


{"id":4640,"date":"2022-06-28T11:09:18","date_gmt":"2022-06-28T09:09:18","guid":{"rendered":"https:\/\/www.editions-eni.fr\/blog\/?p=4640"},"modified":"2022-10-17T14:52:01","modified_gmt":"2022-10-17T12:52:01","slug":"quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage","status":"publish","type":"post","link":"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/","title":{"rendered":"Quelle certification Microsoft choisir en mati\u00e8re de s\u00e9curit\u00e9 ? D\u00e9cryptage."},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px||false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221;]<\/p>\n<p>Des <strong>ran\u00e7ongiciels<\/strong> \u00e0 la <strong>cyberguerre<\/strong> internationale, <strong>les menaces en mati\u00e8re de s\u00e9curit\u00e9 informatique sont omnipr\u00e9sentes<\/strong>. Dans ce contexte, la s\u00e9curisation des environnements informatiques est devenue une priorit\u00e9 pour les entreprises. Mais le <strong>manque de profils comp\u00e9tents<\/strong> en mati\u00e8re de cybers\u00e9curit\u00e9 ne cesse de cro\u00eetre&#8230; Sur les premiers mois de l\u2019ann\u00e9e 2022, 71% des employeurs ont d\u00e9j\u00e0 subi des dommages en raison d\u2019une p\u00e9nurie de talents.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; custom_padding=&#8221;|0px||||&#8221;]<\/p>\n<p>Pour \u00eatre au rendez-vous des enjeux de la cybers\u00e9curit\u00e9, la formation semble \u00eatre la solution la plus efficace. Mais <strong>comment se rep\u00e9rer parmi les formations certifiantes\u00a0?<\/strong> \u00c0 titre d\u2019exemple, <strong>Microsoft propose pas moins de six certifications diff\u00e9rentes<\/strong> sur les questions de s\u00e9curit\u00e9, conformit\u00e9 et identit\u00e9. <strong>Nous les d\u00e9cryptons pour vous.<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;21px||0px||false|false&#8221;]<\/p>\n<h3 style=\"text-align: left;\"><span style=\"color: #333399;\">\u00c9clairage sur les certifications Microsoft <\/span><span style=\"color: #333399;\">en S\u00e9curit\u00e9, Conformit\u00e9 et Identit\u00e9 (SCI)<\/span><o:p><\/o:p><\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-19px|||||&#8221; custom_padding=&#8221;20px||20px||false|false&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-24px|auto|0px|auto|false|false&#8221; custom_padding=&#8221;30px||0px||false|false&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;display:flex;&#8221; custom_css_main_element_phone=&#8221;display:inherit;&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/07\/securiser_son_pc-01-1.jpg&#8221; alt=&#8221;s\u00e9curiser son pc 01&#8243; title_text=&#8221;securiser son pc&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width=&#8221;74%&#8221; custom_margin=&#8221;1px||-3px|||&#8221; custom_padding=&#8221;|16px||||&#8221; animation_style=&#8221;bounce&#8221; animation_direction=&#8221;left&#8221; border_radii=&#8221;off||2000px|2000px|&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text quote_border_color=&#8221;#3BB6D5&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; width=&#8221;99.3%&#8221; custom_margin=&#8221;|||-64px||&#8221; custom_padding=&#8221;|||8px||&#8221;]<\/p>\n<p>En tant qu\u2019\u00e9diteur de services cloud avec Microsoft 365 et Microsoft Azure, le g\u00e9ant am\u00e9ricain de l\u2019informatique ne pouvait faire l\u2019impasse sur les questions de s\u00e9curit\u00e9.<\/p>\n<p>Ainsi, <strong>Microsoft a d\u00e9velopp\u00e9 plusieurs options de formations certifiantes<\/strong> qui permettent d\u2019acqu\u00e9rir et de d\u00e9montrer un certain niveau de comp\u00e9tences op\u00e9rationnelles e<strong>n mati\u00e8re de s\u00e9curit\u00e9, d\u2019identit\u00e9 et de conformit\u00e9<\/strong>.<\/p>\n<p>Ces formations peuvent \u00eatre <strong>regroup\u00e9es selon deux approches\u00a0<\/strong>:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px||20px||false|false&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3>1. Une approche produit<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>Garantir une protection avanc\u00e9e de ses services fait partie des priorit\u00e9s strat\u00e9giques de Microsoft, qui propose des formations certifiantes pour renforcer et valider ses comp\u00e9tences en s\u00e9curit\u00e9 autour de ses deux produits phares : Microsoft 365 et Microsoft Azure.