{"id":17556,"date":"2025-05-30T16:04:32","date_gmt":"2025-05-30T14:04:32","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?post_type=mec-events&#038;p=17556"},"modified":"2026-01-12T12:06:29","modified_gmt":"2026-01-12T11:06:29","slug":"pecb-certified-nist-cybersecurity-professional","status":"publish","type":"mec-events","link":"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-certified-nist-cybersecurity-professional\/","title":{"rendered":"PECB Certified NIST Cybersecurity Professional"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"17556\" class=\"elementor elementor-17556\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-322b389 e-flex e-con-boxed e-con e-child\" data-id=\"322b389\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5261bc4 e-flex e-con-boxed e-con e-child\" data-id=\"5261bc4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7127562 e-con-full e-flex e-con e-child\" data-id=\"7127562\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a958331 elementor-widget elementor-widget-image\" data-id=\"a958331\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"203\" height=\"248\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/04\/images-removebg-preview-1.png\" class=\"attachment-medium size-medium wp-image-14850\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19386d8 elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"19386d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e819159 elementor-widget elementor-widget-image\" data-id=\"e819159\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"200\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/03\/pecb.png\" class=\"attachment-large size-large wp-image-6392\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/03\/pecb.png 500w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/03\/pecb-300x120.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e85162 elementor-widget elementor-widget-spacer\" data-id=\"8e85162\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-66b4040 e-flex e-con-boxed e-con e-child\" data-id=\"66b4040\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab26308 elementor-widget elementor-widget-text-editor\" data-id=\"ab26308\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Acqu\u00e9rez une expertise dans l\u2019application des lignes directrices du NIST, la gestion des contr\u00f4les de s\u00e9curit\u00e9, l\u2019utilisation de techniques de gestion des risques et la conception d\u2019un programme de cybers\u00e9curit\u00e9 align\u00e9 sur les objectifs organisationnels et les besoins en mati\u00e8re de s\u00e9curit\u00e9.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d6daf6 elementor-widget elementor-widget-heading\" data-id=\"7d6daf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">L' audience cibl\u00e9e par la formation\n\n\n\n\n\n\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3489ddc elementor-widget elementor-widget-text-editor\" data-id=\"3489ddc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Dirigeants ou administrateurs responsables de la supervision des initiatives de cybers\u00e9curit\u00e9 au sein de leur organisation<\/li><li>Administrateurs syst\u00e8mes et ing\u00e9nieurs r\u00e9seaux souhaitant approfondir leur compr\u00e9hension des contr\u00f4les de s\u00e9curit\u00e9 et des processus de gestion des risques afin de se conformer aux normes de s\u00e9curit\u00e9 du NIST<\/li><li>Professionnels impliqu\u00e9s dans le d\u00e9veloppement et la mise en \u0153uvre de programmes de cybers\u00e9curit\u00e9<\/li><li>Professionnels et conseillers qui fournissent des services de cybers\u00e9curit\u00e9 et de conformit\u00e9, en veillant \u00e0 rester inform\u00e9s des derniers cadres et bonnes pratiques du NIST<\/li><li>Enqu\u00eateurs en criminalistique num\u00e9rique et en cybercriminalit\u00e9 qui doivent comprendre les aspects techniques et r\u00e9glementaires des cadres de cybers\u00e9curit\u00e9 afin d\u2019enqu\u00eater sur les incidents de s\u00e9curit\u00e9 et d\u2019y r\u00e9pondre de mani\u00e8re compl\u00e8te<\/li><li>Personnes travaillant en cybers\u00e9curit\u00e9 ou en s\u00e9curit\u00e9 de l\u2019information qui visent \u00e0 approfondir leur compr\u00e9hension des lignes directrices du NIST et \u00e0 d\u00e9velopper des comp\u00e9tences pratiques en gestion des risques li\u00e9s \u00e0 la cybers\u00e9curit\u00e9<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d811ef2 e-flex e-con-boxed e-con e-child\" data-id=\"d811ef2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e9960e0 elementor-widget elementor-widget-heading\" data-id=\"e9960e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ce que vous allez apprendre<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3a6ffe elementor-widget elementor-widget-text-editor\" data-id=\"c3a6ffe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dans le monde actuel de plus en plus num\u00e9rique, les organisations sont confront\u00e9es \u00e0 des d\u00e9fis croissants pour s\u00e9curiser leurs syst\u00e8mes d\u2019information et assurer leur conformit\u00e9 aux normes r\u00e9glementaires. Les publications du NIST, telles que le NIST SP 800-12, le NIST SP 800-53, le NIST RMF, le NIST SP 800-171 et le NIST Cybersecurity Framework, offrent des lignes directrices compl\u00e8tes et des bonnes pratiques pour \u00e9tablir des mesures de cybers\u00e9curit\u00e9 robustes. La mise en \u0153uvre de ces cadres aide les organisations \u00e0 renforcer leur posture en mati\u00e8re de cybers\u00e9curit\u00e9, \u00e0 g\u00e9rer efficacement les risques et \u00e0 maintenir leur conformit\u00e9 aux exigences f\u00e9d\u00e9rales.