{"id":4501,"date":"2024-04-05T11:56:10","date_gmt":"2024-04-05T09:56:10","guid":{"rendered":"http:\/\/www.ests.uca.ma\/?page_id=4501"},"modified":"2024-04-05T11:56:25","modified_gmt":"2024-04-05T09:56:25","slug":"licence-duniversite-en-automatisation-et-securite-des-reseaux-denreprises-asre","status":"publish","type":"page","link":"https:\/\/www.ests.uca.ma\/?page_id=4501","title":{"rendered":"LICENCE D&rsquo;UNIVERSIT\u00c9 EN AUTOMATISATION ET SECURIT\u00c9 DES R\u00c9SEAUX D&rsquo;ENREPRISES (ASRE)"},"content":{"rendered":"<p style=\"text-align: center;\"><strong><span style=\"font-size: 24pt; color: #003366;\">LICENCE D&rsquo;UNIVERSIT\u00c9 EN AUTOMATISATION ET SECURIT\u00c9 DES R\u00c9SEAUX D&rsquo;ENREPRISES (ASRE)\u00a0<\/span><\/strong><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 24pt; color: #666699; font-family: impact, sans-serif;\">Les inscriptions pour l\u2019ann\u00e9e universitaire\u00a0 2024-2025 sont ouvertes<\/span><\/p>\n<p style=\"text-align: justify;\"><em><span style=\"color: #3366ff; font-size: 18pt;\"><strong>Comp\u00e9tences vis\u00e9es<\/strong><\/span><\/em><\/p>\n<p>La licence d\u2019universit\u00e9 de \u00ab Automatisation et S\u00e9curit\u00e9 des r\u00e9seaux des entreprises ASRE\u00bb a pour objectif de former des professionnels dans le domaine des NTIC, capable de :<\/p>\n<ul>\n<li>Savoir les concepts de base de OSPFv2 \u00e0 zone unique en expliquant comment il fonctionne sur les r\u00e9seaux multi-acc\u00e8s point \u00e0 point et de diffusion ainsi que sa mise en \u0153uvre.<\/li>\n<li>Expliquer comment les listes de contr\u00f4le d&rsquo;acc\u00e8s sont utilis\u00e9es dans le cadre d&rsquo;une politique de s\u00e9curit\u00e9 r\u00e9seau.<\/li>\n<li>Mettre en \u0153uvre des listes de contr\u00f4le d&rsquo;acc\u00e8s IPv4 pour filtrer le trafic et s\u00e9curiser l&rsquo;acc\u00e8s des administrateurs.<\/li>\n<li>Configurer les services NAT sur le routeur de p\u00e9riph\u00e9rie pour assurer l&rsquo;\u00e9volutivit\u00e9 des adresses IPv4.<\/li>\n<li>Expliquer comment les technologies d&rsquo;acc\u00e8s WAN peuvent \u00eatre utilis\u00e9es pour r\u00e9pondre aux besoins de l&rsquo;entreprise.<\/li>\n<li>Expliquer comment VPN et IPSec sont utilis\u00e9s pour s\u00e9curiser la connectivit\u00e9 de site \u00e0 site et d&rsquo;acc\u00e8s distant.<\/li>\n<li>Expliquer comment les p\u00e9riph\u00e9riques r\u00e9seau mettent en \u0153uvre la QoS.<\/li>\n<li>Mettre en \u0153uvre des protocoles pour g\u00e9rer le r\u00e9seau.<\/li>\n<li>Expliquer les caract\u00e9ristiques des architectures r\u00e9seau \u00e9volutives.<\/li>\n<li>D\u00e9panner les r\u00e9seaux d&rsquo;entreprise.<\/li>\n<li>Expliquer l&rsquo;objectif et les caract\u00e9ristiques de la virtualisation du r\u00e9seau.<\/li>\n<li>Expliquer comment l&rsquo;automatisation des r\u00e9seaux est possible gr\u00e2ce aux RESTful API et les outils de gestion de<\/li>\n<li>Apprendre le langage Pythone, les formats de donn\u00e9es comme XML, YAML, \u2026<\/li>\n<li>Avoir un aper\u00e7u sur IOT.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><em><span style=\"color: #3366ff;\"><strong><span style=\"font-size: 18pt;\">Objectifs de la formation<\/span><\/strong><\/span><\/em><\/p>\n<p>Cette formation a pour objectifs de\u00a0:<\/p>\n<ul>\n<li>D\u00e9velopper des comp\u00e9tences techniques permettant aux laur\u00e9ats d\u2019int\u00e9grer les entreprises nationales et multinationales\u00a0;<\/li>\n<li>Former des informaticiens capables d\u2019int\u00e9grer le march\u00e9 de freelance\u00a0;<\/li>\n<li>Former des informaticiens capables de cr\u00e9er des entreprises sp\u00e9cialis\u00e9es dans le domaine des NTIC\u00a0;<\/li>\n<li>Renforcer la collaboration entre l\u2019universit\u00e9 et le secteur industriel.