{"id":648,"date":"2024-03-04T16:27:42","date_gmt":"2024-03-04T15:27:42","guid":{"rendered":"https:\/\/ethik-formations.fr\/?page_id=648"},"modified":"2024-03-04T16:27:42","modified_gmt":"2024-03-04T15:27:42","slug":"data-ai","status":"publish","type":"page","link":"https:\/\/ethik-formations.fr\/index.php\/data-ai\/","title":{"rendered":"Data &amp; AI"},"content":{"rendered":"\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><div class=\"n2-section-smartslider fitvidsignore  n2_clear\" data-ssid=\"44\" tabindex=\"0\" role=\"region\" aria-label=\"Slider\"><div id=\"n2-ss-44-align\" class=\"n2-ss-align\"><div class=\"n2-padding\"><div id=\"n2-ss-44\" data-creator=\"Smart Slider 3\" data-responsive=\"fullwidth\" class=\"n2-ss-slider n2-ow n2-has-hover n2notransition  \">\n        <div class=\"n2-ss-slider-1 n2_ss__touch_element n2-ow\">\n            <div class=\"n2-ss-slider-2 n2-ow\">\n                                                <div class=\"n2-ss-slider-3 n2-ow\">\n\n                    <div class=\"n2-ss-slide-backgrounds n2-ow-all\"><div class=\"n2-ss-slide-background\" data-public-id=\"1\" data-mode=\"fill\"><div data-gradient=\"horizontal\" data-color-start=\"RGBA(255,255,255,1)\" data-color-end=\"RGBA(255,255,255,1)\" style=\"background:linear-gradient(to right, RGBA(255,255,255,1) 0%,RGBA(255,255,255,1) 100%);\" class=\"n2-ss-slide-background-color\"><\/div><\/div><\/div>                    <div class=\"n2-ss-slider-4 n2-ow\">\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1300 600\" data-related-device=\"desktopPortrait\" class=\"n2-ow n2-ss-preserve-size n2-ss-preserve-size--slider n2-ss-slide-limiter\"><\/svg><div data-first=\"1\" data-slide-duration=\"0\" data-id=\"88\" data-slide-public-id=\"1\" data-title=\"Slide 1\" class=\"n2-ss-slide n2-ow  n2-ss-slide-88\"><div role=\"note\" class=\"n2-ss-slide--focus\" tabindex=\"-1\">Slide 1<\/div><div class=\"n2-ss-layers-container n2-ss-slide-limiter n2-ow\"><div class=\"n2-ss-layer n2-ow n-uc-TipgxLFcMz8J\" data-sstype=\"slide\" data-pm=\"default\"><div class=\"n2-ss-layer n2-ow n-uc-0O5lD6u7CBBt\" data-pm=\"default\" data-sstype=\"content\" data-hasbackground=\"0\"><div class=\"n2-ss-section-main-content n2-ss-layer-with-background n2-ss-layer-content n2-ow n-uc-0O5lD6u7CBBt-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-SLdKX8MEYdZW\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-SLdKX8MEYdZW-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-9zSogOXFTzz1\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-9zSogOXFTzz1-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-lIuAOPhoMBKj\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-lIuAOPhoMBKj-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-AmrYPEQGnh3m\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-AmrYPEQGnh3m-inner\"><div class=\"n2-ss-layer n2-ow n-uc-66nVQZ4QWyWY\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-44item1\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 1 : Fondamentaux de la Data et de l\u2019IA<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-UUWqcl3ktk1g\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Introduction \u00e0 la gestion des donn\u00e9es<br \/>\n&#8211; Concepts fondamentaux de la gestion des donn\u00e9es<br \/>\n&#8211; Importance de la qualit\u00e9 des donn\u00e9es<br \/>\n&#8211; Fondements de l\u2019Intelligence Artificielle<br \/>\n&#8211; D\u00e9finitions et domaines d\u2019application<br \/>\n&#8211; \u00c9thique de l\u2019IA<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Introduction \u00e0 la gestion des donn\u00e9es<br \/>\n&#8211; Concepts fondamentaux de la gestion des donn\u00e9es<br \/>\n&#8211; Importance de la qualit\u00e9 des donn\u00e9es<br \/>\n&#8211; Fondements de l\u2019Intelligence Artificielle<br \/>\n&#8211; D\u00e9finitions et domaines d\u2019application<br \/>\n&#8211; \u00c9thique de l\u2019IA<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Introduction \u00e0 la gestion des donn\u00e9es<br \/>\n&#8211; Concepts fondamentaux de la gestion des donn\u00e9es<br \/>\n&#8211; Importance de la qualit\u00e9 des donn\u00e9es<br \/>\n&#8211; Fondements de l\u2019Intelligence Artificielle<br \/>\n&#8211; D\u00e9finitions et domaines d\u2019application<br \/>\n&#8211; \u00c9thique de l\u2019IA<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-I4H30kj5agjd\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-I4H30kj5agjd-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-lHm0BxD9Rftc\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-lHm0BxD9Rftc-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-Fs5vCns4MUhM\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-Fs5vCns4MUhM-inner\"><div class=\"n2-ss-layer n2-ow