<\/p><p><br \/>Gr\u00e2ce \u00e0 des directives approfondies sur les publications du NIST, les participants apprennent \u00e0 relever des d\u00e9fis complexes en mati\u00e8re de s\u00e9curit\u00e9, en appliquant ces cadres pour concevoir des programmes de cybers\u00e9curit\u00e9 robustes, align\u00e9s sur les objectifs organisationnels. La formation fournit \u00e9galement une expertise pratique pour pr\u00e9venir, d\u00e9tecter et r\u00e9pondre efficacement aux cybermenaces, en int\u00e9grant les bonnes pratiques et les normes afin de cr\u00e9er une approche de s\u00e9curit\u00e9 coh\u00e9rente. \u00c0 l&rsquo;issue de la formation, les participants pourront passer l\u2019examen. Les personnes ayant r\u00e9ussi l\u2019examen recevront la certification mondialement reconnue \u00ab PECB Certified NIST Cybersecurity Professional \u00bb.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e82462 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3e82462\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4688ff7 elementor-widget elementor-widget-heading\" data-id=\"4688ff7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Programme de la formation\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15aa12d elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"15aa12d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-hourglass-half\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Dur\u00e9e : 5 jours<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbb6a7d elementor-widget elementor-widget-n-accordion\" data-id=\"bbb6a7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1960\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1960\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 1 : Introduction aux normes et principes de cybers\u00e9curit\u00e9 du NIST <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1960\" class=\"elementor-element elementor-element-b9f2ff9 e-con-full e-flex e-con e-child\" data-id=\"b9f2ff9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1960\" class=\"elementor-element elementor-element-e4eae23 e-con-full e-flex e-con e-child\" data-id=\"e4eae23\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1960\" class=\"elementor-element elementor-element-6567827 e-con-full e-flex e-con e-child\" data-id=\"6567827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-943e322 elementor-widget elementor-widget-text-editor\" data-id=\"943e322\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Objectifs et structure de la formation<\/li><li>Cadres et normes en mati\u00e8re de s\u00e9curit\u00e9 de l\u2019information et de cybers\u00e9curit\u00e9<\/li><li>Introduction au NIST et \u00e0 son r\u00f4le dans la cybers\u00e9curit\u00e9<\/li><li>Introduction \u00e0 la cybers\u00e9curit\u00e9<\/li><li>L\u2019organisation et son contexte<\/li><li>R\u00f4les, responsabilit\u00e9s et autorit\u00e9s<\/li><li>Politique de cybers\u00e9curit\u00e9<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1961\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1961\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 2 : Strat\u00e9gie de gestion des risques et gestion des risques li\u00e9s \u00e0 la cha\u00eene d\u2019approvisionnement <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1961\" class=\"elementor-element elementor-element-bbd7171 e-flex e-con-boxed e-con e-child\" data-id=\"bbd7171\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7bb59f1 elementor-widget elementor-widget-text-editor\" data-id=\"7bb59f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Strat\u00e9gie de gestion des risques<\/li><li>Gestion des risques li\u00e9s \u00e0 la cha\u00eene d\u2019approvisionnement<\/li><li>Gestion des actifs<\/li><li>\u00c9valuation des risques<\/li><li>Am\u00e9lioration<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1962\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1962\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 3 : S\u00e9lection des contr\u00f4les de s\u00e9curit\u00e9, sensibilisation et formation, et surveillance continue <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1962\" class=\"elementor-element elementor-element-69114f8 e-flex e-con-boxed e-con e-child\" data-id=\"69114f8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d99ef2 elementor-widget elementor-widget-text-editor\" data-id=\"7d99ef2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>S\u00e9lection