{"id":19090,"date":"2025-09-16T15:28:54","date_gmt":"2025-09-16T13:28:54","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?page_id=19090"},"modified":"2026-04-09T17:31:52","modified_gmt":"2026-04-09T15:31:52","slug":"parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite","status":"publish","type":"page","link":"https:\/\/acgcyberacademy.fr\/en\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/","title":{"rendered":"Detecting and dealing with IT security incidents certification course"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"19090\" class=\"elementor elementor-19090\" wpc-filter-elementor-widget=\"1\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3b7ab1 e-con-full e-flex e-con e-parent\" data-id=\"a3b7ab1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c770fdf e-con-full e-flex e-con e-child\" data-id=\"c770fdf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cedb2b elementor-widget elementor-widget-heading\" data-id=\"3cedb2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DTISI Certification Pathway: <br>Detecting and Handling IT Security Incidents<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d0ffda e-grid e-con-full e-con e-child\" data-id=\"1d0ffda\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1851309 elementor-widget elementor-widget-text-editor\" data-id=\"1851309\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Reference: DTISI<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1456de0 elementor-widget elementor-widget-text-editor\" data-id=\"1456de0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 23 days (161 hours)<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fb8cc8 elementor-widget elementor-widget-image\" data-id=\"6fb8cc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-1024x576.png\" class=\"attachment-large size-large wp-image-21452\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-1024x576.png 1024w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-300x169.png 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-768x432.png 768w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-1536x864.png 1536w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-18x10.png 18w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama.png 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f1a01d e-con-full e-flex e-con e-child\" data-id=\"8f1a01d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83e1163 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"83e1163\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;center&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"138285411\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1382854111\" data-tab-title-id=\"e-n-tab-title-1382854111\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1382854111\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tINTER\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1382854112\" data-tab-title-id=\"e-n-tab-title-1382854112\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1382854112\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tINTRA\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1382854111\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1382854111\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-14f8ed1 e-con-full e-flex e-con e-child\" data-id=\"14f8ed1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da3d952 elementor-widget elementor-widget-text-editor\" data-id=\"da3d952\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cost : <strong>14 490 \u20ac HT<\/strong><\/p><div class=\"info_label\">Category:<strong>\u00a0<\/strong><\/div><div class=\"info_label\"><strong>Computer security<\/strong><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1382854112\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1382854112\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-bddcf25 e-con-full e-flex e-con e-child\" data-id=\"bddcf25\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e185992 elementor-widget elementor-widget-text-editor\" data-id=\"e185992\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our in-company training courses are customised, flexible and tailored to the specific needs of your team.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2b2245 elementor-align-center elementor-widget elementor-widget-global elementor-global-8968 elementor-widget-button\" data-id=\"a2b2245\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjYxNTkiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">I WOULD LIKE A QUOTE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e8c41f elementor-button-info elementor-align-justify elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"3e8c41f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/04\/Parcours-DTISI-Detecter-et-traiter-des-incidents-de-securite-informatique.