{"id":271,"date":"2016-03-04T19:36:08","date_gmt":"2016-03-04T18:36:08","guid":{"rendered":"http:\/\/werle.pro\/?page_id=271"},"modified":"2017-11-09T14:08:26","modified_gmt":"2017-11-09T13:08:26","slug":"pssi-itrf","status":"publish","type":"page","link":"https:\/\/werle.pro\/index.php\/pssi-itrf\/","title":{"rendered":"PSSI ITRF"},"content":{"rendered":"<h3><strong>A destination des ITRF et enseignants du domaine<\/strong><\/h3>\n<h4 style=\"padding-left: 30px;\"><strong>Bonnes pratiques &amp; Conformit\u00e9<\/strong><\/h4>\n<ul>\n<li><strong><a href=\"http:\/\/www.ssi.gouv.fr\" target=\"_blank\" rel=\"noopener\">Agence Nationale de la SSI<\/a><\/strong>\n<ul>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/uploads\/IMG\/pdf\/mementodep-v1-1.pdf\" target=\"_blank\" rel=\"noopener\">D\u00e9fense en profondeur du SI<\/a><\/li>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/entreprise\/guide\/securiser-ladministration-des-systemes-dinformation\/\" target=\"_blank\" rel=\"noopener\">S\u00e9curiser l&rsquo;administration des syst\u00e8mes d&rsquo;information<\/a><\/li>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/administration\/\" target=\"_blank\" rel=\"noopener\">Administration <\/a>&#8211; <a href=\"http:\/\/www.ssi.gouv.fr\/administration\/bonnes-pratiques\/\" target=\"_blank\" rel=\"noopener\">Bonnes pratiques <\/a><\/li>\n<li><a href=\"http:\/\/werle.pro\/index.php\/cyberedu\/\" target=\"_blank\" rel=\"noopener\">CyberEdu<\/a> &#8211; <a href=\"http:\/\/www.ssi.gouv.fr\/particulier\/formation\/cyberedu\/\" target=\"_blank\" rel=\"noopener\">Les supports de cours (Malette &amp; Colloque)<\/a><\/li>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/administration\/reglementation\/\" target=\"_blank\" rel=\"noopener\">R\u00e8glementation<\/a><\/li>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/administration\/bonnes-pratiques\/dispositifs-de-videoprotection\/\" target=\"_blank\" rel=\"noopener\">Vid\u00e9oprotection<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/www.cnil.fr\/professionnel\" target=\"_blank\" rel=\"noopener\">CNIL Professionnel<\/a> &#8211; Informatique &amp; Libert\u00e9s\n<ul>\n<li><a href=\"https:\/\/www.cnil.fr\/fr\/correspondants-informatique-et-libertes-cil\" target=\"_blank\" rel=\"noopener\">Le CIL<\/a> veille \u00e0 la s\u00e9curit\u00e9 juridique et informatique<\/li>\n<li><a href=\"https:\/\/www.cnil.fr\/fr\/comprendre-vos-obligations\" target=\"_blank\" rel=\"noopener\">Vos obligations l\u00e9gales<\/a><\/li>\n<li><a href=\"https:\/\/www.cnil.fr\/fr\/les-labels-cnil\" target=\"_blank\" rel=\"noopener\">Les Labels CNIL<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong><a href=\"http:\/\/www.cyber-securite.fr\/\" target=\"_blank\" rel=\"noopener\">Cyber S\u00e9curit\u00e9<\/a><\/strong>\n<ul>\n<li><a href=\"http:\/\/www.cyber-securite.fr\/2014\/02\/21\/projet-cyberedu-de-lanssi-integrer-la-cybersecurite-aux-formations-superieures-en-informatique\/\" target=\"_blank\" rel=\"noopener\">CyberEdu inauguration<\/a><\/li>\n<li><a href=\"http:\/\/www.orange-business.com\/fr\/blogs\/securite\" target=\"_blank\" rel=\"noopener\">Blog cybers\u00e9curit\u00e9<\/a> chez Orange (OIV)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4 style=\"padding-left: 30px;\"><strong>Outils<\/strong><\/h4>\n<ul>\n<li><a href=\"http:\/\/www.cert.ssi.gouv.fr\/\" target=\"_blank\" rel=\"noopener\">CERT-Fr<\/a>\n<ul>\n<li><a href=\"http:\/\/www.cert.ssi.gouv.fr\/site\/cert-fr_alerte.rss\" target=\"_blank\" rel=\"noopener\">Alertes de s\u00e9curit\u00e9<\/a><\/li>\n<li><a href=\"http:\/\/www.cert.ssi.gouv.fr\/site\/cert-fr.rss\" target=\"_blank\" rel=\"noopener\">Avis