1 groupe esaip Angers, Francia www.esaip.org groupe.

Slides:



Advertisements
Similar presentations
IT Security Assurance Management of Network and User Behavior Budi Rahardjo INDOCISC - ID-CERT -
Advertisements

Incident Response Managing Security at Microsoft Published: April 2004.
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Centro Internacional para Estudios del Medio Ambiente y el Desarrollo Sostenible CIEMADeS Centro Internacional para Estudios del Medioambiente y el Desarrollo.
Monpellier, November (c) Jordi Garcia - The Spanish Degree in Informatics: A FIB Perspective Nuria Castell, Jordi Garcia and.
H-Tech. H-Tech: Objective European online university Technical and humanist For students around the world Engineering Bachelors and Masters degrees.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Ch.5 It Security, Crime, Compliance, and Continuity
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security Controls – What Works
Lecture 10 Security and Control.
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
University of Zilina Slovakia. Brief history The University of Zilina was established on October 1, 1953 as the University of Railway Transport in Prague.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
1 A new training course for Engineers in Lyon : « Prevention and management of risk in the territory » A way forward ‘’excellence’’ ?
© 2003 by Carnegie Mellon University page 1 Information Security Risk Evaluation for Colleges and Universities Carol Woody Senior Technical Staff Software.
Session 3 – Information Security Policies
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
The College of Information Sciences and Technology ist.psu.edu.
Lessius Department of Business Studies. 2 Introduction of Lessius Lessius University College Associated with Catholic University of Leuven Business studies.
1 Hochschule Esslingen Business Administration International Industrial Management(B.Sc.) Industrial Management/Automotive Industry (B.Sc.) Innovation.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
INTERNATIONALIZATION OF PhD STUDIES Gonzalez-Martinez, C 1., Pastor, Cl 1., Chafer, M 1. and Pittia, P 2. 1Universitat Politecnica de Valencia (Spain),
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
“Bachelier en Droit”- Bachelor in Law at the University of Namur Robert Queck « Maître de conférences » at the Law Faculty Deputy Director CRID LEFIS General.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.
Securing Information Systems
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Safety Driven Performance Conference 2013 The future of managing asset-intensive businesses John Keefe APM/RBMI Technical Manager Asset Integrity Services.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Experiences in Undergraduate Studies in the University of Zaragoza LEFIS Undergraduate studies Oslo, 19 th -20 th May 2006.
BUSINESS B1 Information Security.
Japan National Oil Company Training Centre Anthony Hegarty - aiming higher Global Threats – Global Solutions.
Present Day. LEFIS Learning Material Artificial Intelligence and Law Artificial Intelligence and Law Civil Law III (University of La Laguna) Civil Law.
International Master in Industrial Management Universidad Politecnica de Madrid (Madrid-Spain) Politecnico di Milano (Milan-Italy) Royal Institute of Technology.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
C8- Securing Information Systems
IS Network and Telecommunications Risks Chapter Six.
9 th Workshop on European Collaboration for Higher Education and Research in Nuclear Engineering & Radiological Protection Salamanca, Spain 5-7 June 2013.
Randy Beavers CS 585 – Computer Security February 19, 2009.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Module 11: Designing Security for Network Perimeters.
Ethics for engineering: some experiences Fernando Galindo, University of Zaragoza, Spain Information and Communication Technologies: Teaching of e-government.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
MASTER’S IN ENVIRONMENTAL CHANGE: ANALYSIS AND MANAGEMENT.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
MIS323 – Business Telecommunications Chapter 10 Security.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
HAN Automotive European Master in Automotive Engineering EMAE HAN Automotive HAN-University Arnhem, The Netherlands.
Universitat Internacional de Catalunya & People’s Friendship University of Russia A Brand NEW Official Master’s degree in Cultural Management and Intercultural.
Securing Information Systems
Add video notes to lecture
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Securing Information Systems
Information Assurance & Network Security Certificate
NordSecMob Master’s Programme in Security and Mobile Computing
Presentation transcript:

1 groupe esaip Angers, Francia groupe

2 Periferia de ANGERS Una ciudad del Valle del Loira Ciudad jovén, viva, moderna y culta. + de 260,000 habitantes 30,000 estudiantes 90 mn AVE desde Paris (60 €) 90 mn de la costa Transporte urbano para estudiantes (33 € al mes) ¿ Dónde estamos ?

