{"id":74,"date":"2021-03-04T13:58:27","date_gmt":"2021-03-04T12:58:27","guid":{"rendered":"http:\/\/it-cybersec.expert\/?page_id=74"},"modified":"2023-05-10T01:44:21","modified_gmt":"2023-05-09T23:44:21","slug":"services","status":"publish","type":"page","link":"https:\/\/it-cybersec.expert\/index.php\/services\/","title":{"rendered":"Services"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; fullwidth=\u00a0\u00bbon\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; background_image=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/03\/blog-2-1.png\u00a0\u00bb background_position=\u00a0\u00bbbottom_center\u00a0\u00bb background_blend=\u00a0\u00bbluminosity\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_fullwidth_header title=\u00a0\u00bbServices\u00a0\u00bb subhead=\u00a0\u00bbAccueil | Nos Services \u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; title_font=\u00a0\u00bbPoppins|700|||||||\u00a0\u00bb title_font_size=\u00a0\u00bb65px\u00a0\u00bb subhead_font=\u00a0\u00bbPoppins|300|||||||\u00a0\u00bb subhead_font_size=\u00a0\u00bb19px\u00a0\u00bb background_enable_color=\u00a0\u00bboff\u00a0\u00bb custom_padding=\u00a0\u00bb80px||80px||false|false\u00a0\u00bb text_shadow_style=\u00a0\u00bbpreset5&Prime; text_shadow_horizontal_length=\u00a0\u00bb0.23em\u00a0\u00bb text_shadow_color=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; module_id=\u00a0\u00bbSERVICES-AUDIT\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; background_color=\u00a0\u00bb#f7f7f7&Prime; background_video_mp4=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/03\/4k-background-footage-ideal-for-Blockchain-Website-1.mp4&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.16&Prime; animation_style=\u00a0\u00bbslide\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; text_font=\u00a0\u00bbPoppins|600|||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#d6d6d6&Prime; text_font_size=\u00a0\u00bb17px\u00a0\u00bb text_letter_spacing=\u00a0\u00bb1px\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_2_font=\u00a0\u00bbPoppins|900|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb||9px|||\u00a0\u00bb custom_padding=\u00a0\u00bb1px|15px||15px|false|true\u00a0\u00bb text_text_shadow_style=\u00a0\u00bbpreset2&Prime; text_text_shadow_color=\u00a0\u00bb#000000&Prime; locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb header_5_text_color__hover=\u00a0\u00bb#3bad71&Prime; header_5_text_color__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb]<\/p>\n<p class=\"page-title\" style=\"text-align: center;\"><span>NOS SERVICES D&rsquo;AUDIT<\/span><\/p>\n<h2 class=\"tm-custom-heading \" style=\"text-align: center;\"><strong>Au sein de notre<span>\u00a0<\/span><strong class=\"green\">\u00e9quipe offensive<\/strong>, notre catalogue est vari\u00e9<\/strong><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=\u00a0\u00bb#ffffff\u00a0\u00bb divider_weight=\u00a0\u00bb3px\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; width=\u00a0\u00bb5%\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb||-21px||false|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; _builder_version=\u00a0\u00bb4.16&Prime; background_enable_color=\u00a0\u00bboff\u00a0\u00bb animation_style=\u00a0\u00bbbounce\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.16&Prime; box_shadow_style=\u00a0\u00bbpreset1&Prime; box_shadow_spread=\u00a0\u00bb-4px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/04\/21.jpg\u00a0\u00bb title_text=\u00a0\u00bbpost-img-004-740&#215;592&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; text_font=\u00a0\u00bbPoppins||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_2_font=\u00a0\u00bbPoppins|800|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_3_text_color=\u00a0\u00bb#e09900&Prime; custom_padding=\u00a0\u00bb|15px||15px|false|true\u00a0\u00bb