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4><span style=\"color: #333399;\"><strong>Administration de la s\u00e9curit\u00e9 Microsoft 365 (MS-500)<\/strong><\/span><\/h4>\n<p>Cette formation, qui pr\u00e9pare \u00e0 l\u2019examen de certification <a href=\"https:\/\/www.eni-service.fr\/index.php\/certification\/microsoft-365-certified-security-administrator-associate\/\">Microsoft 365 Certified : Security Administrator Associate<\/a>, apprend \u00e0 <strong>s\u00e9curiser de mani\u00e8re proactive les environnements d\u2019entreprise et hybrides Microsoft\u00a0365.<\/strong><\/p>\n<p>Secure Score, protection Exchange Online, protection avanc\u00e9e contre les menaces (ATP) Azure, protection avanc\u00e9e contre les menaces (ATP) Windows Defender, gestion des menaces\u00a0: tous ces sujets y sont abord\u00e9s.<\/p>\n<p>Un <strong>incontournable<\/strong> pour apprendre \u00e0 mieux g\u00e9rer la protection contre les menaces et la protection des informations\u00a0!<\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"color: #333399;\"><strong>Technologies de s\u00e9curit\u00e9 Microsoft Azure (AZ-500)<\/strong><\/span><\/h4>\n<p>Cette formation certifiante <strong>pr\u00e9pare au statut d\u2019ing\u00e9nieur S\u00e9curit\u00e9 Azure<\/strong>, dont le r\u00f4le est de maintenir l\u2019\u00e9tat de la s\u00e9curit\u00e9, d\u2019identifier et de corriger les vuln\u00e9rabilit\u00e9s, d\u2019effectuer une mod\u00e9lisation des menaces, de mettre en \u0153uvre une protection et de r\u00e9pondre aux escalades des incidents de s\u00e9curit\u00e9.<\/p>\n<p>Ses capacit\u00e9s op\u00e9rationnelles\u00a0? G\u00e9rer l\u2019identit\u00e9 et l\u2019acc\u00e8s, mettre en \u0153uvre une protection de plateforme, g\u00e9rer les op\u00e9rations de s\u00e9curit\u00e9, s\u00e9curiser les donn\u00e9es et les applications. Autant de comp\u00e9tences mesur\u00e9es lors de l\u2019examen de certification.<\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"color: #333399;\"><strong>Microsoft 365 \u2013 Gestion de la mobilit\u00e9 et de la s\u00e9curit\u00e9 (MS101)<\/strong><\/span><\/h4>\n<p>Avec les nombreuses possibilit\u00e9s qu\u2019offre Microsoft 365, il est important de pouvoir \u00e0 la fois s\u00e9curiser <strong>son organisation mais aussi la collecte des donn\u00e9es et la gestion des appareils<\/strong>. C\u2019est tout l\u2019objectif de cette formation.<\/p>\n<p>Elle permet aussi de pr\u00e9parer la certification\u00a0<a href=\"https:\/\/www.eni-service.fr\/index.php\/certification\/microsoft-365-certified-enterprise-administrator-expert\/\" target=\"_blank\" rel=\"noopener\">Microsoft Certified Microsoft 365 Enterprise Administrator Expert<\/a> lorsqu\u2019elle est compl\u00e9t\u00e9e par la MS-100.<\/p>\n<p>S\u00e9curit\u00e9, conformit\u00e9, gestion des menaces, gouvernances et gestion des appareils, dont les p\u00e9riph\u00e9riques mobiles, dans Microsoft 365 sont au programme tout comme l\u2019acquisition de connaissances et comp\u00e9tences pour g\u00e9rer le volet Intune.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px||20px||false|false&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-15px|auto||auto||&#8221; custom_padding=&#8221;||||false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3>2. Une approche par type de comp\u00e9tence<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>D\u2019autres formations Microsoft visent \u00e0 renforcer les comp\u00e9tences en s\u00e9curit\u00e9 informatique des professionnels en poste, selon leur sp\u00e9cialit\u00e9\u00a0:<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h4><span style=\"color: #333399;\"><strong>Principes de base de Microsoft en mati\u00e8re de s\u00e9curit\u00e9, de conformit\u00e9 et d\u2019identit\u00e9 (SC900)<\/strong><\/span><\/h4>\n<p>Destin\u00e9 \u00e0 un <strong>public large<\/strong>, cette formation certifiante familiarise avec les <strong>principes fondamentaux<\/strong> de la s\u00e9curit\u00e9, de la conformit\u00e9 et de l\u2019identit\u00e9 (SCI) dans les services Microsoft bas\u00e9s sur le cloud et ses connexes.<\/p>\n<p>Elle a vocation \u00e0 <strong>valider des connaissances g\u00e9n\u00e9rales<\/strong> concernant les solutions de s\u00e9curit\u00e9, de conformit\u00e9 et d\u2019identit\u00e9 de Microsoft, en ouvrant \u00e0 la certification <a href=\"https:\/\/www.eni-service.fr\/index.php\/certification\/microsoft-certified-security-compliance-and-identity-fundamentals\/\">Microsoft Certified : Security, Compliance, and Identity Fundamentals<\/a>.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;40px|||||&#8221;]<\/p>\n<h4><span style=\"color: #333399;\"><strong>Administrateur des identit\u00e9s et des acc\u00e8s Microsoft (SC-300)<\/strong><\/span><\/h4>\n<p>Cette formation fournit aux responsables de la gestion des identit\u00e9s les connaissances et comp\u00e9tences n\u00e9cessaires pour <strong>concevoir et mettre en \u0153uvre des solutions de gestion des identit\u00e9s bas\u00e9es sur Microsoft Azure Active Directory<\/strong> (Azure AD) et les technologies d&#8217;identit\u00e9 connect\u00e9es.