{"id":650,"date":"2024-03-04T16:47:09","date_gmt":"2024-03-04T15:47:09","guid":{"rendered":"https:\/\/ethik-formations.fr\/?page_id=650"},"modified":"2024-03-04T16:47:10","modified_gmt":"2024-03-04T15:47:10","slug":"software-engineering-2","status":"publish","type":"page","link":"https:\/\/ethik-formations.fr\/index.php\/software-engineering-2\/","title":{"rendered":"Software Engineering"},"content":{"rendered":"\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><div class=\"n2-section-smartslider fitvidsignore  n2_clear\" data-ssid=\"45\" tabindex=\"0\" role=\"region\" aria-label=\"Slider\"><div id=\"n2-ss-45-align\" class=\"n2-ss-align\"><div class=\"n2-padding\"><div id=\"n2-ss-45\" data-creator=\"Smart Slider 3\" data-responsive=\"fullwidth\" class=\"n2-ss-slider n2-ow n2-has-hover n2notransition  \">\n        <div class=\"n2-ss-slider-1 n2_ss__touch_element n2-ow\">\n            <div class=\"n2-ss-slider-2 n2-ow\">\n                                                <div class=\"n2-ss-slider-3 n2-ow\">\n\n                    <div class=\"n2-ss-slide-backgrounds n2-ow-all\"><div class=\"n2-ss-slide-background\" data-public-id=\"1\" data-mode=\"fill\"><div data-gradient=\"horizontal\" data-color-start=\"RGBA(255,255,255,1)\" data-color-end=\"RGBA(255,255,255,1)\" style=\"background:linear-gradient(to right, RGBA(255,255,255,1) 0%,RGBA(255,255,255,1) 100%);\" class=\"n2-ss-slide-background-color\"><\/div><\/div><\/div>                    <div class=\"n2-ss-slider-4 n2-ow\">\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1300 600\" data-related-device=\"desktopPortrait\" class=\"n2-ow n2-ss-preserve-size n2-ss-preserve-size--slider n2-ss-slide-limiter\"><\/svg><div data-first=\"1\" data-slide-duration=\"0\" data-id=\"89\" data-slide-public-id=\"1\" data-title=\"Slide 1\" class=\"n2-ss-slide n2-ow  n2-ss-slide-89\"><div role=\"note\" class=\"n2-ss-slide--focus\" tabindex=\"-1\">Slide 1<\/div><div class=\"n2-ss-layers-container n2-ss-slide-limiter n2-ow\"><div class=\"n2-ss-layer n2-ow n-uc-zYO4nRO1lNrn\" data-sstype=\"slide\" data-pm=\"default\"><div class=\"n2-ss-layer n2-ow n-uc-bECLn8YQORQZ\" data-pm=\"default\" data-sstype=\"content\" data-hasbackground=\"0\"><div class=\"n2-ss-section-main-content n2-ss-layer-with-background n2-ss-layer-content n2-ow n-uc-bECLn8YQORQZ-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-emy77nMTqk3m\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-emy77nMTqk3m-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-dpSNyVCtWI1s\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-dpSNyVCtWI1s-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-WwPgRRpuSQRW\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-WwPgRRpuSQRW-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-k1zBsdsA7w0H\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-k1zBsdsA7w0H-inner\"><div class=\"n2-ss-layer n2-ow n-uc-uT5Ko63n8YDl\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-45item1\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 1 : Introduction au G\u00e9nie Logiciel<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-gOMQvyclqy54\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; D\u00e9finition et importance du g\u00e9nie logiciel<br \/>\n&#8211; \u00c9volution de l\u2019ing\u00e9nierie logicielle<br \/>\n&#8211; Principes fondamentaux<br \/>\n&#8211; Processus de d\u00e9veloppement logiciel<br \/>\n&#8211; Mod\u00e8les de d\u00e9veloppement (en cascade, agile, DevOps)<br \/>\n&#8211; Cycle de vie du logiciel<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; D\u00e9finition et importance du g\u00e9nie logiciel<br \/>\n&#8211; \u00c9volution de l\u2019ing\u00e9nierie logicielle<br \/>\n&#8211; Principes fondamentaux<br \/>\n&#8211; Processus de d\u00e9veloppement logiciel<br \/>\n&#8211; Mod\u00e8les de d\u00e9veloppement (en cascade, agile, DevOps)<br \/>\n&#8211; Cycle de vie du