIX/ASACommunication translationConfi guration via ASDM

Packet switchingStatic routing caseDynamic routingVLANs

Access controlAAA

TACACSRADIUSTACACS Vs RADIUS

802.1XPrincipleState and interfaces802.1X work processSwitch confi guration

Identity controlStatic passwordsSingle use passwords and access cardsElectronic certifi catesBiometry

ACSBasic principleCisco Secure ACS for WindowsCisco secure ACS for UNIX

IOS FirewallAuthentication Proxy

Client/server architecture principlePropertiesAAA confi guration

Filtering on routersPacket fi lteringState fi lteringURL fi ltering

Cisco IOS Firewall CBACCBAC confi guration

Advanced use of the PIX/ASAACLs

Defi nitionACLs confi gurationVerifi cations

Object groupingConfi guration

Network object groupService object groupProtocol object groupICMP object groupNested object groupsExample of a startup confi guration

Modular security policiesSwitch security

Switch waterproofi ngVLANs protection

VLAN HoppingPrivate VLANs vulnerabilities

Spanning Tree protectionThreatsCountermeasure

InstallationMac OS X Tiger versions

Mac OS X Server unlimited licenceMac OS X Server 10 clients

Hardware considerationsXserve G5Xserve Cluster NodeXserve RAIDXserve Intel

Installation preparationLocal installationRemote installation

Mac OS X Server Admin ToolsGeneral tools overview

Where can you download them?Gateway Setup AssistantQTSS PublisherServer AssistantServer MonitorSystem Image Utility

Xgrid AdminServer Admin

OverviewLocal confi gurationRemote confi guration

Workgroup ManagerOverviewLocal confi gurationRemote confi guration

Open DirectoryIntroduction to Open Directory

Presentation and historyKDC and SASL

Node setupOpen Directory states

Connection to a directory serviceOpen Directory MasterOpen Directory replica

Advanced setupUser management

Network ServicesDHCP: Dynamic Host Confi guration Protocol

What is the DHCP?DHCP confi guration under Mac OS X Server

DNS: Domain Name SystemWhat is the DNS?DNS Confi guration under Mac OS X Server

Permissions and AuthenticationWorkgroup Manager

APPLE TECHNOLOGIES: MAC OS X Server 30 h.

CISCO TECHNOLOGIES: Network Security 1 28 h.

Page 64: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 64 -

User accountsGroup accountsShare points and Workgroup ManagerPermissionsACL

File ServiceProtocolsCreation of a share point

How-toPermissionsHow to enable the different protocols?

Apple File ServicesPermissionsConfi guration

WindowsPermissionsLockingGuestsServer Name and WorkgroupAdvanced settingsLogging

NFSHow does it work?LockingSecurityServer Admin

FTPConfi gurationServer AdminFile conversionMessagesAdvanced settingsLoggingMonitoring

Comparison of the different protocolsCase sensitivity problems

PrintingPrinting on Mac OS XProtocolsPrinting queuePrinter management

SharingManagementMonitoringQuotasPool printers

Printing service limitsWeb Services

Internet ServicesApache confi gurationConfi guring a dynamic server

Realms and WebDAVProxy server

Confi guring the proxy serverMonitoring Web services

Quicktime Streaming Server (QTSS)Working principlePreparing the mediaManaging QTSS

Firewall & NATFirewall

What is a fi rewall?How to confi gure the Mac OS X Server fi rewall?

Network Address Translation (NAT)What is a NAT?How to confi gure the NAT on Mac OS X Server?

Accounts managementClient management and toolsClients’ management conceptsUser accounts

Home folderMobile accountsLogin and logout synchronizationBackground Sync

User groupsGroup creationAssigning a user to a groupGroup folder

Computers listsComputers lists creationHost computers

Preferences managementPreferencesHow to apply preferences?Preferences managementApplications’ preferences deployment

Network views managementNetBoot and Network Install

ConceptProcessDiagramShadow fi lesSupported clientsConfi guration

Disk image creationParticular case: NetInstallNetboot server administrationImages activationClients fi lteringClient confi guration

Clients monitoring

MICROSOFT TECHNOLOGIES: Active Directory 30 h.

Introduction to the Active Directory infrastructureThe Architecture of Active Directory

PreviewWhat Does Active Directory Do?The Logical Structure of Active DirectoryThe Physical Structure of Active DirectoryWhat Are Operations Masters?

How Active Directory WorksWhat is a Directory Service?What is a Scheme?What is the Global Catalogue?What are Distinguished and Relative Distinguished Names?

Examining Active DirectoryActive Directory ManagementActive Directory ManagementActive Directory Administrative Snap-ins and Tools

Implementation of a forest and Active Directory structureCreating a Forest and Domain Structure

Requirements for Installing Active DirectoryThe Active Directory Installation ProcessHow to Troubleshoot the Installation of Active Directory

Examining Active Directory Integrated DNSDNS and Active Directory Namespaces

What Are Active Directory Integrated Zones?What Are SRV Resource Records?

How Client Computers Use DNS to Locate Domain Controllers and ServicesRaising Forest and Domain Functional Levels

What Is Forest and Domain Functionality?Requirements for Enabling New Windows Server 2003 Features

Creating Trust RelationshipsTypes of TrustsWhat Are Trusted Domain Objects?How Trusts Work in a Forest?How Trusts Work Across Forests?

Creating and Managing Organizational UnitsIntroduction to Managing Organizational Units

Methods for Creating and Managing Organizational UnitsDelegating Administrative Control for Organizational Units

What Is Delegation of Administrative Privileges?Organizational Unit Administrative Tasks

Planning an Organizational Unit StrategyThe Organizational Unit Planning ProcessOrganizational Factors that Affect an Organizational Unit StructureGuidelines for Planning an Organizational Unit StructureGuidelines for Delegating Administrative Control

Implementing user, group and computer accountsManaging user accounts

Account typesGroup typesLocal domain groups

SUPINFO - 3 (L3)

Page 65: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

SUPINFO - 3 (L3)

Global groupsUniversal groupsImplementing UPN suffi xesDefi ning a main user nameFinding and resolving the name suffi xes’ confl icts

Planning a strategy for user, group and computer accountsDefi nition and history of SIDMoving objectsA few practical tips

Planning the Active Directory auditThe reasons behind auditing the access to Active DirectoryAnalysis instructions of the Active Directory modifi cations

Implementation of a group policyCreating and Confi guring GPOs

PreviewWhy Specify a Domain Controller for Managing GPOs?What Are WMI Filters?What Is Loopback Processing?When Is Group Policy Applied?

Managing GPOs What Is a Copy Operation?What Is a Backup Operation?What Is a Restore Operation?What Is an Import Operation?

Verifying and Troubleshooting Group PolicyCommon Problems with Implementing Group Policy

Delegating Administrative Control of Group PolicyDelegation of GPOsDelegation of Group Policy for a Site, Domain, or Organizational UnitDelegation of WMI Filters

Deploying and managing software using group policy confi guring and maintaining Software

Introduction to Managing Software DeploymentThe Software Installation and Maintenance Process Defi nition of Windows Installer

Deploying, confi guring and maintaining SoftwareDefi ning a copy operationDefi ning a save operationDefi ning restore operationDefi ning an import operation

Troubleshooting Software DeploymentCommon problems link to implementing group policy

Delegating the administrative control of group policyDelegating GPOsDelegating group policy for a site, domain or organizational unitDelegating WMI fi lters

Planning a Software Deployment Strategy using group policyPresentation of the software deployment management

Software installation and maintenance processDefi nition of Windows Installer

Deployment, confi guration and maintenance of the softwareOverview of the software deployment processAllocating and publishing softwareCreating a distribution place for softwareUsing GPO to deploy softwareDefault options for software installationModifying the software installation options

Resolving problems linked to software deploymentCommon problems linked to the use of GPO in software deploymentFinding the cause of the problemResolving the software installation problems while using the GPO

Planning a software deployment strategyPlanning instructions for software distributionPlanning instructions for software deployment using GPOSoftware maintenance planning instructions

Implementing sites to manage the replication of Active DirectoryIntroduction to Active Directory Replication

Replication of Linked Multi-value AttributesWhat Are Active Directory Partitions?What Is Replication Topology?Automatic Generation of Replication TopologyGlobal Catalogue and Replication of Partitions

Creating and Confi guring SitesWhat Are Sites and Subnet Objects?What Are Site Links?Replication within Sites vs. Replication between SitesWhy Disable Default Bridging of All Site Links?

Managing Site TopologyWhat Is a Bridgehead Server?What Is the Inter-site Topology Generator?

Troubleshooting Replication FailuresCommon Replication ProblemsWhat Is Replication Monitor?What Is the Repadmin Tool?What Is the Dcdiag Tool?

