


{"id":560,"date":"2021-06-04T11:10:04","date_gmt":"2021-06-04T09:10:04","guid":{"rendered":"https:\/\/preprod.editions-eni.fr\/blog\/?p=560"},"modified":"2023-12-06T09:23:39","modified_gmt":"2023-12-06T08:23:39","slug":"administrer-ses-reseaux-informatiques-5-competences-indispensables","status":"publish","type":"post","link":"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/","title":{"rendered":"Administrer ses r\u00e9seaux informatiques : 5 comp\u00e9tences indispensables"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px||false|false&#8221;][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/icon_systemes-reseaux.png&#8221; alt=&#8221;systemes-reseaux&#8221; title_text=&#8221;icon_systemes-reseaux&#8221; align_tablet=&#8221;&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p><strong>L\u2019administration des syst\u00e8mes et r\u00e9seaux<\/strong><span>\u00a0<\/span>s\u2019est fortement d\u00e9velopp\u00e9e depuis 30 ans, du fait de la g\u00e9n\u00e9ralisation du \u00ab tout distribu\u00e9 \u00bb avec la<span>\u00a0<\/span><strong>norme TCP\/IP<\/strong><span>\u00a0<\/span>qui s\u2019est v\u00e9ritablement impos\u00e9e.<\/p>\n<p>Les<span>\u00a0<\/span><strong>syst\u00e8mes d\u2019exploitation ont fortement \u00e9volu\u00e9<\/strong><span>\u00a0<\/span>pour converger principalement vers les<span>\u00a0<\/span><a href=\"https:\/\/www.editions-eni.fr\/livre\/les-reseaux-administrez-un-reseau-sous-windows-ou-sous-linux-exercices-et-corriges-6e-edition-9782409025860\" target=\"_blank\" rel=\"noopener noreferrer\">syst\u00e8mes Unix\/Linux et Windows<\/a>. Sur les<span>\u00a0<\/span><strong>r\u00e9seaux locaux, Ethernet<\/strong><span>\u00a0<\/span>a \u00e9t\u00e9 le grand vainqueur, tandis que dans le m\u00eame temps les \u00ab Cisco Acad\u00e9mies \u00bb se d\u00e9veloppaient pour<span>\u00a0<\/span><a href=\"https:\/\/www.eni-service.fr\/index.php\/fomation\/cisco-prise-en-main-et-gestion-de-base-des-equipements\/\" target=\"_blank\" rel=\"noopener noreferrer\">former des centaines de milliers de personnes aux technologies r\u00e9seaux CISCO<\/a>.<\/p>\n<p>Aujourd\u2019hui, l\u2019<strong>Administrateur Syst\u00e8mes et R\u00e9seaux<\/strong><span>\u00a0<\/span>doit \u00eatre en mesure de<span>\u00a0<\/span><strong>ma\u00eetriser les syst\u00e8mes d\u2019exploitation les plus courants<\/strong><span>\u00a0<\/span>mais aussi<span>\u00a0<\/span><strong>\u00eatre capable de configurer ses \u00e9quipements d\u2019interconnexions (commutateurs et routeurs)<\/strong><span>\u00a0<\/span>pour g\u00e9rer l\u2019ensemble de son environnement.<\/p>\n<p>L\u2019activit\u00e9 de l\u2019Administrateur a \u00e9volu\u00e9 progressivement vers l\u2019<strong>automatisation<\/strong>, la<span>\u00a0<\/span><strong>planification<\/strong>, de l\u2019ex\u00e9cution des t\u00e2ches r\u00e9p\u00e9titives dans un contexte de processus formalis\u00e9s autour des changements, au sens ITIL du terme, dans un contexte o\u00f9 les serveurs, voire les postes de travail, sont g\u00e9r\u00e9s par une couche de virtualisation (<a href=\"https:\/\/www.editions-eni.fr\/livre\/vmware-vsphere-6-concevoir-une-infrastructure-de-virtualisation-complement-video-haute-disponibilite-vmotion-vsan-et-equilibrage-de-charge-9782409019715\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>VMWare Sphere, Microsoft Hyper-V<\/strong><\/a>).<\/p>\n<p>Une<span>\u00a0<\/span><strong>connaissance<\/strong><span>\u00a0<\/span>globale est indispensable et doit inclure des<span>\u00a0<\/span><strong>concepts fondamentaux<\/strong><span>\u00a0<\/span>tels que les notions de<span>\u00a0<\/span><strong>sauvegarde<\/strong>, de<span>\u00a0<\/span><strong>restauration<\/strong>, de<span>\u00a0<\/span><strong>s\u00e9curit\u00e9<\/strong>, les r\u00f4les des diff\u00e9rentes briques de l\u2019<strong><a href=\"https:\/\/www.editions-eni.fr\/livre\/reseaux-informatiques-notions-fondamentales-8e-edition-protocoles-architectures-reseaux-sans-fil-virtualisation-securite-ipv6-9782409021398\" target=\"_blank\" rel=\"noopener noreferrer\">architecture<\/a>, \u00e9quilibre de charge, tol\u00e9rance de panne, redondance, virtualisation ou maintien en conditions op\u00e9rationnelles (MCO)<\/strong>.