logiciel<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; D\u00e9finition et importance du g\u00e9nie logiciel<br \/>\n&#8211; \u00c9volution de l\u2019ing\u00e9nierie logicielle<br \/>\n&#8211; Principes fondamentaux<br \/>\n&#8211; Processus de d\u00e9veloppement logiciel<br \/>\n&#8211; Mod\u00e8les de d\u00e9veloppement (en cascade, agile, DevOps)<br \/>\n&#8211; Cycle de vie du logiciel<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-nEskm60R2xb5\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-nEskm60R2xb5-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-Gqz7vWliAwfJ\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-Gqz7vWliAwfJ-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-On46so6oD214\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-On46so6oD214-inner\"><div class=\"n2-ss-layer n2-ow n-uc-djJi8QgeZgTO\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-45item3\" class=\"n2-font-f2a5d376f425daee5af147093fbc7c92-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 2 : Langages de Programmation et Outils de D\u00e9veloppement<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-op0rJVbqvVkS\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Langages de programmation courants<br \/>\n&#8211; Java, Python, C++, JavaScript<br \/>\n&#8211; Choix de langage en fonction des besoins du projet<br \/>\n&#8211; Environnements de d\u00e9veloppement int\u00e9gr\u00e9s (IDE)<br \/>\n&#8211; Utilisation efficace des IDE<br \/>\n&#8211; D\u00e9bogage et gestion de versions<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Langages de programmation courants<br \/>\n&#8211; Java, Python, C++, JavaScript<br \/>\n&#8211; Choix de langage en fonction des besoins du projet<br \/>\n&#8211; Environnements de d\u00e9veloppement int\u00e9gr\u00e9s (IDE)<br \/>\n&#8211; Utilisation efficace des IDE<br \/>\n&#8211; D\u00e9bogage et gestion de versions<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Langages de programmation courants<br \/>\n&#8211; Java, Python, C++, JavaScript<br \/>\n&#8211; Choix de langage en fonction des besoins du projet<br \/>\n&#8211; Environnements de d\u00e9veloppement int\u00e9gr\u00e9s (IDE)<br \/>\n&#8211; Utilisation efficace des IDE<br \/>\n&#8211; D\u00e9bogage et gestion de versions<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-PbNK3BXjQ990\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-PbNK3BXjQ990-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-xkXPweKUHcBd\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-xkXPweKUHcBd-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-8keYe6gUTGc9\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-8keYe6gUTGc9-inner\"><div class=\"n2-ss-layer n2-ow n-uc-pGAydBp4rb1g\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-45item5\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 3 : Conception Logicielle<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-pTQjcPlRsFv7\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Principes de conception<br \/>\n&#8211; Solidit\u00e9 des principes de conception<br \/>\n&#8211; Mod\u00e9lisation UML (Unified Modeling Language)<br \/>\n&#8211; Architecture logicielle<br \/>\n&#8211; Architectures monolithiques et microservices<br \/>\n&#8211; Design patterns<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Principes de conception<br \/>\n&#8211; Solidit\u00e9 des principes de conception<br \/>\n&#8211; Mod\u00e9lisation UML (Unified Modeling Language)<br \/>\n&#8211; Architecture logicielle<br \/>\n&#8211; Architectures monolithiques et microservices<br \/>\n&#8211; Design patterns<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Principes de conception<br \/>\n&#8211; Solidit\u00e9 des principes de conception<br \/>\n&#8211; Mod\u00e9lisation UML (Unified Modeling Language)<br \/>\n&#8211; Architecture logicielle<br \/>\n&#8211; Architectures monolithiques et