{"id":810,"date":"2023-06-30T13:12:47","date_gmt":"2023-06-30T12:12:47","guid":{"rendered":"https:\/\/www.aptitude-informatique.fr\/?page_id=810"},"modified":"2023-06-30T13:12:47","modified_gmt":"2023-06-30T12:12:47","slug":"securite-informatique","status":"publish","type":"page","link":"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/","title":{"rendered":"S\u00e9curit\u00e9 Informatique"},"content":{"rendered":"<div class=\"colonnes\">\n<div class=\"clearfix\">\n<div class=\"colgauche\">\n<p class=\"boutons\"><a class=\"Team\" href=\"https:\/\/www.aptitude-informatique.fr\/wp-content\/uploads\/plansite\/Securit\u00e9_informatiquen1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Telecharger le PDF<\/a><\/p>\n<p>&nbsp;<\/p>\n<div class=\"blg\">\n<h4>Tarifs<\/h4>\n<p>Intra \u00e0 partir de 700 \u20ac<\/p>\n<\/div>\n<div class=\"blg\">\n<h4>Public cibl\u00e9<\/h4>\n<p>Tout public<\/p>\n<\/div>\n<div class=\"blg\">\n<h4>Niveau requis<\/h4>\n<p>Connaissances environnement Windows Ios Linux ou Android<\/p>\n<\/div>\n<div class=\"blg\">\n<h4>Objectifs formation<\/h4>\n<p>\u00catre sensibilis\u00e9 \u00e0 la s\u00e9curit\u00e9 de l\u2019informatique, et \u00eatre capable de mettre en place un minimum d\u2019outil pour ce prot\u00e9ger.<\/p>\n<\/div>\n<div class=\"blg\">\n<h4>Moyens p\u00e9dagogiques<\/h4>\n<p>\u2022 Grilles d\u2018\u00e9valuation de niveau.<br \/>\n\u2022 Formateurs avec une exp\u00e9riences professionnelles et des comp\u00e9tences p\u00e9dagogiques<br \/>\n\u2022 6 personnes maximum \/ stage<br \/>\n\u2022 1 ordinateur par personne<br \/>\n\u2022 Chaque notion est expliqu\u00e9e au tableau et suivie imm\u00e9diatement d\u2019un exercice pratique.<br \/>\n\u2022 Les exercices \u00e9voluent en difficult\u00e9 au fur et \u00e0 mesure du stage.<br \/>\n\u2022 Un support de cours sera remis \u00e0 chaque participant en fin de formation.<br \/>\n\u2022 Assistance t\u00e9l\u00e9phonique gratuite.<\/p>\n<\/div>\n<div class=\"blg\">\n<h4>Dur\u00e9e de la formation<\/h4>\n<p>De 14h \u00e0 21 heures<\/p>\n<\/div>\n<div class=\"blg\">\n<h4>Contact<\/h4>\n<h3>APTITUDE INFORMATIQUE<\/h3>\n<p>22 rue du Bignon &#8211; 35000 &#8211; RENNES<\/p>\n<p>02 99 26 31 57<\/p>\n<p>contact@aptitude-informatique.fr<\/p>\n<\/div>\n<div class=\"blg\">\n<h4>D\u00e9lai d\u2019acceptation<\/h4>\n<p>Mise en place de vos cours d\u00e8s acceptation du financement.<\/p>\n<\/div>\n<div class=\"blg\">\n<h4>Accessibilit\u00e9 Handicap\u00e9<\/h4>\n<p>Conditions d\u2019accueil et d\u2019acc\u00e8s au public en situation d\u2019handicap en fonction du lieu d&rsquo;accueil du client.<\/p>\n<\/div>\n<\/div>\n<div class=\"coldroite\">\n<h4>Introduction et pr\u00e9sentation<\/h4>\n<p>Pr\u00e9sentation de la formation<\/p>\n<h4>Description des diff\u00e9rents risques<\/h4>\n<p>Introduction \u00e0 la Cyber s\u00e9curit\u00e9<br \/>\nRisques pour les entreprises<br \/>\nRisque pour les particuliers<\/p>\n<h4>Comment se prot\u00e9ger ?<\/h4>\n<p>R\u00e8gles de base<br \/>\nProt\u00e9ger son ordinateur<br \/>\nProt\u00e9ger son smartphone ou sa tablette<br \/>\nProt\u00e9ger sa connexion Internet<br \/>\nProt\u00e9ger sa bo\u00eetes mail<\/p>\n<h4>Rester vigilant<\/h4>\n<p>Rep\u00e9rer les arnaques<br \/>\nD\u00e9masquer les attaques<br \/>\nVigilance sur Internet<br \/>\nG\u00e9rer son identit\u00e9 num\u00e9rique<\/p>\n<h4>S\u00e9curit\u00e9 et t\u00e9l\u00e9travail<\/h4>\n<p>Authentification multifactorielle<br \/>\nVPN et s\u00e9curit\u00e9 des terminaux<br \/>\nTravailler dans un endroit public<\/p>\n<h4>Conclusion<\/h4>\n<p>Comment r\u00e9agir en cas de probl\u00e8me ?<br \/>\nR\u00e9capitulatif des r\u00e9flexes \u00e0 acqu\u00e9rir\n<\/p><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Telecharger le PDF &nbsp; Tarifs Intra \u00e0 partir de 700 \u20ac Public cibl\u00e9 Tout public Niveau requis Connaissances environnement Windows Ios Linux ou Android Objectifs formation \u00catre sensibilis\u00e9 \u00e0 la s\u00e9curit\u00e9 de l\u2019informatique, et \u00eatre capable de mettre en place un minimum d\u2019outil pour ce prot\u00e9ger. Moyens p\u00e9dagogiques \u2022 Grilles d\u2018\u00e9valuation de niveau. \u2022 Formateurs<br \/><a class=\"moretag\" href=\"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/\">+ Read