{"id":19186,"date":"2025-09-16T17:42:19","date_gmt":"2025-09-16T15:42:19","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?page_id=19186"},"modified":"2025-12-11T09:29:12","modified_gmt":"2025-12-11T08:29:12","slug":"parcours-certifiant-piloter-et-animer-la-securite-informatique","status":"publish","type":"page","link":"https:\/\/acgcyberacademy.fr\/en\/parcours-certifiant-piloter-et-animer-la-securite-informatique\/","title":{"rendered":"IT security management and leadership certification course"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"19186\" class=\"elementor elementor-19186\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3b7ab1 e-flex e-con-boxed e-con e-parent\" data-id=\"a3b7ab1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c770fdf e-flex e-con-boxed e-con e-child\" data-id=\"c770fdf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cedb2b elementor-widget elementor-widget-heading\" data-id=\"3cedb2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CERTIFYING PATHWAY PASI<br> MANAGING AND LEADING IT SECURITY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d0ffda e-grid e-con-full e-con e-child\" data-id=\"1d0ffda\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1851309 elementor-widget elementor-widget-text-editor\" data-id=\"1851309\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Reference: PASI<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1456de0 elementor-widget elementor-widget-text-editor\" data-id=\"1456de0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 31 days (217 hours)<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d5d19d elementor-widget elementor-widget-image\" data-id=\"0d5d19d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-1024x576.png\" class=\"attachment-large size-large wp-image-21452\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-1024x576.png 1024w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-300x169.png 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-768x432.png 768w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-1536x864.png 1536w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama-18x10.png 18w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/11\/Bleu-et-Blanc-Montage-Geographie-Quiz-Diaporama.png 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f1a01d e-con-full e-flex e-con e-child\" data-id=\"8f1a01d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83e1163 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"83e1163\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;center&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"138285411\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1382854111\" data-tab-title-id=\"e-n-tab-title-1382854111\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1382854111\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tINTER\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1382854112\" data-tab-title-id=\"e-n-tab-title-1382854112\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1382854112\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tINTRA\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1382854111\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1382854111\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-14f8ed1 e-con-full e-flex e-con e-child\" data-id=\"14f8ed1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da3d952 elementor-widget elementor-widget-text-editor\" data-id=\"da3d952\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cost : <strong>19 530 \u20ac HT<\/strong><\/p><div class=\"info_label\">Category:<strong>\u00a0<\/strong><\/div><div class=\"info_label\"><strong>Computer security<\/strong><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1382854112\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1382854112\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-bddcf25 e-con-full e-flex e-con e-child\" data-id=\"bddcf25\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e185992 elementor-widget elementor-widget-text-editor\" data-id=\"e185992\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our in-company training courses are customised, flexible and tailored to the specific needs of your team.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2b2245 elementor-align-center elementor-widget elementor-widget-global elementor-global-8968 elementor-widget-button\" data-id=\"a2b2245\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjYxNTkiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">I WOULD LIKE A QUOTE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e8c41f elementor-button-info elementor-align-justify elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"3e8c41f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/Descriptif-de-cursus-PASI.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download the brochure<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-98f6d9f e-flex e-con-boxed e-con e-parent\" data-id=\"98f6d9f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1bc72b9 elementor-widget elementor-widget-text-editor\" data-id=\"1bc72b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The PASI pathway is a certifying training program with a total duration of 31 days (217 hours) \nspread over approximately 6 months. This training aims to provide professionals with the keys \nto managing IT security within their organization, combining technical knowledge, project management, governance, and team leadership. Validation is achieved through the completion of a professional dossier and an oral defense before a jury.