microservices<br \/>\n&#8211; Design patterns<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-AkZ3OvbHagqN\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-AkZ3OvbHagqN-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-ABVV2sWirbus\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-ABVV2sWirbus-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-Uff7Hp0ixa8K\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-Uff7Hp0ixa8K-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-2DG0ugmneD3o\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-2DG0ugmneD3o-inner\"><div class=\"n2-ss-layer n2-ow n-uc-PVhhRDsT04vh\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-45item7\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 4 : D\u00e9veloppement Agile et DevOps<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-v4RddyQfQNRK\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; M\u00e9thodologies agiles<br \/>\n&#8211; Scrum, Kanban, XP<br \/>\n&#8211; Gestion it\u00e9rative du d\u00e9veloppement<br \/>\n&#8211; Int\u00e9gration continue et livraison continue (CI\/CD)<br \/>\n&#8211; Outils CI\/CD<br \/>\n&#8211; Automatisation des tests<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; M\u00e9thodologies agiles<br \/>\n&#8211; Scrum, Kanban, XP<br \/>\n&#8211; Gestion it\u00e9rative du d\u00e9veloppement<br \/>\n&#8211; Int\u00e9gration continue et livraison continue (CI\/CD)<br \/>\n&#8211; Outils CI\/CD<br \/>\n&#8211; Automatisation des tests<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; M\u00e9thodologies agiles<br \/>\n&#8211; Scrum, Kanban, XP<br \/>\n&#8211; Gestion it\u00e9rative du d\u00e9veloppement<br \/>\n&#8211; Int\u00e9gration continue et livraison continue (CI\/CD)<br \/>\n&#8211; Outils CI\/CD<br \/>\n&#8211; Automatisation des tests<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-Dtbj41YZG2Xe\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-Dtbj41YZG2Xe-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-Tyxbe4FzdtLn\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-Tyxbe4FzdtLn-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-57blR2TcKGft\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-57blR2TcKGft-inner\"><div class=\"n2-ss-layer n2-ow n-uc-GOaXCArAQWTo\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-45item9\" class=\"n2-font-b74a2e16141988a522a19c1b814fa08d-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 5 : Gestion de Projet Logiciel<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-obK0L768IB2Q\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Planification de projet<br \/>\n&#8211; \u00c9tablissement des objectifs<br \/>\n&#8211; Estimation du temps et des ressources<br \/>\n&#8211; Gestion d\u2019\u00e9quipe<br \/>\n&#8211; Communication efficace<br \/>\n&#8211; Gestion des conflits<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Planification de projet<br \/>\n&#8211; \u00c9tablissement des objectifs<br \/>\n&#8211; Estimation du temps et des ressources<br \/>\n&#8211; Gestion d\u2019\u00e9quipe<br \/>\n&#8211; Communication efficace<br \/>\n&#8211; Gestion des conflits<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Planification de projet<br \/>\n&#8211; \u00c9tablissement des objectifs<br \/>\n&#8211; Estimation du temps et des ressources<br \/>\n&#8211; Gestion d\u2019\u00e9quipe<br \/>\n&#8211; Communication efficace<br \/>\n&#8211; Gestion des conflits<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-Grf8xpMSZKlt\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-Grf8xpMSZKlt-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-i1Mu1FJ7vEGx\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-i1Mu1FJ7vEGx-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-KmrXb32kOJdf\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-KmrXb32kOJdf-inner\"><div class=\"n2-ss-layer n2-ow