The TCOM major trains, through the core and specialization
courses and specialization courses, students who are as
technically proficient in information systems and
telecommunications networks. This dual competence is
reinforced by preparing students for the economic dimension of
Students in the TCOM major have the following unique features:
- to meet technical needs based on solid network and telecom
- Know how to manage projects and justify their investments
and their return on investment (ROI)
- to be able to work on software developments in different
languages acquired during the first three years
The TCOM major has a self-managed laboratory equipped with
professional equipment where various practical exercises are
prepared by the Assistants and then carried out by the students
throughout the course of the major.
Example of practical works:
Spanning Tree Protocol (STP)
The objective of this tutorial is to observe the
operation of normal STP and the transition to RSTP
(rapid STP) through different spanning-tree instances
depending on the VLAN.
The objective of this tutorial is to learn how to sniff
packets for network traffic analysis and security
purposes. The tutorial also allows to push the network
analysis further with tshark.
Static and Dynamic Routing
During these labs, students review the partitioning of
an IPv4 address class into subnets to configure static
routes within a LAN and do troubleshooting. In a second
step, the notions of administrative distance and routing
metrics are studied to implement several dynamic
routing protocols (OSPF, RIP, BGP).
Docker & Docker-Compose
After a presentation of Docker and its interest in the
DevOps culture, students learn to manipulate and
deconstruct a container through the notions of images
and containers, volumes and networks until they create
a multi-container application.
The tutorial allows to experiment with Infrastructure
as Code (IaC) up to a project where we will exploit
Ansible groups to add two VMs and be able to add more at
will. Finally, a Docker web application will run on the
two VMs, and a reverse proxy on another VM for
Through exercises, this course approaches security in
wireless networks from an offensive point of view and
with a purely pedagogical aim. WPA, WPA2, rogue APs,
application layer injection and WPA-Supplicant
configurations are all covered.
Dynamic Host Configuration Protocol (DHCP)
This tutorial allows students to review their knowledge
of IPv4 through an introduction to BOOTP, RARP and DHCP.
The objective of this tutorial is to configure a DHCP
server in order to allow the machines on the network to
retrieve their network configuration, then in a second
step a DHCP relay is set up.
Simple Mail Transfer Protocol (SMTP)
Through a course on the SMTP, POP and IMAP protocols,
this lab allows to understand the functioning of a mail
sending, but also the authentication/encryption and the
security of messages. The security aspect is
particularly deepened since the objective of this
tutorial is to configure a mail server to exchange mails
with its partner, before sending a mail by impersonating
Future engineers-managers with strong technical skills, TCOM
engineers are required to work in the fields of networks and
security, telephony and on the perimeters of architecture and
The information security manager acts as a business expert
on the company's processes on security issues. He helps and
advises companies to ensure the security of their data and
systems. He/she ensures the permanent control of the
activity and defines the associated security requirements.
He defines the information risk management policy in the
company, deploys and leads the risk management system.
Chief Telecommunications Officer
The telecom and network manager is in charge of managing the
company's telecom infrastructure. Depending on the person
he/she is dealing with, he/she may be considered as a
project manager vis-à-vis operators and as a project
manager and internal service provider vis-à-vis other
departments of the company. His/her missions range from
the definition of the architecture to the purchase of
telecom services, including management control and
monitoring in the broad sense.
The network engineer is in charge of all of the company's
telecommunications networks, which cover local and remote
networks: telephony, internet, intranet... He/she is
responsible for the good performance of the network,
organizes and defines the procedures, and is responsible for
the installation and security of the network.
The technical consultant advises, analyzes and implements
the solution chosen by the customer within the framework of
The IT auditor makes recommendations on a given process by
analyzing the way it is managed from an IT perspective.
He/she establishes technical and organizational diagnoses
that he/she submits to his/her hierarchy.
Network & Telecom Architect
The technical architect is in charge of defining the
technical architecture of the IS and the associated rules.
He/she ensures consistency between hardware, applications,
operating systems, networks, etc. He/she ensures that the IS
architecture evolves to meet user needs and that any new
solution is interoperable with the existing environment.
Get in touch
24 Rue Pasteur, 94270 Kremlin-Bicêtre Pasteur - Intersol Laboratoire TCOM