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7805952 elementor-widget elementor-widget-heading\" data-id=\"7805952\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Target audience<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5a983c elementor-widget elementor-widget-text-editor\" data-id=\"d5a983c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>CISOs, CIOs, security managers, cybersecurity project managers, and professionals seeking to move into security leadership roles.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-579caa9 elementor-widget elementor-widget-heading\" data-id=\"579caa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Objectives<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aace03e elementor-widget elementor-widget-text-editor\" data-id=\"aace03e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Understand the fundamental concepts of system and network security.<\/li><li>Master the implementation of appropriate security solutions.<\/li><li>Know and apply cybersecurity regulations and standards.<\/li><li>Be able to manage a strategic action plan and collaborate effectively with stakeholders.<\/li><li>Lead awareness initiatives and develop a cybersecurity culture within teams.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80c6e0c elementor-widget elementor-widget-heading\" data-id=\"80c6e0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PREREQUISITES<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13a08f2 elementor-widget elementor-widget-text-editor\" data-id=\"13a08f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Have a good knowledge of operating systems (Windows, Linux) and computer networks (TCP\/IP, protocols, topologies).<\/li><li>Have a personal computer with virtualization capability (to run simulated environments) and a stable high-speed internet connection.<\/li><li>Mastery of basic cybersecurity concepts is a plus, to better benefit from practical exercises on real cases.<\/li><li>Be able to use standard office tools (Excel spreadsheets, reporting tools) and be ready to familiarize with specialized security tools (SIEM, network security solutions).<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8d25ab elementor-widget elementor-widget-heading\" data-id=\"b8d25ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DETAILED PROGRAM<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12787a9 elementor-widget elementor-widget-text-editor\" data-id=\"12787a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The pathway is organized around 7 major modules, covering theory, practice, and real-world cases.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47cd54b elementor-widget elementor-widget-n-accordion\" data-id=\"47cd54b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Module 1: Fundamentals of System and Network Security\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7520\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-7520\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 1: Fundamentals of System and Network Security <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7520\" class=\"elementor-element elementor-element-7e45716 e-con-full e-flex e-con e-child\" data-id=\"7e45716\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7520\" class=\"elementor-element elementor-element-49b5f98 e-flex e-con-boxed e-con e-child\" data-id=\"49b5f98\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2af96a elementor-widget elementor-widget-text-editor\" data-id=\"e2af96a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: <\/strong>5 days \u2013 35 hours<br \/><strong>Objectives:<\/strong> Enable participants to master the main vulnerabilities, threats, security equipment, and solutions to secure systems and networks, while developing active monitoring in the field of cybersecurity.<br \/><b><\/b><b><br \/><\/b><\/p><p><b>Contents:<\/b><\/p><ul><li>Specificities and vulnerabilities of different information systems (Windows, Linux, Mac, Android, iOS).<\/li><li>Main current risks and threats: ransomware, phishing, DDoS attacks.<\/li><li>Security architectures: PKI, cryptography.<\/li><li>Data security principles and securing exchanges (protocols, VPN, encryption).<\/li><li>Methods and tools for technical, technological, and regulatory monitoring (ANSSI, CVE).<\/li><li>Practical exercises: identification and classification of assets, log analysis from our SOC, real case studies on attacks.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7521\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7521\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 2: Fundamentals of Cybersecurity Regulations <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7521\" class=\"elementor-element elementor-element-89e5876 e-con-full e-flex e-con e-child\" data-id=\"89e5876\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df8f5e4 elementor-widget elementor-widget-text-editor\" data-id=\"df8f5e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\"><strong>Duration:  1 days \u2013 7 hours<\/strong><br>\n<strong>Objectives: <\/strong> Enable participants to understand the regulatory issues related to data protection and security, notably GDPR and associated ISO standards.<\/p><p><strong>Contents:<\/strong><\/p><ul><li>Issues related to regulatory compliance: cybercrime, data theft, etc.