{"id":17666,"date":"2025-05-30T20:08:08","date_gmt":"2025-05-30T18:08:08","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?post_type=mec-events&#038;p=17666"},"modified":"2026-03-02T15:49:21","modified_gmt":"2026-03-02T14:49:21","slug":"initiation-a-la-cyber-criminalistique","status":"publish","type":"mec-events","link":"https:\/\/acgcyberacademy.fr\/en\/events\/initiation-a-la-cyber-criminalistique\/","title":{"rendered":"Initiation \u00e0 la Cyber criminalistique"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"17666\" class=\"elementor elementor-17666\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0c232 e-flex e-con-boxed e-con e-child\" data-id=\"6c0c232\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1c28922 elementor-widget elementor-widget-image\" data-id=\"1c28922\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"506\" height=\"261\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/ISO-IEC-38500-LIGM-4p-FR-Partner-1.png\" class=\"attachment-large size-large wp-image-10725\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/ISO-IEC-38500-LIGM-4p-FR-Partner-1.png 506w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/07\/ISO-IEC-38500-LIGM-4p-FR-Partner-1-300x155.png 300w\" sizes=\"(max-width: 506px) 100vw, 506px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89d27fd elementor-widget elementor-widget-text-editor\" data-id=\"89d27fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span class=\"TextRun Highlight SCXW119008336 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW119008336 BCX8\">Comprendre et Pratiquer les Fondamentaux de l\u2019Investigation Num\u00e9rique<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW119008336 BCX8\">forensic<\/span><\/span><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b0eb856 e-flex e-con-boxed e-con e-child\" data-id=\"5b0eb856\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ad7b056 elementor-widget elementor-widget-heading\" data-id=\"4ad7b056\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">L' audience cibl\u00e9e par la formation<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25da03fa elementor-widget elementor-widget-text-editor\" data-id=\"25da03fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"12\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Professionnels IT, analystes s\u00e9curit\u00e9, administrateurs syst\u00e8mes\/r\u00e9seaux.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"12\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u00c9quipes SOC, CERT\/CSIRT, d\u00e9butants en investigation num\u00e9rique.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"12\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u00c9tudiants et professionnels en reconversion vers la cybers\u00e9curit\u00e9 technique.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d6e3ac1 e-flex e-con-boxed e-con e-child\" data-id=\"5d6e3ac1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b68c9 elementor-widget elementor-widget-heading\" data-id=\"4d4b68c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ce que vous allez apprendre<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57a3c7d5 elementor-widget elementor-widget-text-editor\" data-id=\"57a3c7d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Comprendre les <\/span><b><span data-contrast=\"auto\">principes fondamentaux de la criminalistique num\u00e9rique (computer forensics)<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Conna\u00eetre le <\/span><b><span data-contrast=\"auto\">cycle complet d\u2019investigation num\u00e9rique<\/span><\/b><span data-contrast=\"auto\"> : acquisition, analyse, documentation.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Identifier les artefacts critiques sur <\/span><b><span data-contrast=\"auto\">syst\u00e8mes Windows, Linux, Mac et r\u00e9seaux<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">D\u00e9couvrir les outils et bonnes pratiques pour <\/span><b><span data-contrast=\"auto\">pr\u00e9server la preuve num\u00e9rique<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Appr\u00e9hender les techniques d\u2019investigation sur les <\/span><b><span data-contrast=\"auto\">emails, malwares et web\/dark web<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"auto\">Ma\u00eetriser les bases de la conformit\u00e9, de la tra\u00e7abilit\u00e9 et des standards de la preuve.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71419de5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"71419de5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ca12bed elementor-widget elementor-widget-heading\" data-id=\"1ca12bed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Programme de la formation <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10905e70 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"10905e70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-hourglass-half\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Dur\u00e9e : 1 jour<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3aba5c elementor-widget elementor-widget-text-editor\" data-id=\"c3aba5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"104\" data-end=\"184\"><strong data-start=\"104\" data-end=\"126\">Accueil &amp; contexte<\/strong> : r\u00f4le de l\u2019investigation num\u00e9rique dans la cybers\u00e9curit\u00e9<ul><li data-start=\"186\" data-end=\"272\"><strong data-start=\"186\" data-end=\"198\">Module 1<\/strong> : Introduction \u00e0 la criminalistique num\u00e9rique &amp; processus d\u2019investigation<\/li><li data-start=\"274\" data-end=\"344\"><strong data-start=\"274\" data-end=\"286\">Module 2<\/strong> : Syst\u00e8mes de fichiers, disques &amp; acquisition des donn\u00e9es<\/li><li data-start=\"346\" data-end=\"355\"><strong style=\"background-color: transparent; color: inherit; font-family: inherit; font-size: inherit; letter-spacing: inherit; text-transform: inherit;\" data-start=\"357\" data-end=\"369\">Module 3<\/strong><span style=\"background-color: transparent;\"> : Analyse de syst\u00e8mes Windows, Linux &amp; Mac OS<\/span><\/li><li data-start=\"417\" data-end=\"435\"><strong style=\"background-color: transparent; color: inherit; font-family: inherit; font-size: inherit; letter-spacing: inherit; text-transform: inherit;\" data-start=\"437\" data-end=\"449\">Module 4<\/strong><span style=\"background-color: transparent;\"> : Investigation sur r\u00e9seaux, emails et incidents web<\/span><\/li><li data-start=\"504\" data-end=\"574\"><strong data-start=\"504\" data-end=\"516\">Module 5<\/strong> : Forensics avanc\u00e9 : anti-forensics, dark web et malwares<\/li><\/ul><\/li><li data-start=\"587\" data-end=\"655\"><strong data-start=\"587\" data-end=\"613\">Atelier pratique guid\u00e9<\/strong> : sc\u00e9nario d\u2019investigation avec artefacts<\/li><li data-start=\"657\" data-end=\"687\"><strong data-start=\"657\" data-end=\"687\">D\u00e9brief &amp; QCM d\u2019\u00e9valuation<\/strong><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3add2827 e-flex e-con-boxed e-con e-child\" data-id=\"3add2827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-796b392b e-flex e-con-boxed e-con e-child\" data-id=\"796b392b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39dfad0 elementor-widget elementor-widget-heading\" data-id=\"39dfad0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Modalit\u00e9s d'\u00e9valuation\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a00ffd elementor-widget elementor-widget-text-editor\" data-id=\"3a00ffd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">QCM en fin de formation sur les \u00e9tapes cl\u00e9s de l\u2019investigation.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">D\u00e9brief d\u2019un mini-scenario bas\u00e9 sur des artefacts simples.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8149729 elementor-widget elementor-widget-heading\" data-id=\"8149729\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">M\u00e9thodes p\u00e9dagogiques <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e80079 elementor-widget elementor-widget-text-editor\" data-id=\"2e80079\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Animation par un expert en forensic certifi\u00e9 (ex : CHFI, GCFA\u2026).<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Pr\u00e9sentations enrichies par des d\u00e9monstrations concr\u00e8tes.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Atelier avec artefacts simul\u00e9s et outils de base (Autopsy, FTK Imager\u2026).<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Documentation fournie (mod\u00e8le de plan d\u2019investigation, checklists, outils open-source).<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-391f492 elementor-widget elementor-widget-heading\" data-id=\"391f492\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Les Objectifs de la formation<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a33cab7 elementor-widget elementor-widget-text-editor\" data-id=\"2a33cab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">\u00c0 la fin de la journ\u00e9e, les participants sauront :<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><ul><li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Identifier les principales \u00e9tapes d\u2019une investigation num\u00e9rique conforme.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">D\u00e9tecter et extraire des preuves num\u00e9riques sur syst\u00e8mes, r\u00e9seaux et environnements web.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Comprendre comment les donn\u00e9es sont stock\u00e9es, copi\u00e9es, dissimul\u00e9es ou effac\u00e9es.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Appliquer les bonnes pratiques d\u2019acquisition et de pr\u00e9servation de preuve.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Utiliser des outils de base pour collecter, examiner et documenter des incidents.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f051be3 e-flex e-con-boxed e-con e-child\" data-id=\"4f051be3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b552e6 elementor-widget elementor-widget-heading\" data-id=\"52b552e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Les pr\u00e9requis de la formation<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae18b01 elementor-widget elementor-widget-text-editor\" data-id=\"ae18b01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"13\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Notions de base en syst\u00e8mes d\u2019exploitation et r\u00e9seaux.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"13\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Une curiosit\u00e9 pour la cybers\u00e9curit\u00e9 technique (niveau d\u00e9butant \u00e0 interm\u00e9diaire).<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aaaf1ef e-con-full e-flex e-con e-parent\" data-id=\"aaaf1ef\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d37df5 elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"8d37df5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/03\/Initiation-a-la-Cyber-criminalistique.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Voir la brochure de cette formation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Comprendre et Pratiquer les Fondamentaux de l\u2019Investigation Num\u00e9rique forensic L&rsquo; audience cibl\u00e9e par la formation Professionnels IT, analystes s\u00e9curit\u00e9, administrateurs syst\u00e8mes\/r\u00e9seaux.\u00a0 \u00c9quipes SOC, CERT\/CSIRT, d\u00e9butants en investigation num\u00e9rique.\u00a0 \u00c9tudiants et professionnels en reconversion vers la cybers\u00e9curit\u00e9 technique.\u00a0 Ce que vous allez apprendre Comprendre les principes fondamentaux de la criminalistique num\u00e9rique (computer forensics).\u00a0 Conna\u00eetre le cycle [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":12444,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[92],"duree":[166],"examen":[160],"langue":[144],"niveau":[90],"formateur":[100],"cpf":[],"organismes":[],"organisme":[],"mec_category":[96],"class_list":["post-17666","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-non","duree-1-jour","examen-non","langue-francais","niveau-fondamental","formateur-acg-cyberacademy","mec_category-management-de-la-securite-de-linformation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Initiation \u00e0 la Cybercriminalistique \u2013 ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Apprenez les bases du forensic num\u00e9rique : acquisition, analyse, pr\u00e9servation des preuves et investigation sur Windows, Linux, Mac et r\u00e9seaux.