"Penser globale, agir national", telle est la ligne conductrice qui portera toute la politique et les actions de l’Université.
Joindre
L’employabilité de nos étudiants devient nos préoccupations. Les offres de formation sont accréditées aux besoins de la société.
Joindre
Les Écoles Doctorales et les laboratoires encadrent des doctorants et de chercheurs aptes à la création d’emploi
Joindre
Task |
Former les utilisateurs et promouvoir la sensibilisation à la sécurité afin d'assurer la sécurité du système et d'améliorer l'efficacité du serveur et du réseau. |
Élaborer des plans pour protéger les fichiers informatiques contre toute modification, destruction ou divulgation accidentelle ou non autorisée et répondre aux besoins de traitement des données d'urgence. |
Communiquer avec les utilisateurs pour discuter de problèmes tels que les besoins d'accès aux données informatiques, les violations de sécurité et les changements de programmation. |
Surveiller les rapports actuels de virus informatiques pour déterminer quand mettre à jour les systèmes de protection antivirus. |
Modifier les fichiers de sécurité informatique pour intégrer un nouveau logiciel, corriger les erreurs ou modifier l'état d'accès individuel. |
Coordonner la mise en œuvre du plan du système informatique avec le personnel de l'établissement et les fournisseurs extérieurs. |
Surveiller l'utilisation des fichiers de données et régler l'accès pour sauvegarder l'information dans les fichiers informatiques. |
Effectuer des évaluations de risques et exécuter des tests de système de traitement de données pour assurer le fonctionnement des activités de traitement de données et des mesures de sécurité. |
Chiffrer les transmissions de données et ériger des pare-feux pour cacher des informations confidentielles telles qu'elles sont transmises et éviter les transferts numériques contaminés. |
Documenter les politiques, les procédures et les tests de sécurité informatique et d'urgence. |
Examiner les violations des procédures de sécurité informatique et discuter des procédures avec les contrevenants pour s'assurer que les violations ne sont pas répétées. |
Maintenir des systèmes permanents de cryptologie et de soutien direct à la flotte requis dans les opérations spéciales de terre, de surface de la mer et de sous-sol. |
ElementID | Connaissance (FR / EN) | ScaleName | DataValue |
2.C.3.a | Ordinateurs et électronique / Computers and Electronics | Niveau | 6,39 |
2.C.6 | Éducation et formation / Education and Training | Niveau | 4,89 |
2.C.9.a | Télécommunications / Telecommunications | Niveau | 4,86 |
2.C.3.b | Ingénierie et technologie / Engineering and Technology | Niveau | 4,35 |
2.C.1.a | Administration et gestion / Administration and Management | Niveau | 4,08 |
2.C.4.a | Mathématiques / Mathematics | Niveau | 3,83 |
2.C.7.a | Langues Anglaise - Française - Malagasy / English Language | Niveau | 3,76 |
2.C.8.a | Sécurité publique / Public Safety and Security | Niveau | 3,59 |
2.C.1.e | Service client et personnel / Customer and Personal Service | Niveau | 3,51 |
2.C.1.b | Clérical / Clerical | Niveau | 3,37 |
2.C.1.f | Personnel et ressources humaines / Personnel and Human Resources | Niveau | 3,3 |
2.C.8.b | Droit et gouvernement / Law and Government | Niveau | 3,24 |
2.C.2.a | Production et traitement / Production and Processing | Niveau | 3,24 |
2.C.3.c | Conception / Design | Niveau | 3,17 |
2.C.9.b | Communications et médias / Communications and Media | Niveau | 2,61 |
ElementID | Compétence (FR / EN) | ScaleName | DataValue |
2.A.1.a | Compréhension écrite / Reading Comprehension | Importance | 3,88 |
2.A.2.a | Pensée critique / Critical Thinking | Importance | 3,88 |
2.B.2.i | Résolution de problèmes complexes / Complex Problem Solving | Importance | 3,75 |
2.A.1.d | Parlant / Speaking | Importance | 3,62 |
2.A.1.b | Écoute active / Active Listening | Importance | 3,5 |
2.A.1.c | L'écriture / Writing | Importance | 3,5 |
2.B.5.a | Gestion du temps / Time Management | Importance | 3,38 |
2.B.4.e | Jugement et prise de décision / Judgment and Decision Making | Importance | 3,38 |
2.A.2.b | Apprentissage actif / Active Learning | Importance | 3,25 |
2.A.2.d | surveillance / Monitoring | Importance | 3,25 |
2.B.4.g | Analyse de systèmes / Systems Analysis | Importance | 3,25 |
2.B.5.d | / Management of Personnel Resou | Importance | 3,12 |
2.B.4.h | Évaluation des systèmes / Systems Evaluation | Importance | 3,12 |
2.B.1.d | Négociation / Negotiation | Importance | 3 |
2.B.1.e | En instruction / Instructing | Importance | 3 |
2.B.1.f | Orientation du service / Service Orientation | Importance | 3 |
2.B.3.g | Surveillance de l'opération / Operation Monitoring | Importance | 3 |
2.B.3.m | Analyse de contrôle de qualité / Quality Control Analysis | Importance | 3 |
2.B.1.b | Coordination / Coordination | Importance | 3 |
2.B.1.a | Perceptivité sociale / Social Perceptiveness | Importance | 3 |
2.B.1.c | Persuasion / Persuasion | Importance | 2,88 |
