{"id":22626,"date":"2019-12-13T13:54:05","date_gmt":"2019-12-13T13:54:05","guid":{"rendered":"https:\/\/www.istegroup.com\/?post_type=product&#038;p=22626"},"modified":"2024-01-03T13:43:23","modified_gmt":"2024-01-03T13:43:23","slug":"securite-des-reseaux-informatiques","status":"publish","type":"product","link":"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/","title":{"rendered":"S\u00e9curit\u00e9 des r\u00e9seaux informatiques"},"content":{"rendered":"<p>D\u00e9velopp\u00e9 en collaboration avec une \u00e9quipe de la formation et de la certification Cisco, <em>S\u00e9curit\u00e9 des r\u00e9seaux informatiques<\/em> fait un \u00e9tat de l\u2019art et des bonnes pratiques de la mise en place d\u2019un syst\u00e8me informatique s\u00e9curis\u00e9. Des exemples concrets sont propos\u00e9s \u00e0 chaque chapitre pour aider le lecteur \u00e0 appliquer la configuration et \u00e0 ma\u00eetriser le concept abord\u00e9.<\/p>\n<p>Cet ouvrage s\u2019adresse aux \u00e9tudiants pr\u00e9parant l\u2019examen du CCNA s\u00e9curit\u00e9 (210-260 IINS), que ce soit dans les centres de formation professionnelle, les facult\u00e9s techniques ou dans les centres de formation reli\u00e9s au programme Cisco Academy. Il peut \u00e9galement venir en aide \u00e0 toute personne int\u00e9ress\u00e9e par la s\u00e9curit\u00e9 informatique, aux professionnels de ce domaine ou aux simples utilisateurs qui d\u00e9sirent identifier les menaces et la vuln\u00e9rabilit\u00e9 d\u2019un r\u00e9seau afin de mieux en assurer la s\u00e9curit\u00e9.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>D\u00e9velopp\u00e9 en collaboration avec une \u00e9quipe de la formation et de la certification Cisco, S\u00e9curit\u00e9 des r\u00e9seaux informatiques fait un \u00e9tat de l\u2019art et des bonnes pratiques de la mise en place d\u2019un syst\u00e8me informatique s\u00e9curis\u00e9. Des exemples concrets sont propos\u00e9s \u00e0 chaque chapitre pour aider le lecteur \u00e0 appliquer la configuration et \u00e0 ma\u00eetriser [&hellip;]<\/p>\n","protected":false},"featured_media":22632,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"product_brand":[],"product_cat":[667],"product_tag":[],"class_list":{"0":"post-22626","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-informatique-12506482","8":"first","9":"instock","10":"shipping-taxable","11":"purchasable","12":"product-type-variable"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curit\u00e9 des r\u00e9seaux informatiques - ISTE Group<\/title>\n<meta name=\"description\" content=\"S\u00e9curit\u00e9 des r\u00e9seaux informatiques fait un \u00e9tat de l\u2019art et des bonnes pratiques de la mise en place d\u2019un syst\u00e8me informatique s\u00e9curis\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 des r\u00e9seaux informatiques - ISTE Group\" \/>\n<meta property=\"og:description\" content=\"S\u00e9curit\u00e9 des r\u00e9seaux informatiques fait un \u00e9tat de l\u2019art et des bonnes pratiques de la mise en place d\u2019un syst\u00e8me informatique s\u00e9curis\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/\" \/>\n<meta property=\"og:site_name\" content=\"ISTE Group\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-03T13:43:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/S\u00e9curit\u00e9-des-r\u00e9seaux-informatiques-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1706\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/\",\"url\":\"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/\",\"name\":\"S\u00e9curit\u00e9 des r\u00e9seaux informatiques - ISTE Group\",\"isPartOf\":{\"@id\":\"https:\/\/www.istegroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/S\u00e9curit\u00e9-des-r\u00e9seaux-informatiques-scaled.jpg\",\"datePublished\":\"2019-12-13T13:54:05+00:00\",\"dateModified\":\"2024-01-03T13:43:23+00:00\",\"description\":\"S\u00e9curit\u00e9 des r\u00e9seaux informatiques fait un \u00e9tat de l\u2019art et des bonnes pratiques de la mise en place d\u2019un syst\u00e8me informatique