Implementing the placement of domain controllersImplementing the Global Catalogue in Active Directory

Review of a Global Catalogue ServerCustomize a Global Catalogue ServerWhat Is Universal Group Membership Caching?Determining the Placement of Domain Controllers in Active DirectoryWhat Is Active Directory Sizer?Parameters for Active Directory Sizer

Planning the Placement of Domain ControllersGuidelines for Placing Domain ControllersGuidelines for Placing Global Catalogue ServersGuidelines for Enabling Universal Group Membership CachingGuidelines for Placing Active Directory Integrated DNS Servers

Managing operations mastersIntroduction to Operations Master Roles

What Is the Schema Master?What Is the Domain Naming Master?What Is the PDC Emulator?What Is the RID Master?What Is the Infrastructure Master?

Transferring and Seizing Operations Master RolesOperation Master Roles TransfersWhen to Seize Operations Master Roles

Planning the Placement of Operations MastersGuidelines for Placing Operations Masters Guidelines for Placing the Schema MasterGuidelines for Placing the Domain Naming MasterGuidelines for Placing the PDC Emulator Master Guidelines for Placing the RID MasterGuidelines for Placing the Infrastructure MasterGuidelines for Seizing Operations Masters Roles

Active Directory maintenanceThe Active Directory Database and Log Files

Description of the Active Directory fi lesMoving and Defragmenting the Active Directory Database

How to defragment the Active Directory Database and Log FilesBacking Up and Restoring Active DirectoryComponents of the System State DataHow to Back Up Active Directory?Backing Up and Restoring Active Directory

Planning for Monitoring Active DirectoryOverview of Monitoring Active Directory Events to Monitor

Performance Counters to MonitorGuidelines for Monitoring Active Directory

Discovering the .NET Framework 2.0Introducing the .NET platform 2.0

NET FrameworkNET ServicesVisual Studio 2005

Overview of the .NET Framework 2.0

The Common Language RuntimeClass library Common System TypesDeveloping Client side applications Developing Server side applications Web Applications and Web Services

NET TECHNOLOGIES:C# & ADO.NET development

56 h.

- 65 -

Page 66: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 66 -

Introducing the Oracle Database AdministrationIntroduction to DBA1

Oracle ProductsRelational Database SystemsStructured Query LanguageTasks of an Oracle Database Administrator

Oracle ArchitectureStorageLogical StructuresThe Data DictionaryDatabase/Grid Control

Installing Oracle Database 10g Software and Creating a DatabasePreface

System requirementsOptimal Flexible ArchitectureSetting Environment variables

Oracle Universal InstallerLaunching OUIConfi guring Oracle

Creating a Database on installEnd of InstallationCreating an Oracle Database Overview of DBCACreate a Database

Windows Application ADO .NET: data and XML

Pro and cons of the .NET Framework 2.0Support for Internet norms Using unifi ed application models Extensible classes .NET 2.0 new features

Fundamentals of C# 2.0Overview of C# 2.0

Structure of a C# 2.0 program Input/OutputGood Patterns Compiling, executing, debug

Data typesIntegrated Data TypesCreating Data TypesConverting typesComparing Value types and Reference typesReferences as method parametersNullable TypesObject Hierarchy

Instructions and TablesInstructionsConditional statementsIterative InstructionsSwitch instructionsIntroducing arrays

Exception handlingUsing methodsUsing parametersErrors managementException handling

Object Oriented Programming and C# 2.0Fundamentals of OOP C#2.0

Objects and classes Class vs StructuresEncapsulationStatic data, static methodsC# 2.0 and object oriented programmingObject oriented systems.

Property and indexerWhat is a property?What is an indexer?

InheritanceClass derivationMethods implementationInterfaces implementationUsing InterfacesUsing abstract classes

C# 2.0: GenericsGeneric classesGeneric MethodsGeneric constraint typesGeneric overloading

Advanced C# 2.0Overloading, delegates, events

Operators OverloadingDelegatingEvents

IteratorsIntroducing iteratorsImplementing iterators

Generics iteratorsAttributes

Introduction attributesImplementing attributes

Windows FormsIntroducing Windows Forms

Creating a project, architecturing the solutionReferencesEntry pointsApplication and Application ContextStarting and stopping the applicationThe AssemblyInfo.cs fi le

Forms, Controls and Drag&DropModal Forms and non-modal formsEventsDelegatesEventHandlersWindows Forms ControlsUser ControlsMenusDrag & Drop

GDI+ and printingGDI+: Basics GDI+: The Graphics classGDI+: Pens and BrushesGDI+: Images and TextsPrinting: PrintDocumentPrinting: PrintPreviewDialogPrinting: PrintDialog

Confi guration fi le and deploymentConfi guration: PresentationConfi guration: CreationConfi guration: Using a confi g fi leConfi guration: RedirectionDeployment: Creating a projectDeployment: Using a projectDeployment: Advanced concepts

ADO .NET 2.0Introduction

General ConceptHistoricWhy ADO.Net (1.x and 2.0)?General use and namespaces

ProviderGeneral conceptPro and cons of the providerDbProviderFactory object

Connected modeOverviewConnection (DbConnection)Request (DbCommand)Reading (DbDataReader)Parameters (DbParameter)Transactions (DbTransaction)Stored Procedures

Offl ine ModeDataSetDbDataAdapterDataSet and DbDataAdapter TypeAdvanced Concepts

ORACLE TECHNOLOGIES: DBA 1 & DBA 2 52 h.

SUPINFO - 3 (L3)

Page 67: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 67 -

SUPINFO - 3 (L3)

Other actions with DBCAManaging the Database

Controlling the DatabaseManaging ToolsStartup StagesShutdown ModesInitialization Parameter FilesUsing Database Control

Storage StructuresWhat are Tablespaces and Data Files?Managing Tablespaces

Administering Users and Managing Schema ObjectsAdministering Users

Creating an UserProfi le and UsersAuthenticating UsersPrivilegesAssigning Quota to UsersRoles

Managing Schema ObjectsSchemasGuidelines for Objects ManagementData TypesManaging TablesIndexes ViewsSequences

Managing DataData Pump

Manipulating Data through SQLData Pump Export Data Pump Import Directory Objects

SQL*Loader PresentationThe SQL*Loader Control FileMethods for Loading Data Loading Data

Oracle Database SecurityParameters and privileges

Database SecuritySecurity ParametersPrivileges

Profi les FeaturesManaging Profi les

AuditMonitoring for Suspicious Activity Standard Database AuditingValue-based AuditingFine-Grained Auditing (FGA)

Oracle Net ServicesOracle Net Listener

Defi nitionListener ManagementListener CreationRegistering Database

Names ResolutionIntroductionMethods of ConnectionsConfi guring Connections

Oracle Net Manager PresentationConfi gurationsOracle Net Connectivity

Oracle Shared ServersSessions

Dedicated Server ProcessShared Server ProcessSGA and PGA

Shared Servers Confi guration PresentationDISPATHERS SHARED_SERVERS MAX_SHARED_SERVERS CIRCUITS SHARED_SERVER_SESSIONS

Monitoring Shared ServersVerifying Shared Server SetupData Dictonary ViewsChoosing a Connection TypeWhen Not to Use Shared Server

Monitoring and ManagementPerformance Monitoring

PresentationOptimizationsHow to get Information?

Proactive MaintenanceManaging ThresholdsSQL Tuning and Access AdvisorsAutomatic Workload Repository Automatic Database Diagnostic Monitor

Undo ManagementConcepts

Undo Data Transactions and Undo DataStoring Undo Information

Undo ManagementAdministering UndoUndo RetentionUndo Tablespaces

Backup and RecoveryConcepts

PresentationType of failures

DBAs Common TasksThe DBA in the Company

How DBAs Spend Their Time?Introduction to the DBAs Common Tasks

Using Globalization Support Customize language-dependentSpecify Different Linguistic Sorts for QueriesRetrieve Data that Matches a Search String Ignoring Case or Accent DifferencesObtain Globalization Support Confi guration Information

Controlling Access to the Oracle ListenerSecure the listenerEnable TCP valid node checkingRemove default EXTPROC entryAdd a Separate Listener to Handle External Procedure Calls

Confi guring Recovery ManagerManaging RMAN

Describe the RMAN repository and recovery catalogDescribe the Media Management Library InterfaceConfi gure Database Parameters that Affect RMANChange RMAN default settings with CONFIGURE

Using Recovery ManagerUse the RMAN BACKUP CommandManage the backups with RMAN

Diagnostic sourcesUse Various Files for Diagnostic PurposesUse Enterprise Manager to View AlertsAdjust Thresholds for Tracked MetricsControl the Size and Location of Trace Files

Managing Data RecoveryRecovering from Noncritical Losses

Recover Temporary TablespaceCreation Recover a Redo Log Group MemberRecover Index TablespacesRecover Read-only TablespacesRe-create the password fi le

Database RecoveryRecover the Control FileExplain reasons for Incomplete RecoveryDescribe Incomplete Recovery MethodologyRecover the Database to a Specifi c Point-In-Time

Flashback Database Describe Flashback Database ArchitectureConfi guring Flashback DatabaseMonitor the Flashback DatabaseUsing the Enterprise Manager Recovery Wizard