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download the brochure<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-98f6d9f e-flex e-con-boxed e-con e-parent\" data-id=\"98f6d9f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-579caa9 elementor-widget elementor-widget-heading\" data-id=\"579caa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Objectifs p\u00e9dagogiques\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aace03e elementor-widget elementor-widget-text-editor\" data-id=\"aace03e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"atlas-html\"><strong>Acqu\u00e9rir les connaissances, savoir-faire et comp\u00e9tences n\u00e9cessaires pour la d\u00e9tection et le traitement des incidents de s\u00e9curit\u00e9 informatique<\/strong><\/div><div class=\"atlas-spacer\">\u00a0<\/div><ul><li class=\"atlas-html\">Detecting IT security incidents<\/li><li class=\"atlas-html\">Dealing with first-level IT security incidents<\/li><li class=\"atlas-html\">Apporter une contribution op\u00e9rationnelle \u00e0 la gestion de crise<\/li><li class=\"atlas-html\">Working as part of a team within a SOC, CSIRT or CSERT<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7805952 elementor-widget elementor-widget-heading\" data-id=\"7805952\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Publics <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aba7433 elementor-widget elementor-widget-text-editor\" data-id=\"aba7433\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le parcours de formation est ouvert aux candidats titulaires d\u2019une certification de niveau 5 ou 6 dans le domaine de l\u2019informatique, dont la cybers\u00e9curit\u00e9 n\u2019est pas la seule fonction (techniciens syst\u00e8mes et r\u00e9seaux, assistance technique dans les ESN, diff\u00e9rents profils de la DSI).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a38e11 elementor-widget elementor-widget-heading\" data-id=\"8a38e11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PREREQUISITES<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f66475 elementor-widget elementor-widget-text-editor\" data-id=\"8f66475\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><p>Justifier d\u2019un dipl\u00f4me ou d\u2019une certification de niveau 5 (par exemple : BTS Services Informatiques aux Organisations, BTS Syst\u00e8mes num\u00e9riques, DUT informatique, Licence Professionnelle m\u00e9tiers de l\u2019Informatique, BUT Informatique, Titres \u00e0 Finalit\u00e9 Professionnelle, CQP dont le CQP Administrateur Syst\u00e8mes et R\u00e9seaux, etc.)<\/p><p>OU<\/p><\/li><li><p>Justifier d\u2019une exp\u00e9rience acquise au sein de la Direction des syst\u00e8mes d\u2019information d\u2019une entreprise ou d\u2019une ESN (Entreprise de Services du Num\u00e9rique)<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8d25ab elementor-widget elementor-widget-heading\" data-id=\"b8d25ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DETAILED PROGRAM<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2020fbb elementor-widget elementor-widget-text-editor\" data-id=\"2020fbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>The pathway is organized around 7 major modules, covering theory, practice, and real-world cases.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47cd54b elementor-widget elementor-widget-n-accordion\" data-id=\"47cd54b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Module 1: Fundamentals of System and Network Security\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7520\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-7520\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 1: Fundamentals of System and Network Security <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7520\" class=\"elementor-element elementor-element-7e45716 e-con-full e-flex e-con e-child\" data-id=\"7e45716\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7520\" class=\"elementor-element elementor-element-49b5f98 e-flex e-con-boxed e-con e-child\" data-id=\"49b5f98\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2af96a elementor-widget elementor-widget-text-editor\" data-id=\"e2af96a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 2 days \u2013 14 hours<\/strong><\/p><p><em><strong>Objectives:<\/strong><\/em> Permettre aux stagiaires de ma\u00eetriser les concepts cl\u00e9s de la cybers\u00e9curit\u00e9, identifier les risques, les vecteursd\u2019attaque, et comprendre le cadre r\u00e9glementaire applicable.<\/p><p><em><strong>Contents:<\/strong><\/em><\/p><ul><li>Identification of the cyber ecosystem: actors, cybercrime chain, attacker profiles and motivations.<\/li><li>Fundamental concepts: risks, organizational impacts, affected information systems.<\/li><li>Types of attacks: ransomware, phishing, denial of service, social engineering, compromised passwords.<\/li><li>Main vectors: email, web browsing, wireless connections, malware.<\/li><li>Regulatory framework: ISO 27001, 27005 standards, GDPR.<\/li><li>Security references: OWASP Top 10, STRIDE.