


{"id":6003,"date":"2024-04-18T12:28:34","date_gmt":"2024-04-18T10:28:34","guid":{"rendered":"https:\/\/www.editions-eni.fr\/blog\/?p=6003"},"modified":"2024-12-31T16:01:17","modified_gmt":"2024-12-31T15:01:17","slug":"lexpertise-judiciaire-informatique-et-la-cybersecurite","status":"publish","type":"post","link":"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/","title":{"rendered":"L\u2019expertise judiciaire informatique et la cybers\u00e9curit\u00e9\u00a0"},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<p><strong>Sur <a href=\"https:\/\/www.eni-elearning.com\/fr\/\" target=\"_blank\" rel=\"noopener\">notre plateforme elearning<\/a> pour les professionnels, vous retrouvez tous les contenus ENI, des livres aux vid\u00e9os en passant par les eformations. Depuis la fin d\u2019ann\u00e9e derni\u00e8re, nos auteurs vous proposent \u00e9galement des articles venant approfondir ou \u00e9clairer une th\u00e9matique.<\/strong><\/p>\n<p><strong>Techniques ou g\u00e9n\u00e9ralistes, ces articles constituent une ressource de premier choix pour tous ceux qui travaillent dans l\u2019IT. Et le meilleur moyen de vous le prouver, c\u2019est de vous montrer (un peu) \u00e0 qui cela ressemble\u00a0!<\/strong><\/p>\n<p><strong>Ce mois-ci, nous avons d\u00e9cid\u00e9 de mettre en lumi\u00e8re <a href=\"https:\/\/www.editions-eni.fr\/damien-lamy\" target=\"_blank\" rel=\"noopener\">Damien Lamy<\/a> et son article \u00ab\u00a0L\u2019expertise judiciaire informatique et la cybers\u00e9curit\u00e9\u00a0\u00bb qui met en lumi\u00e8re des impacts parfois m\u00e9sestim\u00e9s de la cyberprotection sur les entreprises et notamment lorsqu\u2019un expert judiciaire doit intervenir.<\/strong><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<p>Damien Lamy est bien plac\u00e9 pour \u00e9clairer ce pan de la s\u00e9curit\u00e9 informatique\u00a0: expert judiciaire depuis 2017, il est aussi membre de la r\u00e9serve citoyenne de cyberd\u00e9fense non op\u00e9rationnelle, Architecte R\u00e9seau et S\u00e9curit\u00e9 depuis 2004 et responsable de la soci\u00e9t\u00e9 LMSI mais aussi auteur aux Editions ENI.<\/p>\n<p>Extrait de son article\u00a0:<\/p>[\/et_pb_text][et_pb_testimonial _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<ol>\n<li><strong>Introduction<\/strong><\/li>\n<\/ol>\n<p>La cybers\u00e9curit\u00e9 \u00e9tant de plus en plus pr\u00e9sente dans notre quotidien, il n\u2019est pas hasardeux de penser que le m\u00e9tier de l\u2019expertise informatique devra \u00e9voluer avec ce changement des mentalit\u00e9s et des obligations futures. Pour cela, l\u2019expert informatique devra \u00e0 la fois faire preuve de bon sens et haute technicit\u00e9.<\/p>\n<ol start=\"2\">\n<li><strong>Les risques cyber des entreprises<\/strong><\/li>\n<\/ol>\n<p>La notion de cybers\u00e9curit\u00e9 englobe l\u2019ensemble des syst\u00e8mes de protection des donn\u00e9es contre toutes les formes d\u2019atteinte \u00e0 leur s\u00e9curit\u00e9 ou pour emp\u00eacher leur vol afin d\u2019\u00e9viter que ne soit ternie la r\u00e9putation des entreprises ou qu\u2019elles soient en difficult\u00e9s.<\/p>\n<p>Devant le nombre croissant d\u2019entreprises impact\u00e9es par ce fl\u00e9au, la cybers\u00e9curit\u00e9 est aujourd\u2019hui au centre de l\u2019actualit\u00e9.<\/p>\n<p>Les textes encadrant la s\u00e9curisation des donn\u00e9es personnelles<\/p>\n<p>Dans un monde o\u00f9 la technologie est de plus en plus pr\u00e9sente et o\u00f9 l\u2019\u00e9volution de la comp\u00e9tence informatique est constante, il est de courant de faire appel \u00e0 l\u2019expertise judiciaire. La fa\u00e7on d\u2019aborder l\u2019expertise judiciaire a \u00e9galement \u00e9volu\u00e9, notamment depuis le d\u00e9veloppement de l\u2019intelligence artificielle (IA) et du cloud ainsi que depuis l\u2019entr\u00e9e en vigueur de diff\u00e9rents textes qui obligent les entreprises et organismes \u00e9tatiques \u00e0 prendre en compte la cybers\u00e9curit\u00e9\u00a0:\u00a0\u2026<\/p>[\/et_pb_testimonial][et_pb_code _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_code][et_pb_code _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<p>Apr\u00e8s avoir red\u00e9fini la cybers\u00e9curit\u00e9 et donc les diff\u00e9rents risques r\u00e9currents dans les entreprises, Damien Lamy aborde le r\u00f4le des diff\u00e9rents acteurs, entreprises, institutions et justice.<\/p>\n<p><strong>Mais pour en voir plus de cet article, il faut \u00eatre abonn\u00e9 \u00e0 la <a href=\"https:\/\/www.eni-elearning.com\/fr\/\" target=\"_blank\" rel=\"noopener\">plateforme elearning pour les professionnels<\/a> \ud83d\ude42<\/strong><\/p>\n<p>De nombreux autres articles vous y attendent sur des sujet aussi vari\u00e9s que l\u2019IA, Python, le webmarketing\u2026 Vous y retrouverez \u00e9galement les livres, vid\u00e9os, eformations et webinaires du groupe ENI. De quoi fournir de nombreuses ressources pour les \u00e9quipes SI et IT\u00a0!