{"id":29431,"date":"2026-02-15T17:57:52","date_gmt":"2026-02-15T17:57:52","guid":{"rendered":"https:\/\/msit.ma\/wordpress\/?page_id=29431"},"modified":"2026-03-06T15:07:49","modified_gmt":"2026-03-06T15:07:49","slug":"administration-reseau-systeme-et-securite","status":"publish","type":"page","link":"https:\/\/msit.ma\/index.php\/administration-reseau-systeme-et-securite\/","title":{"rendered":"Administration R\u00e9seau, Syst\u00e8me et S\u00e9curit\u00e9"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"29431\" class=\"elementor elementor-29431\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"wd-negative-gap elementor-element elementor-element-86f1972 e-flex e-con-boxed e-con e-parent\" data-id=\"86f1972\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7cbecfa e-con-full e-flex e-con e-child\" data-id=\"7cbecfa\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6ca5cca e-con-full e-flex e-con e-child\" data-id=\"6ca5cca\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b858479 elementor-widget elementor-widget-heading\" data-id=\"b858479\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Administration des Syst\u00e8mes, Cybers\u00e9curit\u00e9 et Cloud Computing\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-b9165fe e-flex e-con-boxed e-con e-parent\" data-id=\"b9165fe\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-15bf904 e-con-full e-flex e-con e-child\" data-id=\"15bf904\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-69628a1 e-con-full e-flex e-con e-child\" data-id=\"69628a1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e3eb495 elementor-widget elementor-widget-heading\" data-id=\"e3eb495\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">INTRODUCTION<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aaa9b89 color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"aaa9b89\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"master-d\">La\u00a0<strong>Licence Professionnelle en Administration des Syst\u00e8mes,\u00a0 Cybers\u00e9curit\u00e9 et Cloud Computing<\/strong>, propos\u00e9e \u00e0 Had Soualem, forme des sp\u00e9cialistes capables de prot\u00e9ger les infrastructures informatiques contre les cybermenaces. Ce programme couvre des domaines essentiels comme le hacking \u00e9thique, la cryptographie, le cloud s\u00e9curis\u00e9, les normes ISO, et les r\u00e9seaux IPv6. Les \u00e9tudiants acqui\u00e8rent des comp\u00e9tences techniques de pointe, r\u00e9pondant aux besoins croissants en cybers\u00e9curit\u00e9 au Maroc et \u00e0 l\u2019international.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1901209 e-con-full e-flex e-con e-child\" data-id=\"1901209\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c240bed elementor-widget elementor-widget-image\" data-id=\"c240bed\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"280\" src=\"https:\/\/msit.ma\/wp-content\/uploads\/2026\/01\/msit-06-1-400x280.png\" class=\"attachment-medium size-medium wp-image-29117\" alt=\"\" srcset=\"https:\/\/msit.ma\/wp-content\/uploads\/2026\/01\/msit-06-1-400x280.png 400w, https:\/\/msit.ma\/wp-content\/uploads\/2026\/01\/msit-06-1-1142x800.png 1142w, https:\/\/msit.ma\/wp-content\/uploads\/2026\/01\/msit-06-1-768x538.png 768w, https:\/\/msit.ma\/wp-content\/uploads\/2026\/01\/msit-06-1-1536x1076.png 1536w, https:\/\/msit.ma\/wp-content\/uploads\/2026\/01\/msit-06-1-430x301.png 430w, https:\/\/msit.ma\/wp-content\/uploads\/2026\/01\/msit-06-1-700x490.png 700w, https:\/\/msit.ma\/wp-content\/uploads\/2026\/01\/msit-06-1-150x105.png 150w, https:\/\/msit.ma\/wp-content\/uploads\/2026\/01\/msit-06-1.png 1784w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-6bc6a6f e-flex e-con-boxed e-con e-parent\" data-id=\"6bc6a6f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-852957b e-con-full e-flex e-con e-child\" data-id=\"852957b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9029420 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"9029420\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-license\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tModules\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-893e30b color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"893e30b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"list-show\"><li>Cybers\u00e9curit\u00e9, Cryptage et Blockchain<\/li><li>CCNA Switching, Routing and Security<\/li><li>Virtualisation<\/li><li>Nouvelle g\u00e9n\u00e9ration des r\u00e9seaux IPv6<\/li><li>Administration Linux et S\u00e9curit\u00e9<\/li><li>Administration Windows Server et S\u00e9curit\u00e9<\/li><li>Cloud Computing et S\u00e9curit\u00e9<\/li><li>Normes ISO pour la s\u00e9curit\u00e9 des syst\u00e8mes<\/li><li>Piratage et d\u00e9fense \u00e9thique<\/li><li>CCNP ROUTE<\/li><li>Programmation Python et S\u00e9curit\u00e9<\/li><li>Techniques avanc\u00e9es de Ethical Hacking (OWASP)<\/li><li>Administration Oracle et S\u00e9curit\u00e9<\/li><li>Projet de fin d\u2019\u00e9tude, en entreprise si possible<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e808f1 e-con-full e-flex e-con e-child\" data-id=\"7e808f1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-604d013 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"604d013\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-dart-board\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tObjectifs de la formation\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-207f388 color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"207f388\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"master-p\">La Licence Professionnelle propos\u00e9e \u00e0 Casablanca offre une formation exhaustive et pratique, ax\u00e9e sur la protection des syst\u00e8mes informatiques et des donn\u00e9es contre les cybermenaces. Elle permet aux \u00e9tudiants de :<\/p><ul class=\"master-ul\"><li>Ma\u00eetriser la s\u00e9curit\u00e9 des r\u00e9seaux, la cryptographie et le cloud computing.