2.B.3.a | Analyse d'exploitation / Operations Analysis | Importance | 2,88 |
2.A.2.c | Stratégies d'apprentissage / Learning Strategies | Importance | 2,75 |
2.B.3.e | La programmation / Programming | Importance | 2,5 |
2.B.3.b | Conception de la technologie / Technology Design | Importance | 2,38 |
2.A.1.f | Science / Science | Importance | 2,38 |
2.A.1.e | Mathématiques / Mathematics | Importance | 2,25 |
2.B.3.k | Dépannage / Troubleshooting | Importance | 2,12 |
ElementID | ElementName | ScaleName | DataValue |
1.A.1.a | Compréhension écrite / Written Comprehension | Importance | 4 |
1.A.1.a | Compréhension orale / Oral Comprehension | Importance | 3,88 |
1.A.1.b | Sensibilité au problème / Problem Sensitivity | Importance | 3,88 |
1.A.1.b | Raisonnement déductif / Deductive Reasoning | Importance | 3,75 |
1.A.1.b | Raisonnement inductif / Inductive Reasoning | Importance | 3,75 |
1.A.1.a | Expression oral / Oral Expression | Importance | 3,62 |
1.A.4.b | Clarté de la parole / Speech Clarity | Importance | 3,5 |
1.A.4.a | Près de la vision / Near Vision | Importance | 3,5 |
1.A.1.b | Commande d'information / Information Ordering | Importance | 3,5 |
1.A.1.a | Expression écrite / Written Expression | Importance | 3,5 |
1.A.1.b | Catégorie Flexibilité / Category Flexibility | Importance | 3,38 |
1.A.4.b | Reconnaissance de la parole / Speech Recognition | Importance | 3,38 |
1.A.1.e | Flexibilité de la fermeture / Flexibility of Closure | Importance | 3,25 |
1.A.1.g | Attention sélective / Selective Attention | Importance | 3,25 |
1.A.1.e | Vitesse perceptuelle / Perceptual Speed | Importance | 3 |
1.A.1.b | Originalité / Originality | Importance | 2,88 |
1.A.1.b | La maîtrise des idées / Fluency of Ideas | Importance | 2,88 |
1.A.1.g | Partage de temps / Time Sharing | Importance | 2,75 |
1.A.4.a | Vision extrême / Far Vision | Importance | 2,75 |
1.A.2.a | Dextérité des doigts / Finger Dexterity | Importance | 2,75 |
1.A.1.e | Vitesse de fermeture / Speed of Closure | Importance | 2,62 |
1.A.1.f | Visualisation / Visualization | Importance | 2,62 |
1.A.1.c | Raisonnement mathématique / Mathematical Reasoning | Importance | 2,62 |
1.A.1.d | Mémorisation / Memorization | Importance | 2,5 |
1.A.4.a | Discrimination visuelle de couleur / Visual Color Discrimination | Importance | 2,38 |
1.A.1.c | Nombre d'installations / Number Facility | Importance | 2,38 |
1.A.4.b | Attention auditive / Auditory Attention | Importance | 2,12 |
1.A.2.a | Maintien de la main / Arm-Hand Steadiness | Importance | 2,12 |
1.A.2.b | Précision de contrôle / Control Precision | Importance | 2 |
1.A.2.a | Dextérité manuelle / Manual Dexterity | Importance | 2 |
1.A.4.b | Sensibilité auditive / Hearing Sensitivity | Importance | 2 |
T2Type | T2Example | CommodityTitle |
Tools | Desktop computers | Desktop computers |
Tools | Local area network LAN analyzers | Network analyzers |
Tools | Mainframe computers | Mainframe computers |
Tools | Network analyzers | Network analyzers |
Tools | Notebook computers | Notebook computers |
Tools | Protocol analyzers | Protocol analyzers |
Technology | Access management software | Access software |
Technology | Active directory software | Internet directory services software |
Technology | Adobe Systems Adobe Flash | Graphics or photo imaging software |
Technology | Advanced business application programming ABAP | Object or component oriented development software |
Technology | AJAX | Web platform development software |
Technology | Akoura SmartToken | Authentication server software |
Technology | Anti-phishing software | Transaction security and virus protection software |
Technology | Anti-spyware software | Transaction security and virus protection software |
Technology | Anti-Trojan software | Transaction security and virus protection software |
Technology | Apache Cassandra | Data base management system software |
Technology | Apache Hadoop | Data base management system software |
Technology | Apache HTTP Server | Portal server software |
Technology | Apache Pig | Data base management system software |
Technology | Apache Subversion SVN | File versioning software |
Technology | Apache Tomcat | Web platform development software |
Technology | ArcSight Enterprise Threat and Risk Management | Enterprise system management software |
Technology | Atlassian JIRA | Content workflow software |
Technology | Automated audit trail analysis software | Network monitoring software |
Technology | Automated installation software | Configuration management software |
Technology | Automated media tracking software | Network monitoring software |
Technology | Backup and archival software | Backup or archival software |
Technology | Berkeley Internet Domain Name BIND | Internet directory services software |
Technology | C | Development environment software |
Technology | C# | Object or component oriented development software |
Technology | C++ | Object or component oriented development software |
Technology | Cisco Systems CiscoWorks | Administration software |