Recovering from User ErrorsPerform Flashback OperationsManage the Recycle BinUsing Flashback Versions QueryFlashback TablesPerform Transaction Level Recovery

Page 68: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 68 -

Setup DHCP and DNS servers Introduction, DNS/DHCP basics Installation of a DHCP server

InstallationConfi guration RelayLaunching and tests

Installation of a DNS Server Reminding of the DNS concept Concept of fully qualifi ed domain name BIND installation Bind DLZ Files sharing with SAMBA™

Overview Requirements

SambaHistoryDaemonsNew features

The SMB Protocol The SMB format

NetBIOS Protocol NetBIOS operation

Using client smbmountnmblookupfi ndsmb Smb4kServer confi guration The different sections:

The global section Homes sections Printers and print$ Sections Netlogon section Shares sections

smb.conf fi le validity User management SWAT

InstallationUsing SWAT Using Samba as a Domain Controller Creating folders on Samba server

Modifi cation in smb.conf Adding computers accounts

Directories services with OpenLDAP™ Presentation

What is a directory? Directory X.500

LDAP an access protocol to the directories simplifi ed and functional The model of information

Basic element of the directory Attributes of an object Classes of objects and heritage Access to information

The naming model Installation

Necessary for the installation Recovery sources or binaries Compilation and installation by sources

Confi guration The slapd.conf fi le Launching and stop of the slapd service The client fi le confi guration

Directory use Defi nition of schema and DIT Defi nition of slapd.conf and executing the server DIT loading in the directory Search and handling in the DIT Graphic customer of exploration

Using LDAP for a centralized authentication Modify /etc/nsswitch.conf Updating PAM authentication system Updating ldap.conf Replication of LDAP directory What is the replication? Course of a process of replication Installation of the replication

Secure authentication with Kerberos™ IntroductionGlossary How Kerberos works

Kerberos’s advantages How Kerberos works

Confi gure Kerberos Confi gure the server Confi gure a Kerberos client

ConclusionFirewalling with iptables

IntroductionConceptsNetFilter

InstallationKernel part: Netfi lter Administration part: IPtables How to use IPtables The FILTER table

How to save and load rules Main commands OptionsNAT (Network Address Translation)

Kernel options ICMP related options IP related options

Introduction to messaging systemsComponents’ presentation

Different services Single or multi-servers systems

On one server On several servers (sender -> receiver)

Mail User Agent MailThunderbird and the others

Mail Transfer Agent SendmailPostfi x Qmail

Mail Delivery Agent FormatThe different MDA SendmailMaildrop

Services SMTP POP (Post Offi ce Protocol) IMAP (Internet Mail Access Protocol)

Filters

LINUX TECHNOLOGIES: MCU, MCA & CLE 40 h.

SUPINFO - 3 (L3)

Database Storage ManagementMonitoring Storage

Statistics and Views Advisory FrameworkMonitoring and Managing Storage

Automatic Storage Management

ConceptASM InstanceASM and Database ControlASM Group DiskASM FilesMigrating Database to ASM Storage

Page 69: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 69 -

SUPINFO - 3 (L3)

Introduction to Java Enterprise EditionJavaEE concept

OriginGoalsArchitecture

ComponentsFrameworks Project management toolsApplication servicesEJB component

Dynamic Web development - Servlet, JSP & TaglibServlets

ConceptsMechanismCreationConfi guration Request responsesSession managementCookies managementsContext managementLinking management

Java Server PagesConceptsSpecifi c syntaxImplicit objectsObject and properties manipulation action managementRedirect and include action management

TagLibsConceptTagLib fullnessMechanismHandler tag usesPersonalized tag creation

MVC 2 framework – StrutsProblematic

Servlets/JSP issuesMVC solution

StrutsMVC system applicationFramework structureAction creationForm creationStruts taglib useInternationalizationForm validation systemTemplate use: tiles

Distributed applications - RMI Presentation

Problematic and originAPI and characteristics and composition

RMI uses

Stubs and Skeletons Object references and transportRemote method callingRegister and Naming Client/server linkRemote objectsCompilation and execution RMI ExceptionSecurity Specifi city (dynamic loading, garbage collector,…)

Remote processing - Web ServicesConcept and mechanism

Problematic and characteristic ConceptProtocol details: SOAP

Web Service deploymentTools Web Service basic deployment WSDL Default client creationDeployment detailsUDDI directory serviceSecurity

Java 2 Mobile Edition basesIntroduction

History ConceptCDLC confi gurationMIDP profi le

MidletDefi nition How to create a Midlet Midlet states

User interfacesPresentationWhich packages? High level interfacesMenusLow level interfacesMultimedia

Advanced Java 2 Mobile EditionHigh level 2D interfaces

GameCanvasLayer TiledLayer SpriteLayerManager

ConnectivityWirelessBluetooth

SUN TECHNOLOGIES: Java Web and Mobile 40 h.

Active Spam Killer Bogofi lter DspamAntivirusClam AV Owner solutions

Optional services Webmails

Squirrelmail

IMP

Mailman

Mailing lists

Sympa

GPG

Page 70: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 70 -

IntroductionThe XNA Framework

PresentationWhy XNA?

XNA InstallationPrerequisitesXBOX360 deployment

XNA: 2DDrawing a sprite

Simple spriteSprite with transparencySprites collisions

Using inputsKeyboard

MouseJoypad

SoundXACTSound Integration

XNA: 3DDrawing primitives

Coordinate systemDrawing

ModelsDrawing a modelAnimation and modelsModel’s picking

Special EffectsParticle renderingParticle engine

.NET TECHNOLOGIES: XNA 12 h.

SUPINFO - 3 (L3)

Page 71: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 71 -

SUPINFO - 4 (M1)

CORPORATE LAWS 30 h.

An introductionSources and economic sectorsCorporate bodyChoice of legal structuresTrade litigation

Corporate common lawCorporate contractAdhesion to the instrument of incorporationSocial bodiesCorporate dissolution

PartnershipsGeneral partnership

Limited partnershipPrivate company (Ltd)

Defi nition and constitutionAssociated rightsCompany administrationCollective decisions

Public company (Plc)Defi nition and constitutionAssociated rightsCompany administrationCollective decisions

Other company forms

Defi nition and composition of an ERPERP defi nition, basic functionsPresentation of an ERP example (Baan ERP): the enterprises’ functions as seen through the ERPDefi ning the parameters of ERP versus specifi c developments programming Main differences between modular software and software packagesConstituents of an ERP Technical architecture: customer connections, hosts, network, storage, administrationFunctional modulesIntegrating the ERP to other inter/extern applications

ERP MarketImportance of the ERP in the IT fi eld todayMain publishers and integrators, segmentation by area, size of the enterprise, status of the ERP solutionsClients’ typology, types of enterprises, sectors and models by sector (examples of sector adapted solutions)

Life of an ERP ProjectProject constituents (human, organization, technical factors)The ERP project phases: pre-survey or framing, preparation, execution, provisioning and supportEstablishment methodology of the ERPProject organisation: works supervision/work supervision, integration, data migration, change managementExample of project constructionStart-up approaches: big bang, by module, by unitHow to carry through the evolution of an application architecture: an example in the aviation industryExample of the budgetary structure of an ERP structure: material costs, external costs, licensing

costs, integration costs, internal costs,Can ROI (return on investment) be calculated?Risks and key factors for success

Plan a modifi cation, one key factor of the success of an ERP projectOppositions, actors,Planning to conduct change: communication planning and training planningExample of change-conducive plan

Care of ERPTransferring the integrator’s team competences to the customer’s teamsDefi nition, organization and implementation of the Competency and Support CentreProblems arising from version changesOutsourcing: materials, support, maintenance (off-shore with front-offi ce and back-offi ce)

Other specialized software packagesSCM supply chain managementCRM customer relation managementEAIConclusionsAdvantages and disadvantages of the ERPsWhat roles can a SUPINFO engineer play in the set-up and maintenance of an ERP?What future for ERPs? Technological advances of the ERPs: new service oriented architectures

EAI/ERP 16 h.

Please note that the detail of the program is different in each country and therefore adapted to suit local needs.

Introduction of UML languageHistorical reason for the establishment of a pattern

A short reminder of the computing evolutionThe software complexityThe progressive management of the complexityThe limits of structured programming

Contribution of the establishment of a patternThe encapsulation principleThe abstraction principleThe modularity principleSynthesis

Historical aspects of the establishment of a patternGrady Booch and OODIvar Jacobson and OOSEJohn Rumbaugh and OMTThe arrival of UML

Uses casesDiagram description

The objective of this diagramThe syntactic elements

Case study

Needs formulationDiagram example and high-level utilization caseDiagram example and low-level utilization case

Classes’ diagramsDiagram description

The objective of this diagramThe syntactic elements

Case studyA few design patternsClasses diagram example

Packets diagramsDiagram description

The objective of this diagramThe syntactic elements

Case studyPackets diagram example

Objects diagramsDiagram description

The objective of this diagramThe syntactic elements

Case study

UML MODELING 20 h.

