top of page

BLOCK 1

1. IT Support and Service Provision

1.1

IT asset management

  • List and identify digital resources

  • Utilize the repositories, norms and standards adopted by the IT service provider

  • Establish and verify the authorization levels associated with a service

  • Check the conditions for the continuity of an IT service

  • Managing backups

  • Verify compliance with the rules for using digital resources

1.2

Incident response and requests for assistance and enhancements

  • Collect, track and direct requests

  • Handling requests related to network, system, and application services

  • Processing application-related requests

1.3

Developing the organization's online presence

  • Contribute to enhancing the organization's image on digital media, taking into account the legal framework and economic considerations.

  • List the organization's online services and measure their visibility.

  • Participate in the development of a website that uses the organization's data

1.4

Project-based work

  • Analyze the objectives and organizational methods of a project

  • Plan activities

  • Evaluate project monitoring indicators and analyze discrepancies

1.5

Provision of an IT service to users

  • Perform integration and acceptance tests for a service

  • Deploy a service

  • Supporting users in setting up a service

1.6

Organizing one's professional development

  • Setting up your personal learning environment

  • Implementing information monitoring tools and strategies

  • Managing your professional identity

  • Developing your professional project

BLOCK 2

2 Conception et développement d’applications

2.1

Design and development of an application solution

• Analyze an expressed need and its legal context

  • Participate in the design of the architecture of an application solution

  • Modeling an application solution

  • Leveraging the resources of the application framework

  • Identify, develop, use, or adapt software components

  • Leveraging web technologies to implement exchanges between applications, including mobile applications

  • Use data access components

  • Continuously integrate versions of an application solution

  • Perform the tests necessary for the validation or production deployment of adapted or developed components.

  • Write technical and user documentation for an application solution

  • Leveraging the features of a development and testing environment

2.2

Corrective or evolutionary maintenance of an application solution

  • Gather, analyze and update information on a version of an application solution

  • Evaluating the quality of an application solution

  • Analyze and correct a malfunction

  • Update the technical and user documentation for an application solution

  • Develop and perform tests on the updated elements

2.3

Data management

  • Using data with a query language

  • Developing application functionalities within a database management system (relational or non-relational)

  • Designing or adapting a database

  • Administering and deploying a database

BLOCK 3

3. Cybersecurity of IT services

3.1

Protection of personal data

  • Identify the processing of personal data within the organization

  • Identify the risks associated with the collection, processing, storage and dissemination of personal data

  • Apply the regulations regarding the collection, processing and storage of personal data

  • Raising user awareness about the protection of personal data

3.2

Preserving the organization's digital identity

  • Protecting an organization's digital identity

  • Deploy the appropriate means of electronic evidence

3.3

Securing equipment and user practices

  • Inform users about the risks associated with using a digital resource and promote best practices.

  • Identify threats and implement appropriate defenses

  • Manage appropriate access and privileges

  • Check the effectiveness of the protection

3.4

Ensuring the availability, integrity, and confidentiality of the organization's IT services and data in the face of cyberattacks.

  • Characterize the risks associated with the malicious use of an IT service

  • Identify the consequences of a loss of availability, integrity, or confidentiality

  • Identify the legal obligations that apply regarding the archiving and protection of the organization's data.

  • Organize the collection and preservation of digital evidence

  • Implement procedures that guarantee compliance with legal obligations.

3.5

Cybersecurity of an application solution and its development

  • Participate in the verification of elements contributing to the quality of an IT development

  • Considering security in an application development project

  • Implement and verify the conformity of an application solution and its development to a security framework, norm, or standard.

  • Preventing attacks

  • Analyze the connections (logs)

  • Analyze security incidents, propose and implement countermeasures

bottom of page