{"id":22924,"date":"2024-11-28T13:27:51","date_gmt":"2024-11-28T13:27:51","guid":{"rendered":"https:\/\/virtual-routes.org\/?page_id=22924"},"modified":"2025-06-30T07:32:59","modified_gmt":"2025-06-30T06:32:59","slug":"cours-de-cybersecurite","status":"publish","type":"page","link":"https:\/\/virtual-routes.org\/fr\/cours-de-cybersecurite\/","title":{"rendered":"Cours sur la cybers\u00e9curit\u00e9"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"22924\" class=\"elementor elementor-22924\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1efb2b e-flex e-con-boxed e-con e-parent\" data-id=\"c1efb2b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-152a237 e-con-full e-flex e-con e-child\" data-id=\"152a237\" data-element_type=\"container\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-5919a11 elementor-widget elementor-widget-heading\" data-id=\"5919a11\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cours d'introduction en ligne sur la cybers\u00e9curit\u00e9<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3076d25 elementor-widget elementor-widget-text-editor\" data-id=\"3076d25\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dans le cadre de la <a href=\"https:\/\/virtual-routes.org\/fr\/initiatives\/seminaires-sur-la-cybersecurite\/\">Programme de s\u00e9minaires sur la cybers\u00e9curit\u00e9 de Google.org<\/a>Dans le cadre de l'Ann\u00e9e europ\u00e9enne de la cybers\u00e9curit\u00e9, Virtual Routes a mis au point trois cours d'introduction en ligne sur mesure portant sur des sujets essentiels en mati\u00e8re de cybers\u00e9curit\u00e9. Ces cours sont con\u00e7us par Virtual Routes en partenariat avec des universitaires de haut niveau, chacun ayant des dizaines d'ann\u00e9es d'exp\u00e9rience dans la recherche et l'enseignement de la cybers\u00e9curit\u00e9.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d84a92 elementor-widget elementor-widget-button\" data-id=\"2d84a92\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/fr\/connexion\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Aller aux cours<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0bce0ca e-con-full e-flex e-con e-child\" data-id=\"0bce0ca\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46437c8 dce_masking-none elementor-widget elementor-widget-video\" data-id=\"46437c8\" data-element_type=\"widget\" data-settings=\"{&quot;loop&quot;:&quot;yes&quot;,&quot;video_type&quot;:&quot;vimeo&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<iframe class=\"elementor-video-iframe\" allowfullscreen allow=\"clipboard-write\" title=\"Lecteur vid\u00e9o vimeo\" src=\"https:\/\/player.vimeo.com\/video\/1073105688?color&amp;autopause=0&amp;loop=1&amp;muted=0&amp;title=1&amp;portrait=1&amp;byline=1&amp;h=a86134bb2d#t=\"><\/iframe>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78426fd elementor-absolute hide-stairs dce_masking-none elementor-invisible elementor-widget elementor-widget-image\" data-id=\"78426fd\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;slideInLeft&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img alt=\"\" loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"808\" src=\"https:\/\/virtual-routes.org\/wp-content\/uploads\/2024\/11\/Group-5.svg\" class=\"attachment-large size-large wp-image-1899\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5494a6d e-flex e-con-boxed e-con e-parent\" data-id=\"5494a6d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-edc4245 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"edc4245\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-18fefb4 e-con-full e-flex e-con e-child\" data-id=\"18fefb4\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d71faf elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"8d71faf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Qu'est-ce que c'est ?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61405be elementor-widget elementor-widget-text-editor\" data-id=\"61405be\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pour atteindre les objectifs du programme de s\u00e9minaires sur la cybers\u00e9curit\u00e9 de Google.org, chaque cours pr\u00e9sente les \u00e9l\u00e9ments suivants <strong>les concepts et principes cl\u00e9s, illustr\u00e9s par des exemples clairs<\/strong> et soutenu par une s\u00e9rie d'exercices interactifs tels que des moments de r\u00e9flexion, des questions de discussion et l'analyse d'\u00e9tudes de cas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-083215c elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"083215c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pourquoi ?