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"color: #3366ff;\"><em><span style=\"font-size: 18pt;\"><strong>Public cible<\/strong><\/span><\/em><\/span><\/p>\n<p>Cette formation est destin\u00e9e aux :<\/p>\n<ul>\n<li>Titulaires d\u2019un dipl\u00f4me de Bac+2 ou plus en informatique, math\u00e9matiques ou autres sp\u00e9cialit\u00e9s jug\u00e9es \u00e9quivalentes du secteur public ou priv\u00e9\u00a0;<\/li>\n<li>Dipl\u00f4m\u00e9s fonctionnaires ou salari\u00e9s d\u00e9sireux de se remettre \u00e0 niveau et d\u2019am\u00e9liorer leurs comp\u00e9tences ;<\/li>\n<li>Chercheurs d\u2019emplois dont la formation initiale ne leur permet pas d\u2019acc\u00e9der au march\u00e9 d\u2019emploi ;<\/li>\n<li>Dipl\u00f4m\u00e9s en formation professionnelle souhaitant acqu\u00e9rir des comp\u00e9tences dans des NTIC.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #3366ff;\"><em><span style=\"font-size: 18pt;\">Modalit\u00e9s<\/span><\/em><\/span><\/strong><\/p>\n<ul style=\"list-style-type: circle;\">\n<li>Frais de dossier : <span style=\"color: #0000ff;\"><strong>300,00 Dhs<\/strong><\/span><\/li>\n<li>Co\u00fbt de formation : <span style=\"color: #0000ff;\"><strong>25\u00a0000,00 Dhs<\/strong><\/span><\/li>\n<li>Lieu de formation : <strong>Ecole Sup\u00e9rieure de Technologie &#8211; Safi<\/strong><\/li>\n<li>D\u00e9roulement de la formation : <strong>du <span style=\"color: #0000ff;\">1<sup>er<\/sup> octobre 2024<\/span> au <span style=\"color: #0000ff;\">30 septembre 2025<\/span><\/strong><\/li>\n<li>S\u00e9lection : <strong>du <span style=\"color: #0000ff;\">1<sup>er<\/sup> septembre 2024<\/span> au <span style=\"color: #0000ff;\">15 septembre 2025<\/span><\/strong><\/li>\n<li>Evaluation : <strong>Devoirs Surveill\u00e9s, Examens et mini-projets<\/strong><\/li>\n<li>Dipl\u00f4me d\u00e9livr\u00e9 : <strong>Licence Professionnelle d\u2019Universit\u00e9<\/strong><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"color: #3366ff;\"><em><strong><span style=\"font-size: 18pt;\">Programme<\/span><\/strong><\/em><\/span><\/p>\n<p style=\"text-align: justify;\">Le programme de la formation comprend des enseignements th\u00e9oriques et pratiques, des S\u00e9minaires de sp\u00e9cialistes universitaires et professionnels et un stage professionnel<em>.<\/em><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #00ccff; font-size: 14pt;\"><strong><em>Contenu p\u00e9dagogique<\/em><\/strong><em>\u00a0<\/em><\/span><\/p>\n<p style=\"text-align: justify;\"><strong><em><u>Semestre <\/u><\/em><\/strong><strong><em>I<\/em><\/strong><\/p>\n<table style=\"width: 100%; border-collapse: collapse; border-style: solid;\">\n<tbody>\n<tr>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module<\/strong><strong> 1\u00a0<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 2<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 3<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 4<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 5<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 6<\/strong><\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Programmation Essentiel en Python<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Format de donn\u00e9es (JSON, XML et YAML)<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Les mod\u00e8les de r\u00e9f\u00e9rences<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">S\u00e9curit\u00e9 de couche 2<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Routage<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Langue des entreprises &amp; soft skills<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: justify;\"><strong><em>Semestre II<\/em><\/strong><\/p>\n<table style=\"width: 100%; border-collapse: collapse; border-style: solid;\">\n<tbody>\n<tr>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 7<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 8<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 