<\/p>\n<p>Notre expert Jos\u00e9 Dordoigne vous partage les<span>\u00a0<\/span><strong>5 comp\u00e9tences indispensables \u00e0 l\u2019Administrateur Syst\u00e8mes et R\u00e9seaux<\/strong><span>\u00a0<\/span>!<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;20px||20px||false|false&#8221; custom_padding_phone=&#8221;0px||0px||false|false&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;display:flex;&#8221; custom_css_main_element_phone=&#8221;display:inherit;&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/tcp-ip.jpg&#8221; alt=&#8221;TCP\/IP&#8221; title_text=&#8221;tcp-ip&#8221; src_tablet=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/tcp-ip.jpg&#8221; src_phone=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/tcp-ip.jpg&#8221; src_last_edited=&#8221;on|phone&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;89%&#8221; animation_style=&#8221;bounce&#8221; animation_direction=&#8221;left&#8221; border_radii=&#8221;off||2000px|2000px|&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3 data-menu=\"La compr\u00e9hension des concepts r\u00e9seau et mat\u00e9riels utilis\u00e9s\" id=\"item1-1\">Comp\u00e9tence n\u00b01<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin_tablet=&#8221;||10px||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221;]<\/p>\n<h3 data-menu=\"La compr\u00e9hension des concepts r\u00e9seau et mat\u00e9riels utilis\u00e9s\" id=\"item1-1\">La compr\u00e9hension des concepts r\u00e9seau et mat\u00e9riels utilis\u00e9s.<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>De tr\u00e8s nombreux concepts doivent \u00eatre appr\u00e9hend\u00e9s pour comprendre le fonctionnement global d\u2019un\u00a0<\/span><strong>environnement distribu\u00e9 TCP\/IP<\/strong><span>, les\u00a0<\/span><strong>composants logiciels et mat\u00e9riels<\/strong><span>\u00a0utilis\u00e9s, le\u00a0<\/span><strong>client-Serveur<\/strong><span>, la topologie des r\u00e9seaux, les services mis en jeu, la\u00a0<\/span><strong>virtualisation<\/strong><span>, la continuit\u00e9 d\u2019activit\u00e9, ainsi que les solutions mises en jeu pour assurer cette continuit\u00e9 : redondance, sauvegardes. Le principe des couches OSI reste un \u00e9l\u00e9ment important pour d\u00e9tailler chaque fonction au travers d\u2019un mod\u00e8le normalis\u00e9.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;20px||20px||false|false&#8221; custom_padding_phone=&#8221;0px||0px||false|false&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; module_class=&#8221;custom_row&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;display:flex;||align-items:center;&#8221; custom_css_main_element_phone=&#8221;display:inherit;&#8221;][et_pb_column type=&#8221;3_5&#8243; module_class=&#8221;second-on-mobile&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3 data-menu=\"La connaissance les principaux syst\u00e8mes d\u2019exploitations r\u00e9seau et la virtualisation\" id=\"item2-1\">Comp\u00e9tence n\u00b02<span>\u00a0<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin_tablet=&#8221;||10px||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;1px|||||&#8221;]<\/p>\n<h3 data-menu=\"La connaissance les principaux syst\u00e8mes d\u2019exploitations r\u00e9seau et la virtualisation\" id=\"item2-1\">La connaissance, les principaux syst\u00e8mes d&#8217;exploitations r\u00e9seau et la virtualisation.<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;]La connaissance minimale des<span>\u00a0<\/span><strong>syst\u00e8mes<span>\u00a0<\/span><a href=\"https:\/\/www.editions-eni.fr\/livre\/windows-server-2019-infrastructure-reseau-9782409026638\" target=\"_blank\" rel=\"noopener noreferrer\">Windows<\/a><span>\u00a0<\/span>et<span>\u00a0<\/span><a href=\"https:\/\/www.editions-eni.fr\/livre\/linux-maitrisez-l-administration-du-systeme-6e-edition-9782409025716\" target=\"_blank\" rel=\"noopener noreferrer\">Linux<\/a><\/strong><span>\u00a0<\/span>est indispensable. Le fait de<span>\u00a0<\/span><strong>les installer et