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a274ce elementor-widget elementor-widget-text-editor\" data-id=\"1a274ce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ces cours fournissent <strong>une base de r\u00e9f\u00e9rence normalis\u00e9e pour les \u00e9tudiants<\/strong> dans le programme Google.org Cybersecurity Seminars pour commencer leur parcours dans le domaine de la cybers\u00e9curit\u00e9. Ils veillent \u00e0 ce que des \u00e9tudiants issus d'horizons tr\u00e8s divers puissent int\u00e9grer le programme avec des connaissances de base dans des domaines cl\u00e9s, en particulier <strong>un engagement r\u00e9ussi avec les organisations communautaires locales<\/strong> (LCO).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4605d8b elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"4605d8b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comment ?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dd49b9 elementor-widget elementor-widget-text-editor\" data-id=\"1dd49b9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ces cours sont r\u00e9serv\u00e9s aux \u00e9tudiants participant au programme Google.org Cybersecurity Seminars. Chaque cours comprend <strong>un m\u00e9lange de contenu vid\u00e9o et d'exercices guid\u00e9s<\/strong>Ce cours est con\u00e7u pour permettre aux \u00e9tudiants de le suivre seuls ou aux universit\u00e9s de l'int\u00e9grer dans leurs s\u00e9minaires sur la cybers\u00e9curit\u00e9.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca67c5b elementor-absolute e-transform hide-stairs dce_masking-none elementor-widget elementor-widget-image\" data-id=\"ca67c5b\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:90,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img alt=\"\" loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"808\" src=\"https:\/\/virtual-routes.org\/wp-content\/uploads\/2024\/11\/white-stair.svg\" class=\"attachment-large size-large wp-image-10938\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b2d0089 e-flex e-con-boxed e-con e-parent\" data-id=\"b2d0089\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7502cdc elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7502cdc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">COURS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c50439 e-con-full e-flex e-con e-child\" data-id=\"0c50439\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-be2d47f elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"be2d47f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Introduction \u00e0 la cybers\u00e9curit\u00e9<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-717d90c e-con-full e-flex e-con e-child\" data-id=\"717d90c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dc48d1 elementor-widget elementor-widget-heading\" data-id=\"0dc48d1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dr Jason Nurse, lecteur en cybers\u00e9curit\u00e9, Universit\u00e9 du Kent<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ec19c4 elementor-widget elementor-widget-text-editor\" data-id=\"9ec19c4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dans ce cours, M. Jason Nurse pr\u00e9sente l'origine et la signification de la cybers\u00e9curit\u00e9 et des concepts qui y sont associ\u00e9s, en montrant qu'elle int\u00e8gre de multiples disciplines et domaines de recherche. Il aborde ensuite les aspects humains de la cybers\u00e9curit\u00e9, notamment le contexte de l'utilisateur et les aspects humains de la dynamique attaquant-d\u00e9fenseur. M. Nurse se concentre ensuite sur les contr\u00f4les de cybers\u00e9curit\u00e9 courants, en montrant comment ils peuvent contribuer \u00e0 \u00e9lever rapidement les niveaux de cybers\u00e9curit\u00e9 dans les OCL, mais avec certaines limites importantes. Enfin, M. Nurse se penche sur le th\u00e8me \u00e9mergent des cyberpr\u00e9judices et de la gestion des risques.