{"id":19090,"date":"2025-09-16T15:28:54","date_gmt":"2025-09-16T13:28:54","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?page_id=19090"},"modified":"2026-02-05T12:14:12","modified_gmt":"2026-02-05T11:14:12","slug":"parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite","status":"publish","type":"page","link":"https:\/\/acgcyberacademy.fr\/en\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/","title":{"rendered":"Detecting and dealing with IT security incidents certification course"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"19090\" class=\"elementor elementor-19090\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3b7ab1 e-con-full e-flex e-con e-parent\" data-id=\"a3b7ab1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c770fdf e-con-full e-flex e-con e-child\" data-id=\"c770fdf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cedb2b elementor-widget elementor-widget-heading\" data-id=\"3cedb2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DTISI Certification Pathway: <br>Detecting and Handling IT Security Incidents<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d0ffda e-grid e-con-full e-con e-child\" data-id=\"1d0ffda\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1851309 elementor-widget elementor-widget-text-editor\" data-id=\"1851309\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Reference: DTISI<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1456de0 elementor-widget elementor-widget-text-editor\" data-id=\"1456de0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 23 days (161 hours)<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fb8cc8 elementor-widget elementor-widget-image\" data-id=\"6fb8cc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-1024x576.png\" class=\"attachment-large size-large wp-image-21452\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-1024x576.png 1024w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-300x169.png 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-768x432.png 768w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-1536x864.png 1536w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-18x10.png 18w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama.png 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f1a01d e-con-full e-flex e-con e-child\" data-id=\"8f1a01d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83e1163 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"83e1163\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;center&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"138285411\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1382854111\" data-tab-title-id=\"e-n-tab-title-1382854111\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1382854111\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tINTER\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1382854112\" data-tab-title-id=\"e-n-tab-title-1382854112\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1382854112\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tINTRA\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1382854111\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1382854111\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-14f8ed1 e-con-full e-flex e-con e-child\" data-id=\"14f8ed1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da3d952 elementor-widget elementor-widget-text-editor\" data-id=\"da3d952\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cost : <strong>14 490 \u20ac HT<\/strong><\/p><div class=\"info_label\">Category:<strong>\u00a0<\/strong><\/div><div class=\"info_label\"><strong>Computer security<\/strong><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1382854112\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1382854112\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-bddcf25 e-con-full e-flex e-con e-child\" data-id=\"bddcf25\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e185992 elementor-widget elementor-widget-text-editor\" data-id=\"e185992\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our in-company training courses are customised, flexible and tailored to the specific needs of your team.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2b2245 elementor-align-center elementor-widget elementor-widget-global elementor-global-8968 elementor-widget-button\" data-id=\"a2b2245\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjYxNTkiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">I WOULD LIKE A QUOTE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e8c41f elementor-button-info elementor-align-justify elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"3e8c41f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/Descriptif-de-cursus-DTISI.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download the brochure<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-98f6d9f e-flex e-con-boxed e-con e-parent\" data-id=\"98f6d9f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aba7433 elementor-widget elementor-widget-text-editor\" data-id=\"aba7433\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This certification training program lasts 23 days (161 hours) over approximately 4 months. The DTISI pathway prepares participants to identify, analyze, and manage incidents within a SOC or CERT. The program combines in-depth theory, immersive practical exercises, and crisis management simulations, validated through a final role-play and an oral defense before a panel.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7805952 elementor-widget elementor-widget-heading\" data-id=\"7805952\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">TARGET AUDIENCE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5a983c elementor-widget elementor-widget-text-editor\" data-id=\"d5a983c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>SOC analysts, security technicians, incident management experts, CERT team coordinators.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-579caa9 elementor-widget elementor-widget-heading\" data-id=\"579caa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Objectives<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aace03e elementor-widget elementor-widget-text-editor\" data-id=\"aace03e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Master the fundamental concepts and stakeholders in cybersecurity.