Page 72: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 72 -

Niveau 1 : PROFESSIONAL SITUATIONS - ADVANCEDFlight InformationPlane ReservationsSeminar PlanningDelegatesA New JobJob PromotionsInsurance & BankingMarket ResearchHelpful ContactsLiving in America

READING DOCUMENTSExecutive Committee MeetingThe Complaint

WRITING DOCUMENTSThe Year in ReviewThe ResponseThe ResignationHotel Brochure

MEETINGSCompany Strategy Company Strategy (Speaking)

PRESENTATION & SPEECHESPoliciesSite VisitSOCIALIZINGAt the RestaurantAt the Restaurant (Speaking)

PROFESSIONAL INTERACTIONBusiness NegotiationsBusiness Negotiations (Speaking)Delivery TimeDelivery Time (Speaking)

The OrderThe Order (Speaking)The Trade ShowThe Trade Show (Speaking)A Project Update

Niveau 2 : PROFESSIONAL SITUATIONS – EXPERTAn AppointmentBusiness CallsThe Company StandComparing ProductsMaking a SaleNegotiatingTrouble with OrdersAfter-sales ServicePaying a BillOrganizing a StayWelcoming VisitorsHandling an Invoice

PROFESSIONNAL INTERACTIONThe ProjectLegal Advice

READING DOCUMENTSThe Press Article

PRESENTATION AN SPEECHESProduct AnalysisThe Decision

SOCIALIZINGBetween MeetingsThe EconomyBetween Meetings

MEETINGSDepartment RestructureClient Negotiations

Foreign language: AMERICAN ENGLISH 4 70 h.

Managing for the fi rst timeA basic grounding in effective people managementTaking stock of your role as a managerDrawing up the identity card for your unitCarrying out a diagnosis of your teamTaking stock of your teamThe golden rules for being successful in a new managerial role

Succeeding to management interviewsSucceed to a professional interviewAccomplish a useful feedbackReact to a non-respect of the rulesReact to a poor performanceCongratulate a colleague

PEOPLE MANAGEMENT 15 h.

MARKETING PRINCIPLES 11 h.

Objects diagram exampleCommunication diagram

Diagram descriptionThe objective of this diagramThe syntactic elements

Case studyCommunication diagram example

State-transition diagramDiagram description

The objective of this diagramThe syntactic elements

Case studyState-transition diagram example

Sequence diagramsDiagram description

The objective of this diagram

The syntactic elementsCase study

Sequence diagram exampleActivity diagrams

Diagram descriptionThe objective of this diagramThe syntactic elements

Case studyActivity diagram example

Components and spread out diagramsDiagram description

The objective of this diagramThe syntactic elements

Case studyThe components and spread out diagram example

SUPINFO - 4 (M1)

Page 73: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 73 -

STRATEGY 31 h.

FINANCIAL MECHANISMS 18 h.

Fundamentals of fi nancial managementManagement Control: managing performanceTransfer prices and responsibility centresWhat is a cost?Cost price: from partial costs to full costsCost price: from full costs to the ABC method

Understanding the sources of value creation: ROCE and EVAUnderstanding the principles of the forecasting processConstructing and managing a budgetFrom broad strategy to daily management with the Balanced ScorecardPreparing your operating report

SELLING/NEGOTIATION 9 h.

Selling big projectsImproving your understanding of your prospect’s situationMotivate your target by raising problems that need resolvingIncrease your target’s motivation by asking implication questions

Master large project selling with the help of a real-world exampleStimulate the other side’s interest with questions about results they hope forAdapt your “pitch” to your target’s express needs

SUPPLY CHAIN MANAGEMENT 6 h.

The basics of supply chain managementWhat is the supply chain?The best way to guide fl ows in the supply chain

The supply chain and client satisfactionThe supply chain and the relationship with suppliersThe supply chain and decisions about industrial structure

The fundamentals of a company’s strategyWhat is a company’s strategy?Guidelines for drawing up a strategic projectMastering SWOT analysisAnalyzing market dynamicsBuilding your strategy at the business levelWhat is a cost strategy?Conducting a cost strategy successfullyWhat is differentiation strategy?Conducting a differentiating strategy successfullyThe value chain and competitive advantage

Analyzing your competitive positionValue creation and strategy

Understanding corporate strategyWhat is corporate strategy?The keys to the success of a corporate strategy

Understanding the theory of resourcesTheory of competitive advantage by Michael PorterThe limits of Porter’s modelRedefi ning strategy through the theory of resources

Intrusion Detection and Prevention TechnologyOverview of Intrusion Detection and PreventionInspection EngineCisco IDS and IPS Devices

Confi gure Network Intrusion Detection and PreventionCisco IOS Intrusion Prevention SystemConfi gure Attack Guards on the PIX/ASAConfi gure Intrusion Prevention on the PIX/ASAConfi gure Shunning on the PIX/ASA

Encryption and VPN TechnologyEncryption BasicsIntegrity BasicsImplementing Digital Certifi catesVPN TopologiesVPN TechnologiesIPSec

Confi gure Site-to-Site VPN Using Pre-shared KeysPrepare a Router for Site-to-Site VPN using Pre-shared KeysConfi gure a Router for IKE using Pre-shared KeysConfi gure a Router with IPSec using Pre-shared KeysTest and Verify the IPSec Confi guration of the RouterConfi gure a PIX/ASA Site-to-Site VPN using Pre-shared Keys

Confi gure Site-to-Site-VPN Using Digital Certifi catesConfi gure CA Support on a Cisco RouterConfi gure an IOS Router Site-to-Site VPN using Digital Certifi catesConfi gure a PIX/ASA Site-to-Site VPN using Digital Certifi cates

Confi gure Remote Access VPNIntroduction to Cisco Easy VPNConfi gure the Easy VPN ServerConfi gure Easy VPN Remote for the Cisco VPN ClientConfi gure Easy VP Remote for Access RoutersConfi gure the PIX/ASA as an Easy VPN ServerConfi gure a PIX/ASA as an Easy VPN ClientConfi gure the ASA to support WebVPN

Secure Network Architecture and ManagementLayer 2 Security Best PracticesSDM Security AuditRouter Management Center (MC)Simple Network Management Protocol (SNMP)

PIX/ASA Contexts, Failover and ManagementConfi gure a PIX/ASA to Perform in Multiple Context ModeConfi gure PIX/ASA FailoverConfi gure Transparent Firewall ModePIX/ASA Management

CISCO TECHNOLOGIES: Network Security 2 28 h.

SUPINFO - 4 (M1)

Page 74: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 74 -

Presentation of exchange 2007 Previous versions of exchange server New features of exchange server 2007 roles

Mailbox roleClient access roleHub transport roleEdge transport role Unifi ed messaging roleEditions and cal for exchange server 2007

Architecture for exchange server 2007Installation of exchange 2007

Requirement of exchange 2007 installationMinimal requirement to execute exchange 2007 Considerations on the material and the performancesSoftware requirements

Exchange and active directory interactions Active directory preparation to deploy exchange server 2007

Directory preparation in a one-domain infrastructure.Exchange server 2007 silent installation

Exchange server 2007 installation wizard.Exchange server 2007 installation without wizard

Checks after an exchange server 2007 installationExchange server best practices analyser (exbpa)

Migration to exchange server 2007Confi guring mailbox server roles

Administration toolsExchange management console (emc) Exchange management shell and Microsoft windows powershell Exchange management shell commands

Implementing mailbox server roles Introduction to the mailbox server role post-Installation tasks Storage groups and databases Process of managing data on a mailbox server Data storage technology options

Managing public folder databasesPublic folders

Public folder replication Managing data on a mailbox server

Managing recipient objects Introducing recipient objects

What are recipient objects? The different recipient object types Managing mailboxes Introducing mailbox management Examples of mailbox user management Moving mailboxes Mailbox confi guration options Deleting mailboxes

Managing distribution groups IntroductionReminder on active directory group types Selecting between group typesActive directory group scope

Managing dynamic distribution group PresentationConditions and fi lters Managing mail contact PresentationUsesManaging mail-enabled public folders PresentationUsesPublic folder permissions

Managing e-mail address and address lists Managing e-mail address policies

PresentationWhat are accepted domains? Confi guring accepted domains Authoritative domains Relay domainsDelete an accepted domain: What are e-mail address policies?

MICROSOFT TECHNOLOGIES: Exchange Server 26 h.