<\/li><\/ul><p><em><strong>Travaux pratiques :<\/strong><\/em> identification des vecteurs d\u2019attaque sur une architecture fictive, cat\u00e9gorisation des incidents selon leur criticit\u00e9, quiz de validation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7521\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7521\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Axe 2 : \u00c9tat de l\u2019art et fonctionnement d\u2019un SOC <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7521\" class=\"elementor-element elementor-element-89e5876 e-con-full e-flex e-con e-child\" data-id=\"89e5876\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df8f5e4 elementor-widget elementor-widget-text-editor\" data-id=\"df8f5e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 4 days \u2013 28 hours<\/strong><\/p><p><em><strong>Objectives: <\/strong><\/em>Former \u00e0 la connaissance du SOC, \u00e0 ses outils et m\u00e9thodes, notamment le SIEM, ainsi qu\u2019aux principauxframeworks de gestion des incidents.<\/p><p><em><strong>Contents:<\/strong><\/em><\/p><ul><li>Definition, role, and organization of a SOC.<\/li><li>Overview of functions: monitoring, analysis, incident response.<\/li><li>Introduction to SIEM tools (Elastic Stack, Splunk), their architecture and features.<\/li><li>Pr\u00e9sentation et d\u00e9monstration IDS\/IPS.\u2022 Recommandations de l\u2019ANSSI sur la journalisation.<\/li><li>Incident response frameworks: NIST, CERT, ISO 27035.<\/li><\/ul><p><em><strong>Travaux pratiques :<\/strong><\/em> installation et configuration de SIEM, analyse des logs, cr\u00e9ation de r\u00e8gles de corr\u00e9lation, \u00e9tude decas (temps r\u00e9el phishing).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7522\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7522\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 3: Incident Management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7522\" class=\"elementor-element elementor-element-ca6c2a7 e-con-full e-flex e-con e-child\" data-id=\"ca6c2a7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-099e760 elementor-widget elementor-widget-text-editor\" data-id=\"099e760\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 10 days \u2013 70 hours<\/strong><\/p><p><em><strong>Objectives: <\/strong><\/em>Apprendre \u00e0 d\u00e9ployer et g\u00e9rer efficacement le processus complet de gestion des incidents de s\u00e9curit\u00e9, desd\u00e9tections initiales \u00e0 la rem\u00e9diation.<\/p><p><em><strong>Contents:<\/strong><\/em><\/p><ul><li>Principles and roles of IDS, IPS, UTM.<\/li><li>Incident classification by criticality, functioning of incident databases.<\/li><li>Response phases: detection, categorization, containment, eradication, recovery.<\/li><li>Forensic analysis methods, tools: Kansa, GRR.<\/li><li>Procedures and tools to handle minor and major incidents.<\/li><\/ul><p><em><strong>Practical work <\/strong><\/em>: simulations compl\u00e8tes, r\u00e9daction de rapports, analyse des causes racines.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7523\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7523\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 4: Fundamentals of Digital Forensics <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7523\" class=\"elementor-element elementor-element-fbd0b9b e-flex e-con-boxed e-con e-child\" data-id=\"fbd0b9b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9c504e elementor-widget elementor-widget-text-editor\" data-id=\"d9c504e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 1 day \u2013 7 hours<\/strong><\/p><p><em><strong>Objectives:<\/strong><\/em> Donner les bases indispensables de l\u2019analyse forensic pour traiter les incidents et identifier les causes racines.<\/p><p><em><strong>Contents:<\/strong><\/em><\/p><ul><li>Digital investigation process, definition and role of evidence.<\/li><li>Forensic taxonomy and methodologies.<\/li><li>Collaboration with internal and external actors (ANSSI, law enforcement).<\/li><\/ul><p><em><strong>Practical work<\/strong><\/em> : collecte, pr\u00e9servation et analyse des preuves num\u00e9riques, r\u00e9daction de rapports forensic.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7524\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7524\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 5: Cybersecurity Crisis Management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7524\" class=\"elementor-element elementor-element-8df4acb e-flex e-con-boxed e-con e-child\" data-id=\"8df4acb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-720b65a elementor-widget elementor-widget-text-editor\" data-id=\"720b65a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Dur\u00e9e : 3 jours &#8211; 21 heures<\/strong><\/p><p><em><strong>Objectives: <\/strong><\/em>Renforcer les comp\u00e9tences en traitement avanc\u00e9 des incidents, planification des r\u00e9ponses et rem\u00e9diation.