Technology | Citrix | Access software |
Technology | Common business oriented language COBOL | Development environment software |
Technology | Computer forensic software | Filesystem software |
Technology | Conformance and validation testing software | Program testing software |
Technology | Cryptographic key management software | Network security and virtual private network VPN equipment software |
Technology | Customer information control system CICS | Transaction server software |
Technology | Delphi Technology | Financial analysis software |
Technology | Diameter | Authentication server software |
Technology | Domain name system DNS | Internet directory services software |
Technology | End-to-end encryption software | Transaction security and virus protection software |
Technology | Epic Systems | Medical software |
Technology | Extensible markup language XML | Enterprise application integration software |
Technology | Firewall software | Network security and virtual private network VPN equipment software |
Technology | Hewlett Packard HP-UX | Operating system software |
Technology | Honeypot | Transaction security and virus protection software |
Technology | Hypertext markup language HTML | Web platform development software |
Technology | IBM Cognos Impromptu | Business intelligence and data analysis software |
Technology | IBM Domino | Communications server software |
Technology | IBM Notes | Electronic mail software |
Technology | IBM Power Systems software | Enterprise system management software |
Technology | IBM Tivoli Access Management TAM | Access software |
Technology | IBM Tivoli Identity Management TIM | Authentication server software |
Technology | IBM WebSphere | Enterprise application integration software |
Technology | Integrity verification software | Network monitoring software |
Technology | Intrusion detection system IDS | Network security or virtual private network VPN management software |
Technology | Intrusion prevention system IPS | Network security or virtual private network VPN management software |
Technology | JavaScript | Web platform development software |
Technology | Job control language JCL | Operating system software |
Technology | Keystroke monitoring software | Network monitoring software |
Technology | KornShell | Operating system software |
Technology | License management software | License management software |
Technology | Link encryption software | Transaction security and virus protection software |
Technology | Linux | Operating system software |
Technology | McAfee | Transaction security and virus protection software |
Technology | McAfee VirusScan | Transaction security and virus protection software |
Technology | Micro Focus OpenView | Network monitoring software |
Technology | Microsoft .NET Framework | Development environment software |
Technology | Microsoft Access | Data base user interface and query software |
Technology | Microsoft Excel | Spreadsheet software |
Technology | Microsoft Exchange Server | Electronic mail software |
Technology | Microsoft Office | Office suite software |
Technology | Microsoft PowerPoint | Presentation software |
Technology | Microsoft PowerShell | Development environment software |
Technology | Microsoft Project | Project management software |
Technology | Microsoft SharePoint | Project management software |
Technology | Microsoft SQL Server | Data base user interface and query software |
Technology | Microsoft Visio | Graphics or photo imaging software |
Technology | Microsoft Visual Basic | Development environment software |
Technology | Microsoft Visual Basic Scripting Edition VBScript | Development environment software |
Technology | Microsoft Windows | Operating system software |
Technology | Microsoft Word | Word processing software |
Technology | MicroStrategy | Business intelligence and data analysis software |
Technology | MongoDB | Data base management system software |
Technology | MySQL | Data base management system software |
Technology | Nagios | Network monitoring software |
Technology | Network and system vulnerability assessment software | Network security or virtual private network VPN management software |
Technology | Network directory services software | Internet directory services software |
Technology | Network intrusion prevention systems NIPS | Network monitoring software |
Technology | Network security auditing software | Network security or virtual private network VPN management software |
Technology | Network, hardware, and software auditing software | Network monitoring software |
Technology | Node.js | Web platform development software |
Technology | NoSQL | Data base management system software |
Technology | Objective C | Object or component oriented development software |
Technology | Oracle E-Business Suite Financials | Financial analysis software |
Technology | Oracle Fusion Applications | Enterprise resource planning ERP software |
Technology | Oracle Java | Object or component oriented development software |
