{"id":19443,"date":"2025-09-22T12:16:23","date_gmt":"2025-09-22T10:16:23","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?page_id=19443"},"modified":"2025-11-06T16:25:33","modified_gmt":"2025-11-06T15:25:33","slug":"parcours-introductif-a-la-cybersecurite","status":"publish","type":"page","link":"https:\/\/acgcyberacademy.fr\/en\/parcours-introductif-a-la-cybersecurite\/","title":{"rendered":"Introductory Cybersecurity Course"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"19443\" class=\"elementor elementor-19443\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3b7ab1 e-flex e-con-boxed e-con e-parent\" data-id=\"a3b7ab1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c770fdf e-flex e-con-boxed e-con e-child\" data-id=\"c770fdf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cedb2b elementor-widget elementor-widget-heading\" data-id=\"3cedb2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Introductory Cybersecurity Course\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d0ffda e-grid e-con-full e-con e-child\" data-id=\"1d0ffda\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1851309 elementor-widget elementor-widget-text-editor\" data-id=\"1851309\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>R\u00e9f\u00e9rence : ACGCYBER<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1456de0 elementor-widget elementor-widget-text-editor\" data-id=\"1456de0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Dur\u00e9e : 10 jours (70 heures)<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f1a01d e-con-full e-flex e-con e-child\" data-id=\"8f1a01d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83e1163 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"83e1163\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;center&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"138285411\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1382854111\" data-tab-title-id=\"e-n-tab-title-1382854111\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1382854111\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tINTER\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1382854112\" data-tab-title-id=\"e-n-tab-title-1382854112\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1382854112\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tINTRA\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1382854111\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1382854111\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-14f8ed1 e-con-full e-flex e-con e-child\" data-id=\"14f8ed1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da3d952 elementor-widget elementor-widget-text-editor\" data-id=\"da3d952\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cost :\u00a0<strong>On request<\/strong><\/p><div class=\"info_label\">Category:<strong>\u00a0<\/strong><\/div><div class=\"info_label\"><strong>Cybersecurity<\/strong><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1382854112\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1382854112\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-bddcf25 e-con-full e-flex e-con e-child\" data-id=\"bddcf25\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e185992 elementor-widget elementor-widget-text-editor\" data-id=\"e185992\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our in-company training courses are customised, flexible and tailored to the specific needs of your team.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2b2245 elementor-align-center elementor-widget elementor-widget-global elementor-global-8968 elementor-widget-button\" data-id=\"a2b2245\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjYxNTkiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">I WOULD LIKE A QUOTE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e8c41f elementor-button-info elementor-align-justify elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"3e8c41f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download the brochure<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-98f6d9f e-flex e-con-boxed e-con e-parent\" data-id=\"98f6d9f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f60c80 elementor-widget elementor-widget-heading\" data-id=\"4f60c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What you will learn\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bc72b9 elementor-widget elementor-widget-text-editor\" data-id=\"1bc72b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At the end of the course, trainees will be able to apply the fundamental principles, standards and tools of IT security in an operational manner.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7805952 elementor-widget elementor-widget-heading\" data-id=\"7805952\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The target audience for training\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5a983c elementor-widget elementor-widget-text-editor\" data-id=\"d5a983c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Anyone interested in a career in cybersecurity, particularly systems and network technicians and administrators.