{"id":645,"date":"2024-03-04T16:00:08","date_gmt":"2024-03-04T15:00:08","guid":{"rendered":"https:\/\/ethik-formations.fr\/?page_id=645"},"modified":"2024-03-04T16:00:09","modified_gmt":"2024-03-04T15:00:09","slug":"cyber-securite","status":"publish","type":"page","link":"https:\/\/ethik-formations.fr\/index.php\/cyber-securite\/","title":{"rendered":"Cyber s\u00e9curit\u00e9"},"content":{"rendered":"\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><div class=\"n2-section-smartslider fitvidsignore  n2_clear\" data-ssid=\"43\" tabindex=\"0\" role=\"region\" aria-label=\"Slider\"><div id=\"n2-ss-43-align\" class=\"n2-ss-align\"><div class=\"n2-padding\"><div id=\"n2-ss-43\" data-creator=\"Smart Slider 3\" data-responsive=\"fullwidth\" class=\"n2-ss-slider n2-ow n2-has-hover n2notransition  \">\n        <div class=\"n2-ss-slider-1 n2_ss__touch_element n2-ow\">\n            <div class=\"n2-ss-slider-2 n2-ow\">\n                                                <div class=\"n2-ss-slider-3 n2-ow\">\n\n                    <div class=\"n2-ss-slide-backgrounds n2-ow-all\"><div class=\"n2-ss-slide-background\" data-public-id=\"1\" data-mode=\"fill\"><div data-gradient=\"horizontal\" data-color-start=\"RGBA(255,255,255,1)\" data-color-end=\"RGBA(255,255,255,1)\" style=\"background:linear-gradient(to right, RGBA(255,255,255,1) 0%,RGBA(255,255,255,1) 100%);\" class=\"n2-ss-slide-background-color\"><\/div><\/div><\/div>                    <div class=\"n2-ss-slider-4 n2-ow\">\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1300 600\" data-related-device=\"desktopPortrait\" class=\"n2-ow n2-ss-preserve-size n2-ss-preserve-size--slider n2-ss-slide-limiter\"><\/svg><div data-first=\"1\" data-slide-duration=\"0\" data-id=\"87\" data-slide-public-id=\"1\" data-title=\"Slide 1\" class=\"n2-ss-slide n2-ow  n2-ss-slide-87\"><div role=\"note\" class=\"n2-ss-slide--focus\" tabindex=\"-1\">Slide 1<\/div><div class=\"n2-ss-layers-container n2-ss-slide-limiter n2-ow\"><div class=\"n2-ss-layer n2-ow n-uc-7ctrC3y3es1c\" data-sstype=\"slide\" data-pm=\"default\"><div class=\"n2-ss-layer n2-ow n-uc-lNdXr6EYwu0V\" data-pm=\"default\" data-sstype=\"content\" data-hasbackground=\"0\"><div class=\"n2-ss-section-main-content n2-ss-layer-with-background n2-ss-layer-content n2-ow n-uc-lNdXr6EYwu0V-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-3VTCIzKikhGM\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-3VTCIzKikhGM-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-fPHaaCChrCJH\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-fPHaaCChrCJH-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-YGZDo38PujrI\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-YGZDo38PujrI-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-xcQG1uV0l8u2\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-xcQG1uV0l8u2-inner\"><div class=\"n2-ss-layer n2-ow n-uc-YD7OkMU4qMXC\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-43item1\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 1 : Fondamentaux de la Cybers\u00e9curit\u00e9<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-jFVlGqXauaL7\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Introduction \u00e0 la cybers\u00e9curit\u00e9<br \/>\n&#8211; D\u00e9finition et importance<br \/>\n&#8211; \u00c9volution des menaces en ligne<br \/>\n&#8211; Principes de base de la s\u00e9curit\u00e9 informatique<br \/>\n&#8211; Confidentialit\u00e9, int\u00e9grit\u00e9 et disponibilit\u00e9 (CID)<br \/>\n&#8211; Principes de moindre privil\u00e8ge<br \/>\n&#8211; Authentification et autorisation<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Introduction \u00e0 la cybers\u00e9curit\u00e9<br \/>\n&#8211; D\u00e9finition et importance<br \/>\n&#8211; \u00c9volution des menaces en ligne<br \/>\n&#8211; Principes de base de la s\u00e9curit\u00e9 informatique<br \/>\n&#8211; Confidentialit\u00e9, int\u00e9grit\u00e9 et disponibilit\u00e9 (CID)<br \/>\n&#8211; Principes de moindre privil\u00e8ge<br \/>\n&#8211; Authentification et autorisation<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Introduction \u00e0 la cybers\u00e9curit\u00e9<br \/>\n&#8211; D\u00e9finition et importance<br \/>\n&#8211; \u00c9volution des menaces en ligne<br \/>\n&#8211; Principes de base de la s\u00e9curit\u00e9 informatique<br \/>\n&#8211; Confidentialit\u00e9, int\u00e9grit\u00e9 et disponibilit\u00e9 (CID)<br \/>\n&#8211; Principes de moindre privil\u00e8ge<br \/>\n&#8211; Authentification et autorisation<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-WITPlKKnTrXt\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-WITPlKKnTrXt-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-AChORKsD6ScE\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-AChORKsD6ScE-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-WEqwAa0mtFnG\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-WEqwAa0mtFnG-inner\"><div class=\"n2-ss-layer n2-ow n-uc-vOUEl6z340Qx\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-43item3\" class=\"n2-font-e129a8c8af82a9c52ce966752db00e29-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 2 : Menaces et Vuln\u00e9rabilit\u00e9s<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-p1aPKML1YgCz\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Types de menaces<br \/>\n&#8211; Malwares (virus, vers, chevaux de Troie)<br \/>\n&#8211; Attaques par phishing<br \/>\n&#8211; Attaques de d\u00e9ni de service (DDoS)<br \/>\n&#8211; Vuln\u00e9rabilit\u00e9s courantes<br \/>\n&#8211; Logiciels obsol\u00e8tes<br \/>\n&#8211; Faiblesses dans les mots de passe<br \/>\n&#8211; Manque de mises \u00e0 jour de s\u00e9curit\u00e9<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Types de menaces<br \/>\n&#8211; Malwares (virus, vers, chevaux de Troie)<br \/>\n&#8211; Attaques par phishing<br \/>\n&#8211; Attaques de d\u00e9ni de service (DDoS)<br \/>\n&#8211; Vuln\u00e9rabilit\u00e9s courantes<br \/>\n&#8211; Logiciels obsol\u00e8tes<br \/>\n&#8211; Faiblesses dans les mots de passe<br \/>\n&#8211; Manque de mises \u00e0 jour de s\u00e9curit\u00e9<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Types de menaces<br \/>\n&#8211; Malwares (virus, vers, chevaux de Troie)<br \/>\n&#8211; Attaques par phishing<br \/>\n&#8211; Attaques de d\u00e9ni de service (DDoS)<br \/>\n&#8211; Vuln\u00e9rabilit\u00e9s courantes<br \/>\n&#8211; Logiciels obsol\u00e8tes<br \/>\n&#8211; Faiblesses dans les mots de passe<br \/>\n&#8211; Manque de mises \u00e0 jour de s\u00e9curit\u00e9<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-jRerOjvsrogF\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-jRerOjvsrogF-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-rbaNzUm737BT\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-rbaNzUm737BT-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-P6k7oC2LLLOZ\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-P6k7oC2LLLOZ-inner\"><div class=\"n2-ss-layer n2-ow n-uc-iMgkoEOpZY2L\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-43item5\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 3 : S\u00e9curit\u00e9 des R\u00e9seaux<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-hmJabp86Setv\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Architecture des r\u00e9seaux s\u00e9curis\u00e9s<br \/>\n&#8211; Pare-feu<br \/>\n&#8211; VPN (R\u00e9seaux Priv\u00e9s Virtuels)<br \/>\n&#8211; IDS\/IPS (D\u00e9tection\/Pr\u00e9vention d\u2019intrusion)<br \/>\n&#8211; S\u00e9curit\u00e9 sans fil<br \/>\n&#8211; Protocoles de s\u00e9curit\u00e9 (WPA, WPA2, WPA3)<br \/>\n&#8211; Risques li\u00e9s au Wi-Fi public<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Architecture des r\u00e9seaux s\u00e9curis\u00e9s<br \/>\n&#8211; Pare-feu<br \/>\n&#8211; VPN (R\u00e9seaux Priv\u00e9s Virtuels)<br \/>\n&#8211; IDS\/IPS (D\u00e9tection\/Pr\u00e9vention d\u2019intrusion)<br \/>\n&#8211; S\u00e9curit\u00e9 