9<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 10<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 11<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 12<\/strong><\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">S\u00e9curit\u00e9 de la couche r\u00e9seau<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Automatisation d\u2019infrastructure r\u00e9seau<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Les\u00a0 certifications CCNA 1, 2 et 3<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\"><strong>Stage de fin d\u2019\u00e9tudes<\/strong><\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\"><strong>Stage de fin d\u2019\u00e9tudes<\/strong><\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\"><strong>Stage de fin d\u2019\u00e9tudes<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: justify;\"><em><strong><span style=\"color: #3366ff; font-size: 18pt;\">Contact<\/span><\/strong><\/em><\/p>\n<table class=\" alignleft\" style=\"width: 100%; border-collapse: collapse; border-color: #ffffff;\">\n<tbody>\n<tr>\n<td style=\"width: 9.47711%;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.ests.uca.ma\/wp-content\/uploads\/2019\/07\/img_311846.png\" alt=\"\" width=\"50\" height=\"50\" \/><\/td>\n<td style=\"width: 90.5229%; text-align: left;\"><strong>Responsable de la formation\u00a0:<\/strong> <span style=\"color: #003366;\">P<strong>r ESSALIH Mohamed<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 9.47711%;\" rowspan=\"2\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.ests.uca.ma\/wp-content\/uploads\/2019\/07\/img_346970.png\" alt=\"\" width=\"50\" height=\"50\" \/><\/td>\n<td style=\"width: 90.5229%; text-align: left;\"><strong><span style=\"color: #003366;\">Secr\u00e9tariat de la formation :<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 90.5229%; text-align: left;\"><strong><span style=\"color: #003366;\">Responsable de la formation : +212670098670<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 9.47711%;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.ests.uca.ma\/wp-content\/uploads\/2019\/07\/home-house-main-page-building-address-location-2-2684.png\" alt=\"\" width=\"50\" height=\"50\" \/><\/td>\n<td style=\"width: 90.5229%; text-align: left;\"><strong>ECOLE SUP\u00c9RIEURE DE TECHNOLOGIE, Route Dar Si A\u00efssa, BP 89, SAFI<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 9.47711%;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.ests.uca.ma\/wp-content\/uploads\/2019\/07\/58485698e0bb315b0f7675a8.png\" alt=\"\" width=\"50\" height=\"50\" \/><\/td>\n<td style=\"width: 90.5229%; text-align: left;\"><strong>m.essalih@uca.ac.ma<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>LICENCE D&rsquo;UNIVERSIT\u00c9 EN AUTOMATISATION ET SECURIT\u00c9 DES R\u00c9SEAUX D&rsquo;ENREPRISES (ASRE)\u00a0 Les inscriptions pour l\u2019ann\u00e9e universitaire\u00a0 2024-2025 sont ouvertes Comp\u00e9tences vis\u00e9es La licence d\u2019universit\u00e9 de \u00ab Automatisation et S\u00e9curit\u00e9 des r\u00e9seaux des entreprises ASRE\u00bb a pour objectif de former des professionnels dans le domaine des NTIC, capable de : Savoir les concepts de base de OSPFv2<\/p>\n","protected":false},"author":1,"featured_media":165,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4501","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=\/wp\/v2\/pages\/4501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4501"}],"version-history":[{"count":1,"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=\/wp\/v2\/pages\/4501\/revisions"}],"predecessor-version":[{"id":4503,"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=\/wp\/v2\/pages\/4501\/revisions\/4503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=\/wp\/v2\/media\/165"}],"wp:attachment":[{"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}