<\/li><li>Introduction to GDPR: key principles, scope, role of the DPO, sanctions.<\/li><li>Correspondence between ISO 27001, 27005 standards and GDPR.<\/li><li>Other sector-specific regulations and obligations of OIV and OSE.<\/li><li>Practical exercises: Privacy Impact Assessment (PIA), compliance evaluation, drafting mitigation plans.<br \/>d\u2019att\u00e9nuation.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7522\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7522\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 3: Managing a Cybersecurity Action Plan <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7522\" class=\"elementor-element elementor-element-ca6c2a7 e-con-full e-flex e-con e-child\" data-id=\"ca6c2a7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-099e760 elementor-widget elementor-widget-text-editor\" data-id=\"099e760\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 10 days \u2013 70 hours<\/strong><br \/><strong>Objectives:<\/strong> Train participants in implementing, managing, and leading a strategic cybersecurity action plan in line with corporate governance.<\/p><p><strong>Contents:<\/strong><\/p><ul><li>Security policy (PSSI), stakeholders, constraints, and documentation.<\/li><li>Writing and structuring an action plan based on ISO 27001.<\/li><li>Collaboration with stakeholders (IT Director, CISO, DPO, service providers).<\/li><li>Project management: tasks, resources, budget, tools (Trello, MS Project).<\/li><li>Leading meetings, communicating with management.<\/li><li>Practical exercises: maturity analysis, development of dashboards, drafting and presenting a strategic plan.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7523\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7523\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 4: Security Risk Analysis and Assessment <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7523\" class=\"elementor-element elementor-element-fbd0b9b e-flex e-con-boxed e-con e-child\" data-id=\"fbd0b9b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9c504e elementor-widget elementor-widget-text-editor\" data-id=\"d9c504e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 6 days \u2013 42 hours<\/strong><br \/><strong>Objectives:<\/strong> Master cybersecurity risk analysis according to ISO 27005 and EBIOS Risk Manager, from asset inventory to prioritization and treatment plan.<\/p><p><strong>Content<\/strong><\/p><ul><li>Regulatory framework and ISMS: ISO\/IEC 27000, ISO 27005; risk analysis principles.<\/li><li>Threats and mapping: STRIDE, OWASP, outsourcing; TOGAF\/CMDB and critical dependencies.<\/li><li>EBIOS RM: context, feared events, scenarios, risks, measures.<\/li><li>Prioritization and tools: impact\/probability matrices, risk mapping, ISO 27001\/27002, ANSSI guidelines.<\/li><li>Practical case: MITRE ATT&amp;CK scenarios, prioritization, and treatment plan.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7524\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7524\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 5: Organization and Coordination of Incident Response <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7524\" class=\"elementor-element elementor-element-8df4acb e-flex e-con-boxed e-con e-child\" data-id=\"8df4acb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-720b65a elementor-widget elementor-widget-text-editor\" data-id=\"720b65a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 2 days \u2013 14 hours<\/strong><br \/><strong>Objectives:<\/strong> Organize and coordinate incident response, formalize crisis and continuity processes, and manage business recovery to maintain critical functions.<\/p><p><strong>Contents:<\/strong><\/p><ul><li>Incident response and continuity (DRP\/BCP): objectives, structure, teams, procedures.<\/li><li>Crisis governance and stakeholders: roles, responsibilities, alert\/escalation.<\/li><li>Operational execution and inter-team coordination, monitoring\/reporting tools.<\/li><li>Internal\/external crisis communication: messages, channels, coordination with management\/regulators.<\/li><li>Practical exercises: drafting a DRP\/BCP, crisis simulations, ransomware\/phishing scenarios.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7525\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7525\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 6: Security Control and Evaluation Actions <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7525\" class=\"elementor-element elementor-element-26880fe e-flex e-con-boxed e-con e-child\" data-id=\"26880fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a542bf2 elementor-widget elementor-widget-text-editor\" data-id=\"a542bf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 2 days \u2013 14 hours<\/strong><br \/><strong>Objectives:<\/strong> Deploy control measures and audit the implementation of security actions.<\/p><p><strong>Contents:<\/strong><\/p><ul><li>Conducting technical and organizational audits.<\/li><li>Penetration testing, analysis of results.<\/li><li>Analysis of action plans, defining effectiveness metrics.<\/li><li>Writing reports and continuous improvement recommendations.