<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_testimonial author=&#8221;Damien LAMY&#8221; job_title=&#8221;Expert cybers\u00e9curit\u00e9&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<p><span>Architecte R\u00e9seau et S\u00e9curit\u00e9 depuis 2004 et responsable de la soci\u00e9t\u00e9 LMSI,\u00a0<\/span><strong>Damien LAMY<\/strong><span>\u00a0a int\u00e9gr\u00e9 la r\u00e9serve citoyenne de cyberd\u00e9fense non op\u00e9rationnelle. \u00c9galement expert judiciaire depuis 2017, il exerce en tant que consultant s\u00e9curit\u00e9 chez des clients de toute taille, dans des secteurs o\u00f9 la rigueur dans la conception des infrastructures est cruciale ! Il anime \u00e9galement diverses formations sur le th\u00e8me de la s\u00e9curit\u00e9 et donne des conf\u00e9rences dans plusieurs \u00e9coles pour sensibiliser des publics vari\u00e9s allant des utilisateurs aux directions d&#8217;entreprises.<\/span><\/p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||27px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<h2>Pour aller <span style=\"color: #3bb6d5;\">plus loin<\/span><\/h2>[\/et_pb_text][et_pb_divider color=&#8221;#3BB6D5&#8243; divider_position=&#8221;center&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;90px&#8221; max_width_tablet=&#8221;13%&#8221; max_width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;5px||||false|false&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;display:flex;&#8221; custom_css_main_element_phone=&#8221;display:inherit;&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/04\/les-fondamentaux-de-la-cybersecurite-avec-watchguard-9782409043642_XL.jpg&#8221; alt=&#8221;Scratch et Raspberry Pi Projets maker pour s&#8217;initier \u00e0 l&#8217;\u00e9lectronique et \u00e0 la robotique&#8221; title_text=&#8221;scratch-et-raspberry-pi-projets-maker-pour-s-initier-a-l-electronique-et-a-la-robotique-2e-edition-9782409027901_M&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/les-fondamentaux-de-la-cybersecurite-avec-watchguard-9782409043642&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding_tablet=&#8221;||||false|false&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; border_radii_last_edited=&#8221;off|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; transform_scale__hover=&#8221;105%|105%&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<p>Livre<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<strong>Les fondamentaux de la cybers\u00e9curit\u00e9 avec WatchGuard<\/strong>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/04\/la-menace-cyber-mieux-la-connaitre-pour-mieux-s-en-proteger-9782409043857_XL.jpg&#8221; alt=&#8221;Flutter D\u00e9veloppez vos applications mobiles multiplateformes avec Dart&#8221; title_text=&#8221;flutter-developpez-vos-applications-mobiles-multiplateformes-avec-dart-9782409025273_M (1)&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/la-menace-cyber-mieux-la-connaitre-pour-mieux-s-en-proteger-9782409043857&#8243; url_new_window=&#8221;on&#8221; src_tablet=&#8221;&#8221; src_phone=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/01\/le-cloud-prive-avec-openstack-guide-pratique-pour-l-architecture-l-administration-et-l-implementation-9782409038693_XL.jpg&#8221; src_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; hover_enabled=&#8221;0&#8243; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<p>Livre<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<strong>La menace cyber<\/strong>\nMieux la conna\u00eetre pour mieux s\u2019en prot\u00e9ger[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/cyber-resilience-en-entreprise-enjeux-referentiels-et-bonnes-pratiques-2e-edition-9782409041440_XL.jpg&#8221; alt=&#8221;Flutter D\u00e9veloppez vos applications mobiles multiplateformes avec Dart&#8221; title_text=&#8221;presentiel-web&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/cyber-resilience-en-entreprise-enjeux-referentiels-et-bonnes-pratiques-2e-edition-9782409041440&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<p>Livre<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<strong>Cyber-r\u00e9silience en entreprise<\/strong>\nEnjeux, r\u00e9f\u00e9rentiels et bonnes pratiques[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/04\/kali-linux-bien-demarrer-l-analyse-de-la-securite-de-votre-infrastructure-2e-version-vt2kali_XL.png&#8221; alt=&#8221;Flutter D\u00e9veloppez vos applications mobiles multiplateformes avec