et Actualit\u00e9s de s\u00e9curit\u00e9<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong><a href=\"http:\/\/www.renater.fr\/\" target=\"_blank\" rel=\"noopener\">Renater<\/a><\/strong>\n<ul>\n<li><a href=\"http:\/\/werle.pro\/index.php\/univcloud-gt-confiance-numerique\/\" target=\"_blank\" rel=\"noopener\">Le r\u00e9seau<\/a>\n<ul>\n<li><a href=\"https:\/\/www.renater.fr\/infrastructure-nationale\" target=\"_blank\" rel=\"noopener\">Les infrastructures<\/a><\/li>\n<li><a href=\"https:\/\/www.renater.fr\/statistiques-reseau\" target=\"_blank\" rel=\"noopener\">Supervision<\/a><\/li>\n<li><a href=\"https:\/\/pasillo.renater.fr\/metrologie\/dispo.php\" target=\"_blank\" rel=\"noopener\">Les weathermaps m\u00e9tropole<\/a> (direct)<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/services.renater.fr\/ssi\/\" target=\"_blank\" rel=\"noopener\">Le service s\u00e9curit\u00e9<\/a><\/li>\n<li><a href=\"https:\/\/filesender.renater.fr\" target=\"_blank\" rel=\"noopener\">FileSender <\/a>&#8211; Transmission de gros fichiers partout dans le Monde<\/li>\n<li><a href=\"https:\/\/www.renater.fr\/voix-et-image\" target=\"_blank\" rel=\"noopener\">RENAvisio <\/a>&#8211; Visio\u00a0 et web conf\u00e9rence<\/li>\n<li><a href=\"https:\/\/www.renater.fr\/campus-best-practice-en-france\" target=\"_blank\" rel=\"noopener\">Campus best pratice<\/a> &#8211; Bonnes pratiques<\/li>\n<li><a href=\"https:\/\/scanner.renater.fr\/\" target=\"_blank\" rel=\"noopener\">SCAN&rsquo;er<\/a> &#8211; Scanner de vuln\u00e9rabilit\u00e9s de vos syst\u00e8mes<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><a href=\"http:\/\/cybertactique.blogspot.fr\/2014\/12\/lecture-securite-et-espionnage.html\" target=\"_blank\" rel=\"noopener\">Blog CyberTactique<\/a><\/li>\n<li><a href=\"http:\/\/zone-h.org\/archive\/filter=1\/special=1\" target=\"_blank\" rel=\"noopener\">Zone-H : D\u00e9facement de site<\/a><\/li>\n<\/ul>\n<h4 style=\"padding-left: 30px;\">Notions de technologies r\u00e9seaux<\/h4>\n<ul>\n<li>Instructeur Cisco CNA : <a href=\"https:\/\/www.netacad.com\/\" target=\"_blank\" rel=\"noopener\">acc\u00e8s au site<\/a><\/li>\n<li><a href=\"http:\/\/www.marionnet.org\" target=\"_blank\" rel=\"noopener\">Simulateur virtuel de r\u00e9seau MarioNet<\/a><\/li>\n<\/ul>\n<h4 style=\"padding-left: 30px;\"><strong>Lectures<\/strong><\/h4>\n<ul>\n<li><a href=\"http:\/\/www.bortzmeyer.org\/ficheslecture.html\" target=\"_blank\" rel=\"noopener\">Fiches de lecture de Bortzmeyer<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>A destination des ITRF et enseignants du domaine Bonnes pratiques &amp; Conformit\u00e9 Agence Nationale de la SSI D\u00e9fense en profondeur du SI S\u00e9curiser l&rsquo;administration des syst\u00e8mes d&rsquo;information Administration &#8211; Bonnes pratiques CyberEdu &#8211; Les supports de cours (Malette &amp; Colloque) R\u00e8glementation Vid\u00e9oprotection CNIL Professionnel &#8211; Informatique &amp; Libert\u00e9s Le CIL veille \u00e0 la s\u00e9curit\u00e9 juridique &#8230; <a title=\"PSSI ITRF\" class=\"read-more\" href=\"https:\/\/werle.pro\/index.php\/pssi-itrf\/\" aria-label=\"Read more about PSSI ITRF\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P7ALXt-4n","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages\/271"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=271"}],"version-history":[{"count":14,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages\/271\/revisions"}],"predecessor-version":[{"id":1356,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages\/271\/revisions\/1356"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}