sans fil<br \/>\n&#8211; Protocoles de s\u00e9curit\u00e9 (WPA, WPA2, WPA3)<br \/>\n&#8211; Risques li\u00e9s au Wi-Fi public<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Architecture des r\u00e9seaux s\u00e9curis\u00e9s<br \/>\n&#8211; Pare-feu<br \/>\n&#8211; VPN (R\u00e9seaux Priv\u00e9s Virtuels)<br \/>\n&#8211; IDS\/IPS (D\u00e9tection\/Pr\u00e9vention d\u2019intrusion)<br \/>\n&#8211; S\u00e9curit\u00e9 sans fil<br \/>\n&#8211; Protocoles de s\u00e9curit\u00e9 (WPA, WPA2, WPA3)<br \/>\n&#8211; Risques li\u00e9s au Wi-Fi public<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-DTdE2ui4dGZn\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-DTdE2ui4dGZn-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-L1JAHvTn1zYv\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-L1JAHvTn1zYv-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-nU7G4KmpXcOf\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-nU7G4KmpXcOf-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-vniGP89ypRak\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-vniGP89ypRak-inner\"><div class=\"n2-ss-layer n2-ow n-uc-JXKEabYCRL4v\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-43item7\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 4 : S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Exploitation<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-qsvKeODPHFCa\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Configuration s\u00e9curis\u00e9e des syst\u00e8mes d\u2019exploitation<br \/>\n&#8211; Gestion des droits d\u2019acc\u00e8s<br \/>\n&#8211; Param\u00e8tres de s\u00e9curit\u00e9 avanc\u00e9s<br \/>\n&#8211; S\u00e9curit\u00e9 mobile<br \/>\n&#8211; Gestion des appareils mobiles (MDM)<br \/>\n&#8211; Applications s\u00e9curis\u00e9es<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Configuration s\u00e9curis\u00e9e des syst\u00e8mes d\u2019exploitation<br \/>\n&#8211; Gestion des droits d\u2019acc\u00e8s<br \/>\n&#8211; Param\u00e8tres de s\u00e9curit\u00e9 avanc\u00e9s<br \/>\n&#8211; S\u00e9curit\u00e9 mobile<br \/>\n&#8211; Gestion des appareils mobiles (MDM)<br \/>\n&#8211; Applications s\u00e9curis\u00e9es<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Configuration s\u00e9curis\u00e9e des syst\u00e8mes d\u2019exploitation<br \/>\n&#8211; Gestion des droits d\u2019acc\u00e8s<br \/>\n&#8211; Param\u00e8tres de s\u00e9curit\u00e9 avanc\u00e9s<br \/>\n&#8211; S\u00e9curit\u00e9 mobile<br \/>\n&#8211; Gestion des appareils mobiles (MDM)<br \/>\n&#8211; Applications s\u00e9curis\u00e9es<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-fgKprJreiKW7\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-fgKprJreiKW7-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-7dd4dpcvRXT4\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-7dd4dpcvRXT4-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-RAF9vxF3O9iG\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-RAF9vxF3O9iG-inner\"><div class=\"n2-ss-layer n2-ow n-uc-8GYkDqRi5PNJ\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-43item9\" class=\"n2-font-8bdb827227064ff7c472628106e2d7d4-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 5 : Gestion des Incidents de S\u00e9curit\u00e9<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-I0MyFBCYlVji\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Planification de la r\u00e9ponse aux incidents<br \/>\n&#8211; \u00c9valuation des risques<br \/>\n&#8211; Plan de communication en cas d\u2019incident<br \/>\n&#8211; Analyse post-incident<br \/>\n&#8211; Collecte de donn\u00e9es forensiques<br \/>\n&#8211; Rapports et documentation<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Planification de la r\u00e9ponse aux incidents<br \/>\n&#8211; \u00c9valuation des risques<br \/>\n&#8211; Plan de communication en cas d\u2019incident<br \/>\n&#8211; Analyse post-incident<br \/>\n&#8211; Collecte de donn\u00e9es forensiques<br \/>\n&#8211; Rapports