n-uc-wToD7aMrqEjj\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-44item3\" class=\"n2-font-e129a8c8af82a9c52ce966752db00e29-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 2 : Collecte et Pr\u00e9paration des Donn\u00e9es<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-3pxGlkuDzZ1u\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Collecte de donn\u00e9es<br \/>\n&#8211; Sources de donn\u00e9es<br \/>\n&#8211; M\u00e9thodes de collecte<br \/>\n&#8211; Nettoyage et pr\u00e9paration des donn\u00e9es<br \/>\n&#8211; Identification et traitement des valeurs manquantes<br \/>\n&#8211; Normalisation et transformation des donn\u00e9es<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Collecte de donn\u00e9es<br \/>\n&#8211; Sources de donn\u00e9es<br \/>\n&#8211; M\u00e9thodes de collecte<br \/>\n&#8211; Nettoyage et pr\u00e9paration des donn\u00e9es<br \/>\n&#8211; Identification et traitement des valeurs manquantes<br \/>\n&#8211; Normalisation et transformation des donn\u00e9es<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Collecte de donn\u00e9es<br \/>\n&#8211; Sources de donn\u00e9es<br \/>\n&#8211; M\u00e9thodes de collecte<br \/>\n&#8211; Nettoyage et pr\u00e9paration des donn\u00e9es<br \/>\n&#8211; Identification et traitement des valeurs manquantes<br \/>\n&#8211; Normalisation et transformation des donn\u00e9es<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-baSjsI8BQ11L\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-baSjsI8BQ11L-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-tHOvU6jCps2t\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-tHOvU6jCps2t-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-VagUfY75YHvL\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-VagUfY75YHvL-inner\"><div class=\"n2-ss-layer n2-ow n-uc-FrRb0UkLaRfE\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-44item5\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 3 : Analyse de Donn\u00e9es et Statistiques<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-9EjycyUq1c3s\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; M\u00e9thodes d\u2019analyse de donn\u00e9es<br \/>\n&#8211; Analyse descriptive<br \/>\n&#8211; Analyse exploratoire<br \/>\n&#8211; Concepts statistiques pour l\u2019analyse des donn\u00e9es<br \/>\n&#8211; Moyenne, m\u00e9diane, \u00e9cart-type<br \/>\n&#8211; Tests statistiques de base<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; M\u00e9thodes d\u2019analyse de donn\u00e9es<br \/>\n&#8211; Analyse descriptive<br \/>\n&#8211; Analyse exploratoire<br \/>\n&#8211; Concepts statistiques pour l\u2019analyse des donn\u00e9es<br \/>\n&#8211; Moyenne, m\u00e9diane, \u00e9cart-type<br \/>\n&#8211; Tests statistiques de base<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; M\u00e9thodes d\u2019analyse de donn\u00e9es<br \/>\n&#8211; Analyse descriptive<br \/>\n&#8211; Analyse exploratoire<br \/>\n&#8211; Concepts statistiques pour l\u2019analyse des donn\u00e9es<br \/>\n&#8211; Moyenne, m\u00e9diane, \u00e9cart-type<br \/>\n&#8211; Tests statistiques de base<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-1KeHqQx76UCX\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-1KeHqQx76UCX-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-FhSLyJeG1LVv\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-FhSLyJeG1LVv-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-mLgsUILlfYpx\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-mLgsUILlfYpx-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-EcAdtsuZMiH3\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-EcAdtsuZMiH3-inner\"><div class=\"n2-ss-layer n2-ow n-uc-G6kpd1LB0ko2\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-44item7\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 4 : Machine Learning<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-BetWt0atBQA1\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Introduction au Machine Learning<br \/>\n&#8211; Types de Machine Learning : Supervis\u00e9, Non supervis\u00e9, Apprentissage profond<br \/>\n&#8211; Algorithme d\u2019apprentissage<br \/>\n&#8211; Applications pratiques du Machine Learning<br \/>\n&#8211; Pr\u00e9diction<br \/>\n&#8211; Classification et clustering<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Introduction au Machine Learning<br \/>\n&#8211; Types de Machine Learning : Supervis\u00e9, Non supervis\u00e9, Apprentissage profond<br \/>\n&#8211; Algorithme d\u2019apprentissage<br \/>\n&#8211; Applications pratiques du Machine Learning<br \/>\n&#8211; Pr\u00e9diction<br \/>\n&#8211; Classification et clustering<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Introduction au Machine Learning<br \/>\n&#8211; Types de Machine Learning : Supervis\u00e9, Non supervis\u00e9, Apprentissage profond<br \/>\n&#8211; Algorithme