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-579caa9 elementor-widget elementor-widget-heading\" data-id=\"579caa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training objectives\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aace03e elementor-widget elementor-widget-text-editor\" data-id=\"aace03e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Have a global vision of cybersecurity and its environment (challenges, ecosystem, etc.)<\/li><li>Be familiar with the various cybersecurity guidelines, standards and tools<\/li><li>Understanding cybersecurity-related professions<\/li><li>Understanding the legal obligations relating to cyber security<\/li><li>Understand the main risks and threats and how to protect against them<\/li><li>Identify good practice in IT security.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9df2183 elementor-widget elementor-widget-heading\" data-id=\"9df2183\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Assessment method\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ed7c2c elementor-widget elementor-widget-text-editor\" data-id=\"5ed7c2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Practical exercises at every stage of the course.<\/li><li>A case study linking the different skill blocks.<\/li><li>Quiz at the end of each day's training.<\/li><li>Self-assessment of knowledge acquired by the trainee via a questionnaire.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aeb3725 elementor-widget elementor-widget-heading\" data-id=\"aeb3725\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Trainer<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8561ef8 elementor-widget elementor-widget-text-editor\" data-id=\"8561ef8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>An expert consultant-trainer in cybersecurity, combining technical expertise, field experience and teaching know-how, whose technical, professional and teaching skills have been rigorously assessed and validated as part of our internal selection procedures.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4218c0a elementor-widget elementor-widget-heading\" data-id=\"4218c0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Teaching methods and resources:\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2020fbb elementor-widget elementor-widget-text-editor\" data-id=\"2020fbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The course is based on a balanced combination of theoretical and practical approaches, guaranteeing both the acquisition of knowledge and its operational application:<\/p><ul><li>Structured theoretical input, illustrated by practical examples tailored to the participants' professional context.<\/li><li>Practical exercises at each stage to help you assimilate the knowledge you have acquired.<\/li><li>A case study linking the different skill blocks.<\/li><li>Full educational documentation, supplied in digital format.<\/li><li>Course evaluation questionnaire at the end of the course, analysed by our teaching team.<\/li><li>Certificate of acquired skills sent to the trainee at the end of the course.<\/li><li>End-of-training certificate sent at the same time as the invoice to the company or funding organisation, confirming that the trainee has fully attended the session.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8d25ab elementor-widget elementor-widget-heading\" data-id=\"b8d25ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training prerequisites\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4516f59 elementor-widget elementor-widget-text-editor\" data-id=\"4516f59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>General knowledge of information systems and familiarity with the ANSSI security hygiene guide.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c32c41e elementor-widget elementor-widget-heading\" data-id=\"c32c41e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Course content<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47cd54b elementor-widget elementor-widget-n-accordion\" data-id=\"47cd54b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Module 1: Fundamentals of System and Network Security\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7520\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-7520\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 1 : Introduction et enjeux de la cybers\u00e9curit\u00e9 \u2013 Panorama des menaces et principes fondamentaux <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7520\" class=\"elementor-element elementor-element-7e45716 e-con-full e-flex e-con e-child\" data-id=\"7e45716\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2af96a elementor-widget elementor-widget-text-editor\" data-id=\"e2af96a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 1 - Morning: Introduction and cybersecurity issues\u00a0<\/strong><\/p><ul><li>Introduction and cybersecurity issues<\/li><li>Presentation of the objectives, programme and teaching methods.<\/li><li>Definitions and key concepts of cybersecurity.<\/li><li>IS security issues: business impact, image, compliance.<\/li><li>Profiles and motivations of the attackers (hacktivists, cybercriminals, governments, insiders).<\/li><li>Case study: recent significant incidents and impact analysis.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul><p>\u00a0<\/p><p><strong>Day 1 - Afternoon: Overview of threats and fundamental principles<\/strong><\/p><ul><li>Overview of threats and fundamental principles<\/li><li>Threat typology: APT, phishing, ransomware, fraud, etc.