<\/p>\n<p>Pr\u00e9parant au passage de la certification <a href=\"https:\/\/www.eni-service.fr\/index.php\/certification\/microsoft-certified-identity-and-access-administrator-associate\/\">Microsoft Certified : Identity and Access Administrator Associate<\/a>, elle forme au r\u00f4le d\u2019administrateur des identit\u00e9s et des acc\u00e8s Microsoft.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-22px|||||&#8221;]<\/p>\n<h4><span style=\"color: #333399;\"><strong>Administrer la protection des informations (SC-400)<\/strong><\/span><\/h4>\n<p>La \u00a0certification <a href=\"https:\/\/www.eni-service.fr\/index.php\/certification\/microsoft-certified-information-protection-administrator-associate\/\">Microsoft Certified : Information Protection Administrator Associate<\/a> pr\u00e9pare \u00e0 assumer la responsabilit\u00e9 de <strong>traduire les exigences et les contr\u00f4les de conformit\u00e9 en mise en \u0153uvre technique<\/strong>.<\/p>\n<p>Elle couvre notamment la mise en \u0153uvre des politiques de pr\u00e9vention des pertes de donn\u00e9es, les types d&#8217;informations sensibles, les \u00e9tiquettes de sensibilit\u00e9, les politiques de conservation des donn\u00e9es et le cryptage des messages Office 365.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;14px|||||&#8221;]<\/p>\n<h4><span style=\"color: #333399;\"><strong>Analyste des op\u00e9rations de s\u00e9curit\u00e9 Microsoft (SC-200)<\/strong><\/span><\/h4>\n<p>S\u2019adressant aux <strong>personnes en charge de la surveillance des syst\u00e8mes<\/strong>, cette formation pr\u00e9pare au r\u00f4le d\u2019analyste des op\u00e9rations de s\u00e9curit\u00e9. Sa <strong>mission\u00a0: r\u00e9duire les risques organisationnels<\/strong> en rem\u00e9diant rapidement aux attaques actives dans l\u2019environnement. Il a pour responsabilit\u00e9 la gestion, le monitoring et la r\u00e9ponse aux menaces \u00e0 l\u2019aide de Microsoft Azure Sentinel, Azure Defender et Microsoft 365 Defender.<\/p>\n<p>Candidater \u00e0 la certification <a href=\"https:\/\/www.eni-service.fr\/index.php\/certification\/microsoft-certified-security-operations-analyst-associate\/\">Microsoft Certified : Security Operations Analyst Associate<\/a> suppose une bonne connaissance op\u00e9rationnelle de ces outils.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px||20px||false|false&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3>Pourquoi se former \u00e0 la s\u00e9curit\u00e9 informatique\u00a0?<o:p><\/o:p><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>Le passage d\u2019une <strong>certification<\/strong> constitue un <strong>avantage consid\u00e9rable<\/strong>. C\u2019est la garantie d\u2019un niveau de comp\u00e9tences op\u00e9rationnelles r\u00e9elles.<\/p>\n<p>Ainsi, <strong>35% des professionnels informatiques certifi\u00e9s d\u00e9clarent \u00eatre plus influents<\/strong> lors du d\u00e9ploiement du cloud computing par rapport \u00e0 leurs homologues et 36% d\u00e9clarent que la certification Microsoft les aide \u00e0 accomplir des t\u00e2ches complexes avec plus d\u2019assurance.<\/p>\n<p>En outre, devenir un professionnel certifi\u00e9 Microsoft ouvre les portes vers de <strong>nombreuses opportunit\u00e9s de carri\u00e8re<\/strong> sur des m\u00e9tiers tr\u00e8s recherch\u00e9s. Le besoin de professionnels qualifi\u00e9s atteint aujourd\u2019hui un niveau record. Et qui dit m\u00e9tier en tension, dit r\u00e9mun\u00e9ration \u00e9lev\u00e9e comme le montre la <a href=\"https:\/\/www.blogdumoderateur.com\/salaires-metiers-cybersecurite-2022\/\">derni\u00e8re \u00e9tude sur les salaires<\/a> en 2022.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.0&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243;]<\/p>\n<h2>Pour aller <span style=\"color: #3bb6d5;\">plus loin<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#3BB6D5&#8243; divider_position=&#8221;center&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.9.0&#8243; max_width=&#8221;90px&#8221; max_width_tablet=&#8221;13%&#8221; max_width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;5px||||false|false&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;display:flex;&#8221; custom_css_main_element_phone=&#8221;display:inherit;&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/presentiel-system.jpg&#8221; alt=&#8221;formation en