d\u2019apprentissage<br \/>\n&#8211; Applications pratiques du Machine Learning<br \/>\n&#8211; Pr\u00e9diction<br \/>\n&#8211; Classification et clustering<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-HTPVFlCD0ZJn\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-HTPVFlCD0ZJn-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-3giTaQ8Q5CF0\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-3giTaQ8Q5CF0-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-jbAJ2uj1qssO\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-jbAJ2uj1qssO-inner\"><div class=\"n2-ss-layer n2-ow n-uc-123b27deaaf77\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-44item9\" class=\"n2-font-b74a2e16141988a522a19c1b814fa08d-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 5 : Intelligence Artificielle et Deep Learning<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-4MavaUt3LgTR\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Fondements du Deep Learning<br \/>\n&#8211; R\u00e9seaux de neurones<br \/>\n&#8211; Apprentissage profond<br \/>\n&#8211; Applications avanc\u00e9es de l\u2019IA<br \/>\n&#8211; Traitement du langage naturel (NLP)<br \/>\n&#8211; Vision par ordinateur<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Fondements du Deep Learning<br \/>\n&#8211; R\u00e9seaux de neurones<br \/>\n&#8211; Apprentissage profond<br \/>\n&#8211; Applications avanc\u00e9es de l\u2019IA<br \/>\n&#8211; Traitement du langage naturel (NLP)<br \/>\n&#8211; Vision par ordinateur<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Fondements du Deep Learning<br \/>\n&#8211; R\u00e9seaux de neurones<br \/>\n&#8211; Apprentissage profond<br \/>\n&#8211; Applications avanc\u00e9es de l\u2019IA<br \/>\n&#8211; Traitement du langage naturel (NLP)<br \/>\n&#8211; Vision par ordinateur<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-cLYoEQvC5Thc\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-cLYoEQvC5Thc-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-U6iuQQwMfsvf\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-U6iuQQwMfsvf-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-opCK581lACnt\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-opCK581lACnt-inner\"><div class=\"n2-ss-layer n2-ow n-uc-TgnbwdOtrQNM\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-44item11\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 6 : Sensibilisation \u00e0 la Cybers\u00e9curit\u00e9<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-PxFvZoE9lRza\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Formation des employ\u00e9s<br \/>\n&#8211; Bonnes pratiques en mati\u00e8re de s\u00e9curit\u00e9<br \/>\n&#8211; Gestion des mots de passe<br \/>\n&#8211; Communication et sensibilisation continue<br \/>\n&#8211; Campagnes de sensibilisation<br \/>\n&#8211; Simulation d\u2019attaques<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Formation des employ\u00e9s<br \/>\n&#8211; Bonnes pratiques en mati\u00e8re de s\u00e9curit\u00e9<br \/>\n&#8211; Gestion des mots de passe<br \/>\n&#8211; Communication et sensibilisation continue<br \/>\n&#8211; Campagnes de sensibilisation<br \/>\n&#8211; Simulation d\u2019attaques<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Formation des employ\u00e9s<br \/>\n&#8211; Bonnes pratiques en mati\u00e8re de s\u00e9curit\u00e9<br \/>\n&#8211; Gestion des mots de passe<br \/>\n&#8211; Communication et sensibilisation continue<br \/>\n&#8211; Campagnes de sensibilisation<br \/>\n&#8211; Simulation d\u2019attaques<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-IfTwwT7CpL81\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-IfTwwT7CpL81-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-C1IvjoGwQuO7\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-C1IvjoGwQuO7-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-gV8yO98oTE8g\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-gV8yO98oTE8g-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-vJ2kzgtldvhv\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-vJ2kzgtldvhv-inner\"><div class=\"n2-ss-layer n2-ow n-uc-vBvRFoGs0wLl\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-44item13\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 7 : Aspects Juridiques et \u00c9thiques<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-Dtn8QxD3jKXI\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; L\u00e9gislation en mati\u00e8re de cybers\u00e9curit\u00e9<br \/>\n&#8211; Loi sur la protection des donn\u00e9es<br \/>\n&#8211; Responsabilit\u00e9 l\u00e9gale des entreprises<br \/>\n&#8211; \u00c9thique en cybers\u00e9curit\u00e9<br \/>\n&#8211; Respect de la vie priv\u00e9e<br \/>\n&#8211; Responsabilit\u00e9 sociale des entreprises<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; L\u00e9gislation