<\/p><p><em><strong>Contents:<\/strong><\/em><\/p><ul><li>D\u00e9finition et organisation de la gestion de crise : identification des enjeux (r\u00e9putation, fonctionnement, finances), r\u00f4les des parties prenantes, et bonnes pratiques des cellules de crise.<\/li><li>Politique d\u2019escalade\u00a0: compr\u00e9hension des types d\u2019escalades (manag\u00e9riales, fonctionnelles) et des m\u00e9canismes de d\u00e9clenchement.<\/li><li>Proc\u00e9dures de gestion de crise\u00a0: logistique, r\u00e9f\u00e9rentiels (ex. PRIS), \u00e9tapes cl\u00e9s du d\u00e9roulement, et formalisation du retour d\u2019exp\u00e9rience.<\/li><li>Continuit\u00e9 d\u2019activit\u00e9 (PCA\/PRA)\u00a0: cadre r\u00e9glementaire, typologie des risques, r\u00f4les des acteurs, et mesures de s\u00e9curisation des actifs et des r\u00e9seaux.<\/li><li>Communication et gestion du stress : architecture des \u00e9changes, indicateurs de suivi, outils de pilotage, et techniques de r\u00e9gulation en p\u00e9riode de crise.<\/li><\/ul><p><strong><em>Travaux pratiques :<\/em><\/strong> \u00e9laboration de fiches r\u00e9flexes, gestion coordonn\u00e9e d\u2019incidents majeurs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7525\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7525\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 6: Team Awareness and Continuous Improvement <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7525\" class=\"elementor-element elementor-element-26880fe e-flex e-con-boxed e-con e-child\" data-id=\"26880fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a542bf2 elementor-widget elementor-widget-text-editor\" data-id=\"a542bf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 2 days \u2013 14 hours<\/strong><\/p><p><strong><em>Objectives:\u00a0<\/em><\/strong>Ma\u00eetriser les techniques avanc\u00e9es d\u2019analyse des journaux, construction de sc\u00e9narios de d\u00e9tection et r\u00e9ponsesrapides.<\/p><p><em><strong>Contents:<\/strong><\/em><\/p><ul><li>Th\u00e9matiques de communication : menaces courantes (phishing, ransomware, piratage\u2026), exposition des donn\u00e9es personnelles, s\u00e9curit\u00e9 des mots de passe et des moyens d\u2019authentification.<\/li><li>Bonnes pratiques de protection : mise \u00e0 jour des logiciels, sauvegarde des donn\u00e9es, signalement des fraudes, s\u00e9curit\u00e9 en t\u00e9l\u00e9travail, gestion des mots de passe.<\/li><li>Outils de communication : intranet, emails, MOOC ANSSI, outils de veille, formats collaboratifs comme le World Caf\u00e9.<\/li><li>Adaptation aux profils utilisateurs : salari\u00e9s, prestataires, personnes en situation de handicap.<\/li><li>Supports p\u00e9dagogiques : r\u00e9daction de proc\u00e9dures et modes op\u00e9ratoires pour les utilisateurs, en lien avec la politique de s\u00e9curit\u00e9.<\/li><li>Campagnes de sensibilisation : conception de sc\u00e9narios simples d\u2019ing\u00e9nierie sociale (ex. hame\u00e7onnage) pour illustrer les risques et renforcer la vigilance.<\/li><\/ul><p><em><strong>Travaux pratiques :<\/strong><\/em> Elaborer un kit de sensibilisation, organiser une campagne de sensibilisation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7526\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7526\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 7: Cybersecurity Monitoring <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7526\" class=\"elementor-element elementor-element-8835775 e-flex e-con-boxed e-con e-child\" data-id=\"8835775\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2bb1955 elementor-widget elementor-widget-text-editor\" data-id=\"2bb1955\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 1 day \u2013 7 hours<\/strong><\/p><p><em><strong>Objectives <\/strong><\/em>:\u00a0 Savoir \u00e0 utiliser les outils et sources de veille adapt\u00e9s aux enjeux de la cybers\u00e9curit\u00e9 et identifier les impacts li\u00e9s \u00e0 la veille dans les pratiques de l\u2019entreprise.<\/p><p><em><strong>Content\u00a0<\/strong><\/em>:<\/p><ul><li>Compr\u00e9hension de l\u2019OSINT et du paysage des menaces\u00a0: introduction aux usages de l\u2019OSINT, \u00e9volution des cybermenaces, r\u00f4le du cycle PDCA et outils d\u2019anticipation.<\/li><li>Sources et techniques de veille\u00a0: exploitation de sources r\u00e9glementaires et techniques (ANSSI, CERT-FR, NIST, \u00e9diteurs, Dark Net\u2026), recherche de publications (CVE), identification des failles r\u00e9seau.<\/li><li>Capitalisation et diffusion de la veille\u00a0: archivage via le Knowledge Management, communication via intranet, supports internes et tableaux de bord.<\/li><li>Implication des parties prenantes : direction, cellules de crise, utilisateurs, pour int\u00e9grer la veille dans les pratiques de s\u00e9curit\u00e9 de l\u2019entreprise.<\/li><\/ul><p><em><strong>Travaux pratiques :<\/strong><\/em> mise en place de processus de veille, analyse des r\u00e9sultats, formulation de plans d\u2019am\u00e9lioration continue.