<\/li><li>Identify and analyze attack vectors, techniques, and scenarios.<\/li><li>Effectively use SIEM tools as well as SOC analysis and detection methods.<\/li><li>Manage incidents with structured processes in compliance with standards (ISO 27035).<\/li><li>Participate in crisis management and team awareness initiatives.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a38e11 elementor-widget elementor-widget-heading\" data-id=\"8a38e11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PREREQUISITES<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f66475 elementor-widget elementor-widget-text-editor\" data-id=\"8f66475\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>General IT knowledge and cybersecurity fundamentals (concepts of attacks, vectors, risks).<\/li><li>Knowledge of the ANSSI security guide or completion of an equivalent training module (e.g., ANSSI SecNumacad\u00e9mie Mooc) is recommended but not mandatory.<\/li><li>A personal computer with internet access and the ability to run advanced cybersecurity tools (SIEM, forensic tools).<\/li><li>Familiarity with networks and system environments, along with skills in analysis and synthesis to process complex security log data.<\/li><li>Willingness to actively participate in practical workshops and incident simulations to validate skills.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8d25ab elementor-widget elementor-widget-heading\" data-id=\"b8d25ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DETAILED PROGRAM<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2020fbb elementor-widget elementor-widget-text-editor\" data-id=\"2020fbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The pathway is organized around 7 major modules, covering theory, practice, and real-world cases.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47cd54b elementor-widget elementor-widget-n-accordion\" data-id=\"47cd54b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Module 1: Fundamentals of System and Network Security\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7520\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-7520\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 1: Fundamentals of System and Network Security <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7520\" class=\"elementor-element elementor-element-7e45716 e-con-full e-flex e-con e-child\" data-id=\"7e45716\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7520\" class=\"elementor-element elementor-element-49b5f98 e-flex e-con-boxed e-con e-child\" data-id=\"49b5f98\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2af96a elementor-widget elementor-widget-text-editor\" data-id=\"e2af96a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 2 days \u2013 14 hours<\/strong><br \/><strong>Objectives:<\/strong> Enable participants to master key cybersecurity concepts, identify risks and attack vectors, and understand the applicable regulatory framework.<\/p><p><strong>Contents:<\/strong><\/p><ul><li>Identification of the cyber ecosystem: actors, cybercrime chain, attacker profiles and motivations.<\/li><li>Fundamental concepts: risks, organizational impacts, affected information systems.<\/li><li>Types of attacks: ransomware, phishing, denial of service, social engineering, compromised passwords.<\/li><li>Main vectors: email, web browsing, wireless connections, malware.<\/li><li>Regulatory framework: ISO 27001, 27005 standards, GDPR.<\/li><li>Security references: OWASP Top 10, STRIDE.<\/li><li>Practical exercises: identifying attack vectors on a simulated architecture, categorizing incidents by criticality, validation quizzes.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7521\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7521\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 2: State of the Art of the SOC <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7521\" class=\"elementor-element elementor-element-89e5876 e-con-full e-flex e-con e-child\" data-id=\"89e5876\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df8f5e4 elementor-widget elementor-widget-text-editor\" data-id=\"df8f5e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 4 days \u2013 28 hours<\/strong><br \/><strong>Objectives:<\/strong> Train participants in SOC knowledge, its tools and methods, particularly SIEM, as well as the main incident management frameworks.<\/p><p><strong>Contents:<\/strong><\/p><ul><li>Definition, role, and organization of a SOC.<\/li><li>Overview of functions: monitoring, analysis, incident response.<\/li><li>Introduction to SIEM tools (Elastic Stack, Splunk), their architecture and features.<\/li><li>Presentation and demonstration of IDS\/IPS.<\/li><li>ANSSI recommendations on logging.<\/li><li>Incident response frameworks: NIST, CERT, ISO 27035.<\/li><li>Practical exercises: SIEM installation and configuration, log analysis, correlation rule creation,<br \/>case study (real-time phishing).<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7522\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7522\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 3: Incident Management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7522\" class=\"elementor-element elementor-element-ca6c2a7 e-con-full e-flex e-con e-child\" data-id=\"ca6c2a7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-099e760 elementor-widget elementor-widget-text-editor\" data-id=\"099e760\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 10 days \u2013 70 hours<\/strong><br \/><strong>Objectives:<\/strong> Learn to deploy and manage the complete security incident management process, from initial detection to remediation.<\/p><p><strong>Contents:<\/strong><\/p><ul><li>Principles and roles of IDS, IPS, UTM.<\/li><li>Incident classification by criticality, functioning of incident databases.<\/li><li>Response phases: detection, categorization, containment, eradication, recovery.<\/li><li>Forensic analysis methods, tools: Kansa, GRR.<\/li><li>Procedures and tools to handle minor and major incidents.<\/li><li>Practical exercises: full simulations, report writing, root cause analysis.