{"version":"1.0","provider_name":"APTITUDE INFORMATIQUE","provider_url":"https:\/\/www.aptitude-informatique.fr","author_name":"yann Le Goc","author_url":"https:\/\/www.aptitude-informatique.fr\/index.php\/author\/yann\/","title":"S\u00e9curit\u00e9 Informatique - APTITUDE INFORMATIQUE","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"pgaeR7vQT5\"><a href=\"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/\">S\u00e9curit\u00e9 Informatique<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/embed\/#?secret=pgaeR7vQT5\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0S\u00e9curit\u00e9 Informatique\u00a0\u00bb &#8212; APTITUDE INFORMATIQUE\" data-secret=\"pgaeR7vQT5\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Telecharger le PDF &nbsp; Tarifs Intra \u00e0 partir de 700 \u20ac Public cibl\u00e9 Tout public Niveau requis Connaissances environnement Windows Ios Linux ou Android Objectifs formation \u00catre sensibilis\u00e9 \u00e0 la s\u00e9curit\u00e9 de l\u2019informatique, et \u00eatre capable de mettre en place un minimum d\u2019outil pour ce prot\u00e9ger. Moyens p\u00e9dagogiques \u2022 Grilles d\u2018\u00e9valuation de niveau. \u2022 Formateurs+ Read More"}