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4218c0a elementor-widget elementor-widget-heading\" data-id=\"4218c0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">LEARNING ASSESSMENT<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a07dd4e elementor-widget elementor-widget-text-editor\" data-id=\"a07dd4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Skills validated through a final role-play, followed by an oral defense before a panel.<\/li><li>Regular evaluations with quizzes and self-tests integrated into the modules.<\/li><li>Travaux pratiques approfondis utilisant des outils SOC (SIEM Splunk, Elastic Stack), forensic(Kansa, GRR), et simulation d\u2019incidents (phishing, ransomware).<\/li><li>Deliverables: analysis reports, incident classification, forensic documentation, and remediation plans.<\/li><li>Livrables : rapports d\u2019analyse, classification des incidents, documentation des investigationsforensics, et plans de rem\u00e9diation.<\/li><li>Labs include advanced configuration and customization of detection tools, as well as coordinated management of complex incidents.<\/li><li>Evaluated skills include mastery of ISO 27035, NIST CSF standards, SOC and CERT processes, and in-depth log analysis.\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9055f74 elementor-widget elementor-widget-heading\" data-id=\"9055f74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Teaching Methods <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e298ca elementor-widget elementor-widget-text-editor\" data-id=\"3e298ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Alternation of theoretical inputs, demonstrations, feedback, and case studies.<\/li><li>Intensive practical exercises using real tools (SIEM, monitoring tools).<\/li><li>Continuous assessment through quizzes, practical exercises, professional dossier, and oral defense.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92bd2a0 elementor-widget elementor-widget-text-editor\" data-id=\"92bd2a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>EXPERTISE TERRAIN <\/strong>Formateurs en poste : analystes SOC, auditeurs PASSI, consultants cyber. Vous apprenez avec celles et ceux qui font face aux menaces au quotidien.<\/p><p><strong>50 % DE PRATIQUE, 100% D\u2019IMPACT \u2013 \u00abLEARNING BY DOING\u00bb <\/strong>Labs, mises en situation, simulations d\u2019attaque : ici, on apprend en faisant.Apprenez la cybers\u00e9curit\u00e9 autrement : int\u00e9grer le Cyber Squad, c\u2019est transformer la th\u00e9orie en pratique.<\/p><p><strong>L\u2019ALLIANCE DES COMP\u00c9TENCES TECHNIQUES ET STRAT\u00c9GIQUES <\/strong>Gr\u00e2ce aux parcours DTISI et PASI, les \u00e9quipes du Cyber Squad se compl\u00e8tent : les agents techniques neutralisent les menaces en temps r\u00e9el, pendant que les leaders strat\u00e9giques pr\u00e9parent et pilotent la vision \u00e0 long terme. Ensemble, ils b\u00e2tissent une v\u00e9ritable forteresse num\u00e9rique.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-326cc20 elementor-widget elementor-widget-heading\" data-id=\"326cc20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">KEY STRENGTHS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fe71f2 elementor-widget elementor-widget-text-editor\" data-id=\"8fe71f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>PASSI certified trainers, SOC and forensic experts.<\/li><li>Hands-on experience with leading professional tools (SIEM, Elastic, Splunk).<\/li><li>Pragmatic approach with simulations and real-world scenarios.<\/li><li>Alignment with ANSSI, ISO 27035, and NIST recommendations.<\/li><li>This program is eligible for OPCO Atlas funding.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-121971a e-flex e-con-boxed e-con e-parent\" data-id=\"121971a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-95b29ea e-con-full e-flex e-con e-child\" data-id=\"95b29ea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-549c86b elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"549c86b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond-150x150.webp\" class=\"attachment-thumbnail size-thumbnail wp-image-20155\" alt=\"ACG Cyber Academy reconnue par Opco Atlas \u2013 organisme de formation cybers\u00e9curit\u00e9\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond-150x150.webp 150w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond-300x300.webp 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond-12x12.webp 12w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp 500w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-12c9d92 e-con-full e-flex e-con e-child\" data-id=\"12c9d92\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-01f2b72 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"01f2b72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">This program qualifies for OPCO Atlas funding as part of the CampusAtlas