3 –Escuela de Ingeniería acreditada « Grande Ecole » en 2004 y miembro de «Conférence des Grandes Ecoles» –Grado reconocido por la C.T.I. Commisión de Título de ingenieros –Primera Escuela de Ingenieros en Francia con certificación Europass ¿ Quienes somos ?

4 Campus Esaip Moderno Buen Ambiente Alojamiento (opción propuesta por el esaip) 12 habiatciones disponibles en el campus (160€- 230€) Residencias universitarias (280€ - 340€) Pisos compartidos (precio a discutir con propetarios)

5 Internacional + de 50 universidades asociadas por todo el mundo Bélgica Haute Ecole Roi Baudouin de Mons et Charleroi Katholieke Hogeschool Limburg KATHO Kortrijk República Checa Czech Technical University in Prague Dinamarca The Engineering College of Aarhus University of Southern Denmark, Odense VIA Vitus Bering University, Horsens Filandia TAMK University of Applied Sciences Tampere Suecia The Royal Institute of Technology, Stockholm Alemania Hochschule Albstadt-Sigmaringen Hochschule Darmstadt HTW Dresden Hochschule Esslingen Hochschule Heilbronn HTWK Leipzig Universität Oldenburg Universität Osnabrück Hochschule Ravensburg-Weingarten Hochschule Reutlingen Inglaterra Buckinghamshire Chilterns New University Liverpool Hope University College University of Glamorgan Liverpool John Moores University

6 Desarrollo multicultural México Universidad La Salle Países Bajos Avans Hogeshchool Breda Hogeschool Utrecht Noruega Norwegian University of Science and Technology, Trondheim Polonia Technical University of Radom Technical University of Lodz Portugal Instituto Politecnico do Porto Rumania University of Bucharest España Universidad de Alicante Universidad Pablo de Olavide Sevilla EUSS Barcelona Universidad Pontificia Comillas de Madrid Universidad Politécnica de Madrid Universidad Autónoma de Madrid Universidad Antonio de Nebrija, Madrid Universidad de Malaga Universidad Politécnica de Valencia Universidad de Salamanca Universidad de Castilla-La-Mancha, Albacete yToledo

7 Informática Industrial Medio Ambiente Gestión de riesgos Telecomunicación Cursos impartidos groupe esaip

8 MásterIngeniería 2 especialidades * Industrial computing and Telecommunications (IRT) * Industrial Safety, Environment and Risk Management (SEP) * Information Technology Project Manager Dos Opciones

9 Erasmus students PROGRAMMES RUN DURING THE WINTER SEMESTER Depending on your level of studies, you can : 1.Complete one semester of the first year (equivalent to “Baccalauréat + 3” years of higher education), from September to February for 30 ECTS. 2.Complete one semester of the second year (equivalent to “Baccalauréat + 4” years of higher education), from September to February) for 30 ECTS. 3.Complete one semester of the third year (equivalent to “Baccalauréat + 5” years of higher education) from October to March for 30 ECTS.

10 Engineering degree Semester 1 ModulesNumber of ECTS credits Analysis methods for engineering6 Computer tools for engineering3 Methods and tools for industrial resource management 3 Communication3 Communication in foreign languages6 Project : corporate culture4 Software engineering5 Environmental Risks5 TOTAL30 CREDITS Common core Industrial computing & telecommunications Risk management

11 Engineering degree Semester 3 ModulesNumber of ECTS credits Engineering science4 Functional analysis and systems security2 Production management2 Corporate culture3 Methods and tools for industrial resource management 3 Physics for IT engineering3 Corporate local networks3 Software engineering5 Science for environmental engineering3 Industrial risks3 Sustainable development and industrial production5 TOTAL30 CREDITS Common core Industrial computing & telecommunications Risk management

12 Engineering degree Semester 5 ModulesNumber of ECTS credits Engineering science4 Corporate culture3 Project management3 Projects7 Science for IT engineering5 Industrial computing4 Specialised computing4 Science for environmental engineering5 Systems of management3 Industrial risks5 TOTAL30 CREDITS Common core Industrial computing & telecommunications Risk management

