sss

Blog

@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk1 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk1 .im-goal:before{content: "\e013";}#fourk1{text-align:center}#fourk1 .fourk-icon{background-color: transparent}#fourk1 .fourk-icon:before{}#fourk1 .fourk-icon:after{}#fourk1 i{font-size:30px;line-height:30px;color:#9ebabf}#fourk1 .fourk-icon.hovered i{}#fourk1 i{text-align: center;}#fourk1{float: left; margin-right: 20px;}#fourk1 + *{overflow: hidden;} Objectifs Prendre connaissance des menaces auxquelles est exposé le système d’information, ainsi que de leurs conséquences S’approprier [...] Read More
@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk7 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk7 .im-goal:before{content: "\e013";}#fourk7{text-align:center}#fourk7 .fourk-icon{background-color: transparent}#fourk7 .fourk-icon:before{}#fourk7 .fourk-icon:after{}#fourk7 i{font-size:30px;line-height:30px;color:#9ebabf}#fourk7 .fourk-icon.hovered i{}#fourk7 i{text-align: center;}#fourk7{float: left; margin-right: 20px;}#fourk7 + *{overflow: hidden;} Objectifs Présenter les différents acteurs autour du standard PCI DSS (Payment Card Industry Data Security Standard) Présenter [...] Read More
@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk13 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk13 .im-goal:before{content: "\e013";}#fourk13{text-align:center}#fourk13 .fourk-icon{background-color: transparent}#fourk13 .fourk-icon:before{}#fourk13 .fourk-icon:after{}#fourk13 i{font-size:30px;line-height:30px;color:#9ebabf}#fourk13 .fourk-icon.hovered i{}#fourk13 i{text-align: center;}#fourk13{float: left; margin-right: 20px;}#fourk13 + *{overflow: hidden;} Objectifs Identifier et corriger les vulnérabilités applicatives (Owasp top 10) Identifier les problèmes de sécurité dans le [...] Read More
@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk19 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk19 .im-goal:before{content: "\e013";}#fourk19{text-align:center}#fourk19 .fourk-icon{background-color: transparent}#fourk19 .fourk-icon:before{}#fourk19 .fourk-icon:after{}#fourk19 i{font-size:30px;line-height:30px;color:#9ebabf}#fourk19 .fourk-icon.hovered i{}#fourk19 i{text-align: center;}#fourk19{float: left; margin-right: 20px;}#fourk19 + *{overflow: hidden;} Objectifs Maitriser les concepts et les techniques d’investigation numérique en cas d’attaque informatique ou de suspicions d’un [...] Read More
@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk25 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk25 .im-goal:before{content: "\e013";}#fourk25{text-align:center}#fourk25 .fourk-icon{background-color: transparent}#fourk25 .fourk-icon:before{}#fourk25 .fourk-icon:after{}#fourk25 i{font-size:30px;line-height:30px;color:#9ebabf}#fourk25 .fourk-icon.hovered i{}#fourk25 i{text-align: center;}#fourk25{float: left; margin-right: 20px;}#fourk25 + *{overflow: hidden;} Objectifs Comprendre la mise en oeuvre d’un Système de Management de la Sécurité de l’Information conforme à [...] Read More
@font-face{font-family: 'im'; src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot'); src:url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.eot?#iefix') format('embedded-opentype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.woff') format('woff'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.ttf') format('truetype'), url('../../../wp-content/plugins/4k-icons-pack03/icons/fonts/im.svg#oi') format('svg'); font-weight: normal; font-style: normal;}#fourk31 .im-goal:before{font-family: 'im'; font-weight: normal; font-style: normal;}#fourk31 .im-goal:before{content: "\e013";}#fourk31{text-align:center}#fourk31 .fourk-icon{background-color: transparent}#fourk31 .fourk-icon:before{}#fourk31 .fourk-icon:after{}#fourk31 i{font-size:30px;line-height:30px;color:#9ebabf}#fourk31 .fourk-icon.hovered i{}#fourk31 i{text-align: center;}#fourk31{float: left; margin-right: 20px;}#fourk31 + *{overflow: hidden;} Objectifs Prendre connaissance des menaces auxquelles sont exposés les systèmes d’information, ainsi que de leurs conséquences Acquérir [...] Read More