More<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":508,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-810","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>S\u00e9curit\u00e9 Informatique - APTITUDE INFORMATIQUE<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 Informatique - APTITUDE INFORMATIQUE\" \/>\n<meta property=\"og:description\" content=\"Telecharger le PDF &nbsp; Tarifs Intra \u00e0 partir de 700 \u20ac Public cibl\u00e9 Tout public Niveau requis Connaissances environnement Windows Ios Linux ou Android Objectifs formation \u00catre sensibilis\u00e9 \u00e0 la s\u00e9curit\u00e9 de l\u2019informatique, et \u00eatre capable de mettre en place un minimum d\u2019outil pour ce prot\u00e9ger. Moyens p\u00e9dagogiques \u2022 Grilles d\u2018\u00e9valuation de niveau. \u2022 Formateurs+ Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/\" \/>\n<meta property=\"og:site_name\" content=\"APTITUDE INFORMATIQUE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/\",\"url\":\"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/\",\"name\":\"S\u00e9curit\u00e9 Informatique - APTITUDE INFORMATIQUE\",\"isPartOf\":{\"@id\":\"https:\/\/www.aptitude-informatique.fr\/#website\"},\"datePublished\":\"2023-06-30T12:12:47+00:00\",\"dateModified\":\"2023-06-30T12:12:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.aptitude-informatique.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Nos formations\",\"item\":\"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"S\u00e9curit\u00e9 Informatique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aptitude-informatique.fr\/#website\",\"url\":\"https:\/\/www.aptitude-informatique.fr\/\",\"name\":\"APTITUDE INFORMATIQUE\",\"description\":\"Conseil - Formation - Cr\u00e9ation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aptitude-informatique.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 Informatique - APTITUDE INFORMATIQUE","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 Informatique - APTITUDE INFORMATIQUE","og_description":"Telecharger le PDF &nbsp; Tarifs Intra \u00e0 partir de 700 \u20ac Public cibl\u00e9 Tout public Niveau requis Connaissances environnement Windows Ios Linux ou Android Objectifs formation \u00catre sensibilis\u00e9 \u00e0 la s\u00e9curit\u00e9 de l\u2019informatique, et \u00eatre capable de mettre en place un minimum d\u2019outil pour ce prot\u00e9ger. Moyens p\u00e9dagogiques \u2022 Grilles d\u2018\u00e9valuation de niveau. \u2022 Formateurs+ Read More","og_url":"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/","og_site_name":"APTITUDE INFORMATIQUE","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/","url":"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/","name":"S\u00e9curit\u00e9 Informatique - APTITUDE INFORMATIQUE","isPartOf":{"@id":"https:\/\/www.aptitude-informatique.fr\/#website"},"datePublished":"2023-06-30T12:12:47+00:00","dateModified":"2023-06-30T12:12:47+00:00","breadcrumb":{"@id":"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/securite-informatique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.aptitude-informatique.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/"},{"@type":"ListItem","position":3,"name":"Nos formations","item":"https:\/\/www.aptitude-informatique.fr\/index.php\/formations\/nos-formations\/"},{"@type":"ListItem","position":4,"name":"S\u00e9curit\u00e9 Informatique"}]},{"@type":"WebSite","@id":"https:\/\/www.aptitude-informatique.fr\/#website","url":"https:\/\/www.aptitude-informatique.fr\/","name":"APTITUDE INFORMATIQUE","description":"Conseil - Formation - Cr\u00e9ation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aptitude-informatique.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P7ibsz-d4","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/pages\/810"}],"collection":[{"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/comments?post=810"}],"version-history":[{"count":1,"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/pages\/810\/revisions"}],"predecessor-version":[{"id":811,"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/pages\/810\/revisions\/811"}],"up":[{"embeddable":true,"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/pages\/508"}],"wp:attachment":[{"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/media?parent=810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}