header_2_text_shadow_style=\u00a0\u00bbpreset2&Prime; header_2_text_shadow_color=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb header_5_text_color__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb header_5_text_color__hover=\u00a0\u00bb#3bad71&Prime;]<\/p>\n<h2 style=\"text-align: center;\">Audit de configuration<\/h2>\n<div class=\"themetechmount-box-desc\">\n<div class=\"tm-short-desc\" style=\"text-align: center;\">Nous auditons la conformit\u00e9 de vos syst\u00e8mes (serveurs, infrastructures &#8230;) vis-\u00e0-vis de r\u00e9f\u00e9rentiels de s\u00e9curit\u00e9.<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h5 class=\"themetechmount-serviceboxbox-readmore\" style=\"text-align: center;\"><\/h5>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.16&Prime; box_shadow_style=\u00a0\u00bbpreset1&Prime; box_shadow_spread=\u00a0\u00bb-4px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/04\/09.jpg\u00a0\u00bb title_text=\u00a0\u00bbpost-img-002-740&#215;592&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; text_font=\u00a0\u00bbPoppins||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_2_font=\u00a0\u00bbPoppins|800|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb custom_padding=\u00a0\u00bb|15px||15px|false|true\u00a0\u00bb text_text_shadow_style=\u00a0\u00bbpreset2&Prime; text_text_shadow_color=\u00a0\u00bb#000000&Prime; header_2_text_shadow_style=\u00a0\u00bbpreset2&Prime; header_2_text_shadow_color=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb header_5_text_color__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb header_5_text_color__hover=\u00a0\u00bb#3bad71&Prime;]<\/p>\n<h2 style=\"text-align: center;\">Audit Red Team<\/h2>\n<div class=\"themetechmount-box-desc\">\n<div class=\"tm-short-desc\" style=\"text-align: center;\">Nous simulons une attaque r\u00e9elle pour tester la s\u00e9curit\u00e9 globale de votre syst\u00e8me d&rsquo;information<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h5 class=\"themetechmount-serviceboxbox-readmore\" style=\"text-align: center;\"><\/h5>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.16&Prime; box_shadow_style=\u00a0\u00bbpreset1&Prime; box_shadow_spread=\u00a0\u00bb-4px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/04\/03.jpg\u00a0\u00bb title_text=\u00a0\u00bbpost-img-003-740&#215;592&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; text_font=\u00a0\u00bbPoppins||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_2_font=\u00a0\u00bbPoppins|800|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb custom_padding=\u00a0\u00bb|15px||15px|false|true\u00a0\u00bb text_text_shadow_style=\u00a0\u00bbpreset2&Prime; text_text_shadow_color=\u00a0\u00bb#000000&Prime; header_2_text_shadow_style=\u00a0\u00bbpreset2&Prime; header_2_text_shadow_color=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb header_5_text_color__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb header_5_text_color__hover=\u00a0\u00bb#3bad71&Prime;]<\/p>\n<h2 style=\"text-align: center;\">Audit d&rsquo;application web<\/h2>\n<div class=\"themetechmount-box-desc\">\n<div class=\"tm-short-desc\" style=\"text-align: center;\">Nous r\u00e9alisons des tests d&rsquo;intrusion (pentests) afin d&rsquo;\u00e9valuer la s\u00e9curit\u00e9 de vos sites et applications web.