et documentation<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Planification de la r\u00e9ponse aux incidents<br \/>\n&#8211; \u00c9valuation des risques<br \/>\n&#8211; Plan de communication en cas d\u2019incident<br \/>\n&#8211; Analyse post-incident<br \/>\n&#8211; Collecte de donn\u00e9es forensiques<br \/>\n&#8211; Rapports et documentation<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-QQ3GV9WHNWTM\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-QQ3GV9WHNWTM-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-u0NUX580rsUg\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-u0NUX580rsUg-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-9Tzbw7OQYAcq\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-9Tzbw7OQYAcq-inner\"><div class=\"n2-ss-layer n2-ow n-uc-Ku16qH9YtzSu\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-43item11\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 6 : Sensibilisation \u00e0 la Cybers\u00e9curit\u00e9<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-o3pODLa1xPYe\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Formation des employ\u00e9s<br \/>\n&#8211; Bonnes pratiques en mati\u00e8re de s\u00e9curit\u00e9<br \/>\n&#8211; Gestion des mots de passe<br \/>\n&#8211; Communication et sensibilisation continue<br \/>\n&#8211; Campagnes de sensibilisation<br \/>\n&#8211; Simulation d\u2019attaques<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Formation des employ\u00e9s<br \/>\n&#8211; Bonnes pratiques en mati\u00e8re de s\u00e9curit\u00e9<br \/>\n&#8211; Gestion des mots de passe<br \/>\n&#8211; Communication et sensibilisation continue<br \/>\n&#8211; Campagnes de sensibilisation<br \/>\n&#8211; Simulation d\u2019attaques<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Formation des employ\u00e9s<br \/>\n&#8211; Bonnes pratiques en mati\u00e8re de s\u00e9curit\u00e9<br \/>\n&#8211; Gestion des mots de passe<br \/>\n&#8211; Communication et sensibilisation continue<br \/>\n&#8211; Campagnes de sensibilisation<br \/>\n&#8211; Simulation d\u2019attaques<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-l69pTFVnlAVr\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-l69pTFVnlAVr-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-Rk1or61iN6RD\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-Rk1or61iN6RD-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-SYJEKwndY4jM\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-SYJEKwndY4jM-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-bdS96Xexx0B5\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-bdS96Xexx0B5-inner\"><div class=\"n2-ss-layer n2-ow n-uc-kUTUUsbaTLXQ\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-43item13\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 7 : Aspects Juridiques et \u00c9thiques<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-DBWsyOrUsUk7\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; L\u00e9gislation en mati\u00e8re de cybers\u00e9curit\u00e9<br \/>\n&#8211; Loi sur la protection des donn\u00e9es<br \/>\n&#8211; Responsabilit\u00e9 l\u00e9gale des entreprises<br \/>\n&#8211; \u00c9thique en cybers\u00e9curit\u00e9<br \/>\n&#8211; Respect de la vie priv\u00e9e<br \/>\n&#8211; Responsabilit\u00e9 sociale des entreprises<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; L\u00e9gislation en mati\u00e8re de cybers\u00e9curit\u00e9<br \/>\n&#8211; Loi sur la protection des donn\u00e9es<br \/>\n&#8211; Responsabilit\u00e9 l\u00e9gale des entreprises<br \/>\n&#8211; \u00c9thique en cybers\u00e9curit\u00e9<br \/>\n&#8211; Respect de la vie priv\u00e9e<br \/>\n&#8211; Responsabilit\u00e9 sociale des entreprises<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; L\u00e9gislation en mati\u00e8re de cybers\u00e9curit\u00e9<br \/>\n&#8211; Loi sur la protection des donn\u00e9es<br \/>\n&#8211; Responsabilit\u00e9 l\u00e9gale des entreprises<br \/>\n&#8211; \u00c9thique en