Dart&#8221; title_text=&#8221;elearning-graphisme&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/video\/kali-linux-bien-demarrer-l-analyse-de-la-securite-de-votre-infrastructure-2e-version-vt2kali&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;100px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<p>Vid\u00e9o<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<strong>Kali Linux<\/strong>\nBien d\u00e9marrer l&#8217;analyse de la s\u00e9curit\u00e9 de votre infrastructure[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||50px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#7ebec5&#8243; custom_margin=&#8221;40px||||false|false&#8221; custom_padding=&#8221;20px||0px|20px|false|false&#8221; border_radii=&#8221;off|20px|20px||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; header_3_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<h3><span style=\"color: #333333; font-weight:normal,\">POUR LES ENTREPRISES<\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; header_3_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;0px||20px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<h4><span style=\"color: #666666; font-weight: normal;\">D\u00e9couvrez nos solutions de formation pour vos \u00e9quipes et apprenants :<\/span><\/h4>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#7ebec5&#8243; custom_padding=&#8221;|30px|30px|30px|false|false&#8221; border_radii=&#8221;off|||20px|20px&#8221; border_color_all=&#8221;#3BB6D5&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;_initial&#8221; border_color_all=&#8221;#3BB6D5&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/reflechir.jpg&#8221; alt=&#8221;R\u00e9fl\u00e9chir en amont&#8221; title_text=&#8221;reflechir&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/10\/iconeElearning.png&#8221; alt=&#8221;elearning&#8221; title_text=&#8221;iconeElearning&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_4_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<h4 style=\"text-align: center;\">En e-learning avec<br \/>notre offre pour les professionnels<\/h4>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.eni-elearning.com\/fr\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;En savoir plus&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#EEEEEE&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/10\/iconeFormateur.png&#8221; alt=&#8221;formateur&#8221; title_text=&#8221;iconeFormateur&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<h4 style=\"text-align: center;\"><span style=\"color: #ffffff;\">Avec un formateur, en pr\u00e9sentiel ou \u00e0 distance<\/span><\/h4>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.eni-service.fr\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;En savoir plus&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>Sur notre plateforme elearning pour les professionnels, vous retrouvez tous les contenus ENI, des livres aux vid\u00e9os en passant par les eformations. Depuis la fin d\u2019ann\u00e9e derni\u00e8re, nos auteurs vous proposent \u00e9galement des articles venant approfondir ou \u00e9clairer une th\u00e9matique. Techniques ou g\u00e9n\u00e9ralistes, ces articles constituent une ressource de premier choix pour tous ceux qui [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":6004,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[18,5],"tags":[],"genre":[],"class_list":["post-6003","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-paroles-d-experts","category-securite-informatique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>L\u2019expertise judiciaire informatique et la cybers\u00e9curit\u00e9\u00a0 - Eni Blog<\/title>\n<meta name=\"description\" content=\"Mise en lumi\u00e8re des impacts de la cyberprotection sur les entreprises et notamment lorsqu\u2019un expert judiciaire doit intervenir.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L\u2019expertise judiciaire informatique et la cybers\u00e9curit\u00e9\u00a0 - Eni Blog\" \/>\n<meta property=\"og:description\" content=\"Mise en lumi\u00e8re des impacts de la cyberprotection sur les entreprises et notamment lorsqu\u2019un expert judiciaire doit intervenir.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Eni Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-18T10:28:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-31T15:01:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/04\/illustration_cybercriminalite_expertise_judiciaire_1080x383.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"383\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Denis Poillerat\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Denis Poillerat\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/\",\"name\":\"L\u2019expertise judiciaire informatique et la cybers\u00e9curit\u00e9\u00a0 - Eni Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/04\/illustration_cybercriminalite_expertise_judiciaire_1080x383.webp\",\"datePublished\":\"2024-04-18T10:28:34+00:00\",\"dateModified\":\"2024-12-31T15:01:17+00:00\",\"author\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6\"},\"description\":\"Mise en lumi\u00e8re des impacts de la cyberprotection sur les entreprises et notamment lorsqu\u2019un expert judiciaire doit intervenir.