Technology | Oracle JavaServer Pages JSP | Web platform development software |
Technology | Oracle Net Manager | Network monitoring software |
Technology | Oracle PeopleSoft | Enterprise resource planning ERP software |
Technology | Oracle PeopleSoft Financials | Enterprise resource planning ERP software |
Technology | Oracle Solaris | Operating system software |
Technology | Oracle WebLogic Server | Application server software |
Technology | Password cracker software | Transaction security and virus protection software |
Technology | Password management software | Authentication server software |
Technology | Patch and update management software | Configuration management software |
Technology | Penetration testing software | Transaction security and virus protection software |
Technology | PHP: Hypertext Preprocessor | Web platform development software |
Technology | Ping Identity | Transaction security and virus protection software |
Technology | PostgreSQL | Object oriented data base management software |
Technology | Practical extraction and reporting language Perl | Object or component oriented development software |
Technology | Program checksumming software | Transaction security and virus protection software |
Technology | Puppet | Configuration management software |
Technology | Python | Object or component oriented development software |
Technology | Quest BigBrother | Network monitoring software |
Technology | Red Hat Enterprise Linux | Operating system software |
Technology | Red Hat WildFly | Application server software |
Technology | Relational database management software | Data base management system software |
Technology | Remote authentication dial-in user service RADIUS software | Authentication server software |
Technology | Root kit detection software | Transaction security and virus protection software |
Technology | Ruby | Development environment software |
Technology | Ruby on Rails | Web platform development software |
Technology | SAP | Enterprise resource planning ERP software |
Technology | SAS | Analytical or scientific software |
Technology | Secure internet filtering software | Transaction security and virus protection software |
Technology | Secure shell SSH software | Desktop communications software |
Technology | Security incident management software | Network security or virtual private network VPN management software |
Technology | Security risk assessment software | Transaction security and virus protection software |
Technology | Smart card management software | Point of sale POS software |
Technology | Snort | Network monitoring software |
Technology | Splunk Enterprise | Enterprise system management software |
Technology | Stack smashing protection SSP software | Transaction security and virus protection software |
Technology | Structured query language SQL | Data base user interface and query software |
Technology | Swift | Object or component oriented development software |
Technology | Sybase | Data base management system software |
Technology | Symantec | Transaction security and virus protection software |
Technology | Symantec Norton Antivirus | Transaction security and virus protection software |
Technology | System and data disaster recovery software | Backup or archival software |
Technology | System testing software | Program testing software |
Technology | Tableau | Business intelligence and data analysis software |
Technology | Ubuntu | Operating system software |
Technology | Unified modeling language UML | Requirements analysis and system architecture software |
Technology | UNIX | Operating system software |
Technology | Veritas NetBackup | Backup or archival software |
Technology | Virtual private networking VPN software | Network security and virtual private network VPN equipment software |
Technology | Virus scanning software | Transaction security and virus protection software |
Technology | Wireshark | Network monitoring software |
Element ID | Interêt (FR / EN) | ScaleName | DataValue |
1.B.1.a | Réaliste / Realistic | Niveau | 4,67 |
1.B.1.b | Investigatrice / Investigative | Niveau | 5,33 |
1.B.1.c | Artistique / Artistic | Niveau | 1,67 |
1.B.1.d | Social / Social | Niveau | 2,33 |
1.B.1.e | Entreprenant / Enterprising | Niveau | 2,33 |
1.B.1.f | Conventionnel / Conventional | Niveau | 6,33 |
1.B.1.g | Premier intérêt High-Point / First Interest High-Point | Niveau | 6 |
1.B.1.h | Deuxième intérêt High-Point / Second Interest High-Point | Niveau | 2 |
1.B.1.i | Troisième intérêt High-Point / Third Interest High-Point | Niveau | 1 |
Choisir une formation qui vous convient, c'est penser déjà à votre carrière envisagé. Notre module d'orientation vous expose un test d'orientation, une liste de 1100 métiers, et une liste de 250 formations
Le personnel enseignant, administratif et technique est disponible pour vous offrir les meilleurs conseils d'orientation
Le savoir est offert par l'Université. Le savoir faire s'acquiert par l'expérience. Le savoir être dépend de votre personnalité.