n-uc-PrbJJ6KwCx5k\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-45item11\" class=\"n2-font-9e35818b51b3d2fe2b6f23df8e86e287-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 6 : Assurance Qualit\u00e9 et Tests Logiciels<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-pqlZD1GBhbYZ\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Concepts de qualit\u00e9 logicielle<br \/>\n&#8211; Standards de qualit\u00e9<br \/>\n&#8211; M\u00e9triques de qualit\u00e9<br \/>\n&#8211; Strat\u00e9gies de test<br \/>\n&#8211; Test unitaire, int\u00e9gration, syst\u00e8me et acceptation<br \/>\n&#8211; Outils de test<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Concepts de qualit\u00e9 logicielle<br \/>\n&#8211; Standards de qualit\u00e9<br \/>\n&#8211; M\u00e9triques de qualit\u00e9<br \/>\n&#8211; Strat\u00e9gies de test<br \/>\n&#8211; Test unitaire, int\u00e9gration, syst\u00e8me et acceptation<br \/>\n&#8211; Outils de test<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Concepts de qualit\u00e9 logicielle<br \/>\n&#8211; Standards de qualit\u00e9<br \/>\n&#8211; M\u00e9triques de qualit\u00e9<br \/>\n&#8211; Strat\u00e9gies de test<br \/>\n&#8211; Test unitaire, int\u00e9gration, syst\u00e8me et acceptation<br \/>\n&#8211; Outils de test<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-0lGc1G3ltKaS\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-0lGc1G3ltKaS-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-GS8raYeiiK8J\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-GS8raYeiiK8J-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-VRRPbU8Zzxvw\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-VRRPbU8Zzxvw-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-KKQVrFaUVXqd\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-KKQVrFaUVXqd-inner\"><div class=\"n2-ss-layer n2-ow n-uc-sQoaKQIzoa2M\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-45item13\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 7 : S\u00e9curit\u00e9 des Applications<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-jDeq7wkiqkov\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Principes de s\u00e9curit\u00e9<br \/>\n&#8211; Gestion des identit\u00e9s et des acc\u00e8s<br \/>\n&#8211; Pr\u00e9vention des vuln\u00e9rabilit\u00e9s<br \/>\n&#8211; Tests de s\u00e9curit\u00e9<br \/>\n&#8211; Analyses statiques et dynamiques<br \/>\n&#8211; Bonnes pratiques en mati\u00e8re de s\u00e9curit\u00e9 du code<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Principes de s\u00e9curit\u00e9<br \/>\n&#8211; Gestion des identit\u00e9s et des acc\u00e8s<br \/>\n&#8211; Pr\u00e9vention des vuln\u00e9rabilit\u00e9s<br \/>\n&#8211; Tests de s\u00e9curit\u00e9<br \/>\n&#8211; Analyses statiques et dynamiques<br \/>\n&#8211; Bonnes pratiques en mati\u00e8re de s\u00e9curit\u00e9 du code<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Principes de s\u00e9curit\u00e9<br \/>\n&#8211; Gestion des identit\u00e9s et des acc\u00e8s<br \/>\n&#8211; Pr\u00e9vention des vuln\u00e9rabilit\u00e9s<br \/>\n&#8211; Tests de s\u00e9curit\u00e9<br \/>\n&#8211; Analyses statiques et dynamiques<br \/>\n&#8211; Bonnes pratiques en mati\u00e8re de s\u00e9curit\u00e9 du code<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-H0Pn2iG1uCdD\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-H0Pn2iG1uCdD-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-CrRjLxiOKAv0\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-CrRjLxiOKAv0-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-d1gGlPNCulua\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-d1gGlPNCulua-inner\"><div class=\"n2-ss-layer n2-ow n-uc-VrQTxiSFjaQt\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-45item15\" class=\"n2-font-9e35818b51b3d2fe2b6f23df8e86e287-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 8 : Gestion du Cycle de Vie du