<\/li><li>The pillars of cybersecurity: CIDT (Confidentiality, Integrity, Availability, Traceability).<\/li><li>Exercise to identify security needs based on a concrete scenario.<\/li><li>Vulnerabilities and CVE management.<\/li><li>Demonstration: simple exploitation of a vulnerability.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7521\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7521\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 2 : Connaissance et s\u00e9curisation du Syst\u00e8me d\u2019Information \u2013 Mesures de protection et supervision <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7521\" class=\"elementor-element elementor-element-89e5876 e-con-full e-flex e-con e-child\" data-id=\"89e5876\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df8f5e4 elementor-widget elementor-widget-text-editor\" data-id=\"df8f5e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 2 - Morning: Understanding and securing the Information System<\/strong><\/p><ul><li>Information system knowledge and security<\/li><li>Mapping the IS and its interconnections.<\/li><li>Types of network and associated technologies.<\/li><li>Remote access and secure authentication.<\/li><li>Roles and responsibilities of directors.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul><p><strong>\u00a0<\/strong><\/p><p><strong>\u00a0Day 2 - Afternoon: Protective measures and supervision\u00a0<\/strong><\/p><ul><li>Protective measures and supervision<\/li><li>Securing WiFi.<\/li><li>Hardening of user and mobile workstations.<\/li><li>Physical security.<\/li><li>Incident management: detection, response, communication.<\/li><li>Back-up plan and continuity.<\/li><li>Introduction to security auditing.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7522\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7522\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 3 : Introduction \u00e0 la s\u00e9curit\u00e9 offensive \u2013 M\u00e9thodologie des tests d\u2019intrusion <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7522\" class=\"elementor-element elementor-element-ca6c2a7 e-con-full e-flex e-con e-child\" data-id=\"ca6c2a7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-099e760 elementor-widget elementor-widget-text-editor\" data-id=\"099e760\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 3 - Morning: Introduction to offensive security<\/strong><\/p><ul><li>Introduction to offensive security<\/li><li>The attacker's tools (scanners, exploits, frameworks).<\/li><li>Typology of attacks (physical, systems, networks, web).<\/li><li>APT and advanced targeting.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul><p>\u00a0<\/p><p><strong>Day 3 - Afternoon: Intrusion test methodology \u00a0<\/strong><\/p><ul><li>Intrusion test methodology<\/li><li>Steps in a pentest.<\/li><li>Unified Kill Chain.<\/li><li>Exercise: analysis of an attack scenario.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7523\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7523\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 4 : Phase de reconnaissance \u2013 Reconnaissance active <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7523\" class=\"elementor-element elementor-element-fbd0b9b e-flex e-con-boxed e-con e-child\" data-id=\"fbd0b9b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9c504e elementor-widget elementor-widget-text-editor\" data-id=\"d9c504e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 4 - Morning: Reconnaissance phase<\/strong><\/p><ul><li>Reconnaissance phase<\/li><li>Passive recognition and OSINT (open sources).<\/li><li>Practical exercises: finding information on fictitious targets.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul><p>\u00a0<\/p><p><strong>Day 4 - Afternoon: Active reconnaissance<\/strong><\/p><ul><li>Active recognition<\/li><li>Network and port scans.<\/li><li>Tools: Nmap, Metasploit.<\/li><li>Practical exercises: gathering technical information.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7524\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7524\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 5 : Techniques d\u2019attaque avanc\u00e9es \u2013 Exploitation et post-exploitation <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7524\" class=\"elementor-element elementor-element-8df4acb e-flex e-con-boxed e-con e-child\" data-id=\"8df4acb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-720b65a elementor-widget elementor-widget-text-editor\" data-id=\"720b65a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 5 - Morning: Advanced attack techniques\u00a0<\/strong><\/p><ul><li>Advanced attack techniques<\/li><li>Man-In-The-Middle (MITM).<\/li><li>Exploitation of vulnerabilities (CVE).<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul><p><strong>\u00a0<\/strong><\/p><p><strong>Day 5 - Afternoon: Operation and post-operation<\/strong><\/p><ul><li>Operation and post-operation<\/li><li>Searching for and using operating scripts.<\/li><li>Application attacks.<\/li><li>Installation of a backdoor.<\/li><li>Practical exercises: running a scenario.