SUPINFO - 4 (M1)

Introduction to the VoIPVoIP

DescriptionHistoryComparison with the traditional telephonyVoIP actorsThe future: Everything over IP

Protocols linked to the VoIPRTPRTCPSIPMGCPCisco SCCPH.323

SIP protocolDefi nitions

Defi nitionsArchitecture

User AgentsProxy ServerRegistrar ServerRedirect Server

SIP methodsSIP messagesSIP headerSDP headerSIP requestsSIP responsesPredefi ned SIP message list

SIP exchangesSIP transactionsSIP dialogsTypical transactions and dialogs

VoIP equipmentsSubscriber side equipments

IP telephonesAdapters for analog telephoneIP telephony software

Provider side equipmentsPABX and IPBXIP/TDM gatewaysSIP servers

Network infrastructure supporting the VoIPInterconnecting VoIP and traditional telephony

Interconnect VoIP and traditional telephonyLAN infrastructure

QoS and VLANsSecurityVoIP and wireless networks

WAN infrastructureQoSSecurityNAT/PATReliability and availability of WAN links

Implementation over different media and WAN technologies

VOIP TECHNOLOGIES:Study and Implementation

20 h.

Page 75: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 75 -

.NET TECHNOLOGIES: ASP.NET 2.0 & WEB Services

40 h.

ASP.NET 2 Basics (Web Applications)Introducing ASP.NET

OverviewPage framework

Master-pagesStyle, Skin, ThemesWebparts

Server ControlsGeneralities Introducing a few controlsClient/Server interactionPostBackControl validation

Confi guration fi lesFile organizationUpdating an application

ASP.NET 2 Advanced conceptsUser defi ned server controls

BasicsCreation of a user controlUsing events

Data accessDataBindingDataSource typesObjectDataSource

Data displayDebug, Trace, Cache

Debugging an applicationUsing Trace informationCache managementCache dependency

Customization and navigationCustomizationNavigation controls

Web applications securityUser managementIIS authenticationMembershipsUsing rolesOut-of-the-box server controls (Login, LoginView)

Web ServicesGeneralities

Introducing web servicesSOAP protocolWSDL format

Web services and .NETCreation of a web servicesDeployment of web servicesUsing web servicesCreation of a transparent proxy

Managing address lists Presentation of address lists Use

Managing global address lists PresentationUse

Managing offl ine address books PresentationOffl ine address book distribution Use

Managing client access Introduction to managing client access

Presentation of the client access server role (cas) Client access use

Managing pop3 and imap4 access Differences between pop3 and imap4 Activation and authorization pop3 Activation and authorization imap4

Outlook 2007 / exchange 2007 AutodiscoverImplementing outlook web access PresentationConfi guration Implementing outlook anywhere PresentationConfi guration Activesync

Messages routing Introduction to routing

Exchange connector Hub site Installation with an exchange server 2003 Transport rules Transport rules agent Edge rules agent

Rules management Mail transmission in an exchange 2007 organization Role edge server Confi guration of an edge server EdgesyncSolving routing problems Hosted exchange services

High availability, backup, and recovery High availability LcrPresentationWorks Cluster exchange 2007 SccCcrHow ccr works InstallationBackup exchange server 2007 Type of backup Backup data Method of backup How backup Recover exchange server 2007 Emergency recovery Partial restoration

Maintaining the messaging system Implementing change management Microsoft operations framework Updating exchange servers Maintenance tools EseutilIsintegExchange console

SUPINFO - 4 (M1)

Page 76: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 76 -

Installing SUN Solaris 10Introduction to Solaris 10

History Solaris versions: from version 9 to version 10Installing Solaris 10

Step by stepConfi guration exampleAssistance

Managing the fi lesytem Introduction

PrerequisitesHard disk functioningThe FHS

Disk managementCreating partitionsFormattingAssembling and disassembling volumes

Packages managementIntroduction to the principle of packages

Package structureThe /var/sadm/install/contents fi lePackages format

Administering the packages

IntroductionPackages conversionDisplaying information on the packagesAdding an applicationRepairing an applicationErasing an application

Adding an application using the spool directoryTransferring packagesUpdating

Basic operationsBootROM

Introduction to BootROMBootROM commandsIdentifying the start up peripherals

Start up and shutdown sequences SMF - Service Management Facility Start up sequenceShutdown sequence

User and security management Characteristic of the users’ management compared to Linux

Users’ base system managementManagement of the accounts

Management of the fi les of initialization

SUN TECHNOLOGIES: Solaris 1 30 h.

SUPINFO - 4 (M1)

Introduction to Java Enterprise EditionJavaEE concept

OriginGoalsArchitecture

ComponentsFrameworks Project management toolsApplication servicesEJB component

Java Enterprise Edition (JavaEE) ArchitectureConcepts

Enterprise architecture problematic Complex architectureWeak coupling and strong coherency

JavaEE architectureLayer ArchitectureBusiness layerApplication layerPresentation layerMVC concept implementationLinking layers

Java Server FacesIntroduction

JSP issuesJSF characteristics JSF position into an n-tiers applicationJSF site examples

JSF basesComponent conceptCommon attributesBehaviourComponents and JavaBeans linksUnifi ed Expression Language Life cycle

Base tagsDisplayEntryLinksButtonsCheckboxesRadio buttonsArrays

Server confi gurationJavaBean declarationsNavigation

Java Server Faces - advancedBehaviours

ActionListenerValueChangerListener ConversionValidation

Advanced conceptsInternationalization (I18n) Message managementJavaEE integration (resources injection)

FaceletsIntroductionPage structure JSFC Template View templatingComponent templating Facelets tags

Business logic encapsulation - EJB 3Framework presentation

HistoryConcepts

Session BeansCreationDeployment

Entity BeansCreationRelationsDeploymentEntityManager

Message Driven BeanThe JMS APICreation

EJB relationsInjection conceptJava building tool: ANTPresentationConceptsConfi guration fi le

Simple actionsTargets TasksVariables

Complex actionsClassical targetPersonalized taskXDoclet

SUN TECHNOLOGIES: Java Entreprise 30 h.

Page 77: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 77 -

The IBM companyCompany presentation

OriginHistory

ActivitiesHistorical activitiesServices

Product presentationHighlighted productsOther products

IBM todayDetails

AS/400 & OS/400 The hardware: AS/400

Introduction system historyHardware architectureAS/400 different modelsSupported operating systems and their specifi cityAS/400 today uses

The software: OS/400Introduction and operating system historyOS/400 basic conceptOS/400 system connectionControl languageDB2/400, integrated data base

WebSphere Application ServerIntroduction

What is an application server?Introduction to SOAStand-alone environmentDistributed environmentInstallationPackaging

InstallationProfi les

MigrationAdministration clients

Administration consolewsadminCommand lineAntAdministration tools

ArchitectureEnvironment typesServers, nodes, cellsServer typesContainersEnvironment variablesJDBC resources

Application managementDevelopment and deploymentInstallation and confi gurationUpdatesApplication Server Toolkit

WebSphere Application Server - advancedSecurity

WebSphere security modelHigh availabilityAdministrative security

MessagingMessaging architectureSecurityWebSphere MQ

High availability and load managementLoad balancingData replication serviceHigh availability

Performance ViewerPresentationUses

IBM TECHNOLOGIES 40 h.

Advanced 2DAdvanced collision

Pixel collisionDrawing texts

The SpriteFont Class2d within 3D environment

BillboardingShaders and XNA

Shaders basicsIntroductionPixel shaderVertex shader

Using shadersVertex lightning

Textures operationsNormal mapping

Post-process effectsBloom

XNA PhysicsIntroduction

Why a physic engine?NewtonInstalling Newton

ModelsSphereCube

CollisionsAnswering a collision

.NET TECHNOLOGIES: Advanced XNA 12 h.

SUPINFO - 4 (M1)

Security of the systemIntroductionSupervising access to the system Characteristic of the change Security controlSupervising the FTP, rclient and SSH accessesControlling the access to the dataControlling permissions

Printing managementAdministering the printing servers

IntroductionPresentation to the basic principles of network printingConfi guring the printing servicesSupervising the printing servicesStarting and stopping the LP impression serviceSpecifying the chosen printerUsing the LP impression service

Client’s confi gurationBackup management

UFSPresentation of UFSBackupRestore

ZFSPresentation of ZFSBackupRestore

Basic networksNetwork confi guration

IntroductionIfconfi gConfi guring the networks interfacesUsing DHCP

Page 78: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 78 -

DB2 UDB – basis and clientPresentation of DB2 editions

Mono user editionMulti user editionDeveloper editionPortable editionDB2 for z/OS and iSeries

Basis conceptsDB2 / Oracle architecture InstancesDatabasesContainersTables spaces (bufferpools)DB2 Naming conventions Base elements

DB2 ClientPresentation of client typesClient Confi guration Client Server communication TypeCommunications confi guration

DB2 UDB – Server and advance confi gurationDB2 ServerDefault confi gurationRemote server confi guration

Native XML data storagePresentationValidation

PHP Developing with DB2Zend engineSpecifi c functions

Logging Log typesLogging typesMirror logLog reading

Security managementSecurity modelsAuthenticationAuthorizations

Tivoli Identity Manager – logic and organizationTivoli history

HistoryConceptsToday

’Identity Access Manager (IAM) conceptsConceptsPossibilities

Tivoli Identity Manager (TIM) How TIM responds to IAM needs

TIM organization and architectureTIM confi guration

Tivoli Identity Manager – implementationIBM Tivoli Manager features

BasicsAdvanced

ImplementationConfi gurationInteraction with other architecture applicationsUse cases

LotusHistory and presentation

PresentationHistory

Lotus, a collaboration toolsBase conceptsPresentation

Directory servicesServer confi guration Security and access

Calendar and messaging serversDomino server confi gurationNotes confi gurationiNotesGroupwaresUser securityPlugins

MainframeHistory and macro-computer concept

Uses and conceptHistory and marketing overviewToday

Different editionzSeriesSystem z9

Operating systems and virtual systemsVirtual system of systems presentationPossibilities

Advanced operationsMaintenanceUpgradeSecurity

SUPINFO - 4 (M1)

Page 79: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 79 -

BUSINESS CREATION 30 h.