Logiciel<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-Lt8bDJRnWMbb\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Maintenance logicielle<br \/>\n&#8211; Correctifs et mises \u00e0 jour<br \/>\n&#8211; Gestion des changements<br \/>\n&#8211; R\u00e9f\u00e9rentiels de code et documentation<br \/>\n&#8211; Gestion de la documentation<br \/>\n&#8211; Utilisation de r\u00e9f\u00e9rentiels de code (Git, SVN)<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Maintenance logicielle<br \/>\n&#8211; Correctifs et mises \u00e0 jour<br \/>\n&#8211; Gestion des changements<br \/>\n&#8211; R\u00e9f\u00e9rentiels de code et documentation<br \/>\n&#8211; Gestion de la documentation<br \/>\n&#8211; Utilisation de r\u00e9f\u00e9rentiels de code (Git, SVN)<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Maintenance logicielle<br \/>\n&#8211; Correctifs et mises \u00e0 jour<br \/>\n&#8211; Gestion des changements<br \/>\n&#8211; R\u00e9f\u00e9rentiels de code et documentation<br \/>\n&#8211; Gestion de la documentation<br \/>\n&#8211; Utilisation de r\u00e9f\u00e9rentiels de code (Git, SVN)<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-Y9wDPrFB4Ju4\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-Y9wDPrFB4Ju4-inner\"><div class=\"n2-ss-layer n2-ow n2-ss-layer--block n2-ss-has-self-align n-uc-VRE8M0GdIURz\" data-pm=\"normal\" data-sstype=\"row\"><div class=\"n2-ss-layer-row n2-ss-layer-with-background n-uc-VRE8M0GdIURz-inner\"><div class=\"n2-ss-layer-row-inner \"><div class=\"n2-ss-layer n2-ow n-uc-OSoTw50tB1bv\" data-pm=\"default\" data-sstype=\"col\"><div class=\"n2-ss-layer-col n2-ss-layer-with-background n2-ss-layer-content n-uc-OSoTw50tB1bv-inner\"><div class=\"n2-ss-layer n2-ow n-uc-qQDYlZSjYaeE\" data-pm=\"normal\" data-sstype=\"layer\"><div id=\"n2-ss-45item17\" class=\"n2-font-745e90fc2310c85013da2bf7c9fd0a33-hover   n2-ss-item-content n2-ss-text n2-ow\" style=\"display:block;\">Module 9 : \u00c9thique et Responsabilit\u00e9 Professionnelle<\/div><\/div><div class=\"n2-ss-layer n2-ow n-uc-MA01eYR0u0ZB\" data-pm=\"normal\" data-sstype=\"layer\"><div class=\"n2-ss-item-content n2-ss-text n2-ow-all\"><div data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Respect des droits d\u2019auteur et licences<br \/>\n&#8211; Responsabilit\u00e9 sociale des ing\u00e9nieurs logiciels<br \/>\n&#8211; \u00c9thique dans le d\u00e9veloppement de logiciels<\/p>\n<\/div><div class=\"\" data-hide-desktoplandscape=\"1\" data-hide-desktopportrait=\"1\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph  \">&#8211; Respect des droits d\u2019auteur et licences<br \/>\n&#8211; Responsabilit\u00e9 sociale des ing\u00e9nieurs logiciels<br \/>\n&#8211; \u00c9thique dans le d\u00e9veloppement de logiciels<\/p>\n<\/div><div class=\"\" data-hide-mobilelandscape=\"1\" data-hide-mobileportrait=\"1\" data-hide-tabletlandscape=\"1\" data-hide-tabletportrait=\"1\"><p class=\"n2-font-0b2dbb5cbcc153b9663e67f4f7b4941d-paragraph   \">&#8211; Respect des droits d\u2019auteur et licences<br \/>\n&#8211; Responsabilit\u00e9 sociale des ing\u00e9nieurs logiciels<br \/>\n&#8211; \u00c9thique dans le d\u00e9veloppement de logiciels<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>                    <\/div>\n\n                                    <\/div>\n            <\/div>\n        <\/div>\n        <\/div><ss3-loader><\/ss3-loader><\/div><\/div><div class=\"n2_clear\"><\/div><\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/pages\/650"}],"collection":[{"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/comments?post=650"}],"version-history":[{"count":1,"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/pages\/650\/revisions"}],"predecessor-version":[{"id":651,"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/pages\/650\/revisions\/651"}],"wp:attachment":[{"href":"https:\/\/ethik-formations.fr\/index.php\/wp-json\/wp\/v2\/media?parent=650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}