Networks & Telecommunications Major

The TCOM major trains, through the core and specialization courses and specialization courses, students who are as technically proficient in information systems and telecommunications networks. This dual competence is reinforced by preparing students for the economic dimension of companies. Students in the TCOM major have the following unique features:
- to meet technical needs based on solid network and telecom skills
- Know how to manage projects and justify their investments and their return on investment (ROI)
- to be able to work on software developments in different languages acquired during the first three years

Practical works

The TCOM major has a self-managed laboratory equipped with professional equipment where various practical exercises are prepared by the Assistants and then carried out by the students throughout the course of the major.

Example of practical works:

Spanning Tree Protocol (STP)

image The objective of this tutorial is to observe the operation of normal STP and the transition to RSTP (rapid STP) through different spanning-tree instances depending on the VLAN.

Wireshark

image The objective of this tutorial is to learn how to sniff packets for network traffic analysis and security purposes. The tutorial also allows to push the network analysis further with tshark.

Static and Dynamic Routing

image During these labs, students review the partitioning of an IPv4 address class into subnets to configure static routes within a LAN and do troubleshooting. In a second step, the notions of administrative distance and routing metrics are studied to implement several dynamic routing protocols (OSPF, RIP, BGP).

Docker & Docker-Compose

image After a presentation of Docker and its interest in the DevOps culture, students learn to manipulate and deconstruct a container through the notions of images and containers, volumes and networks until they create a multi-container application.

Ansible

image The tutorial allows to experiment with Infrastructure as Code (IaC) up to a project where we will exploit Ansible groups to add two VMs and be able to add more at will. Finally, a Docker web application will run on the two VMs, and a reverse proxy on another VM for load-balancing.

Wi-Fi

image Through exercises, this course approaches security in wireless networks from an offensive point of view and with a purely pedagogical aim. WPA, WPA2, rogue APs, application layer injection and WPA-Supplicant configurations are all covered.

Dynamic Host Configuration Protocol (DHCP)

image This tutorial allows students to review their knowledge of IPv4 through an introduction to BOOTP, RARP and DHCP. The objective of this tutorial is to configure a DHCP server in order to allow the machines on the network to retrieve their network configuration, then in a second step a DHCP relay is set up.

Simple Mail Transfer Protocol (SMTP)

image Through a course on the SMTP, POP and IMAP protocols, this lab allows to understand the functioning of a mail sending, but also the authentication/encryption and the security of messages. The security aspect is particularly deepened since the objective of this tutorial is to configure a mail server to exchange mails with its partner, before sending a mail by impersonating the partner.

Opportunities

Future engineers-managers with strong technical skills, TCOM engineers are required to work in the fields of networks and security, telephony and on the perimeters of architecture and technical infrastructure.
CISO The information security manager acts as a business expert on the company's processes on security issues. He helps and advises companies to ensure the security of their data and systems. He/she ensures the permanent control of the activity and defines the associated security requirements. He defines the information risk management policy in the company, deploys and leads the risk management system.
Chief Telecommunications Officer The telecom and network manager is in charge of managing the company's telecom infrastructure. Depending on the person he/she is dealing with, he/she may be considered as a project manager vis-à-vis operators and as a project manager and internal service provider vis-à-vis other departments of the company. His/her missions range from the definition of the architecture to the purchase of telecom services, including management control and monitoring in the broad sense.
Network Engineer The network engineer is in charge of all of the company's telecommunications networks, which cover local and remote networks: telephony, internet, intranet... He/she is responsible for the good performance of the network, organizes and defines the procedures, and is responsible for the installation and security of the network.
Consultant The technical consultant advises, analyzes and implements the solution chosen by the customer within the framework of projects.
Auditor The IT auditor makes recommendations on a given process by analyzing the way it is managed from an IT perspective. He/she establishes technical and organizational diagnoses that he/she submits to his/her hierarchy.
Network & Telecom Architect The technical architect is in charge of defining the technical architecture of the IS and the associated rules. He/she ensures consistency between hardware, applications, operating systems, networks, etc. He/she ensures that the IS architecture evolves to meet user needs and that any new solution is interoperable with the existing environment.

Get in touch

Kremlin-Bicêtre, France
24 Rue Pasteur, 94270 Kremlin-Bicêtre
Pasteur - Intersol
Laboratoire TCOM
Send an email SEND