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7525\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7525\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 6 : S\u00e9curit\u00e9 du r\u00e9seau \u2013 Segmentation et filtrage <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7525\" class=\"elementor-element elementor-element-26880fe e-flex e-con-boxed e-con e-child\" data-id=\"26880fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a542bf2 elementor-widget elementor-widget-text-editor\" data-id=\"a542bf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 6 - Morning: Network security\u00a0<\/strong><\/p><ul><li>Network security<\/li><li>Firewall: principles and configuration.<\/li><li>Antivirus and EDR solutions.<\/li><li>IDS\/IPS.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul><p>.<\/p><p><strong>Day 6 - Afternoon: Segmentation and filtering<\/strong><\/p><ul><li>Segmentation and filtering<\/li><li>Network segmentation.<\/li><li>Practical exercises: setting up a filtering policy.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7526\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7526\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 7 : Cryptographie appliqu\u00e9e \u2013 Protocoles s\u00e9curis\u00e9s <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7526\" class=\"elementor-element elementor-element-8835775 e-flex e-con-boxed e-con e-child\" data-id=\"8835775\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2bb1955 elementor-widget elementor-widget-text-editor\" data-id=\"2bb1955\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 7 - Morning: Applied cryptography<\/strong><\/p><ul><li>Applied cryptography<\/li><li>Symmetrical and asymmetrical encryption.<\/li><li>Digital signatures.<\/li><li>Certification authorities (PKI).<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul><p>\u00a0<\/p><p><strong>Day 7 - Afternoon: Secure protocols\u00a0<\/strong><\/p><ul><li>Secure protocols<\/li><li>VPN, TLS, SSH.<\/li><li>Practical exercises: implementing encryption.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7527\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"8\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7527\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 8 : Hardening syst\u00e8mes \u2013 Hardening Windows et r\u00e9seaux <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7527\" class=\"elementor-element elementor-element-1753d0c e-flex e-con-boxed e-con e-child\" data-id=\"1753d0c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ddf6b6d elementor-widget elementor-widget-text-editor\" data-id=\"ddf6b6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 8 - Morning: Hardening systems\u00a0<a href=\"https:\/\/acgcyberacademy.fr\/en\/events\/parcours-introductif-a-la-cybersecurite\/\">\u00a0<\/a><\/strong><\/p><ul><li>Hardening systems<\/li><li>Methods and best practice.<\/li><li>Linux: services, rights, logging.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul><p><strong>\u00a0<\/strong><\/p><p><strong>Day 8 - Afternoon: Hardening Windows and networks\u00a0<\/strong><\/p><ul><li>Hardening Windows and networks<\/li><li>Group strategies, services, accounts.<\/li><li>Network equipment: hardening and upgrades.<\/li><li>Practical exercises: multi-platform security.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7528\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"9\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7528\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 9 : Gouvernance et normes \u2013 Politiques et m\u00e9tiers de la cybers\u00e9curit\u00e9 <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7528\" class=\"elementor-element elementor-element-73cd1a7 e-flex e-con-boxed e-con e-child\" data-id=\"73cd1a7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d4a3bae elementor-widget elementor-widget-text-editor\" data-id=\"d4a3bae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 9 - Morning: Governance and standards\u00a0<\/strong><\/p><ul><li>Governance and standards<\/li><li>Introduction to ISO 27000.<\/li><li>Security governance and project mode.<\/li><li>User and administrator charters.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul><p>\u00a0<\/p><p><strong>Day 9 - Afternoon :\u00a0\u00a0<\/strong><strong>Cybersecurity policies and professions<\/strong><\/p><ul><li>Cybersecurity policies and professions<\/li><li>PSSI and reference documents.<\/li><li>Overview of professions and roles.<\/li><li>Case study: audit of a fictitious company.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7529\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"10\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7529\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 10 : Tendances et avenir de la cybers\u00e9curit\u00e9 \u2013 Mise en situation finale, restitution et \u00e9valuation finale  acgcyberacademy.fr <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7529\" class=\"elementor-element elementor-element-059ab6f e-flex e-con-boxed e-con e-child\" data-id=\"059ab6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68e1a4a elementor-widget elementor-widget-text-editor\" data-id=\"68e1a4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 10 - Morning: Trends and the future of cybersecurity<\/strong><\/p><ul><li>Cybersecurity trends and the future<\/li><li>New threats and regulatory developments.<\/li><li>Artificial intelligence and cybersecurity.<\/li><li>Defence automation.