live&#8221; title_text=&#8221;formation en live&#8221; url=&#8221;https:\/\/www.eni-service.fr\/index.php\/fomation\/microsoft-365-administration-de-la-securite\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221;]<\/p>\n<p>Formation MS-500<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221;]<\/p>\n<p><strong>Microsoft 365 : Administration de la s\u00e9curit\u00e9\u00a0<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/presentiel-system.jpg&#8221; alt=&#8221;formation en live&#8221; title_text=&#8221;formation en live&#8221; url=&#8221;https:\/\/www.eni-service.fr\/index.php\/fomation\/microsoft-azure-technologies-de-securite\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221;]<\/p>\n<p>Formation AZ-500<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221;]<\/p>\n<p><strong>Microsoft Azure : Technologies de s\u00e9curit\u00e9<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/presentiel-web.jpg&#8221; alt=&#8221;formation en live&#8221; title_text=&#8221;presentiel-web&#8221; url=&#8221;https:\/\/www.eni-service.fr\/index.php\/fomation\/microsoft-securite-notions-fondamentales-sur-lidentite-la-conformite-et-la-securite\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221;]<\/p>\n<p>Formation SC-900<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221;]<\/p>\n<p><strong>Microsoft S\u00e9curit\u00e9 : Notions fondamentales sur l\u2019identit\u00e9, la conformit\u00e9 et la s\u00e9curit\u00e9<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/presentiel-bureautique.jpg&#8221; alt=&#8221;formation en live&#8221; title_text=&#8221;formation en live&#8221; url=&#8221;https:\/\/www.eni-service.fr\/index.php\/fomation\/microsoft-securite-administrer-les-identites-et-les-acces\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221;]<\/p>\n<p>Formation SC-300<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221;]<\/p>\n<p><strong>Microsoft S\u00e9curit\u00e9 : Administrer les identit\u00e9s et les acc\u00e8s<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Des ran\u00e7ongiciels \u00e0 la cyberguerre internationale, les menaces en mati\u00e8re de s\u00e9curit\u00e9 informatique sont omnipr\u00e9sentes. Dans ce contexte, la s\u00e9curisation des environnements informatiques est devenue une priorit\u00e9 pour les entreprises. Mais le manque de profils comp\u00e9tents en mati\u00e8re de cybers\u00e9curit\u00e9 ne cesse de cro\u00eetre&#8230; Sur les premiers mois de l\u2019ann\u00e9e 2022, 71% des employeurs ont [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":4641,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[11,5],"tags":[],"genre":[],"class_list":["post-4640","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-formation","category-securite-informatique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Quelle certification Microsoft choisir en mati\u00e8re de s\u00e9curit\u00e9 ? D\u00e9cryptage. - Eni Blog<\/title>\n<meta name=\"description\" content=\"Pour r\u00e9pondre aux enjeux de la cybers\u00e9curit\u00e9, se former semble la solution la plus efficace. Mais quelle certification choisir ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quelle certification Microsoft choisir en mati\u00e8re de s\u00e9curit\u00e9 ? D\u00e9cryptage. - Eni Blog\" \/>\n<meta property=\"og:description\" content=\"Pour r\u00e9pondre aux enjeux de la cybers\u00e9curit\u00e9, se former semble la solution la plus efficace. Mais quelle certification choisir ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/\" \/>\n<meta property=\"og:site_name\" content=\"Eni Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-28T09:09:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-17T12:52:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2022\/06\/bandeau_securite_microsoft.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Am\u00e9lie Delfieux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Am\u00e9lie Delfieux\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/\",\"name\":\"Quelle certification Microsoft choisir en mati\u00e8re de s\u00e9curit\u00e9 ? D\u00e9cryptage. - Eni Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2022\/06\/bandeau_securite_microsoft.jpg\",\"datePublished\":\"2022-06-28T09:09:18+00:00\",\"dateModified\":\"2022-10-17T12:52:01+00:00\",\"author\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/ea05677c974724fdc8b2557a3b6430bb\"},\"description\":\"Pour r\u00e9pondre aux enjeux de la cybers\u00e9curit\u00e9, se former semble la solution la plus efficace. Mais quelle certification choisir ?