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/initiation-a-la-cyber-criminalistique\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Initiation \u00e0 la Cybercriminalistique \u2013 ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Apprenez les bases du forensic num\u00e9rique : acquisition, analyse, pr\u00e9servation des preuves et investigation sur Windows, Linux, Mac et r\u00e9seaux.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/initiation-a-la-cyber-criminalistique\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-02T14:49:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/iso-iec-42001-lead-auditor-4p-fr-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1123\" \/>\n\t<meta property=\"og:image:height\" content=\"719\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/initiation-a-la-cyber-criminalistique\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/initiation-a-la-cyber-criminalistique\\\/\",\"name\":\"Initiation \u00e0 la Cybercriminalistique \u2013 ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/initiation-a-la-cyber-criminalistique\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/initiation-a-la-cyber-criminalistique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/iso-iec-42001-lead-auditor-4p-fr-1.jpg\",\"datePublished\":\"2025-05-30T18:08:08+00:00\",\"dateModified\":\"2026-03-02T14:49:21+00:00\",\"description\":\"Apprenez les bases du forensic num\u00e9rique : acquisition, analyse, pr\u00e9servation des preuves et investigation sur Windows, Linux, Mac et r\u00e9seaux.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/initiation-a-la-cyber-criminalistique\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/initiation-a-la-cyber-criminalistique\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/initiation-a-la-cyber-criminalistique\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/iso-iec-42001-lead-auditor-4p-fr-1.jpg\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/iso-iec-42001-lead-auditor-4p-fr-1.jpg\",\"width\":1123,\"height\":719,\"caption\":\"Apprenez les bases du forensic num\u00e9rique : acquisition, analyse, pr\u00e9servation des preuves et investigation sur Windows, Linux, Mac et r\u00e9seaux.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/initiation-a-la-cyber-criminalistique\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Initiation \u00e0 la Cyber criminalistique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Initiation \u00e0 la Cybercriminalistique \u2013 ACG CyberAcademy","description":"Apprenez les bases du forensic num\u00e9rique : acquisition, analyse, pr\u00e9servation des preuves et investigation sur Windows, Linux, Mac et r\u00e9seaux.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/initiation-a-la-cyber-criminalistique\/","og_locale":"en_GB","og_type":"article","og_title":"Initiation \u00e0 la Cybercriminalistique \u2013 ACG CyberAcademy","og_description":"Apprenez les bases du forensic num\u00e9rique : acquisition, analyse, pr\u00e9servation des preuves et investigation sur Windows, Linux, Mac et r\u00e9seaux.","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/initiation-a-la-cyber-criminalistique\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2026-03-02T14:49:21+00:00","og_image":[{"width":1123,"height":719,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/iso-iec-42001-lead-auditor-4p-fr-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/initiation-a-la-cyber-criminalistique\/","url":"https:\/\/acgcyberacademy.fr\/events\/initiation-a-la-cyber-criminalistique\/","name":"Initiation \u00e0 la Cybercriminalistique \u2013 ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/initiation-a-la-cyber-criminalistique\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/initiation-a-la-cyber-criminalistique\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/iso-iec-42001-lead-auditor-4p-fr-1.jpg","datePublished":"2025-05-30T18:08:08+00:00","dateModified":"2026-03-02T14:49:21+00:00","description":"Apprenez les bases du forensic num\u00e9rique : acquisition, analyse, pr\u00e9servation des preuves et investigation sur Windows, Linux, Mac et r\u00e9seaux.","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/initiation-a-la-cyber-criminalistique\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/initiation-a-la-cyber-criminalistique\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/initiation-a-la-cyber-criminalistique\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/iso-iec-42001-lead-auditor-4p-fr-1.jpg","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/iso-iec-42001-lead-auditor-4p-fr-1.jpg","width":1123,"height":719,"caption":"Apprenez les bases du forensic num\u00e9rique : acquisition, analyse, pr\u00e9servation des preuves et investigation sur Windows, Linux, Mac et r\u00e9seaux."},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/initiation-a-la-cyber-criminalistique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"Initiation \u00e0 la Cyber criminalistique"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=17666"}],"version-history":[{"count":11,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17666\/revisions"}],"predecessor-version":[{"id":22562,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17666\/revisions\/22562"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/12444"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=17666"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=17666"},{"taxonomy":"accesibilite","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=17666"},{"taxonomy":"certification","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=17666"},{"taxonomy":"duree","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=17666"},{"taxonomy":"examen","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=17666"},{"taxonomy":"langue","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=17666"},{"taxonomy":"niveau","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=17666"},{"taxonomy":"formateur","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=17666"},{"taxonomy":"cpf","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/cpf?post=17666"},{"taxonomy":"organismes","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organismes?post=17666"},{"taxonomy":"organisme","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organisme?post=17666"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=17666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}