<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h5 class=\"themetechmount-serviceboxbox-readmore\" style=\"text-align: center;\"><\/h5>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; _builder_version=\u00a0\u00bb4.16&Prime; background_enable_color=\u00a0\u00bboff\u00a0\u00bb animation_style=\u00a0\u00bbbounce\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.16&Prime; box_shadow_style=\u00a0\u00bbpreset1&Prime; box_shadow_spread=\u00a0\u00bb-4px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/04\/12.jpg\u00a0\u00bb title_text=\u00a0\u00bbpost-img-004-740&#215;592&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; text_font=\u00a0\u00bbPoppins||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_2_font=\u00a0\u00bbPoppins|800|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_3_text_color=\u00a0\u00bb#e09900&Prime; custom_padding=\u00a0\u00bb|15px||15px|false|true\u00a0\u00bb header_2_text_shadow_style=\u00a0\u00bbpreset2&Prime; header_2_text_shadow_color=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb header_5_text_color__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb header_5_text_color__hover=\u00a0\u00bb#3bad71&Prime;]<\/p>\n<h2 style=\"text-align: center;\">Audit d&rsquo;app mobile<\/h2>\n<div class=\"themetechmount-box-desc\">\n<div class=\"tm-short-desc\" style=\"text-align: center;\">Nous r\u00e9alisons des tests d&rsquo;intrusion (pentests) afin d&rsquo;\u00e9valuer la s\u00e9curit\u00e9 de vos applications mobiles Android et iOS.<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h5 class=\"themetechmount-serviceboxbox-readmore\" style=\"text-align: center;\"><\/h5>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.16&Prime; box_shadow_style=\u00a0\u00bbpreset1&Prime; box_shadow_spread=\u00a0\u00bb-4px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/04\/27.jpg\u00a0\u00bb title_text=\u00a0\u00bbpost-img-002-740&#215;592&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; text_font=\u00a0\u00bbPoppins||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_2_font=\u00a0\u00bbPoppins|800|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb custom_padding=\u00a0\u00bb|15px||15px|false|true\u00a0\u00bb text_text_shadow_style=\u00a0\u00bbpreset2&Prime; text_text_shadow_color=\u00a0\u00bb#000000&Prime; header_2_text_shadow_style=\u00a0\u00bbpreset2&Prime; header_2_text_shadow_color=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb header_5_text_color__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb header_5_text_color__hover=\u00a0\u00bb#3bad71&Prime;]<\/p>\n<h2 style=\"text-align: center;\">Audit interne (LAN)<\/h2>\n<div class=\"themetechmount-box-desc\">\n<div class=\"tm-short-desc\" style=\"text-align: center;\">Nous d\u00e9celons les failles de s\u00e9curit\u00e9 votre r\u00e9seau interne ou de vos locaux, et nous vous aidons \u00e0 les combler.<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h5 class=\"themetechmount-serviceboxbox-readmore\" style=\"text-align: center;\"><\/h5>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.16&Prime; box_shadow_style=\u00a0\u00bbpreset1&Prime; box_shadow_spread=\u00a0\u00bb-4px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/04\/13.jpg\u00a0\u00bb title_text=\u00a0\u00bbpost-img-003-740&#215;592&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; text_font=\u00a0\u00bbPoppins||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_2_font=\u00a0\u00bbPoppins|800|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb custom_padding=\u00a0\u00bb|15px||15px|false|true\u00a0\u00bb text_text_shadow_style=\u00a0\u00bbpreset2&Prime; text_text_shadow_color=\u00a0\u00bb#000000&Prime; header_2_text_shadow_style=\u00a0\u00bbpreset2&Prime; header_2_text_shadow_color=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb header_5_text_color__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb header_5_text_color__hover=\u00a0\u00bb#3bad71&Prime;]<\/p>\n<h2 style=\"text-align: center;\">Audit de code<\/h2>\n<div class=\"themetechmount-box-desc\">\n<div class=\"tm-short-desc\" style=\"text-align: center;\">Nous auditons le code source de vos applications avec un regard s\u00e9curit\u00e9, \u00e0 la recherche de failles applicatives courantes.