offering, recognized and funded up to 100%, with simplified procedures, a quality guarantee, and tailored support provided to member companies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Parcours certifiant DTISI D\u00e9tecter et traiter des incidents de s\u00e9curit\u00e9 informatique R\u00e9f\u00e9rence : DTISI Dur\u00e9e : 23 jours (161 heures) INTER INTRA Co\u00fbt : 14 490 \u20ac HT Cat\u00e9gorie :\u00a0S\u00e9curit\u00e9 Informatique Nos formations intra-entreprise sont personnalis\u00e9es, flexibles et align\u00e9es sur les besoins sp\u00e9cifiques de votre \u00e9quipe. Co\u00fbt : 14 490 \u20ac HT Cat\u00e9gorie :\u00a0S\u00e9curit\u00e9 Informatique [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":20155,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_glsr_average":0,"_glsr_ranking":0,"_glsr_reviews":0,"footnotes":""},"class_list":["post-19090","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Formation cybers\u00e9curit\u00e9 certifiante DTISI \u2013 ACG Cyber Academy<\/title>\n<meta name=\"description\" content=\"Formation cybers\u00e9curit\u00e9 certifiante DTISI d\u2019ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection et la gestion des incidents de s\u00e9curit\u00e9. OPCO Atlas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Formation cybers\u00e9curit\u00e9 certifiante DTISI \u2013 ACG Cyber Academy\" \/>\n<meta property=\"og:description\" content=\"Formation cybers\u00e9curit\u00e9 certifiante DTISI d\u2019ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection et la gestion des incidents de s\u00e9curit\u00e9. OPCO Atlas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-09T15:31:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/\",\"name\":\"Formation cybers\u00e9curit\u00e9 certifiante DTISI \u2013 ACG Cyber Academy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/PARTENAIRE_COULEUR_4x-sans-fond.webp\",\"datePublished\":\"2025-09-16T13:28:54+00:00\",\"dateModified\":\"2026-04-09T15:31:52+00:00\",\"description\":\"Formation cybers\u00e9curit\u00e9 certifiante DTISI d\u2019ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection et la gestion des incidents de s\u00e9curit\u00e9. OPCO Atlas.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/PARTENAIRE_COULEUR_4x-sans-fond.webp\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/PARTENAIRE_COULEUR_4x-sans-fond.webp\",\"width\":500,\"height\":500,\"caption\":\"ACG Cyber Academy reconnue par Opco Atlas \u2013 organisme de formation cybers\u00e9curit\u00e9\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Parcours certifiant D\u00e9tecter et traiter des incidents de s\u00e9curit\u00e9informatiquedents de s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Formation cybers\u00e9curit\u00e9 certifiante DTISI \u2013 ACG Cyber Academy","description":"Formation cybers\u00e9curit\u00e9 certifiante DTISI d\u2019ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection et la gestion des incidents de s\u00e9curit\u00e9. OPCO Atlas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/","og_locale":"en_GB","og_type":"article","og_title":"Formation cybers\u00e9curit\u00e9 certifiante DTISI \u2013 ACG Cyber Academy","og_description":"Formation cybers\u00e9curit\u00e9 certifiante DTISI d\u2019ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection et la gestion des incidents de s\u00e9curit\u00e9. OPCO Atlas.","og_url":"https:\/\/acgcyberacademy.fr\/en\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2026-04-09T15:31:52+00:00","og_image":[{"width":500,"height":500,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/","url":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/","name":"Formation cybers\u00e9curit\u00e9 certifiante DTISI \u2013 ACG Cyber Academy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp","datePublished":"2025-09-16T13:28:54+00:00","dateModified":"2026-04-09T15:31:52+00:00","description":"Formation cybers\u00e9curit\u00e9 certifiante DTISI d\u2019ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection et la gestion des incidents de s\u00e9curit\u00e9. OPCO Atlas.","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp","width":500,"height":500,"caption":"ACG Cyber Academy reconnue par Opco Atlas \u2013 organisme de formation cybers\u00e9curit\u00e9"},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Parcours certifiant D\u00e9tecter et traiter des incidents de s\u00e9curit\u00e9informatiquedents de s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/19090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=19090"}],"version-history":[{"count":199,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/19090\/revisions"}],"predecessor-version":[{"id":23192,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/19090\/revisions\/23192"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/20155"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=19090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}