The basicIntroduction

NotaThe key points

The ideaThe right questionsThe technologic approach

The marketMarket typologyThe customers

The activity and the preliminary studyDefi nitionsKey pointsInformation searchBrief study

From idea to product or serviceThe confrontation

Identifying the actorsThe confrontationThe protection

ConstraintsThe product typeThe productionThe imageThe distributionThe market and the regulationThe means

The project lifespan and analysisPersonality, potential and environmentMotivation, objective and competenceThe deciding moment

The business planRole of the business plan

The roleThe market study

The stages of the market studyThe surveyGalvanizing the sales The price policy

The business planThe planThe contents

The contents (2)

The beginningsSales

IntroductionThe buildingsThe documentsThe commercial activity

FinancesThe fi nances and the planning

Recruitment and suppliersDefi ning the functionsThe suppliersThe staff

Information systemsThe choice of the systemThe activity indicatorsFollow-up and controls

The incorporation certifi cation and the costsThe application form

The administrative bodiesThe contentsThe cost

State aidsSocial aids

The social aidsFinancial aids

The fi nancial aidsFiscal aids

The fi scal aidsAdditional aids

Specifi c aids

Start-UpsThe specifi cities

The investmentsParticular statuses The risks

Project presentation

The enterprise problematicThe information systemThe globalization of the exchangesThe decisional role within the information system

From infocenter to datawarehouseThe infocenterInfocenter: set of dataData warehouseOrientation subject (data warehouse, datamart)Integrated dataHistorised dataNon volatile data

The decision-making projectThe menThe human environmentA project based approach

The success factorsThe technical projectStudy of what’s thereThe data modelsThe ETLThe SGBDThe restitution toolsTechnical architecture

ModellingThe fact tablesThe dimension tablesThe aggregates tablesMetrologyVolumetricThe time

DATA WAREHOUSE:Concepts and architecture 16 h.

COMPUTING AND MULTIMEDIA LAW 40 h.Introduction to computing law

Defi nitionDefi nitionProblematic

CharacteristicsSources and applicable law

National sourcesInternational sources

SUPINFO - 5 (M2)

Page 80: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 80 -

Applicable civil lawApplicable criminal lawProof

Computing litigationOut of court settlementMediation

Research methodologyObjectivesPrinciples: sources’ multiplication, hierarchy and confrontation

Digital copyrightCopyright protection

Intellectual property and digital creationsProtection conditionsMoral rightExploitation rights

Copyright exemptionsWorks not covered by copyrightThe technical copy exceptionThe private copyThe question of downloading

Ethic and computingDefi nition

SoftwareSoftware protection

Defi nition of softwareDifferences with other types of creationsProtection conditionsProtection of the presentationData protectionProtection of the software

Precautions in relation with the websiteCompulsory informationDeclaration obligationsReferencingCivil responsibilities of the contents’ suppliersPenal responsibilities of the contents’ suppliers

Website creation contractLegal nature of the contractProvider’s obligationsClient’s obligationsThe contract clauses

Domain nameDomain name defi nitionAcquiring a domain nameThe domain name litigationThe domain name litigation (2)

SoftwareCopyright protection of the software

The protection conditionsThe software protection systemThe copyright attributionThe copyright protection litigation

Protection of the software with a patentThe European proposalArgumentation

Software contractsThe software creation contractThe software adaptation contract

The software edition contractDatabases

Database protectionLegal defi nition of a databaseFree data, appropriated dataStructure copyrightContents copyright

The world according to GoogleThe Google phenomenonThe Google activities

The Microsoft caseFreedoms and Internet

Freedom of speechFreedom of speechLimits to speech freedom

Individual freedomsImage representation rightCorrespondence secrecy rightOther freedoms

Employee freedomCyber-surveillance of the employeesUtilization of Internet in the workplace

E-commerce freedomThe principle of e-commerce freedomThe exceptions to e-commerce freedom

Freedoms and internet (2)The protection of the cyber-consumer

E-commerce and the right to retractImplementation delays

Canvassing cyber-consumersCanvassing and spammingCyber advertising

Cyber crimeIntrusion in the systemsManipulations in the systemsRepression

Cyber crime (2)The illicit gathering of personal dataThe illicit utilization of personal dataOffences not specifi c to computing

Computing and multimedia contractsThe access providing contract

Defi nitionThe obligations of the access providerThe obligations of the subscriber

The hosting contractDefi nitionThe obligations of the hostThe obligations of the hosted

The referencing contractDefi nitionThe obligations of the referenced siteThe obligations of the search engine or of the directoryThe responsibilities of the search engine or of the directory

The other contractsThe e-commerce contract, setting upThe e-commerce contract, carrying outThe computing services contracts

IntroductionThe computing service

What is a computing service?What does producing services mean?Managing services?Driving by the processes?

Services managementThe SI actors, roles and responsibilitiesThe governance temple (ITIL, COBIT, CMMI, ISO…)The service centreThe maturity levelsThe driving of a service centre

What is ITIL?The ITIL context

The customers’ expectationsThe evolution towards a referentialA bit of history…

ITIL presentationThe ITIL conceptThe ITSMThe perimeters covered by ITIL

ITIL concretelyThe support service

The service DeskIncidents managementProblems managementChanges managementProduction management

ITIL FOUNDATION 24 h.

SUPINFO - 5 (M2)

Page 81: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 81 -

SUPINFO - 5 (M2)

Confi guration managementDelivery service

Capacity managementAvailability managementContinuity managementFinancial managementService levels management

From ITIL to ISO/CEI 20000Introduction

PDCAProcess approachCustomer visionTransversalNormalisation contribution

PROFESSIONAL SITUATIONS - ADVANCEDADMINISTRATIVE & SECRETARIAL

Letter TemplateTravel ItineraryMinutes

AUTOMOTIVEVehicle InspectionVehicle RegistrationRecall Notice

BANKING & INSURANCECertifi cate of InsurancePromissory NoteTravel Insurance

HUMAN RESOURCESPersonnel Requisition FormJob Candidate EvaluationJob Offer LetterNotice of DismissalEmployee HandbookFair Labor Standards Act

SALES & MARKETINGInternal MemoCold Call ScriptSales Results PresentationCase StudyMarketing Strategy

AFTER-SALES & CUSTOMER SERVICECustomer Survey AssessmentLetter of ComplaintWarranty and Return Policy

ITInstallation GuideServer DescriptionThread Safety Issues

LEGALAttorney’s LetterCorporate BylawsGeneral Contract for ServicesPatent Law

Foreign language: AMERICAN ENGLISH 5 56 h.

Management stylesAdapting management to the independence of your staffHelping your staff to progress by using the correct management styleConducting delicate interviews successfully by using different management styles

The manager-coachPsychology in managementHow to improve your coaching by understanding people betterFundamental coaching toolsWhen should you coach? When should you manage?

DelegationWhat is delegation?What is the best way to delegate?Monitoring delegationWhat to do when a delegated mission goes wrong

Developing your staff’s skillsWhat is competence?Choosing which skills to develop your teamDeveloping skills through trainingDeveloping skills by delegatingGiving training feedbackDeveloping your team’s skills through individual coaching: the GROW approach

Organizing work so that it acts as trainingMotivating your staff

Identifying your staff members’ motivationHow to deal with demotivationHow to motivate your staff by using the V.I.E systemHow to effectively praise your staffHow to recognize passivity and overcome

Appraising your staffThe annual appraisal interview: a tiresome obligation or a constructive opportunity?The four golden rules for conducting annual appraisal interviewsHow to use the SMAC method to formulate pertinent objectives that motivate your staffHow to conduct appraisal interviewsHow to manage diffi cult appraisal situationsHow to monitor objectives agreed during appraisal interviewsHow to use the SMART method to formulate pertinent objectives that motivate your staff

PEOPLE MANAGEMENT 63 h.

Manage changeGetting to know what your change project really involvesSettling a suitable change strategyEnsuring success by understanding the stakeholders’ positionsOrganizing the change projectCommunicating about the change project

Motivating your team to support a changeSupporting your team members through changeSteering the change project on a daily basisChange leadership: some ethical issues

TEAM MANAGEMENT 12 h.