de les configurer permet d\u2019acqu\u00e9rir des connaissances minimales sur le sujet<\/strong>. Ceux-ci \u00e9tant souvent ex\u00e9cut\u00e9s au sein d\u2019un hyperviseur, il est important de bien<span>\u00a0<\/span><strong>comprendre comment fonctionne la<span>\u00a0<\/span><a href=\"https:\/\/www.editions-eni.fr\/livre\/reseaux-informatiques-notions-fondamentales-8e-edition-protocoles-architectures-reseaux-sans-fil-virtualisation-securite-ipv6-9782409021398\" target=\"_blank\" rel=\"noopener noreferrer\">virtualisation<\/a><\/strong><span>\u00a0<\/span>\u00e9galement&nbsp;:<span>\u00a0<\/span><strong>allocation de ressources virtualis\u00e9es, int\u00e9gration du r\u00e9seau<\/strong><span>\u00a0<\/span>entre l\u2019h\u00f4te et l\u2019invit\u00e9\u2026<\/p>\n<p>Au travers d\u2019eux, comment la<span>\u00a0<\/span><strong>connectivit\u00e9<\/strong><span>\u00a0<\/span>est mise en \u0153uvre au travers de l\u2019<strong>adressage IP<\/strong><span>\u00a0<\/span>est primordiale ; la notion de<span>\u00a0<\/span><strong>routage<\/strong>, de<span>\u00a0<\/span><strong>sous-r\u00e9seaux<\/strong><span>\u00a0<\/span>dans un<span>\u00a0<\/span><strong>environnement interconnect\u00e9<\/strong><span>\u00a0<\/span>constitue un pr\u00e9requis essentiel pour pouvoir<span>\u00a0<\/span><strong>administrer les syst\u00e8mes<\/strong>. La virtualisation \u00e9tant omnipr\u00e9sente, il convient, en tant qu\u2019utilisateur de la solution, mais pas que, de comprendre les concepts mis en jeu.[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; module_class=&#8221;first-on-mobile&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/virutalisation.jpg&#8221; alt=&#8221;Virtualisation&#8221; title_text=&#8221;virutalisation&#8221; align=&#8221;right&#8221; src_last_edited=&#8221;off|desktop&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;89%&#8221; animation_style=&#8221;bounce&#8221; animation_direction=&#8221;right&#8221; border_radii=&#8221;off|2000px|||2000px&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;display:flex;&#8221; custom_css_main_element_phone=&#8221;display:inherit;&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/routeur.jpg&#8221; alt=&#8221;Routeur&#8221; title_text=&#8221;routeur&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;89%&#8221; animation_style=&#8221;bounce&#8221; animation_direction=&#8221;left&#8221; border_radii=&#8221;off||2000px|2000px|&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3>Comp\u00e9tence n\u00b03<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin_tablet=&#8221;||10px||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h4>La configuration des \u00e9quipements r\u00e9seaux (commutateurs, routeurs).<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>Afin d\u2019\u00eatre \u00e0 l\u2019aise en tant qu\u2019administrateur Syst\u00e8mes et R\u00e9seaux, il convient de comprendre le\u00a0<\/span><strong>fonctionnement des \u00e9quipements d\u2019interconnexion<\/strong><span>\u00a0: niveau 2, niveau 3. Le fait de comprendre comment ils sont configur\u00e9s et comment ils agissent en fonction du mod\u00e8le OSI est essentiel si l\u2019on souhaite\u00a0<\/span><strong>\u00eatre reconnu comme Administrateur Syst\u00e8mes et R\u00e9seaux<\/strong><span>. La mise en \u0153uvre d\u2019un environnement comportant des\u00a0<\/span><strong>\u00e9quipements de type<span>\u00a0<\/span><a href=\"https:\/\/www.editions-eni.fr\/livre\/cisco-configurez-routeurs-et-commutateurs-exercices-et-corriges-5e-edition-9782409014376\" target=\"_blank\" rel=\"noopener noreferrer\">commutateur et routeur<\/a><\/strong><span>\u00a0permet de valider la compr\u00e9hension des t\u00e2ches incombant \u00e0 l\u2019administrateur. L\u2019administrateur doit \u00e9galement pouvoir proposer un\u00a0<\/span><strong>plan d\u2019adressage IP global<\/strong><span>\u00a0incluant tous les\u00a0<\/span><strong>param\u00e8tres TCP\/IP<\/strong><span>\u00a0et prenant en compte la configuration centralis\u00e9e.