en mati\u00e8re de cybers\u00e9curit\u00e9<br \/>\n&#8211; Loi sur la protection des donn\u00e9es<br \/>\n&#8211; Responsabilit\u00e9 l\u00e9gale des entreprises<br \/>\n&#8211; \u00c9thique en cybers\u00e9curit\u00e9<br \/>\n&#8211; Respect de la vie priv\u00e9e<br \/>\n&#8211; Responsabilit\u00e9 sociale des entreprises<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; L\u00e9gislation en mati\u00e8re de cybers\u00e9curit\u00e9<br \/>\n&#8211; Loi sur la protection des donn\u00e9es<br \/>\n&#8211; Responsabilit\u00e9 l\u00e9gale des entreprises<br \/>\n&#8211; \u00c9thique en cybers\u00e9curit\u00e9<br \/>\n&#8211; Respect de la vie priv\u00e9e<br \/>\n&#8211; Responsabilit\u00e9 sociale des entreprises<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-jdIBhVrWHH8X\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-jdIBhVrWHH8X-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-DUheSnMd5MgP\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-DUheSnMd5MgP-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-HhoKu0ugINFX\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-HhoKu0ugINFX-inner\"><div class=\"n2-ss-layer n2-ow n-uc-lksEajPGXdmO\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-44item15\" class=\"n2-font-9e35818b51b3d2fe2b6f23df8e86e287-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 8 : S\u00e9curit\u00e9 des Donn\u00e9es et de l\u2019IA<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-gZ0VN8CUmEXW\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Principes de s\u00e9curit\u00e9 des donn\u00e9es<br \/>\n&#8211; Confidentialit\u00e9 et int\u00e9grit\u00e9 des donn\u00e9es<br \/>\n&#8211; Gestion des autorisations d\u2019acc\u00e8s<br \/>\n&#8211; \u00c9thique et responsabilit\u00e9 en mati\u00e8re d\u2019IA<br \/>\n&#8211; Implications \u00e9thiques de l\u2019utilisation de l\u2019IA<br \/>\n&#8211; Responsabilit\u00e9 sociale des entreprises<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Principes de s\u00e9curit\u00e9 des donn\u00e9es<br \/>\n&#8211; Confidentialit\u00e9 et int\u00e9grit\u00e9 des donn\u00e9es<br \/>\n&#8211; Gestion des autorisations d\u2019acc\u00e8s<br \/>\n&#8211; \u00c9thique et responsabilit\u00e9 en mati\u00e8re d\u2019IA<br \/>\n&#8211; Implications \u00e9thiques de l\u2019utilisation de l\u2019IA<br \/>\n&#8211; Responsabilit\u00e9 sociale des entreprises<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Principes de s\u00e9curit\u00e9 des donn\u00e9es<br \/>\n&#8211; Confidentialit\u00e9 et int\u00e9grit\u00e9 des donn\u00e9es<br \/>\n&#8211; Gestion des autorisations d\u2019acc\u00e8s<br \/>\n&#8211; \u00c9thique et responsabilit\u00e9 en mati\u00e8re d\u2019IA<br \/>\n&#8211; Implications \u00e9thiques de l\u2019utilisation de l\u2019IA<br \/>\n&#8211; Responsabilit\u00e9 sociale des entreprises<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-buomabYlmpEM\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-buomabYlmpEM-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-BTOBRz419gKs\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-BTOBRz419gKs-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-RQMMFVsjc973\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-RQMMFVsjc973-inner\"><div class=\"n2-ss-layer n2-ow n-uc-yxy9HPWeTCts\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-44item17\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Ressources Suppl\u00e9mentaires<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-JXJB5j9tZZpa\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Livres recommand\u00e9s<br \/>\n&#8211; Sites web et blogs<br \/>\n&#8211; Outils et plateformes pour l\u2019IA<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Livres recommand\u00e9s<br \/>\n&#8211; Sites web et blogs<br \/>\n&#8211; Outils et plateformes pour l\u2019IA<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Livres recommand\u00e9s<br \/>\n&#8211; Sites web et blogs<br \/>\n&#8211; Outils et plateformes pour l\u2019IA<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>                    <\/div>\n\n                                    <\/div>\n            <\/div>\n        <\/div>\n        <\/div><ss3-loader><\/ss3-loader><\/div><\/div><div class=\"n2_clear\"><\/div><\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/pages\/648"}],"collection":[{"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/comments?post=648"}],"version-history":[{"count":1,"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/pages\/648\/revisions"}],"predecessor-version":[{"id":649,"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/pages\/648\/revisions\/649"}],"wp:attachment":[{"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/media?parent=648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}