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/#primaryimage\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/04\/illustration_cybercriminalite_expertise_judiciaire_1080x383.webp\",\"contentUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/04\/illustration_cybercriminalite_expertise_judiciaire_1080x383.webp\",\"width\":1080,\"height\":383,\"caption\":\"illustration cybercriminalite expertise judiciaire\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.editions-eni.fr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u2019expertise judiciaire informatique et la cybers\u00e9curit\u00e9\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/\",\"name\":\"Eni Blog\",\"description\":\"Blog des Editions ENI\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6\",\"name\":\"Denis Poillerat\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/author\/dpoillerat\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L\u2019expertise judiciaire informatique et la cybers\u00e9curit\u00e9\u00a0 - Eni Blog","description":"Mise en lumi\u00e8re des impacts de la cyberprotection sur les entreprises et notamment lorsqu\u2019un expert judiciaire doit intervenir.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"L\u2019expertise judiciaire informatique et la cybers\u00e9curit\u00e9\u00a0 - Eni Blog","og_description":"Mise en lumi\u00e8re des impacts de la cyberprotection sur les entreprises et notamment lorsqu\u2019un expert judiciaire doit intervenir.","og_url":"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/","og_site_name":"Eni Blog","article_published_time":"2024-04-18T10:28:34+00:00","article_modified_time":"2024-12-31T15:01:17+00:00","og_image":[{"width":1080,"height":383,"url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/04\/illustration_cybercriminalite_expertise_judiciaire_1080x383.webp","type":"image\/webp"}],"author":"Denis Poillerat","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Denis Poillerat","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/","url":"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/","name":"L\u2019expertise judiciaire informatique et la cybers\u00e9curit\u00e9\u00a0 - Eni Blog","isPartOf":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/04\/illustration_cybercriminalite_expertise_judiciaire_1080x383.webp","datePublished":"2024-04-18T10:28:34+00:00","dateModified":"2024-12-31T15:01:17+00:00","author":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6"},"description":"Mise en lumi\u00e8re des impacts de la cyberprotection sur les entreprises et notamment lorsqu\u2019un expert judiciaire doit intervenir.","breadcrumb":{"@id":"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/#primaryimage","url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/04\/illustration_cybercriminalite_expertise_judiciaire_1080x383.webp","contentUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/04\/illustration_cybercriminalite_expertise_judiciaire_1080x383.webp","width":1080,"height":383,"caption":"illustration cybercriminalite expertise judiciaire"},{"@type":"BreadcrumbList","@id":"https:\/\/www.editions-eni.fr\/blog\/lexpertise-judiciaire-informatique-et-la-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.editions-eni.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"L\u2019expertise judiciaire informatique et la cybers\u00e9curit\u00e9\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.editions-eni.fr\/blog\/#website","url":"https:\/\/www.editions-eni.fr\/blog\/","name":"Eni Blog","description":"Blog des Editions ENI","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6","name":"Denis Poillerat","url":"https:\/\/www.editions-eni.fr\/blog\/author\/dpoillerat\/"}]}},"_links":{"self":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/6003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/comments?post=6003"}],"version-history":[{"count":5,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/6003\/revisions"}],"predecessor-version":[{"id":6370,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/6003\/revisions\/6370"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media\/6004"}],"wp:attachment":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media?parent=6003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/categories?post=6003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/tags?post=6003"},{"taxonomy":"genre","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/genre?post=6003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}