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; module_class=&#8221;custom_row&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;display:flex;&#8221; custom_css_main_element_phone=&#8221;display:inherit;&#8221;][et_pb_column type=&#8221;3_5&#8243; module_class=&#8221;second-on-mobile&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3>Comp\u00e9tence n\u00b04<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin_tablet=&#8221;||10px||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;1px|||||&#8221;]<\/p>\n<h4>La s\u00e9curisation des syst\u00e8mes.<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>La s\u00e9curit\u00e9 est aujourd\u2019hui omnipr\u00e9sente.\u00a0<\/span><strong>Les syst\u00e8mes doivent \u00eatre toujours \u00e0 jour des derniers correctifs de s\u00e9curit\u00e9<\/strong><span>, mais il est \u00e9galement n\u00e9cessaire de s\u2019outiller pour\u00a0<\/span><strong>\u00eatre en mesure de d\u00e9tecter des probl\u00e8mes de s\u00e9curit\u00e9<\/strong><span>. Aujourd\u2019hui,\u00a0<\/span><strong>l\u2019analyse des failles de s\u00e9curit\u00e9<\/strong><span>, ou\u00a0<\/span><strong>le suivi des mises \u00e0 jour des syst\u00e8mes<\/strong><span>\u00a0constitue une des activit\u00e9s importantes de l\u2019administrateur, qu\u2019il s\u2019agisse des syst\u00e8mes Windows ou Linux.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; module_class=&#8221;first-on-mobile&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/securisation.jpg&#8221; alt=&#8221;S\u00e9curisation&#8221; title_text=&#8221;securisation&#8221; align=&#8221;right&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;89%&#8221; animation_style=&#8221;bounce&#8221; animation_direction=&#8221;right&#8221; border_radii=&#8221;off|2000px|||2000px&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;display:flex;&#8221; custom_css_main_element_phone=&#8221;display:inherit;&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/depannage-reseau.jpg&#8221; alt=&#8221;D\u00e9pannage r\u00e9seau&#8221; title_text=&#8221;depannage-reseau&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;89%&#8221; animation_style=&#8221;bounce&#8221; animation_direction=&#8221;left&#8221; border_radii=&#8221;off||2000px|2000px|&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3>Comp\u00e9tence n\u00b05<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin_tablet=&#8221;||10px||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h4>Le d\u00e9pannage d&#8217;un environnement r\u00e9seau TCP\/IP.<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>La\u00a0<\/span><strong>d\u00e9tection des configurations IP erron\u00e9es<\/strong><span>\u00a0(masque, passerelle) doit faire partie des attributions de l\u2019administrateur ; celui-ci doit aussi\u00a0<\/span><strong>\u00eatre en capacit\u00e9 de capturer des trames r\u00e9seaux<\/strong><span>, \u00e0 chaque fois que cela est n\u00e9cessaire pour comprendre ce qu\u2019il se passe. Il doit aussi\u00a0<\/span><strong>\u00eatre en mesure d\u2019avoir une vision globale de son r\u00e9seau, les sous-r\u00e9seaux en place, les vlans utilis\u00e9s ou encore le routage mis en \u0153uvre<\/strong><span>.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h3>En conclusion<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221;]<\/p>\n<p><span>De nombreux concepts doivent \u00eatre assimil\u00e9s pour que l\u2019administrateur Syst\u00e8me soit aussi bien \u00e0 l\u2019aise dans un environnement Windows Serveur que Linux. Il doit \u00e9galement\u00a0<\/span><strong>\u00eatre en capacit\u00e9 de configurer les \u00e9l\u00e9ments d\u2019interconnexion<\/strong><span>\u00a0(commutateurs, routeurs). Il doit\u00a0<\/span><strong>appr\u00e9hender de nombreux concepts notamment ceux li\u00e9s \u00e0 la configuration IP en interr\u00e9seau et pouvoir proposer un plan d\u2019adressage IP adapt\u00e9<\/strong><span>. Il doit alors\u00a0<\/span><strong>\u00eatre en mesure de s\u00e9curiser l\u2019ensemble des environnements<\/strong><span>, tout\u00a0<\/span><strong>en suivant les mises \u00e0 jour des Syst\u00e8mes<\/strong><span>\u00a0qui entrent en ligne de compte.