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/#primaryimage\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2022\/06\/bandeau_securite_microsoft.jpg\",\"contentUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2022\/06\/bandeau_securite_microsoft.jpg\",\"width\":1920,\"height\":680},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.editions-eni.fr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quelle certification Microsoft choisir en mati\u00e8re de s\u00e9curit\u00e9 ? D\u00e9cryptage.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/\",\"name\":\"Eni Blog\",\"description\":\"Blog des Editions ENI\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/ea05677c974724fdc8b2557a3b6430bb\",\"name\":\"Am\u00e9lie Delfieux\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/author\/adelfieux\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quelle certification Microsoft choisir en mati\u00e8re de s\u00e9curit\u00e9 ? D\u00e9cryptage. - Eni Blog","description":"Pour r\u00e9pondre aux enjeux de la cybers\u00e9curit\u00e9, se former semble la solution la plus efficace. Mais quelle certification choisir ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/","og_locale":"fr_FR","og_type":"article","og_title":"Quelle certification Microsoft choisir en mati\u00e8re de s\u00e9curit\u00e9 ? D\u00e9cryptage. - Eni Blog","og_description":"Pour r\u00e9pondre aux enjeux de la cybers\u00e9curit\u00e9, se former semble la solution la plus efficace. Mais quelle certification choisir ?","og_url":"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/","og_site_name":"Eni Blog","article_published_time":"2022-06-28T09:09:18+00:00","article_modified_time":"2022-10-17T12:52:01+00:00","og_image":[{"width":1920,"height":680,"url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2022\/06\/bandeau_securite_microsoft.jpg","type":"image\/jpeg"}],"author":"Am\u00e9lie Delfieux","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Am\u00e9lie Delfieux","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/","url":"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/","name":"Quelle certification Microsoft choisir en mati\u00e8re de s\u00e9curit\u00e9 ? D\u00e9cryptage. - Eni Blog","isPartOf":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/#primaryimage"},"image":{"@id":"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/#primaryimage"},"thumbnailUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2022\/06\/bandeau_securite_microsoft.jpg","datePublished":"2022-06-28T09:09:18+00:00","dateModified":"2022-10-17T12:52:01+00:00","author":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/ea05677c974724fdc8b2557a3b6430bb"},"description":"Pour r\u00e9pondre aux enjeux de la cybers\u00e9curit\u00e9, se former semble la solution la plus efficace. Mais quelle certification choisir ?","breadcrumb":{"@id":"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/#primaryimage","url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2022\/06\/bandeau_securite_microsoft.jpg","contentUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2022\/06\/bandeau_securite_microsoft.jpg","width":1920,"height":680},{"@type":"BreadcrumbList","@id":"https:\/\/www.editions-eni.fr\/blog\/quelle-certification-microsoft-choisir-en-matiere-de-securite-decryptage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.editions-eni.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"Quelle certification Microsoft choisir en mati\u00e8re de s\u00e9curit\u00e9 ? D\u00e9cryptage."}]},{"@type":"WebSite","@id":"https:\/\/www.editions-eni.fr\/blog\/#website","url":"https:\/\/www.editions-eni.fr\/blog\/","name":"Eni Blog","description":"Blog des Editions ENI","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/ea05677c974724fdc8b2557a3b6430bb","name":"Am\u00e9lie Delfieux","url":"https:\/\/www.editions-eni.fr\/blog\/author\/adelfieux\/"}]}},"_links":{"self":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/4640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/comments?post=4640"}],"version-history":[{"count":4,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/4640\/revisions"}],"predecessor-version":[{"id":4727,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/4640\/revisions\/4727"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media\/4641"}],"wp:attachment":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media?parent=4640"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/categories?post=4640"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/tags?post=4640"},{"taxonomy":"genre","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/genre?post=4640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}