cybers\u00e9curit\u00e9<br \/>\n&#8211; Respect de la vie priv\u00e9e<br \/>\n&#8211; Responsabilit\u00e9 sociale des entreprises<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-D9tqrs43cDHW\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-D9tqrs43cDHW-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-k8xjejTosSP3\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-k8xjejTosSP3-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-7ZerSDgQT3I8\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-7ZerSDgQT3I8-inner\"><div class=\"n2-ss-layer n2-ow n-uc-RuRTB3fp1f1l\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-43item15\" class=\"n2-font-9e35818b51b3d2fe2b6f23df8e86e287-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 8: Certification et Carri\u00e8re en Cybers\u00e9curit\u00e9<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-9TixsrNaEJaD\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Principales certifications en cybers\u00e9curit\u00e9<br \/>\n&#8211; CompTIA Security+<br \/>\n&#8211; Certified Information Systems Security Professional (CISSP)<br \/>\n&#8211; Perspectives de carri\u00e8re<br \/>\n&#8211; Profil du professionnel en cybers\u00e9curit\u00e9<br \/>\n&#8211; Opportunit\u00e9s d\u2019emploi<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Principales certifications en cybers\u00e9curit\u00e9<br \/>\n&#8211; CompTIA Security+<br \/>\n&#8211; Certified Information Systems Security Professional (CISSP)<br \/>\n&#8211; Perspectives de carri\u00e8re<br \/>\n&#8211; Profil du professionnel en cybers\u00e9curit\u00e9<br \/>\n&#8211; Opportunit\u00e9s d\u2019emploi<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Principales certifications en cybers\u00e9curit\u00e9<br \/>\n&#8211; CompTIA Security+<br \/>\n&#8211; Certified Information Systems Security Professional (CISSP)<br \/>\n&#8211; Perspectives de carri\u00e8re<br \/>\n&#8211; Profil du professionnel en cybers\u00e9curit\u00e9<br \/>\n&#8211; Opportunit\u00e9s d\u2019emploi<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-BfK9BeENSyFi\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-BfK9BeENSyFi-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-cQlN3qFDRUKp\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-cQlN3qFDRUKp-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-aArFxydkrbob\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-aArFxydkrbob-inner\"><div class=\"n2-ss-layer n2-ow n-uc-bXmtpnFvk7D7\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-43item17\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Ressources Suppl\u00e9mentaires<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-PfBGN420CwFU\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Livres recommand\u00e9s<br \/>\n&#8211; Sites web et blogs<br \/>\n&#8211; Outils de cybers\u00e9curit\u00e9<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Livres recommand\u00e9s<br \/>\n&#8211; Sites web et blogs<br \/>\n&#8211; Outils de cybers\u00e9curit\u00e9<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Livres recommand\u00e9s<br \/>\n&#8211; Sites web et blogs<br \/>\n&#8211; Outils de cybers\u00e9curit\u00e9<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>                    <\/div>\n\n                                    <\/div>\n            <\/div>\n        <\/div>\n        <\/div><ss3-loader><\/ss3-loader><\/div><\/div><div class=\"n2_clear\"><\/div><\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/pages\/645"}],"collection":[{"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/comments?post=645"}],"version-history":[{"count":1,"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/pages\/645\/revisions"}],"predecessor-version":[{"id":646,"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/pages\/645\/revisions\/646"}],"wp:attachment":[{"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/media?parent=645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}