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_testimonial author=&#8221;Jos\u00e9 Dordoigne&#8221; job_title=&#8221;notre expert en syst\u00e8mes et r\u00e9seaux&#8221; portrait_url=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/dordoigne_jose_portrait.jpg&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221;]<\/p>\n<p><span>Ing\u00e9nieur en Informatique, Jos\u00e9 DORDOIGNE est un expert technique dans de nombreux domaines (poste de travail et serveurs Windows, r\u00e9seau et services r\u00e9seau, Unix, HP-UX, AIX, Linux\u2026) qui exerce aujourd&#8217;hui au sein d&#8217;une grande compagnie d&#8217;assurance fran\u00e7aise. Il est titulaire de tr\u00e8s nombreuses certifications (plusieurs fois Microsoft Certified Systems Engineer, mais aussi Red Hat Certified Engineer Linux). Sa p\u00e9dagogie et son expertise technique ont notamment \u00e9t\u00e9 \u00e9prouv\u00e9es au travers d&#8217;une exp\u00e9rience de pr\u00e8s de 10 ans en tant qu&#8217;Ing\u00e9nieur formateur, de d\u00e9marches de conseils au sein d&#8217;une grande SSII pendant 12 ann\u00e9es en tant qu&#8217;architecte Infrastructure, ainsi qu&#8217;avec l&#8217;\u00e9criture d&#8217;une dizaine de livres sur les syst\u00e8mes d&#8217;exploitation Microsoft et les r\u00e9seaux TCP\/IP.<\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.0&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243;]<\/p>\n<h2>Pour aller <span style=\"color: #3bb6d5;\">plus loin<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#3BB6D5&#8243; divider_position=&#8221;center&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.9.0&#8243; max_width=&#8221;90px&#8221; max_width_tablet=&#8221;13%&#8221; max_width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;5px||||false|false&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;display:flex;&#8221; custom_css_main_element_phone=&#8221;display:inherit;&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/livre\/les-reseaux-administrez-un-reseau-sous-windows-ou-sous-linux-exercices-et-corriges-7e-edition-9782409037801_L.jpg&#8221; alt=&#8221;Scratch et Raspberry Pi Projets maker pour s&#8217;initier \u00e0 l&#8217;\u00e9lectronique et \u00e0 la robotique&#8221; title_text=&#8221;scratch-et-raspberry-pi-projets-maker-pour-s-initier-a-l-electronique-et-a-la-robotique-2e-edition-9782409027901_M&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/les-reseaux-administrez-un-reseau-sous-windows-ou-sous-linux-exercices-et-corriges-7e-edition-9782409037801&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; hover_enabled=&#8221;0&#8243; box_shadow_style=&#8221;preset3&#8243; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221;]<\/p>\n<p>Livre<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221;]<strong>Les r\u00e9seaux<\/strong><br \/>\nAdministrez un r\u00e9seau sous Windows ou sous Linux : Exercices et corrig\u00e9s[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/livre\/reseaux-informatiques-notions-fondamentales-9e-edition-protocoles-architectures-reseaux-sans-fil-9782409035173_L.jpg&#8221; alt=&#8221;Flutter D\u00e9veloppez vos applications mobiles multiplateformes avec Dart&#8221; title_text=&#8221;flutter-developpez-vos-applications-mobiles-multiplateformes-avec-dart-9782409025273_M (1)&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/reseaux-informatiques-notions-fondamentales-9e-edition-protocoles-architectures-reseaux-sans-fil-9782409035173&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; hover_enabled=&#8221;0&#8243; box_shadow_style=&#8221;preset3&#8243; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221;]<\/p>\n<p>Livre<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><strong>R\u00e9seaux informatiques &#8211; Notions fondamentales<\/strong><br \/>(Protocoles, Architectures, R\u00e9seaux sans fil&#8230;)<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/presentiel-system.jpg&#8221; alt=&#8221;formation en live&#8221; title_text=&#8221;formation en