<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h5 class=\"themetechmount-serviceboxbox-readmore\" style=\"text-align: center;\"><\/h5>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; _builder_version=\u00a0\u00bb4.16&Prime; background_enable_color=\u00a0\u00bboff\u00a0\u00bb animation_style=\u00a0\u00bbbounce\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.16&Prime; box_shadow_style=\u00a0\u00bbpreset1&Prime; box_shadow_spread=\u00a0\u00bb-4px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/04\/04.jpg\u00a0\u00bb title_text=\u00a0\u00bbpost-img-004-740&#215;592&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; text_font=\u00a0\u00bbPoppins||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_2_font=\u00a0\u00bbPoppins|800|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_3_text_color=\u00a0\u00bb#e09900&Prime; custom_padding=\u00a0\u00bb|15px||15px|false|true\u00a0\u00bb header_2_text_shadow_style=\u00a0\u00bbpreset2&Prime; header_2_text_shadow_color=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb header_5_text_color__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb header_5_text_color__hover=\u00a0\u00bb#3bad71&Prime;]<\/p>\n<h2 style=\"text-align: center;\">Audit de syst\u00e8mes industriels<\/h2>\n<div class=\"themetechmount-box-desc\">\n<div class=\"tm-short-desc\" style=\"text-align: center;\">Nous apportons le soin n\u00e9cessaire \u00e0 l&rsquo;audit de vos syst\u00e8mes industriels, leur r\u00e9seau et les passerelles d&rsquo;acc\u00e8s vers celui-ci.<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h5 class=\"themetechmount-serviceboxbox-readmore\" style=\"text-align: center;\"><\/h5>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.16&Prime; box_shadow_style=\u00a0\u00bbpreset1&Prime; box_shadow_spread=\u00a0\u00bb-4px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/04\/15.jpg\u00a0\u00bb title_text=\u00a0\u00bbpost-img-002-740&#215;592&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; text_font=\u00a0\u00bbPoppins||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_2_font=\u00a0\u00bbPoppins|800|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb custom_padding=\u00a0\u00bb|15px||15px|false|true\u00a0\u00bb text_text_shadow_style=\u00a0\u00bbpreset2&Prime; text_text_shadow_color=\u00a0\u00bb#000000&Prime; header_2_text_shadow_style=\u00a0\u00bbpreset2&Prime; header_2_text_shadow_color=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb header_5_text_color__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb header_5_text_color__hover=\u00a0\u00bb#3bad71&Prime;]<\/p>\n<h2 style=\"text-align: center;\">Audit d&rsquo;infrastructure<\/h2>\n<div class=\"themetechmount-box-desc\">\n<div class=\"tm-short-desc\" style=\"text-align: center;\">Nous auditons vos plages d&rsquo;adresses IP ainsi que vos infrastructures afin d&rsquo;\u00e9valuer leur niveau de s\u00e9curit\u00e9.