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7523\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7523\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 4: Fundamentals of Digital Forensics <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7523\" class=\"elementor-element elementor-element-fbd0b9b e-flex e-con-boxed e-con e-child\" data-id=\"fbd0b9b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9c504e elementor-widget elementor-widget-text-editor\" data-id=\"d9c504e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\"><strong>Duration: 1 day \u2013 7 hours<\/strong><br><strong>Objectifs :<\/strong> Acquire the fundamentals of digital investigation: evidence preservation, collection, analysis, and reporting.<\/p><p><strong>Content:<\/strong><\/p><ul><li>Digital investigation process, definition and role of evidence.<\/li><li>Forensic taxonomy and methodologies.<\/li><li>Collaboration with internal and external actors (ANSSI, law enforcement).<\/li><li>Practical exercises: evidence collection, preservation and analysis, forensic report writing.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7524\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7524\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 5: Cybersecurity Crisis Management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7524\" class=\"elementor-element elementor-element-8df4acb e-flex e-con-boxed e-con e-child\" data-id=\"8df4acb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-720b65a elementor-widget elementor-widget-text-editor\" data-id=\"720b65a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\"><strong>Duration: 3 days \u2013 21 hours<\/strong><br><strong>Objectives :<\/strong> Structure, lead, and train organizational response in a cyber crisis, from activation to feedback (RETEX).<\/p><p><strong>Contents:<\/strong><\/p><ul><li>Crisis cell: roles, escalation, coordination.<\/li><li>BCP\/DRP: scope, dependencies, activation, action synchronization.<\/li><li>Communication: messages, channels, dashboards.3<\/li><li>Practical exercises: crisis cell setup, ransomware exercise, message kit, RETEX.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7525\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7525\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 6: Team Awareness and Continuous Improvement <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7525\" class=\"elementor-element elementor-element-26880fe e-flex e-con-boxed e-con e-child\" data-id=\"26880fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a542bf2 elementor-widget elementor-widget-text-editor\" data-id=\"a542bf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\"><strong>Duration: 2 days \u2013 14 hours<\/strong><br><strong>Objectifs :<\/strong> Design, deploy, and measure awareness actions to sustainably strengthen cybersecurity posture.<\/p><p><strong>Contents:<\/strong><\/p><ul><li>Key topics and materials: phishing, passwords, remote work.<\/li><li>Facilitation methods and managerial support.<\/li><li>KPIs and awareness dashboards.<\/li><li>Practical exercises: mini-campaign, dashboard creation, and improvement plan.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7526\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7526\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 7: Cybersecurity Monitoring <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7526\" class=\"elementor-element elementor-element-8835775 e-flex e-con-boxed e-con e-child\" data-id=\"8835775\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2bb1955 elementor-widget elementor-widget-text-editor\" data-id=\"2bb1955\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 1 day \u2013 7 hours<\/strong><br \/><strong>Objectives:<\/strong> Learn to implement effective operational monitoring to anticipate threats and adapt security measures.<\/p><p><strong>Contents:<\/strong><\/p><ul><li>Monitoring sources: ANSSI, CERT-FR, OSINT, CVE.<\/li><li>Methods for analyzing and exploiting alerts.<\/li><li>Writing and communicating recommendations.<\/li><li>Practical exercises: setting up monitoring processes, analyzing results, formulating continuous improvement plans.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4218c0a elementor-widget elementor-widget-heading\" data-id=\"4218c0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">LEARNING ASSESSMENT<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a07dd4e elementor-widget elementor-widget-text-editor\" data-id=\"a07dd4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Skills validated through a final role-play, followed by an oral defense before a panel.<\/li><li>Regular evaluations with quizzes and self-tests integrated into the modules.<\/li><li>In-depth practical exercises using SOC tools (SIEM Splunk, Elastic Stack), forensic tools (Kansa, GRR, autopsy), and incident simulations (phishing, ransomware).<\/li><li>Deliverables: analysis reports, incident classification, forensic documentation, and remediation plans.<\/li><li>Deliverables: analysis reports, incident classification, forensic investigation documentation, and remediation plans.<\/li><li>Labs include advanced configuration and customization of detection tools, as well as coordinated management of complex incidents.<\/li><li>Evaluated skills include mastery of ISO 27035, NIST CSF standards, SOC and CERT processes, and in-depth log analysis.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9055f74 elementor-widget elementor-widget-heading\" data-id=\"9055f74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Teaching Methods <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e298ca elementor-widget elementor-widget-text-editor\" data-id=\"3e298ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Theoretical courses enriched with real-world case studies and feedback.<\/li><li>Practical exercises with SOC tools, log investigations, and incident simulations.<\/li><li>Role-plays and oral defenses to validate operational skills.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-326cc20 elementor-widget elementor-widget-heading\" data-id=\"326cc20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">KEY STRENGTHS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fe71f2 elementor-widget elementor-widget-text-editor\" data-id=\"8fe71f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>PASSI certified trainers, SOC and forensic experts.<\/li><li>Hands-on experience with leading professional tools (SIEM, Elastic, Splunk).