sss

Blog

@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk1 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk1 .im-goal:before{content: "\e013";}#fourk1{text-align:center}#fourk1 .fourk-icon{background-color: transparent}#fourk1 .fourk-icon:before{}#fourk1 .fourk-icon:after{}#fourk1 i{font-size:30px;line-height:30px;color:#9ebabf}#fourk1 .fourk-icon.hovered i{}#fourk1 i{text-align: center;}#fourk1{float: left; margin-right: 20px;}#fourk1 + *{overflow: hidden;} Objectifs Maitriser les concepts et les techniques d’investigation numérique en cas d’attaque informatique ou de suspicions d’un [...] Read More
@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk7 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk7 .im-goal:before{content: "\e013";}#fourk7{text-align:center}#fourk7 .fourk-icon{background-color: transparent}#fourk7 .fourk-icon:before{}#fourk7 .fourk-icon:after{}#fourk7 i{font-size:30px;line-height:30px;color:#9ebabf}#fourk7 .fourk-icon.hovered i{}#fourk7 i{text-align: center;}#fourk7{float: left; margin-right: 20px;}#fourk7 + *{overflow: hidden;} Objectifs Comprendre la mise en oeuvre d’un Système de Management de la Sécurité de l’Information conforme à [...] Read More
@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk13 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk13 .im-goal:before{content: "\e013";}#fourk13{text-align:center}#fourk13 .fourk-icon{background-color: transparent}#fourk13 .fourk-icon:before{}#fourk13 .fourk-icon:after{}#fourk13 i{font-size:30px;line-height:30px;color:#9ebabf}#fourk13 .fourk-icon.hovered i{}#fourk13 i{text-align: center;}#fourk13{float: left; margin-right: 20px;}#fourk13 + *{overflow: hidden;} Objectifs Prendre connaissance des menaces auxquelles sont exposés les systèmes d’information, ainsi que de leurs conséquences Acquérir [...] Read More
@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk19 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk19 .im-goal:before{content: "\e013";}#fourk19{text-align:center}#fourk19 .fourk-icon{background-color: transparent}#fourk19 .fourk-icon:before{}#fourk19 .fourk-icon:after{}#fourk19 i{font-size:30px;line-height:30px;color:#a4192c}#fourk19 .fourk-icon.hovered i{}#fourk19 i{text-align: center;}#fourk19{float: left; margin-right: 20px;}#fourk19 + *{overflow: hidden;} Objectifs Comprendre la mise en oeuvre d’un Système de Management de la Continuité d’Activité conforme à la [...] Read More
@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk25 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk25 .im-goal:before{content: "\e013";}#fourk25{text-align:center}#fourk25 .fourk-icon{background-color: transparent}#fourk25 .fourk-icon:before{}#fourk25 .fourk-icon:after{}#fourk25 i{font-size:30px;line-height:30px;color:#a59c8b}#fourk25 .fourk-icon.hovered i{}#fourk25 i{text-align: center;}#fourk25{float: left; margin-right: 20px;}#fourk25 + *{overflow: hidden;} Objectifs S'approprier les domaines, le vocabulaire et les notions du programme sur lequel porte l’examen S’entraîner au [...] Read More
@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk31 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk31 .im-goal:before{content: "\e013";}#fourk31{text-align:center}#fourk31 .fourk-icon{background-color: transparent}#fourk31 .fourk-icon:before{}#fourk31 .fourk-icon:after{}#fourk31 i{font-size:30px;line-height:30px;color:#a59c8b}#fourk31 .fourk-icon.hovered i{}#fourk31 i{text-align: center;}#fourk31{float: left; margin-right: 20px;}#fourk31 + *{overflow: hidden;} Objectifs Comprendre les risques et les dangers liés à la cybercriminalité Acquérir les connaissances et techniques de [...] Read More
@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk37 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk37 .im-goal:before{content: "\e013";}#fourk37{text-align:center}#fourk37 .fourk-icon{background-color: transparent}#fourk37 .fourk-icon:before{}#fourk37 .fourk-icon:after{}#fourk37 i{font-size:30px;line-height:30px;color:#a59c8b}#fourk37 .fourk-icon.hovered i{}#fourk37 i{text-align: center;}#fourk37{float: left; margin-right: 20px;}#fourk37 + *{overflow: hidden;} Objectifs Comprendre la mise en oeuvre d’un Système de Management de la Sécurité de l’Information conforme à [...] Read More
@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk43 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk43 .im-goal:before{content: "\e013";}#fourk43{text-align:center}#fourk43 .fourk-icon{background-color: transparent}#fourk43 .fourk-icon:before{}#fourk43 .fourk-icon:after{}#fourk43 i{font-size:30px;line-height:30px;color:#a59c8b}#fourk43 .fourk-icon.hovered i{}#fourk43 i{text-align: center;}#fourk43{float: left; margin-right: 20px;}#fourk43 + *{overflow: hidden;} Objectifs Acquérir les notions de base de l’audit des systèmes d’information Acquérir les notions de base de [...] Read More
@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk49 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk49 .im-goal:before{content: "\e013";}#fourk49{text-align:center}#fourk49 .fourk-icon{background-color: transparent}#fourk49 .fourk-icon:before{}#fourk49 .fourk-icon:after{}#fourk49 i{font-size:30px;line-height:30px;color:#a59c8b}#fourk49 .fourk-icon.hovered i{}#fourk49 i{text-align: center;}#fourk49{float: left; margin-right: 20px;}#fourk49 + *{overflow: hidden;} Objectifs Pratiquer certaines techniques d’audit présentées lors de la formation « Audit des systèmes d’information – Niveau [...] Read More
@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk55 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk55 .im-goal:before{content: "\e013";}#fourk55{text-align:center}#fourk55 .fourk-icon{background-color: transparent}#fourk55 .fourk-icon:before{}#fourk55 .fourk-icon:after{}#fourk55 i{font-size:30px;line-height:30px;color:#782c3f}#fourk55 .fourk-icon.hovered i{}#fourk55 i{text-align: center;}#fourk55{float: left; margin-right: 20px;}#fourk55 + *{overflow: hidden;} Objectifs Acquérir une compréhension des concepts, des approches, des méthodes et des techniques nécessaires pour une gestion [...] Read More