{"id":644,"count":10,"description":"Ce module explore l'ing\u00e9nierie inverse et l'analyse des vuln\u00e9rabilit\u00e9s, en se concentrant sur les techniques utilis\u00e9es pour diss\u00e9quer les logiciels et les syst\u00e8mes afin de d\u00e9couvrir les vuln\u00e9rabilit\u00e9s en mati\u00e8re de s\u00e9curit\u00e9 et de comprendre leur architecture sous-jacente.","link":"https:\/\/virtual-routes.org\/fr\/categorie-de-portail\/cybersecurite\/ingenierie-inverse-et-analyse-de-la-vulnerabilite\/","name":"R\u00e9tro-ing\u00e9nierie et analyse de vuln\u00e9rabilit\u00e9","slug":"ingenierie-inverse-et-analyse-de-la-vulnerabilite","taxonomy":"portal-category","parent":617,"meta":[],"acf":[],"_links":{"self":[{"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/portal-category\/644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/portal-category"}],"about":[{"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/taxonomies\/portal-category"}],"up":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/portal-category\/617"}],"wp:post_type":[{"href":"https:\/\/virtual-routes.org\/fr\/wp-json\/wp\/v2\/portal-item?portal-category=644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}