Page 82: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

SUPINFO - 5 (M2)

- 82 -

Introduction to wireless networksPresentation

HistoryEvolution

EquipmentsNetwork equipmentsClient peripheralsSymbols

ArchitecturesAd HocInfrastructureOther technologies

IEEE 802.11 normsPresentation

IEEE 802 normsIEEE 802.11 norms

PHY layerPMD and PLCP layersChannels and frequencies

MAC layerCSMA/CARTS/CTSIFSServices

MAC architectureDCFPCFCoexistence

Radio technologyWave theory

Physical propertiesMeasures and units

Waves into a WLANScatteringMultipathPath LossAbsorption

ModulationModulation technicsFHSSDSSSOFDM

Wireless technologiesAdvantages

The “wire free” conceptInstallation

DrawbacksSecurityPerformances

FeaturesRedundancyLoad sharingRoamingScalability

AntennasPresentation

ProprietiesPolarization and radiationFresnel zoneDiversity

Antenna typesOmnidirectional antennasUnidirectional antennas

Rules and lawsETSI/FCCEIRP ruleARCEP rule

Cisco access pointsPresentation

ComparisonConnectionBVI interface

Confi guration de base

Default confi guration and resetConfi guration methodsBasic confi gurationInterface confi gurationServices

Advanced confi gurationHot StandbyRepeaterQoSVLAN

Verifi cationsState visualizationCDP

Cisco bridgesPresentation

ComparisonConnectionLEDs

Basic confi gurationDefault confi gurationConfi guration methodsBasic confi gurationInterface confi guration

Advanced confi gurationRepeaterRadio parametersAccess waysSystem confi guration

Verifi cationsState visualizationTroubleshooting

Wireless securitySecurity basics

Technologies presentationThreats classifi cationAttack methodsVerifi cations

First generation securityBasic securitySSIDWEPAuthentication

Second generation securityWPA and WPA2TKIP encryptionAES encryptionAuthentication typesIEEE 802.1X authenticationRADIUS infrastructure

Other methodsVPNVLANSpanning-Tree

Troubleshooting and Site SurveyTroubleshooting

General approachOSI model approachDiagnostic toolsSystem messagesEnterprise management

Basics of site surveyBasicsDesign of an access networkDesign of a point-to-point linkRequired devices

DocumentationDocumentationTools and utilitiesInfrastructure knowledgeStudy

Mounting and installingInstalling access pointsInstalling antennas

CISCO TECHNOLOGIES: Wireless 20 h.

Page 83: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

SUPINFO - 5 (M2)

- 83 -

24 h..NET TECHNOLOGIES: Remoting 5 MDN

RemotingIntroduction

What is Remoting? Accessing distant objectsMarshallingMarshalling by value (serialization) Marshalling by reference Client side activation Server side activation Singleton / Singlecall Communication channels

ImplementationCreating Marshall by Value typesCreating Marshall by Reference typesClient’s side activation: server codeClient’s side activation: client code

Server’s side activation: Server codeServer’s side activation: client code Customising server objects.

Confi guration fi lesAdvantagesClient side confi guration: App.conf server Client side confi guration: App.conf client Server side confi guration: App.conf server Server side confi guration: App.conf client

Other Solution / Future solutionsWeb servicesDirect Socket confi gurationEnterprise services MSMQ Windows Communication Foundation

ORACLE TECHNOLOGIES: Oracle Database 10G: implement & administer a datawarehouse

20 h.

Data Warehouse Design Logical Versus Physical Design in Data WarehousesData Warehousing Schemas Data Warehousing Objects Physical Design in Data Warehouses Hardware and I/O Considerations

Data Warehousing Schemas Star Schema Model Snowfl ake Schema Model Tuning Star Queries Star Transformation Hints Star Transformation Hints Static Partition Pruning and Star Query Dynamic Partition Pruning and Star Query Dynamic Partition Pruning Determination

Partitioning Basics Supported partition types Rolling window operations Partition pruning Partitioning Using a Template

Extraction, Transportation, and Loading (Extraction and Transportation) ETL Tools Extraction Methods Logical Extraction Methods Physical Extraction Methods Change Data Capture Transportation Using Transportable Tablespaces Loading Mechanisms

ETL-Loading Load a formatted fl at fi le into an existing table with SQL*Loader Performing basic transformations while loading with SQL*Loader External tables using oracle_loader driver External tables using oracle_datapump driver Loading data with OCI and Direct-path APIs

ETL-Transformation Transformation Using SQL Transformation Using PL/SQL Transformation Using Table Functions Error Logging and Handling Mechanisms

Parallelism Concepts Parallel Operations Degree of Parallelism Parallel Execution Plan Operations That Can Be Parallelized The PARALLEL Clause Parallel Query Parallel DDL Performance Benefi ts of Parallel DML

Parallel Operations in Data Warehouses Automated Parallel Query Tuning Data Distribution and V$PQ_TQSTAT Object Statistics and V$PQ_TQSTAT

Materialized Views Materialized Views Overview Types of Materialized Views Nested Materialized Views Partitioned Materialized Views Refresh Methods and Modes Altering/Dropping Materialized Views Dimensions and Hierarchies Dimensions and the Data Dictionary

DimensionsCreating dimensions Validate dimensions data View dimension defi nition information Distinguish between dimensions and constraints

Materialized Views Refresh Refresh Methods and Modes Identifying Dependent MVs Conditions for Complete/Fast Refreshes Materialized View Logs Parallel Refreshes

Query Rewrite What Can Be Rewritten? Enabling Query Rewrite Join Compatibility Checks Common Joins PCT and Query Rewrite Query Rewrite using Multiple MVs Index Materialized Views

SQL Access Advisor DBMS_OLAP Advisory Procedures Workload Management and Sources RecommendationsWorkload Filters and Attribute Types Tuning of Manually Created Materialized Views Fast-Refreshable Materialized Views RECOMMEND_MVIEW_STRATEGY procedure

Data Warehousing System Management Statistics Collection Resumable Sessions Backup and Recovery Table Compression Security

Page 84: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

SUPINFO - 5 (M2)

- 84 -

CISCO TECHNOLOGIES: IP Telephony Express

VoIPVoIP vs traditional telephony

Implement voice into an IP networkReal time voice into an IP networkPacket loss, delay and jitterGateways: features and uses

Challenges of the VoIPRequired bandwidth for the VoIP

IP phone presentationThe Cisco IP phone modelsConnect IP phones to the network

Installing with a single cableInstalling with multiple cablesInstalling with multiple switchesNetwork and protocol management

Cisco IP Communicator: an IP softphoneInstallation of the Cisco softphone

Prerequisites and installationInstallation prerequisites for the softphoneInstallation of Cisco IP Communicator

Confi guration of Cisco IP CommunicatorCisco IP Communicator interface

Call featuresIP phone interface descriptionCall establishment

Which are the steps?Point-to-point call

Dial planEvolving dial planA state of the art dial planHierarchical dial plansIntegrating an internal and public dial into the same plan

Class Of Restrictions (COR)IntroductionConfi gurationStep 1: Declaring class namesStep 2: Creating inbound class listsStep 3: Creating outbound class listsStep 4: Applying inbound class listsStep 5: Applying outbound class lists

Confi guring Cisco CallManager ExpressCME, options, process and parameters

GeneralitiesCME processing mode

Communication protocolsSCCP (Skinny Client control Protocol)H.323SIP

VLAN with CMEFlow separationVLAN confi gurationSpecifi c DHCP parameters confi gurationRestriction

Registering process of an IP telephone with CMEGeneralities

Registering processEphone and Ephone-dn

GeneralitiesEphone

GeneralitiesConfi gurationExample of a basic confi gurationExample of a multiple Ephones confi gurationExample of a multiple buttons and multiple Ephones confi guration

Ephone-dnSingle-line Ephone-dnDual-line Ephone-dnPrimary and secondary Ephone-dn with one numberShared Ephone-dnMultiple Ephone-dn on one EphonePreference and HuntstopOverlay Ephone-dn

CME fi lesGeneralitiesFile types

GUI fi lesCisco TAPI fi lesFirmware fi lesMusic on hold

Initial installation of telephonesManual installationAutomated installationPartially automated installationVerifi cations

GUI confi guration of the CMEPrerequisites

Create GUI administrators and users accountsGraphical confi guration interface

Access to the GUI interface“Administrator” interface“Phone user” interface

Call options confi gurationCall transfer confi gurationCall redirection confi gurationTelephone directoryPersonalized ringtonesMusic on holdIP phone display

Quality of Service (QoS)Introduction: what’s the Quality of Service?QoS principlesQoS mechanisms

QoS mode queues managementPQ mode queues managementCQ mode queues managementWFQ mode queues managementCBWFQ and LLQ mode queues managementCongestion detection

20 h.