<\/li><li>Pragmatic approach with simulations and real-world scenarios.<\/li><li>Alignment with ANSSI, ISO 27035, and NIST recommendations.<\/li><li>This program is eligible for OPCO Atlas funding.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-121971a e-flex e-con-boxed e-con e-parent\" data-id=\"121971a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-95b29ea e-con-full e-flex e-con e-child\" data-id=\"95b29ea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-549c86b elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"549c86b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond-150x150.webp\" class=\"attachment-thumbnail size-thumbnail wp-image-20155\" alt=\"ACG Cyber Academy reconnue par Opco Atlas \u2013 organisme de formation cybers\u00e9curit\u00e9\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond-150x150.webp 150w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond-300x300.webp 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond-12x12.webp 12w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp 500w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-12c9d92 e-con-full e-flex e-con e-child\" data-id=\"12c9d92\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-01f2b72 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"01f2b72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">This program qualifies for OPCO Atlas funding as part of the CampusAtlas offering, recognized and funded up to 100%, with simplified procedures, a quality guarantee, and tailored support provided to member companies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Parcours certifiant DTISI D\u00e9tecter et traiter des incidents de s\u00e9curit\u00e9 informatique R\u00e9f\u00e9rence : DTISI Dur\u00e9e : 23 jours (161 heures) INTER INTRA Co\u00fbt : 14 490 \u20ac HT Cat\u00e9gorie :\u00a0S\u00e9curit\u00e9 Informatique Nos formations intra-entreprise sont personnalis\u00e9es, flexibles et align\u00e9es sur les besoins sp\u00e9cifiques de votre \u00e9quipe. Co\u00fbt : 14 490 \u20ac HT Cat\u00e9gorie :\u00a0S\u00e9curit\u00e9 Informatique [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":20155,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_glsr_average":0,"_glsr_ranking":0,"_glsr_reviews":0,"footnotes":""},"class_list":["post-19090","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Formation cybers\u00e9curit\u00e9 certifiante DTISI \u2013 ACG Cyber Academy<\/title>\n<meta name=\"description\" content=\"Formation cybers\u00e9curit\u00e9 certifiante DTISI d\u2019ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection et la gestion des incidents de s\u00e9curit\u00e9. OPCO Atlas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Formation cybers\u00e9curit\u00e9 certifiante DTISI \u2013 ACG Cyber Academy\" \/>\n<meta property=\"og:description\" content=\"Formation cybers\u00e9curit\u00e9 certifiante DTISI d\u2019ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection et la gestion des incidents de s\u00e9curit\u00e9. OPCO Atlas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-05T11:14:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/\",\"name\":\"Formation cybers\u00e9curit\u00e9 certifiante DTISI \u2013 ACG Cyber Academy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/PARTENAIRE_COULEUR_4x-sans-fond.webp\",\"datePublished\":\"2025-09-16T13:28:54+00:00\",\"dateModified\":\"2026-02-05T11:14:12+00:00\",\"description\":\"Formation cybers\u00e9curit\u00e9 certifiante DTISI d\u2019ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection et la gestion des incidents de s\u00e9curit\u00e9. OPCO Atlas.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/PARTENAIRE_COULEUR_4x-sans-fond.webp\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/PARTENAIRE_COULEUR_4x-sans-fond.webp\",\"width\":500,\"height\":500,\"caption\":\"ACG Cyber Academy reconnue par Opco Atlas \u2013 organisme de formation cybers\u00e9curit\u00e9\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Parcours certifiant D\u00e9tecter et traiter des incidents de s\u00e9curit\u00e9informatiquedents de s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Formation cybers\u00e9curit\u00e9 certifiante DTISI \u2013 ACG Cyber Academy","description":"Formation cybers\u00e9curit\u00e9 certifiante DTISI d\u2019ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection et la gestion des incidents de s\u00e9curit\u00e9. OPCO Atlas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/","og_locale":"en_GB","og_type":"article","og_title":"Formation cybers\u00e9curit\u00e9 certifiante DTISI \u2013 ACG Cyber Academy","og_description":"Formation cybers\u00e9curit\u00e9 certifiante DTISI d\u2019ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection et la gestion des incidents de s\u00e9curit\u00e9. OPCO Atlas.","og_url":"https:\/\/acgcyberacademy.fr\/en\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2026-02-05T11:14:12+00:00","og_image":[{"width":500,"height":500,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/","url":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/","name":"Formation cybers\u00e9curit\u00e9 certifiante DTISI \u2013 ACG Cyber Academy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp","datePublished":"2025-09-16T13:28:54+00:00","dateModified":"2026-02-05T11:14:12+00:00","description":"Formation cybers\u00e9curit\u00e9 certifiante DTISI d\u2019ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection et la gestion des incidents de s\u00e9curit\u00e9. OPCO Atlas.","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp","width":500,"height":500,"caption":"ACG Cyber Academy reconnue par Opco Atlas \u2013 organisme de formation cybers\u00e9curit\u00e9"},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Parcours certifiant D\u00e9tecter et traiter des incidents de s\u00e9curit\u00e9informatiquedents de s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/19090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=19090"}],"version-history":[{"count":166,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/19090\/revisions"}],"predecessor-version":[{"id":22429,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/19090\/revisions\/22429"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/20155"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=19090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}