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1b82723 e-con-full e-flex e-con e-child\" data-id=\"1b82723\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-3e6694b elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"3e6694b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Introduction \u00e0 la s\u00e9curit\u00e9 des syst\u00e8mes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33a8a7a e-con-full e-flex e-con e-child\" data-id=\"33a8a7a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7948158 elementor-widget elementor-widget-heading\" data-id=\"7948158\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Professeur Andrew Martin, professeur de s\u00e9curit\u00e9 des syst\u00e8mes, Universit\u00e9 d'Oxford<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99767d0 elementor-widget elementor-widget-text-editor\" data-id=\"99767d0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dans ce cours, le professeur Andrew Martin pr\u00e9sente une introduction \u00e0 la cybers\u00e9curit\u00e9 des syst\u00e8mes num\u00e9riques. Il pr\u00e9sente d'abord les concepts fondamentaux de la conception et de la mise en \u0153uvre des syst\u00e8mes, ainsi que les principales menaces qui p\u00e8sent sur les syst\u00e8mes num\u00e9riques. Le professeur Martin aborde ensuite des domaines de la conception de syst\u00e8mes ayant un large impact sur la cybers\u00e9curit\u00e9, tels que le cryptage et l'authentification. Ces cas montrent comment l'abstraction aide les utilisateurs et les concepteurs \u00e0 surmonter l'immense complexit\u00e9 des syst\u00e8mes num\u00e9riques, mais introduit \u00e0 son tour des hypoth\u00e8ses et des attentes qui cr\u00e9ent des vuln\u00e9rabilit\u00e9s en mati\u00e8re de s\u00e9curit\u00e9 et conduisent \u00e0 des d\u00e9faillances du syst\u00e8me.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f707b0 e-con-full e-flex e-con e-child\" data-id=\"1f707b0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-d85ade6 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"d85ade6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">La cybers\u00e9curit\u00e9 dans la soci\u00e9t\u00e9<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-56168a3 e-con-full e-flex e-con e-child\" data-id=\"56168a3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f33ed2e elementor-widget elementor-widget-heading\" data-id=\"f33ed2e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Lizzie Coles-Kemp, chercheur principal, Institut de recherche sur la cybers\u00e9curit\u00e9 sociotechnique (RISCS)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82b0ff2 elementor-widget elementor-widget-text-editor\" data-id=\"82b0ff2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dans ce cours, le professeur Lizzie Coles-Kemp examine la place de la cybers\u00e9curit\u00e9 dans la soci\u00e9t\u00e9. Le professeur Coles-Kemp d\u00e9taille d'abord l'impact soci\u00e9tal des questions de cybers\u00e9curit\u00e9 et introduit le concept de cybers\u00e9curit\u00e9 centr\u00e9e sur l'humain, en s'appuyant sur les th\u00e9ories de la s\u00e9curit\u00e9 utilisable et de la conception centr\u00e9e sur l'utilisateur. Le professeur Coles-Kemp d\u00e9crit ensuite une approche de l'engagement des communaut\u00e9s locales qui remet en question les orthodoxies en mati\u00e8re de s\u00e9curit\u00e9 et reconna\u00eet les r\u00e9alit\u00e9s du travail avec des groupes divers, marginalis\u00e9s et minoritaires. Le cours se termine par une \u00e9tude de cas sur les aspects de cybers\u00e9curit\u00e9 de l'acc\u00e8s informel aux technologies num\u00e9riques.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b5a49a0 e-flex e-con-boxed e-con e-parent\" data-id=\"b5a49a0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e4315f elementor-align-center elementor-widget__width-inherit elementor-widget elementor-widget-button\" data-id=\"9e4315f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/fr\/connexion\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Aller aux cours<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cours d'introduction en ligne sur la cybers\u00e9curit\u00e9 Dans le cadre du programme Google.org Cybersecurity Seminars, Virtual Routes a mis au point trois cours d'introduction en ligne sur mesure portant sur des sujets essentiels en mati\u00e8re de cybers\u00e9curit\u00e9. Ces cours sont con\u00e7us par Virtual Routes en partenariat avec des universitaires de haut niveau, chacun ayant des d\u00e9cennies d'exp\u00e9rience dans la recherche et l'enseignement de la cybers\u00e9curit\u00e9. Aller \u00e0 [...]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","inline_featured_image":false,"footnotes":""},"class_list":["post-22924","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/pages\/22924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/comments?post=22924"}],"version-history":[{"count":20,"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/pages\/22924\/revisions"}],"predecessor-version":[{"id":56537,"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/pages\/22924\/revisions\/56537"}],"wp:attachment":[{"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/media?parent=22924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}