13 Erasmus students Courses in English “Information Systems Security”, Semesters 1, 3, 5 - Lecturer : William MAIN « Introduction to Human Error », Semester 3 - Lecturer : Steve O‘BRIEN « Risk Management », Semester 5 - Lecturer : Steve O‘BRIEN « Marketing», Semester 1 - Lecturer : Vincent SHORT « International Culture », Semester 1 Europe – Lecturer : Hannah WILLIAMS Northern Asia – Lecturer : William MAIN Southern Asia – Lecturer : Vincent SHORT

14 Erasmus students Courses in English “ Information Systems Security” - Semester 1 Lecturer : William MAIN Introduction and importance of Information Systems Security. Relevant Industry surveys and economic losses. Technical overview of an Information Technology System. Explanation of client – server architecture and databases. Terminology Overview of the threats that exist : natural disasters, malicious software (viruses, worms, trojan horses etc.), hacking, espionage, disgruntled employees Overview of the solutions that exist (Acceptable use policy, biometrics, passwords, smart cards, intrusion detection systems, anti-virus, firewalls, faraday cages etc. Model of error levels, skill based, rule based and knowledge based GEMS (generic error-modelling system) Study cases : Research and document / real life case studies of ISS incidents

15 Erasmus students Courses in English “Information Systems Security” - Semester 3 Lecturer : William MAIN The inspection phase : identifying key information resources and assets The protection phase: deciding what level of protection is needed The detection phase : putting in place systems which identify intrusion The reaction phase : how to respond to a security incident The reflection phase : understanding the lessons learned and improving the plan For Industrial Computing Option : Analysis and evaluation of security software products e.g. : IDS, Biometrics, AntiVirus, Firewall, etc. For Risk Management option : Analysis of Physical Security measures against fires, flooding, earthquakes, etc.

16 Erasmus students Courses in English “Information Systems Security” - Semester 5 Lecturer : William MAIN Development of a Security Audit Computer Forensics Legislation against European cybercrime Review of ISO Review of ISO 27001

17 Erasmus students Courses in English Error production (study of disasters) Typology of errors Performance and output of a socio-technic system Performance and error Model of error levels, skill based, rule based and knowledge based GEMS (generic error-modelling system) Taking decisions and the 8 stages of Rasmussen Determining factors in the passage from one level to another (skill based to rule based and rule based to knowledge based) Modes of failure and modes of control Safety and reliability Modes of failure and modes of control at skilled based level Modes of failure and modes of control at rule based level Modes of failure and modes of control at knowledge based level Situation analysis using GEMS (generic error-modelling system) Assessment and reduction of the risk of human error The « In Depth Defense Approach » “Introduction to Human Error” - Semester 3 Lecturer : Steve O‘Brien

18 Erasmus students Courses in English « Risk Management » - Semester 5 Lecturer : Steve O‘Brien Analysis of different international standards on risk management and the European project ARAMIS on major risks Association of different fundamental models on risk identification, analysis, evaluation and global management Critical review of the ISO WG (Working Group) on a global generic risk management standard. Presentation of organizational structure types developed or analyzed by Gareth MORGAN. Development of a practical approach to learning organizations as the basis of risk management using the work and research of teams from Harvard University and MIT

19 Erasmus students Courses in English Concepts : Economics, Business, Marketing Marketing as a process The different steps The reality Audit : customer/market/product Team work activity : « carmart » “ Marketing» 10 hours – Semester 1 Lecturer : Vincent SHORT

20 Erasmus students Courses in English “International Culture » : 12 hours Semester 1 The influence of culture on different aspects of business The language and vocabulary of management The interface and complementarity between Economics and Management The module will provide a general approach to inter-cultural corporate communication through case studies in European and Asian contexts. Three broad geographical areas will be covered : Europe – Lecturer : Hannah WILLIAMS Northern Asia – Lecturer : William MAIN Southern Asia – Lecturer : Vincent SHORT

21 Application form & course catalogue : international>international students For more information : Teresa Cordovilla Tél