live&#8221; url=&#8221;https:\/\/www.eni-service.fr\/index.php\/fomation\/theorie-des-reseaux-locaux-et-protocole-tcp-ip\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; box_shadow_style=&#8221;preset3&#8243; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221;]<\/p>\n<p>Formation<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221;]<strong>Th\u00e9orie des r\u00e9seaux locaux et protocole TCP\/IP<\/strong>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/presentiel-system.jpg&#8221; alt=&#8221;formation en live&#8221; title_text=&#8221;formation en live&#8221; url=&#8221;https:\/\/www.eni-service.fr\/index.php\/fomation\/windows-server-2016-2019-mise-en-oeuvre-et-administration-des-services-reseau\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; box_shadow_style=&#8221;preset3&#8243; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221;]<\/p>\n<p>Formation<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221;]<strong>Windows Server 2016\/2019 \u2013 Mise en oeuvre et administration des services r\u00e9seau<\/strong>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019administration des syst\u00e8mes et r\u00e9seaux\u00a0s\u2019est fortement d\u00e9velopp\u00e9e depuis 30 ans, du fait de la g\u00e9n\u00e9ralisation du \u00ab tout distribu\u00e9 \u00bb avec la\u00a0norme TCP\/IP\u00a0qui s\u2019est v\u00e9ritablement impos\u00e9e. Les\u00a0syst\u00e8mes d\u2019exploitation ont fortement \u00e9volu\u00e9\u00a0pour converger principalement vers les\u00a0syst\u00e8mes Unix\/Linux et Windows. Sur les\u00a0r\u00e9seaux locaux, Ethernet\u00a0a \u00e9t\u00e9 le grand vainqueur, tandis que dans le m\u00eame temps les \u00ab Cisco [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":561,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[18,3],"tags":[],"genre":[],"class_list":["post-560","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-paroles-d-experts","category-systemes-et-reseaux"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Administrer ses r\u00e9seaux informatiques : 5 comp\u00e9tences indispensables<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez les comp\u00e9tences indispensables pour vous permettre d&#039;\u00eatre autonome dans l&#039;administration de vos r\u00e9seaux informatiques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Administrer ses r\u00e9seaux informatiques : 5 comp\u00e9tences indispensables\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez les comp\u00e9tences indispensables pour vous permettre d&#039;\u00eatre autonome dans l&#039;administration de vos r\u00e9seaux informatiques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/\" \/>\n<meta property=\"og:site_name\" content=\"Eni Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-04T09:10:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-06T08:23:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/bandeau_administrer-ses-reseaux-informatiques.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nathalie Hervoche\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nathalie Hervoche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/\",\"name\":\"Administrer ses r\u00e9seaux informatiques : 5 comp\u00e9tences indispensables\",\"isPartOf\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/bandeau_administrer-ses-reseaux-informatiques.jpg\",\"datePublished\":\"2021-06-04T09:10:04+00:00\",\"dateModified\":\"2023-12-06T08:23:39+00:00\",\"author\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/90914566552378aeb25260958ea73b3a\"},\"description\":\"D\u00e9couvrez les comp\u00e9tences indispensables pour vous permettre d'\u00eatre autonome dans l'administration de vos r\u00e9seaux informatiques.