<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h5 class=\"themetechmount-serviceboxbox-readmore\" style=\"text-align: center;\"><\/h5>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.16&Prime; box_shadow_style=\u00a0\u00bbpreset1&Prime; box_shadow_spread=\u00a0\u00bb-4px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/04\/22.jpg\u00a0\u00bb title_text=\u00a0\u00bbpost-img-003-740&#215;592&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; text_font=\u00a0\u00bbPoppins||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_2_font=\u00a0\u00bbPoppins|800|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb custom_padding=\u00a0\u00bb|15px||15px|false|true\u00a0\u00bb text_text_shadow_style=\u00a0\u00bbpreset2&Prime; text_text_shadow_color=\u00a0\u00bb#000000&Prime; header_2_text_shadow_style=\u00a0\u00bbpreset2&Prime; header_2_text_shadow_color=\u00a0\u00bb#000000&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb header_5_text_color__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb header_5_text_color__hover=\u00a0\u00bb#3bad71&Prime;]<\/p>\n<h2 style=\"text-align: center;\">Audit d&rsquo;environnement IoT<\/h2>\n<div class=\"themetechmount-box-desc\">\n<div class=\"tm-short-desc\" style=\"text-align: center;\">Nous \u00e9valuons la s\u00e9curit\u00e9 de vos environnements IoT et de vos objets connect\u00e9s.<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h5 class=\"themetechmount-serviceboxbox-readmore\" style=\"text-align: center;\"><\/h5>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; module_id=\u00a0\u00bbSERVICES-CONSEIL\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; background_video_mp4=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/03\/Free-Background-Video-Effects-HD-2.mp4&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.16&Prime; animation_style=\u00a0\u00bbzoom\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; text_font=\u00a0\u00bbPoppins||||||||\u00a0\u00bb text_font_size=\u00a0\u00bb18px\u00a0\u00bb text_line_height=\u00a0\u00bb1.8em\u00a0\u00bb header_2_font=\u00a0\u00bbPoppins|800|||||||\u00a0\u00bb header_2_text_align=\u00a0\u00bbcenter\u00a0\u00bb header_2_text_color=\u00a0\u00bb#000000&Prime; custom_margin=\u00a0\u00bb||9px|||\u00a0\u00bb custom_padding=\u00a0\u00bb|15px||15px|false|true\u00a0\u00bb text_font_size_tablet=\u00a0\u00bb\u00a0\u00bb text_font_size_phone=\u00a0\u00bb22px\u00a0\u00bb text_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb text_line_height_tablet=\u00a0\u00bb\u00a0\u00bb text_line_height_phone=\u00a0\u00bb2em\u00a0\u00bb text_line_height_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb header_2_font_size_tablet=\u00a0\u00bb\u00a0\u00bb header_2_font_size_phone=\u00a0\u00bb20px\u00a0\u00bb header_2_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb header_2_line_height_tablet=\u00a0\u00bb\u00a0\u00bb header_2_line_height_phone=\u00a0\u00bb1.4em\u00a0\u00bb header_2_line_height_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb text_text_shadow_style=\u00a0\u00bbpreset4&Prime; text_text_shadow_color=\u00a0\u00bbrgba(0,0,0,0)\u00a0\u00bb text_text_shadow_color_tablet=\u00a0\u00bb\u00a0\u00bb text_text_shadow_color_phone=\u00a0\u00bb#ffffff\u00a0\u00bb text_text_shadow_color_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb header_2_text_shadow_style=\u00a0\u00bbpreset3&Prime; locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb header_5_text_color__hover=\u00a0\u00bb#3bad71&Prime; header_5_text_color__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb]<\/p>\n<p class=\"tm-custom-heading \" style=\"text-align: center;\"><span>NOS SERVICES CONSEIL<\/span><\/p>\n<h2 class=\"tm-custom-heading \" style=\"text-align: center;\"><strong>Notre<span>\u00a0<\/span><strong class=\"green\">\u00e9quipe d\u00e9fensive<\/strong><span>\u00a0<\/span>vous propose de nombreuses missions en conseil