
BLOCK 1
1. IT Support and Service Provision
1.1
IT asset management
List and identify digital resources
Utilize the repositories, norms and standards adopted by the IT service provider
Establish and verify the authorization levels associated with a service
Check the conditions for the continuity of an IT service
Managing backups
Verify compliance with the rules for using digital resources
1.3
Developing the organization's online presence
Contribute to enhancing the organization's image on digital media, taking into account the legal framework and economic considerations.
List the organization's online services and measure their visibility.
Participate in the development of a website that uses the organization's data
BLOCK 2
2. Application Design and Development
2.1
Design and development of an application solution
• Analyze an expressed need and its legal context
Participate in the design of the architecture of an application solution
Modeling an application solution
Leveraging the resources of the application framework
Identify, develop, use, or adapt software components
Leveraging web technologies to implement exchanges between applications, including mobile applications
Use data access components
Continuously integrate versions of an application solution
Perform the tests necessary for the validation or production deployment of adapted or developed components.
Write technical and user documentation for an application solution
Leveraging the features of a development and testing environment
2.2
Corrective or evolutionary maintenance of an application solution
Gather, analyze and update information on a version of an application solution
Evaluating the quality of an application solution
Analyze and correct a malfunction
Update the technical and user documentation for an application solution
Develop and perform tests on the updated elements
BLOCK 3
3. Cybersecurity of IT services
3.1
Protection of personal data
Identify the processing of personal data within the organization
Identify the risks associated with the collection, processing, storage and dissemination of personal data
Apply the regulations regarding the collection, processing and storage of personal data
Raising user awareness about the protection of personal data
3.4
Ensuring the availability, integrity, and confidentiality of the organization's IT services and data in the face of cyberattacks.
Characterize the risks associated with the malicious use of an IT service
Identify the consequences of a loss of availability, integrity, or confidentiality
Identify the legal obligations that apply regarding the archiving and protection of the organization's data.
Organize the collection and preservation of digital evidence
Implement procedures that guarantee compliance with legal obligations.
3.5
Cybersecurity of an application solution and its development
Participate in the verification of elements contributing to the quality of an IT development
Considering security in an application development project
Implement and verify the conformity of an application solution and its development to a security framework, norm, or standard.
Preventing attacks
Analyze the connections (logs)
Analyze security incidents, propose and implement countermeasures