des contr\u00f4les de s\u00e9curit\u00e9<\/li><li>Sensibilisation et formation<\/li><li>Mesures de s\u00e9curit\u00e9<\/li><li>Surveillance continue de la s\u00e9curit\u00e9<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1963\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1963\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 4 : Gestion des incidents de cybers\u00e9curit\u00e9 <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1963\" class=\"elementor-element elementor-element-eb53661 e-flex e-con-boxed e-con e-child\" data-id=\"eb53661\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2153ea2 elementor-widget elementor-widget-text-editor\" data-id=\"2153ea2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Gestion et analyse des incidents<\/li><li>R\u00e9ponse aux incidents, att\u00e9nuation et rapport<\/li><li>R\u00e9tablissement apr\u00e8s incident et le\u00e7ons apprises<\/li><li>Cl\u00f4ture de la formation<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1964\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1964\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 5 :  Examen de certification <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1964\" class=\"elementor-element elementor-element-bfee908 e-flex e-con-boxed e-con e-child\" data-id=\"bfee908\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c91c45b elementor-widget elementor-widget-text-editor\" data-id=\"c91c45b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L\u2019examen \u00ab <strong>PECB Certified NIST Cybersecurity Professional<\/strong> \u00bb r\u00e9pond pleinement aux exigences du Programme d&rsquo;examen et de certification (PEC) de PECB. Il couvre les domaines de comp\u00e9tences suivants : <b>Dur\u00e9e : 3 heures<\/b><\/p><ul><li><strong>Domaine 1 :<\/strong> Principes et concepts fondamentaux de la cybers\u00e9curit\u00e9<\/li><li><strong>Domaine 2 :\u00a0<\/strong> Planification d\u2019une strat\u00e9gie organisationnelle en cybers\u00e9curit\u00e9<\/li><li><strong>Domaine 3 :<\/strong> \u00c9valuation et conseil en mati\u00e8re de programmes de cybers\u00e9curit\u00e9 et de contr\u00f4les de s\u00e9curit\u00e9<\/li><li><strong>Domaine 4 :<\/strong> Gestion des incidents de cybers\u00e9curit\u00e9<\/li><li><strong>Domaine 5 :<\/strong> R\u00e9ponse aux incidents de cybers\u00e9curit\u00e9<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c7b59d e-flex e-con-boxed e-con e-child\" data-id=\"1c7b59d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b2b2b27 e-flex e-con-boxed e-con e-child\" data-id=\"b2b2b27\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55da9ff elementor-widget elementor-widget-heading\" data-id=\"55da9ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Les Objectifs de la formation<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0306fbc elementor-widget elementor-widget-text-editor\" data-id=\"0306fbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Discuter des principes et concepts fondamentaux de la cybers\u00e9curit\u00e9<\/li><li>Soutenir la conformit\u00e9 aux principales publications du NIST, y compris le NIST 800-12, le NIST 800-53, le NIST RMF, le NIST 800-171 et le NIST CSF<\/li><li>\u00c9valuer les contr\u00f4les de s\u00e9curit\u00e9 et prodiguer des conseils \u00e0 cet \u00e9gard, en conformit\u00e9 avec les lignes directrices du NIST<\/li><li>Fournir des orientations sur la gestion des risques en cybers\u00e9curit\u00e9 et les strat\u00e9gies de gestion des incidents<\/li><li>Guider les organisations dans le d\u00e9veloppement et l\u2019optimisation de leurs programmes de cybers\u00e9curit\u00e9<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c25c2d e-flex e-con-boxed e-con e-child\" data-id=\"3c25c2d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12fbd65 elementor-widget elementor-widget-heading\" data-id=\"12fbd65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Les pr\u00e9requis de la formation\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebb200e elementor-widget elementor-widget-text-editor\" data-id=\"ebb200e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><article class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" tabindex=\"-1\" data-turn-id=\"request-WEB:92e55d21-29cd-49cd-9af6-d94a5fa416ce-8\" data-testid=\"conversation-turn-4\" data-scroll-anchor=\"true\" data-turn=\"assistant\"><div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] thread-sm:[--thread-content-margin:--spacing(6)] thread-lg:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] thread-lg:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\" tabindex=\"-1\"><div class=\"flex max-w-full flex-col grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-1\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"8de3fb0b-e475-41ca-a52d-42f3d38936cf\" data-message-model-slug=\"gpt-5-1\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[1px]\"><div class=\"markdown prose dark:prose-invert w-full break-words light markdown-new-styling\"><p data-start=\"48\" data-end=\"432\" data-is-last-node=\"\" data-is-only-node=\"\">La formation PECB Certified NIST Cybersecurity Professional n\u00e9cessite une connaissance de base en cybers\u00e9curit\u00e9. Pour l\u2019obtention de la certification professionnelle, le candidat doit justifier de 5 ans d\u2019exp\u00e9rience, dont 2 ans en cybers\u00e9curit\u00e9, ainsi qu\u2019au moins 300 heures d\u2019implication dans un programme de cybers\u00e9curit\u00e9, et accepter le Code d\u2019\u00e9thique PECB.