s\u00e9curis\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/#primaryimage\",\"url\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/S\u00e9curit\u00e9-des-r\u00e9seaux-informatiques-scaled.jpg\",\"contentUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/S\u00e9curit\u00e9-des-r\u00e9seaux-informatiques-scaled.jpg\",\"width\":1706,\"height\":2560,\"caption\":\"S\u00e9curit\u00e9 des r\u00e9seaux informatiques\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.istegroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/www.istegroup.com\/fr\/nouveautes\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00e9curit\u00e9 des r\u00e9seaux informatiques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.istegroup.com\/#website\",\"url\":\"https:\/\/www.istegroup.com\/\",\"name\":\"ISTE Group\",\"description\":\"Publishing Knowledge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.istegroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 des r\u00e9seaux informatiques - ISTE Group","description":"S\u00e9curit\u00e9 des r\u00e9seaux informatiques fait un \u00e9tat de l\u2019art et des bonnes pratiques de la mise en place d\u2019un syst\u00e8me informatique s\u00e9curis\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/","og_locale":"en_US","og_type":"article","og_title":"S\u00e9curit\u00e9 des r\u00e9seaux informatiques - ISTE Group","og_description":"S\u00e9curit\u00e9 des r\u00e9seaux informatiques fait un \u00e9tat de l\u2019art et des bonnes pratiques de la mise en place d\u2019un syst\u00e8me informatique s\u00e9curis\u00e9.","og_url":"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/","og_site_name":"ISTE Group","article_modified_time":"2024-01-03T13:43:23+00:00","og_image":[{"width":1706,"height":2560,"url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/S\u00e9curit\u00e9-des-r\u00e9seaux-informatiques-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/","url":"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/","name":"S\u00e9curit\u00e9 des r\u00e9seaux informatiques - ISTE Group","isPartOf":{"@id":"https:\/\/www.istegroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/#primaryimage"},"image":{"@id":"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/S\u00e9curit\u00e9-des-r\u00e9seaux-informatiques-scaled.jpg","datePublished":"2019-12-13T13:54:05+00:00","dateModified":"2024-01-03T13:43:23+00:00","description":"S\u00e9curit\u00e9 des r\u00e9seaux informatiques fait un \u00e9tat de l\u2019art et des bonnes pratiques de la mise en place d\u2019un syst\u00e8me informatique s\u00e9curis\u00e9.","breadcrumb":{"@id":"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/#primaryimage","url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/S\u00e9curit\u00e9-des-r\u00e9seaux-informatiques-scaled.jpg","contentUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/08\/S\u00e9curit\u00e9-des-r\u00e9seaux-informatiques-scaled.jpg","width":1706,"height":2560,"caption":"S\u00e9curit\u00e9 des r\u00e9seaux informatiques"},{"@type":"BreadcrumbList","@id":"https:\/\/www.istegroup.com\/en\/produit\/securite-des-reseaux-informatiques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.istegroup.com\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/www.istegroup.com\/fr\/nouveautes\/"},{"@type":"ListItem","position":3,"name":"S\u00e9curit\u00e9 des r\u00e9seaux informatiques"}]},{"@type":"WebSite","@id":"https:\/\/www.istegroup.com\/#website","url":"https:\/\/www.istegroup.com\/","name":"ISTE Group","description":"Publishing Knowledge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.istegroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product\/22626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/media\/22632"}],"wp:attachment":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/media?parent=22626"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product_brand?post=22626"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product_cat?post=22626"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product_tag?post=22626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}