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7526\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7526\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 7: Penetration Testing and Technical Audits <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7526\" class=\"elementor-element elementor-element-8835775 e-flex e-con-boxed e-con e-child\" data-id=\"8835775\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2bb1955 elementor-widget elementor-widget-text-editor\" data-id=\"2bb1955\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 2 days<\/strong><br \/><strong>Objectives:<\/strong> Master the methods and tools to perform penetration tests and technical audits in a secure environment.<\/p><p><strong>Contents:<\/strong><\/p><ul><li>Vulnerability assessment techniques.<\/li><li>Exploitation of vulnerabilities, incident documentation.<\/li><li>Preparation Practical exercises in a virtualized environment.<\/li><li>Exercises of detailed reports and recommendations.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4218c0a elementor-widget elementor-widget-heading\" data-id=\"4218c0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">LEARNING ASSESSMENT<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2020fbb elementor-widget elementor-widget-text-editor\" data-id=\"2020fbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Skills acquisition is validated through a professional dossier prepared by each participant.<\/li><li>Oral defense before a jury, where the candidate presents their dossier and answers experts\u2019 questions.<\/li><li>Throughout the training, regular quizzes validate the understanding of theoretical concepts.<\/li><li>Practical exercises (labs) are highly detailed and immersive: asset inventory, log analysis, configuration of security tools (firewall, SIEM, VPN), detection and documentation of simulated real attacks (ransomware, phishing).<\/li><li>Each lab is delivered as reports, summary tables, action plans, or audit reports. These deliverables also form a basis for evaluation.<\/li><li>Assessment includes the ability to apply methodologies (e.g., ISMS, ISO 27001, GDPR) as well as the relevance and accuracy of recommendations provided.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fb19f8 elementor-widget elementor-widget-heading\" data-id=\"4fb19f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Teaching Methods <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-729d6c6 elementor-widget elementor-widget-text-editor\" data-id=\"729d6c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Alternation of theoretical inputs, demonstrations, feedback, and case studies.<\/li><li>Intensive practical exercises using real tools (SIEM, monitoring tools).<\/li><li>Continuous assessment through quizzes, practical exercises, professional dossier, and oral defense.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f41adc elementor-widget elementor-widget-heading\" data-id=\"6f41adc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">KEY STRENGTHS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-483ee0a elementor-widget elementor-widget-text-editor\" data-id=\"483ee0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Real data and advanced tools from the ACG Cybercampus SOC.<\/li><li>Certified expert trainers with concrete field experience.<\/li><li>Personalized feedback and improvement plan validated by a jury.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b50345b e-flex e-con-boxed e-con e-parent\" data-id=\"b50345b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d64e19a e-con-full e-flex e-con e-child\" data-id=\"d64e19a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3d6642 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"f3d6642\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond-150x150.webp\" class=\"attachment-thumbnail size-thumbnail wp-image-20155\" alt=\"ACG Cyber Academy reconnue par Opco Atlas \u2013 organisme de formation cybers\u00e9curit\u00e9\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond-150x150.webp 150w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond-300x300.webp 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond-12x12.webp 12w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp 500w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-17e8dee e-con-full e-flex e-con e-child\" data-id=\"17e8dee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cbc62c elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"1cbc62c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">This program qualifies for OPCO Atlas funding as part of the CampusAtlas offering, recognized and funded up to 100%, with simplified procedures, a quality guarantee, and tailored support provided to member companies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Parcours certifiant PASI Piloter et animer la s\u00e9curit\u00e9 informatique R\u00e9f\u00e9rence : PASI Dur\u00e9e : 31 jours (217 heures) INTER INTRA Co\u00fbt : 19 530 \u20ac HT Cat\u00e9gorie :\u00a0S\u00e9curit\u00e9 Informatique Nos formations intra-entreprise sont personnalis\u00e9es, flexibles et align\u00e9es sur les besoins sp\u00e9cifiques de votre \u00e9quipe. Co\u00fbt : 19 530 \u20ac HT Cat\u00e9gorie :\u00a0S\u00e9curit\u00e9 Informatique Nos formations [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":20155,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_glsr_average":0,"_glsr_ranking":0,"_glsr_reviews":0,"footnotes":""},"class_list":["post-19186","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Formation cybers\u00e9curit\u00e9 certifiante PASI \u2013 ACG Cyber Academy<\/title>\n<meta name=\"description\" content=\"Formation cybers\u00e9curit\u00e9 certifiante PASI d\u2019ACG Cyber Academy : pilotez et animez la s\u00e9curit\u00e9 informatique de votre organisation. OPCO Atlas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/parcours-certifiant-piloter-et-animer-la-securite-informatique\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Formation cybers\u00e9curit\u00e9 certifiante PASI \u2013 ACG Cyber Academy\" \/>\n<meta property=\"og:description\" content=\"Formation cybers\u00e9curit\u00e9 certifiante PASI d\u2019ACG Cyber Academy : pilotez et animez la s\u00e9curit\u00e9 informatique de votre organisation. OPCO Atlas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/parcours-certifiant-piloter-et-animer-la-securite-informatique\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T08:29:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-piloter-et-animer-la-securite-informatique\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-piloter-et-animer-la-securite-informatique\\\/\",\"name\":\"Formation cybers\u00e9curit\u00e9 certifiante PASI \u2013 ACG Cyber Academy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-piloter-et-animer-la-securite-informatique\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-piloter-et-animer-la-securite-informatique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/PARTENAIRE_COULEUR_4x-sans-fond.webp\",\"datePublished\":\"2025-09-16T15:42:19+00:00\",\"dateModified\":\"2025-12-11T08:29:12+00:00\",\"description\":\"Formation cybers\u00e9curit\u00e9 certifiante PASI d\u2019ACG Cyber Academy : pilotez et animez la s\u00e9curit\u00e9 informatique de votre organisation. OPCO Atlas.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-piloter-et-animer-la-securite-informatique\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-piloter-et-animer-la-securite-informatique\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-piloter-et-animer-la-securite-informatique\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/PARTENAIRE_COULEUR_4x-sans-fond.webp\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/PARTENAIRE_COULEUR_4x-sans-fond.webp\",\"width\":500,\"height\":500,\"caption\":\"ACG Cyber Academy reconnue par Opco Atlas \u2013 organisme de formation cybers\u00e9curit\u00e9\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-certifiant-piloter-et-animer-la-securite-informatique\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Parcours certifiant Piloter et animer la s\u00e9curit\u00e9 informatique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Formation cybers\u00e9curit\u00e9 certifiante PASI \u2013 ACG Cyber Academy","description":"Formation cybers\u00e9curit\u00e9 certifiante PASI d\u2019ACG Cyber Academy : pilotez et animez la s\u00e9curit\u00e9 informatique de votre organisation. OPCO Atlas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/parcours-certifiant-piloter-et-animer-la-securite-informatique\/","og_locale":"en_GB","og_type":"article","og_title":"Formation cybers\u00e9curit\u00e9 certifiante PASI \u2013 ACG Cyber Academy","og_description":"Formation cybers\u00e9curit\u00e9 certifiante PASI d\u2019ACG Cyber Academy : pilotez et animez la s\u00e9curit\u00e9 informatique de votre organisation. OPCO Atlas.","og_url":"https:\/\/acgcyberacademy.fr\/en\/parcours-certifiant-piloter-et-animer-la-securite-informatique\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2025-12-11T08:29:12+00:00","og_image":[{"width":500,"height":500,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-piloter-et-animer-la-securite-informatique\/","url":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-piloter-et-animer-la-securite-informatique\/","name":"Formation cybers\u00e9curit\u00e9 certifiante PASI \u2013 ACG Cyber Academy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-piloter-et-animer-la-securite-informatique\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-piloter-et-animer-la-securite-informatique\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp","datePublished":"2025-09-16T15:42:19+00:00","dateModified":"2025-12-11T08:29:12+00:00","description":"Formation cybers\u00e9curit\u00e9 certifiante PASI d\u2019ACG Cyber Academy : pilotez et animez la s\u00e9curit\u00e9 informatique de votre organisation. OPCO Atlas.","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-piloter-et-animer-la-securite-informatique\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/parcours-certifiant-piloter-et-animer-la-securite-informatique\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-piloter-et-animer-la-securite-informatique\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/09\/PARTENAIRE_COULEUR_4x-sans-fond.webp","width":500,"height":500,"caption":"ACG Cyber Academy reconnue par Opco Atlas \u2013 organisme de formation cybers\u00e9curit\u00e9"},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/parcours-certifiant-piloter-et-animer-la-securite-informatique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Parcours certifiant Piloter et animer la s\u00e9curit\u00e9 informatique"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/19186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=19186"}],"version-history":[{"count":103,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/19186\/revisions"}],"predecessor-version":[{"id":22057,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/19186\/revisions\/22057"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/20155"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=19186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}