<\/p><\/div><\/div><\/div><\/div><div class=\"z-0 flex min-h-[46px] justify-start\">\u00a0<\/div><div class=\"mt-3 w-full empty:hidden\"><div class=\"text-center\">\u00a0<\/div><\/div><\/div><\/div><\/article><div class=\"pointer-events-none h-px w-px\" aria-hidden=\"true\" data-edge=\"true\">\u00a0<\/div><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-566055d elementor-widget elementor-widget-spacer\" data-id=\"566055d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f823660 elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"f823660\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/NIST-Cybersecurity-Professional-4p-FR-Partner.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Voir la brochure de cette formation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Acqu\u00e9rez une expertise dans l\u2019application des lignes directrices du NIST, la gestion des contr\u00f4les de s\u00e9curit\u00e9, l\u2019utilisation de techniques de gestion des risques et la conception d\u2019un programme de cybers\u00e9curit\u00e9 align\u00e9 sur les objectifs organisationnels et les besoins en mati\u00e8re de s\u00e9curit\u00e9. L&rsquo; audience cibl\u00e9e par la formation Dirigeants ou administrateurs responsables de la supervision [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":21429,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[87],"duree":[153],"examen":[146],"langue":[],"niveau":[90],"formateur":[89],"cpf":[],"organismes":[],"organisme":[],"mec_category":[95],"class_list":["post-17556","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-oui","duree-5-jours","examen-oui","niveau-fondamental","formateur-pecb","mec_category-risque-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PECB Certified NIST Cybersecurity Professional - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Concevez un programme de cybers\u00e9curit\u00e9 align\u00e9 sur les objectifs organisationnels gr\u00e2ce aux lignes directrices du NIST, \u00e0 la gestion des risques et aux contr\u00f4les de s\u00e9curit\u00e9\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-certified-nist-cybersecurity-professional\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PECB Certified NIST Cybersecurity Professional - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Concevez un programme de cybers\u00e9curit\u00e9 align\u00e9 sur les objectifs organisationnels gr\u00e2ce aux lignes directrices du NIST, \u00e0 la gestion des risques et aux contr\u00f4les de s\u00e9curit\u00e9\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-certified-nist-cybersecurity-professional\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-12T11:06:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/NIST-Cybersecurity-Professional-4p-FR-Partner-0.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"337\" \/>\n\t<meta property=\"og:image:height\" content=\"289\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-nist-cybersecurity-professional\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-nist-cybersecurity-professional\\\/\",\"name\":\"PECB Certified NIST Cybersecurity Professional - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-nist-cybersecurity-professional\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-nist-cybersecurity-professional\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/NIST-Cybersecurity-Professional-4p-FR-Partner-0.jpg\",\"datePublished\":\"2025-05-30T14:04:32+00:00\",\"dateModified\":\"2026-01-12T11:06:29+00:00\",\"description\":\"Concevez un programme de cybers\u00e9curit\u00e9 align\u00e9 sur les objectifs organisationnels gr\u00e2ce aux lignes directrices du NIST, \u00e0 la gestion des risques et aux contr\u00f4les de s\u00e9curit\u00e9\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-nist-cybersecurity-professional\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-nist-cybersecurity-professional\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-nist-cybersecurity-professional\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/NIST-Cybersecurity-Professional-4p-FR-Partner-0.jpg\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/NIST-Cybersecurity-Professional-4p-FR-Partner-0.jpg\",\"width\":337,\"height\":289,\"caption\":\"Concevez un programme de cybers\u00e9curit\u00e9 align\u00e9 sur les objectifs organisationnels gr\u00e2ce aux lignes directrices du NIST, \u00e0 la gestion des risques et aux contr\u00f4les de s\u00e9curit\u00e9de s\u00e9curit\u00e9, l\u2019utilisation de techniques de gestion des risques et la conception d\u2019un programme de cybers\u00e9curit\u00e9 align\u00e9 sur les objectifs organisationnels et les besoins en mati\u00e8re de s\u00e9curit\u00e9.