SSI<\/strong><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=\u00a0\u00bb#0c71c3&Prime; divider_weight=\u00a0\u00bb3px\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; width=\u00a0\u00bb5%\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb||-21px||false|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; _builder_version=\u00a0\u00bb4.16&Prime; width=\u00a0\u00bb90%\u00a0\u00bb max_width=\u00a0\u00bb2080px\u00a0\u00bb animation_style=\u00a0\u00bbfold\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/04\/0202.jpg\u00a0\u00bb title_text=\u00a0\u00bbsingle-image-08&Prime; _builder_version=\u00a0\u00bb4.16&Prime; width=\u00a0\u00bb100%\u00a0\u00bb max_width=\u00a0\u00bb100%\u00a0\u00bb min_height=\u00a0\u00bb655px\u00a0\u00bb min_height_tablet=\u00a0\u00bb\u00a0\u00bb min_height_phone=\u00a0\u00bb359px\u00a0\u00bb min_height_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_toggle title=\u00a0\u00bbAccompagnement en s\u00e9curit\u00e9\u00a0\u00bb open=\u00a0\u00bbon\u00a0\u00bb open_toggle_text_color=\u00a0\u00bb#3bad71&Prime; closed_toggle_text_color=\u00a0\u00bb#474747&Prime; icon_color=\u00a0\u00bb#3bad71&Prime; open_icon_color=\u00a0\u00bb#3bad71&Prime; _builder_version=\u00a0\u00bb4.16&Prime; title_font=\u00a0\u00bb|700|||||||\u00a0\u00bb title_font_size=\u00a0\u00bb16px\u00a0\u00bb closed_title_font=\u00a0\u00bb|700|||||||\u00a0\u00bb body_font_size=\u00a0\u00bb15px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: justify;\"><span>IT-CyberSec Expert\u00a0vous accompagne dans la mise en \u0153uvre de solutions permettant la\u00a0s\u00e9curisation de votre syst\u00e8me d&rsquo;information.\u00a0Nos consultants sont \u00e0 la disposition de nos clients, pour des missions courte ou longue dur\u00e9e. Actuellement, plusieurs de nos consultants interviennent aupr\u00e8s de grands groupes .<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00a0\u00bbAnalyse Forensique et investigation num\u00e9riques  \u00a0\u00bb open_toggle_text_color=\u00a0\u00bb#12876f\u00a0\u00bb closed_toggle_text_color=\u00a0\u00bb#474747&Prime; icon_color=\u00a0\u00bb#128752&Prime; open_icon_color=\u00a0\u00bb#128752&Prime; _builder_version=\u00a0\u00bb4.16&Prime; title_text_color=\u00a0\u00bb#000000&Prime; title_font=\u00a0\u00bb|700|||||||\u00a0\u00bb title_font_size=\u00a0\u00bb16px\u00a0\u00bb closed_title_font=\u00a0\u00bb|700|||||||\u00a0\u00bb body_font_size=\u00a0\u00bb15px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: justify;\">L&rsquo;analyse forensic est une science qui s&rsquo;int\u00e9resse \u00e0 la recherche de preuves sur des supports num\u00e9riques pour comprendre un comportement, rem\u00e9dier \u00e0 un incident et aider \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es. Ces preuves sont des traces, des art\u00e9facts num\u00e9riques qui fournissent des informations qui, mises bout-\u00e0-bout, permettent de d\u00e9gager un sc\u00e9nario factuel d&rsquo;\u00e9v\u00e8nements et d&rsquo;apporter des r\u00e9ponses aux questions que peut se poser le demandeur.<\/p>\n<p style=\"text-align: justify;\">L&rsquo;analyse forensique est encore appel\u00e9e investigation num\u00e9rique, digital forensics, inforensique ou informatique l\u00e9gale.<\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00a0\u00bbFormation et sensibilisation \u00e0 la s\u00e9curit\u00e9\u00a0\u00bb open_toggle_text_color=\u00a0\u00bb#12876f\u00a0\u00bb closed_toggle_text_color=\u00a0\u00bb#474747&Prime; icon_color=\u00a0\u00bb#12876f\u00a0\u00bb open_icon_color=\u00a0\u00bb#12876f\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; title_text_color=\u00a0\u00bb#000000&Prime; title_font=\u00a0\u00bb|700|||||||\u00a0\u00bb title_font_size=\u00a0\u00bb16px\u00a0\u00bb closed_title_font=\u00a0\u00bb|700|||||||\u00a0\u00bb body_font_size=\u00a0\u00bb15px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Nous proposons diff\u00e9rentes formations, selon le public vis\u00e9 : des formations avanc\u00e9es destin\u00e9es \u00e0 votre personnel technique et une sensibilisation \u00e0 la s\u00e9curit\u00e9 informatique aupr\u00e8s de vos utilisateurs.