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul><p>\u00a0<\/p><p><strong>Day 10 - Afternoon: Final role-play, feedback and final assessment<\/strong><\/p><ul><li>Final situation<\/li><li>Case studies incorporating the full range of skills.<\/li><li>Feedback and debriefing.<\/li><li>Closing and final assessment.<\/li><li>Attendance certificates are handed out and participants evaluate the course.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7af79e0 e-con-full e-flex e-con e-parent\" data-id=\"7af79e0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f9592d elementor-widget elementor-widget-spacer\" data-id=\"7f9592d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Parcours introductif \u00e0 la Cybers\u00e9curit\u00e9 R\u00e9f\u00e9rence : ACGCYBER Dur\u00e9e : 10 jours (70 heures) INTER INTRA Co\u00fbt :\u00a0Sur demande Cat\u00e9gorie :\u00a0Cybers\u00e9curit\u00e9 Nos formations intra-entreprise sont personnalis\u00e9es, flexibles et align\u00e9es sur les besoins sp\u00e9cifiques de votre \u00e9quipe. Co\u00fbt :\u00a0Sur demande Cat\u00e9gorie :\u00a0Cybers\u00e9curit\u00e9 Nos formations intra-entreprise sont personnalis\u00e9es, flexibles et align\u00e9es sur les besoins sp\u00e9cifiques de votre [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_glsr_average":0,"_glsr_ranking":0,"_glsr_reviews":0,"footnotes":""},"class_list":["post-19443","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Formation Cybers\u00e9curit\u00e9 Introductive | ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Parcours introductif \u00e0 la cybers\u00e9curit\u00e9 : ma\u00eetrisez les bases, outils et bonnes pratiques avec ACG CyberAcademy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/parcours-introductif-a-la-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Formation Cybers\u00e9curit\u00e9 Introductive | ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Parcours introductif \u00e0 la cybers\u00e9curit\u00e9 : ma\u00eetrisez les bases, outils et bonnes pratiques avec ACG CyberAcademy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/parcours-introductif-a-la-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-06T15:25:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/03\/cropped-cropped-acg-cyber-academy-logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"100\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-introductif-a-la-cybersecurite\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-introductif-a-la-cybersecurite\\\/\",\"name\":\"Formation Cybers\u00e9curit\u00e9 Introductive | ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"datePublished\":\"2025-09-22T10:16:23+00:00\",\"dateModified\":\"2025-11-06T15:25:33+00:00\",\"description\":\"Parcours introductif \u00e0 la cybers\u00e9curit\u00e9 : ma\u00eetrisez les bases, outils et bonnes pratiques avec ACG CyberAcademy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-introductif-a-la-cybersecurite\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-introductif-a-la-cybersecurite\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-introductif-a-la-cybersecurite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Parcours introductif \u00e0 la Cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Formation Cybers\u00e9curit\u00e9 Introductive | ACG CyberAcademy","description":"Parcours introductif \u00e0 la cybers\u00e9curit\u00e9 : ma\u00eetrisez les bases, outils et bonnes pratiques avec ACG CyberAcademy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/parcours-introductif-a-la-cybersecurite\/","og_locale":"en_GB","og_type":"article","og_title":"Formation Cybers\u00e9curit\u00e9 Introductive | ACG CyberAcademy","og_description":"Parcours introductif \u00e0 la cybers\u00e9curit\u00e9 : ma\u00eetrisez les bases, outils et bonnes pratiques avec ACG CyberAcademy.","og_url":"https:\/\/acgcyberacademy.fr\/en\/parcours-introductif-a-la-cybersecurite\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2025-11-06T15:25:33+00:00","og_image":[{"width":200,"height":100,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/03\/cropped-cropped-acg-cyber-academy-logo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/parcours-introductif-a-la-cybersecurite\/","url":"https:\/\/acgcyberacademy.fr\/parcours-introductif-a-la-cybersecurite\/","name":"Formation Cybers\u00e9curit\u00e9 Introductive | ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"datePublished":"2025-09-22T10:16:23+00:00","dateModified":"2025-11-06T15:25:33+00:00","description":"Parcours introductif \u00e0 la cybers\u00e9curit\u00e9 : ma\u00eetrisez les bases, outils et bonnes pratiques avec ACG CyberAcademy.","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/parcours-introductif-a-la-cybersecurite\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/parcours-introductif-a-la-cybersecurite\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/parcours-introductif-a-la-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Parcours introductif \u00e0 la Cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/19443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=19443"}],"version-history":[{"count":16,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/19443\/revisions"}],"predecessor-version":[{"id":21534,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/19443\/revisions\/21534"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=19443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}