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/#primaryimage\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/bandeau_administrer-ses-reseaux-informatiques.jpg\",\"contentUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/bandeau_administrer-ses-reseaux-informatiques.jpg\",\"width\":1920,\"height\":680,\"caption\":\"Administrer ses r\u00e9seaux informatiques\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.editions-eni.fr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Administrer ses r\u00e9seaux informatiques : 5 comp\u00e9tences indispensables\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/\",\"name\":\"Eni Blog\",\"description\":\"Blog des Editions ENI\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/90914566552378aeb25260958ea73b3a\",\"name\":\"Nathalie Hervoche\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/author\/nhervoche\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Administrer ses r\u00e9seaux informatiques : 5 comp\u00e9tences indispensables","description":"D\u00e9couvrez les comp\u00e9tences indispensables pour vous permettre d'\u00eatre autonome dans l'administration de vos r\u00e9seaux informatiques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/","og_locale":"fr_FR","og_type":"article","og_title":"Administrer ses r\u00e9seaux informatiques : 5 comp\u00e9tences indispensables","og_description":"D\u00e9couvrez les comp\u00e9tences indispensables pour vous permettre d'\u00eatre autonome dans l'administration de vos r\u00e9seaux informatiques.","og_url":"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/","og_site_name":"Eni Blog","article_published_time":"2021-06-04T09:10:04+00:00","article_modified_time":"2023-12-06T08:23:39+00:00","og_image":[{"width":1920,"height":680,"url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/bandeau_administrer-ses-reseaux-informatiques.jpg","type":"image\/jpeg"}],"author":"Nathalie Hervoche","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Nathalie Hervoche","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/","url":"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/","name":"Administrer ses r\u00e9seaux informatiques : 5 comp\u00e9tences indispensables","isPartOf":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/#primaryimage"},"image":{"@id":"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/#primaryimage"},"thumbnailUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/bandeau_administrer-ses-reseaux-informatiques.jpg","datePublished":"2021-06-04T09:10:04+00:00","dateModified":"2023-12-06T08:23:39+00:00","author":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/90914566552378aeb25260958ea73b3a"},"description":"D\u00e9couvrez les comp\u00e9tences indispensables pour vous permettre d'\u00eatre autonome dans l'administration de vos r\u00e9seaux informatiques.","breadcrumb":{"@id":"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/#primaryimage","url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/bandeau_administrer-ses-reseaux-informatiques.jpg","contentUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/bandeau_administrer-ses-reseaux-informatiques.jpg","width":1920,"height":680,"caption":"Administrer ses r\u00e9seaux informatiques"},{"@type":"BreadcrumbList","@id":"https:\/\/www.editions-eni.fr\/blog\/administrer-ses-reseaux-informatiques-5-competences-indispensables\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.editions-eni.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"Administrer ses r\u00e9seaux informatiques : 5 comp\u00e9tences indispensables"}]},{"@type":"WebSite","@id":"https:\/\/www.editions-eni.fr\/blog\/#website","url":"https:\/\/www.editions-eni.fr\/blog\/","name":"Eni Blog","description":"Blog des Editions ENI","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/90914566552378aeb25260958ea73b3a","name":"Nathalie Hervoche","url":"https:\/\/www.editions-eni.fr\/blog\/author\/nhervoche\/"}]}},"_links":{"self":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/comments?post=560"}],"version-history":[{"count":62,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/560\/revisions"}],"predecessor-version":[{"id":5589,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/560\/revisions\/5589"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media\/561"}],"wp:attachment":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media?parent=560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/categories?post=560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/tags?post=560"},{"taxonomy":"genre","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/genre?post=560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}