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-nist-cybersecurity-professional\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PECB Certified NIST Cybersecurity Professional\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PECB Certified NIST Cybersecurity Professional - ACG CyberAcademy","description":"Concevez un programme de cybers\u00e9curit\u00e9 align\u00e9 sur les objectifs organisationnels gr\u00e2ce aux lignes directrices du NIST, \u00e0 la gestion des risques et aux contr\u00f4les de s\u00e9curit\u00e9","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-certified-nist-cybersecurity-professional\/","og_locale":"en_GB","og_type":"article","og_title":"PECB Certified NIST Cybersecurity Professional - ACG CyberAcademy","og_description":"Concevez un programme de cybers\u00e9curit\u00e9 align\u00e9 sur les objectifs organisationnels gr\u00e2ce aux lignes directrices du NIST, \u00e0 la gestion des risques et aux contr\u00f4les de s\u00e9curit\u00e9","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-certified-nist-cybersecurity-professional\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2026-01-12T11:06:29+00:00","og_image":[{"width":337,"height":289,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/NIST-Cybersecurity-Professional-4p-FR-Partner-0.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-nist-cybersecurity-professional\/","url":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-nist-cybersecurity-professional\/","name":"PECB Certified NIST Cybersecurity Professional - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-nist-cybersecurity-professional\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-nist-cybersecurity-professional\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/NIST-Cybersecurity-Professional-4p-FR-Partner-0.jpg","datePublished":"2025-05-30T14:04:32+00:00","dateModified":"2026-01-12T11:06:29+00:00","description":"Concevez un programme de cybers\u00e9curit\u00e9 align\u00e9 sur les objectifs organisationnels gr\u00e2ce aux lignes directrices du NIST, \u00e0 la gestion des risques et aux contr\u00f4les de s\u00e9curit\u00e9","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-nist-cybersecurity-professional\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/pecb-certified-nist-cybersecurity-professional\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-nist-cybersecurity-professional\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/NIST-Cybersecurity-Professional-4p-FR-Partner-0.jpg","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/NIST-Cybersecurity-Professional-4p-FR-Partner-0.jpg","width":337,"height":289,"caption":"Concevez un programme de cybers\u00e9curit\u00e9 align\u00e9 sur les objectifs organisationnels gr\u00e2ce aux lignes directrices du NIST, \u00e0 la gestion des risques et aux contr\u00f4les de s\u00e9curit\u00e9de s\u00e9curit\u00e9, l\u2019utilisation de techniques de gestion des risques et la conception d\u2019un programme de cybers\u00e9curit\u00e9 align\u00e9 sur les objectifs organisationnels et les besoins en mati\u00e8re de s\u00e9curit\u00e9."},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-nist-cybersecurity-professional\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"PECB Certified NIST Cybersecurity Professional"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=17556"}],"version-history":[{"count":11,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17556\/revisions"}],"predecessor-version":[{"id":21749,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17556\/revisions\/21749"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/21429"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=17556"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=17556"},{"taxonomy":"accesibilite","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=17556"},{"taxonomy":"certification","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=17556"},{"taxonomy":"duree","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=17556"},{"taxonomy":"examen","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=17556"},{"taxonomy":"langue","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=17556"},{"taxonomy":"niveau","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=17556"},{"taxonomy":"formateur","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=17556"},{"taxonomy":"cpf","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/cpf?post=17556"},{"taxonomy":"organismes","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organismes?post=17556"},{"taxonomy":"organisme","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organisme?post=17556"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=17556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}