<\/li><li>D\u00e9velopper des comp\u00e9tences en piratage \u00e9thique (ethical hacking) et en r\u00e9ponse aux incidents.<\/li><li>Administrer et s\u00e9curiser des serveurs Linux, Windows et des bases de donn\u00e9es Oracle.<\/li><li>Comprendre et appliquer les normes ISO en s\u00e9curit\u00e9 informatique.<\/li><li>Acqu\u00e9rir une exp\u00e9rience professionnelle gr\u00e2ce \u00e0 un projet de fin d\u2019\u00e9tudes en entreprise.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e07cea3 e-con-full e-flex e-con e-child\" data-id=\"e07cea3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56c0695 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"56c0695\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-child\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M120 72c0-39.765 32.235-72 72-72s72 32.235 72 72c0 39.764-32.235 72-72 72s-72-32.236-72-72zm254.627 1.373c-12.496-12.497-32.758-12.497-45.254 0L242.745 160H141.254L54.627 73.373c-12.496-12.497-32.758-12.497-45.254 0-12.497 12.497-12.497 32.758 0 45.255L104 213.254V480c0 17.673 14.327 32 32 32h16c17.673 0 32-14.327 32-32V368h16v112c0 17.673 14.327 32 32 32h16c17.673 0 32-14.327 32-32V213.254l94.627-94.627c12.497-12.497 12.497-32.757 0-45.254z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tD\u00e9bouch\u00e9s professionnels\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bef0d69 color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"bef0d69\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"list-show\"><li>Analyste en Cybers\u00e9curit\u00e9<\/li><li>Ing\u00e9nieur S\u00e9curit\u00e9 des R\u00e9seaux<\/li><li>Consultant en S\u00e9curit\u00e9 Informatique<\/li><li>Responsable de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information (RSSI)<\/li><li>Cryptographe<\/li><li>Sp\u00e9cialiste en R\u00e9ponse aux Incidents de S\u00e9curit\u00e9<\/li><li class=\"list-show-li\">\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"wd-negative-gap elementor-element elementor-element-209bb2e e-flex e-con-boxed e-con e-parent\" data-id=\"209bb2e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-72e18a5 e-con-full e-flex e-con e-child\" data-id=\"72e18a5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f7f8d69 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"f7f8d69\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-clock2\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tDur\u00e9e de la formation\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6732fc1 color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"6732fc1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"list-show\"><li><div class=\"icon-card\"><ul class=\"list-show\"><li class=\"list-show-li\">Dur\u00e9e de la formation : 2 Semestres (de 01 Octobre \u00e0 30 juillet).<\/li><li class=\"list-show-li\">Horaires :Horaires : 9 \u00e0 16 heures par semaine sont divis\u00e9es selon l\u2019emploi du temps partag\u00e9 d\u00e8s le d\u00e9but de chaque mois.<\/li><\/ul><\/div><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-edabfd0 e-con-full e-flex e-con e-child\" data-id=\"edabfd0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b3d82d6 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"b3d82d6\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-team-join\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPublic cible\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cdc001 color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"8cdc001\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"list-show\"><li>Bac+2 en Informatique ou \u00e9quivalent.<\/li><li>Niveau bac +2 en Informatique ou \u00e9quivalent.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-29dfbea e-con-full e-flex e-con e-child\" data-id=\"29dfbea\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e93b551 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"e93b551\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-Document-Search\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tM\u00e9thodologie\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a64141 color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"8a64141\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"list-show\"><li class=\"list-show-li\">50 % th\u00e9orique (Livre Officiel)<\/li><li class=\"list-show-li\">50% pratique (Sur un vrai mat\u00e9riel)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Administration des Syst\u00e8mes, Cybers\u00e9curit\u00e9 et Cloud Computing INTRODUCTION La\u00a0Licence Professionnelle en Administration des Syst\u00e8mes,\u00a0 Cybers\u00e9curit\u00e9 et Cloud Computing, propos\u00e9e \u00e0<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-29431","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/msit.ma\/index.php\/wp-json\/wp\/v2\/pages\/29431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/msit.ma\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/msit.ma\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/msit.ma\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/msit.ma\/index.php\/wp-json\/wp\/v2\/comments?post=29431"}],"version-history":[{"count":13,"href":"https:\/\/msit.ma\/index.php\/wp-json\/wp\/v2\/pages\/29431\/revisions"}],"predecessor-version":[{"id":29797,"href":"https:\/\/msit.ma\/index.php\/wp-json\/wp\/v2\/pages\/29431\/revisions\/29797"}],"wp:attachment":[{"href":"https:\/\/msit.ma\/index.php\/wp-json\/wp\/v2\/media?parent=29431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}