One year. That’s it!
Next start on May 29, 2023, Reserve your place now!
Online, Classroom or hybrid training.
Register now
Omnivox
Our programs
Two regular programs and three new specialization programs
Regular College Programs:
- LEA.1A Web and mobile application programmer
- LEA.1B Network Manager
Evening Specialization Programs:
- LEA.E6 Software cybersecurity
- LEA.E5 Network cybersecurity
- LEA.E7 Applied artificial intelligence
All our programs are available live online.
Our two regular programs
Both Web and mobile application programmer and Network manager are offered in class, live online or in hybrid, (class and online) during normal college opening hours which are from 8 a.m. to 4 p.m. only.
Our three specialization programs
Software cybersecurity, network cybersecurity and applied artificial intelligence are offered in class, live online or in hybrid mode as evening classes only.

LEA.1A Web and Mobile Application Programmer
A programmer is above all an expert in computer languages. He/She must master one or many languages along with their concepts (for example, the concept of inheritance in an object-oriented language). A knowledge of the sector in which the language will be used is an asset; it allows one to know better the clients’ expectations and their approach to a problem.
LEA.1B Network Manager
After completing this course, you will be an expert in setting up, maintaining, and securing IT networks and data, online and offline accounts, and hardware devices for a business. You will also be able to configure and manage computer servers. Most network managers work in private companies. However, many diversify and become independent expert consultants.

Specialist Programs:
You are active in the world of IT and wish to enhance your skills?
You can now register for one of our three new specialization programs offered for the start of the academic year in March 2023
.
These programs are aimed at people who are already working in the field of IT, as well as IT graduate students who wish to continue their training.
These programs are aimed at people who are already working in the field of IT, as well as IT graduate students who wish to continue their training.
Requirements:
- Undergraduate degree in Computer Science
- The professional studies diploma and relevant work experience
- College diploma in Computer Science or equivalent

LEA.E6 Software cybersecurity
Computer technicians specializing in software cybersecurity participate in the integration of software security solutions and features at all stages of the software development life cycle. They offer a secure software architecture, the integration of data and database protection measures. They participate in the deployment and hosting of new applications and ensure their security on the chosen platforms. They perform software testing and provide user support.
Depending on the scope of the project, the work is carried out individually or in collaboration with various specialists: other computer technicians, analysts, consultants in data or network architecture, project managers, personnel responsible for quality assurance, suppliers, etc.
The work environment is very diverse. The technician ensures that the security dimension of the application to be developed is taken into account during its design and throughout the software development life cycle, rather than treated as an addition at the very end, where security solutions could be badly grafted to the software, or offer only partial protection given certain aspects that would no longer be modifiable (eg, location of the database in the software architecture).They can contribute to the development of the software as well; working on the deployment and hosting of the new software, and applying various tests to put the software through its paces. They work with several teams, from the development team to the infrastructure team and perhaps, if there is one, the test team, separate from the development team. They work with development and staging environments, and with the company's IT infrastructure. The environment is often made up of state-of-the-art hardware and software components, but equally legacy equipment may well be present. The work therefore requires a significant ability to adapt, especially as new malicious software and intrusion techniques are emerging every day. The work also requires constant improvement of knowledge, excellent reasoning and judgment skills, the application of a structured approach, versatility, as well as open-mindedness.
.
The program therefore follows a logical progression of learning starting from the basic notions in session 1 and progressing through the deepening of the notions and the complexity and scope of the projects managed in sessions 2 and 3. The weighting promotes putting into practice notions specific to the acquisition of skills for the installation and maintenance of networks.
LEA.E5 Network cybersecurity
IT technicians specializing in network cybersecurity participate in the review and application of security policies and security measures in the workplace, both physical and technological. More specifically, their task involves, for example, cryptography, the analysis of network monitoring data, the execution of tests aimed at hardening the IT infrastructure and forensics. These specialists also provide support to users.
Depending on the scope of the project, the work is carried out individually or in collaboration with various specialists: other computer technicians, analysts, consultants in data or network architecture, project managers, personnel responsible for quality assurance, suppliers, etc.
The work environment is very diverse. Under the protection of a security policy, the technician must ensure the physical security of the IT infrastructure, and IT security as a whole. The environment is often made up of state-of-the-art hardware and software components, The environment is often made up of state-of-the-art hardware and software components, but equally legacy equipment may well be present. The work therefore requires a significant ability to adapt, especially as new malicious software and intrusion techniques are emerging. The work also requires constant improvement of knowledge, excellent reasoning and judgment skills, the application of a structured approach, versatility, as well as open-mindedness.
The program therefore follows a logical progression of learning starting from the basic notions in session 1 and progressing through the deepening of the notions and the complexity and scope of the projects managed in sessions 2 and 3. The weighting promotes putting into practice notions specific to the acquisition of skills for the installation and maintenance of networks.


LEA.E7 Applied artificial intelligence
Computer technicians specializing in applied artificial intelligence will support a university graduate working in artificial intelligence, a data scientist, by performing various tasks, including the collecting and cleaning of data for analysis, the application of an AI algorithm developed by the university graduate, and in the deployment of the chosen solution with a view to its production.
The artificial intelligence technician is distinguished from other computer technicians by the nature of their tasks. Unlike programming technicians, they are not dedicated to developing specific modules of an application, testing, improving code or providing user support; they are dedicated to the collection and preparation of data, to the application of libraries and machine learning algorithms, according to the learning model defined and developed by the university graduate in artificial intelligence with whom he is associated, then to the deployment and production of the algorithm in a production environment, in particular cloud computing. They also work in a specific context, that of artificial intelligence. The artificial intelligence technician also differs from the network technician, the computer support technician and the system administrator, as he uses programming tools and deploys applications. He is also different from the software tester as he contributes to the development of applications, and is little involved in quality control.
Partners We Work With
Collège Multihexa collaborates with our valued partners to provide internships that help students boost their career prospects.









Testimonials
Hear from our students, faculty
Watch these videos from our students, faculty and alumni to gain a deeper perspective on studying at Multihexa.
Previous
Next
asdasdas
Joue
Joue