Page 85: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 85 -

Notes

Page 86: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

Notes

- 86 -

Page 87: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

Notes

- 87 -

Page 88: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

- 88 -

Page 89: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

Mapa de las escuelas SUPINFO : www.supinfo.com/mapa-escuelas

- 89 -

Tarjeta telefónica internacionalAcceso a una red mundial de 500 puntos estudiantes Servicio mundial de urgencia las 24 horas E-mail y voice-mailRevistas dedicadasTransportes NacionalesTransportes InternacionalesViajes y excursiones

HotelesOciosRestaurantes, bares, pubsCinesMuseosCambioVisaetc.

Además de los servicios externos, la tarjeta ISIC-SUPINFO es utilizada como control de acceso automático a ciertos establecimientos SUPINFO a través del mundo, al acceso a los espacios dedicados a las promociones, a los laboratorios. Ella integra progresivamente un sistema de monedero electrónico para la utilización de fotocopiadoras o el consumo de bebidas y golosinas.

Direcciones y teléfonos de todos los centros SUPINFO en Francia y en el mundo: www.supinfo.com/contacto

SUPINFO otorga a todos sus alumnos ingenieros una tarjeta de estudiante internacional que ofrece numerosas ventajas.Ser alumno ingeniero de una gran escuela como SUPINFO tiene sus ventajas: es reconocida por la UNESCO, la tarjeta ISIC-SUPINFO vale como atestación del estatus de estudiante en el mundo entero.Los alumnos ingenieros SUPINFO se aprovechan entonces de todas sus ventajas a nivel internacional y no solamente a nivel nacional, regional o local. Por ejemplo: los estudiantes Canadienses tienen derecho al 40% de descuento en los trenes.Con la Tarjeta ISIC-SUPINFO, un alumno ingeniero SUPINFO tendrá acceso a la misma reducción.

Pero esto no es todo. He aquí un vistazo de las otras ventajas unidas a la tarjeta ISIC-SUPINFOReducciones en el mundo entero en

Sede administrativa internacional52, rue de Bassano

F-75008 Paris - FRANCIA

Tel.: +33 (0)1 53 35 97 00 - Fax: +33 (0)1 53 35 97 01E-mail: [email protected]: www.supinfo.com

SSIAcow

burg

Page 90: Escuela mundial especializada en las Tecnologías de la Información · 2008-04-10 · - 2 - Antes de terminar sus estudios, Sarah podrá cambiar de opinión y escoger entre las otras

01 INFORMATIQUE9 TELECOMABEILLE ASSURANCEACCENTUREADECCOADP GSIAGF - ALLIANZAIR FRANCEALCATELALSTOMALTADIS - SEITAALTENALTIALTRANAMADEUSANDERSENAONIXARIANESPACEASTONAT&T ISTELATOSATTACHMATEAVAYA COMMUNICATION - LUCENTAXABANQUE WORMSBARCLAYS BANKBAYER PHARMABMC SOFTWAREBNP PARIBASBOUYGUESBOUYGUES TELECOMBRITISH PETROLEUMBULL INGENIERIEBUREAU VERITASBUSINESS OBJECTS SOFTWARECAISSE DE DEPOTS ET CONSIGNATIONSCAIXACANAL +CANAMCAPGEMINICARSLON WAGONS LITSCARREFOUR PROMODESCARTIER INTERNATIONALCAST SOFTWARECDC INFORMATIQUECEGETELCELIOCENCEPCERG FINANCECFAOCGACHRONOPOSTCICCISCOCNILCNP ASSURANCESCNRSCOCA COLA BEVERAGESCOFRAMICOMMISSION EUROPEENNECOMMUNICATION & SYSTEMESCOMPUTER ASSOCIATESCREDIT AGRICOLECREDIT LYONNAISCS TELECOMCSCDALET TECHNOLOGIESDANONEDARTYDASSAULT AVIATIONDASSAULT SYSTEMDELL COMPUTERDELOITTE & TOUCHE TOHMATSUDEXIA - CREDIT LOCAL DE FRANCEDHLDISNEYLAND PARISDOCUMENTUM SOFTWAREDUNLOPEADSEAGLE STAR VIEEASYNET

ECOLE NATIONALE SUPERIEURE DES TELECOMSEDFEDF GDF SERVICESEDSEMI MUSICETIETRALIEULER SFACEUROCOPTEREUROMASTEREXPERIANEXXON CHEMICALFININFOFNACFRAMATOMEFRANCAISE DE MAINTENANCEFRANCAISE DES JEUXFRANCE TELECOM - EQUANTFRANCE TELECOM R&DFRANCE TELEVISIONFUJITSU - ICL COMPUTERGANGEAC SOFTWAREGEMPLUS CARD INTERNATIONALGENERAL ELECTRICGENERALI FINANCESGFIGIATGIE CARTES BANCAIRESGROUPE ANDREGROUPE AZURGROUPE MALAKOFFHEWLETT PACKARD COMPUTERHISPANO SUIZAHSBC - CCFHUMMINGBIRDIBMIBM GLOBAL SERVICESIBM SOFTWAREINTELLICORP SOFTWAREINTELINTERNET PROFESSIONNELIPLANET - NETSCAPEIPPON TECHNOLOGIESIPROGRESS SOFTWAREJD EDWARDS SOFTWAREJET MULTIMEDIAJUNIPER NETWORKSKEYSTONEKRAFT JACOB SUCHARDL’OREALLABORATOIRE FOURNIERLALIQUELE MONDE INFORMATIQUELEROY MERLINLEXMARK INTERNATIONALLIGUE NATIONALE CONTRE LE CANCERLILLYLOGICA

MAC DONALD’S MACIFMANDRIVAMATRA - HACHETTEMAZARD & GUERARDMEDIAMETRIEMEDIAPOSTMEDICALE DE FRANCEMEGA INTERNATIONAL SOFTWAREMERANT SOFTWAREMETAMOR - GROUPE DECANMETROMETROPOLE TELEVISION - M6MICROSOFTMINISTERE DE LA JUSTICEMINISTERE DE L’AGRICULTUREMINISTERE DE L’ECONOMIE DES FINANCES ET DE L’INDUSTRIEMINISTERE DE L’EDUCATIONMINISTERE DE L’INTERIEURMINISTERE DES AFFAIRES ETRANGERESMORY TNTEMOTOROLAMUSEE DU LOUVREMUTUALITE FONCTION PUBLIQUENATEXIS - BANQUE POPULAIRENCR COMPUTERNESTLENET2SNETWORK APPLIANCENORTEL NETWORKSNOVELLOBERTHUR CSOCE GRAPHICSORACLE SOFTWAREORKEM NORSOLOROTISPAGES JAUNESPANASONICPARLEMENT EUROPEENPERSISTENCE SOFTWAREPFA ASSURANCESPHILIPS CONSUMER COMMUNICATIONPHILIPS ECLAIRAGEPHILIPS TRTPRICE WATHERHOUSE COOPERSPROCTER & GAMBLEPROGRESS SOFTWAREPSAPSA CITROENQUALIENCERANK XEROXRATPRENAULTRENAULT - DIACRETEK SOFTWAREREUTERSRHONE POULENC RORERRIB

ROUSSEL UCLAFRR DONNELEYSAGEMSAFETYNETSAINT GOBAINSAP SOFTWARESAPIENS SOFTWARESAS INSTITUTE SOFTWARESAUNIER DUVALSCC ALLIUMSCHLUMBERGER - SEMA GROUPSCHLUMBERGER INDUSTRIESSCHNEIDER ELECTRICSELLIGENT SOFTWARESEPSEPHORASFRSGS THOMSONSHELLSIEMENSSILICON GRAPHICS COMPUTERSILVERSTREAM SOFTWARESINFORSITASMABTPSNCFSNECMASOCIETE GENERALESOFINCOSOFTLAB SOFTWARESOFTWARE AGSOLVAYSOMEPOSTSOPRASOVACSPIESQL TECHSTERIASTERLING SOFTWARESTIME INTERMARCHESUN MICROSYSTEMSSYBASE SOFTWARESYMANTEC SOFTWARESYSTARTECHNIPTECSITF1THALESTHALES - SYSECATIBCO RESEAUXTIMELESSTMP WORLDWIDETOSHIBA COMPUTERTOTALTRANSICIELTRANSPACTRANSPORTS GRAVELEAUT-SYSTEMS SOLERI CIGELUNAMISUNESCOUNI EUROPEUNILEVERUNILOGUNISYSUNIVERS INFORMATIQUEURSSAFVALORISVALTECHVERRERIE CRISTALLERIE D’ARQUESVERSANT SOFTWAREVICTOIRE TELEMATIQUEVISA INTERNATIONALVIVENDIVIVENDI - SAURVOYAGES WASTEELSX AND MAILYVES ROCHER - SANOFIZIFF DAVIS

Sede administrativa internacional52, rue de Bassano - F-75008 Paris - FRANCIA

Tel.: +33 (0)1 53 35 97 00 - Fax: +33 (0)1 53 35 97 01E-mail: [email protected]