<\/p>\n<p>Nous proposons \u00e0 nos clients de simuler une campagne de phishing aupr\u00e8s de leurs employ\u00e9s, et ce afin d&rsquo;avoir un aper\u00e7u du taux de vuln\u00e9rabilit\u00e9 de l&rsquo;entreprise face \u00e0 cette menace. Deux campagnes sont g\u00e9n\u00e9ralement lanc\u00e9es : l&rsquo;une avant la sensibilisation, l&rsquo;autre apr\u00e8s la sensibilisation, et ce afin de tester l&rsquo;efficacit\u00e9 de celle-ci. Nous avons compil\u00e9 ci-dessous les r\u00e9sultats de la derni\u00e8re campagne de phishing que nous avons effectu\u00e9e.<\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00a0\u00bbSupervision de vos infrastructures et services\u00a0\u00bb open_toggle_text_color=\u00a0\u00bb#12876f\u00a0\u00bb closed_toggle_text_color=\u00a0\u00bb#474747&Prime; icon_color=\u00a0\u00bb#12876f\u00a0\u00bb open_icon_color=\u00a0\u00bb#12876f\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; title_text_color=\u00a0\u00bb#000000&Prime; title_font=\u00a0\u00bb|700|||||||\u00a0\u00bb title_font_size=\u00a0\u00bb16px\u00a0\u00bb closed_title_font=\u00a0\u00bb|700|||||||\u00a0\u00bb body_font_size=\u00a0\u00bb15px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: justify;\">Nous mettons \u00e0 votre disposition une plateforme de supervision en mode SaaS d\u00e9velopp\u00e9e par nos ing\u00e9nieurs. Accessible 24h\/24, 7j\/7, elle vous permettra d&rsquo;avoir une vision globale de l&rsquo;\u00e9tat de sant\u00e9 de vos services, pilotables depuis une interface web personnalis\u00e9e.<\/p>\n<p style=\"text-align: justify;\">Cet outil vous alerte en temps r\u00e9el en cas d&rsquo;anomalie ou de panne d\u00e9tect\u00e9e. La supervision est relative \u00e0 l&rsquo;infrastructure (r\u00e9seau, sites web, switchs, pare-feux, serveurs) et aux applications m\u00e9tiers (ERP, CRM, syst\u00e8mes industriels).<\/p>\n<p>NB: En cours de conception !<\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00a0\u00bbInt\u00e9gration de solutions SSI\u00a0\u00bb open_toggle_text_color=\u00a0\u00bb#e02b20&Prime; closed_toggle_text_color=\u00a0\u00bb#474747&Prime; icon_color=\u00a0\u00bb#e02b20&Prime; open_icon_color=\u00a0\u00bb#e02b20&Prime; _builder_version=\u00a0\u00bb4.16&Prime; title_text_color=\u00a0\u00bb#000000&Prime; title_font=\u00a0\u00bb|700|||||||\u00a0\u00bb title_font_size=\u00a0\u00bb16px\u00a0\u00bb closed_title_font=\u00a0\u00bb|700|||||||\u00a0\u00bb body_font_size=\u00a0\u00bb15px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: justify;\">Afin d&rsquo;\u00e9largir ses comp\u00e9tences, <span>IT-CyberSec Expert\u00a0<\/span>collabore de mani\u00e8re pragmatique avec diff\u00e9rents partenaires innovants, leaders ou challengers, selon les besoins de chaque client. Ces relations \u00e9troites permettent de vous assurer une solution globale et efficace gr\u00e2ce \u00e0 notre expertise operationnelle appuy\u00e9e par nos missions de conseil et d\u2019ing\u00e9nierie. Nos interventions s&rsquo;effectuent en toute ind\u00e9pendance vis \u00e0 vis des \u00e9diteurs.<\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00a0\u00bbAnalyse du risque cybers\u00e9curit\u00e9\u00a0\u00bb open_toggle_text_color=\u00a0\u00bb#e02b20&Prime; closed_toggle_text_color=\u00a0\u00bb#474747&Prime; icon_color=\u00a0\u00bb#e02b20&Prime; open_icon_color=\u00a0\u00bb#e02b20&Prime; _builder_version=\u00a0\u00bb4.16&Prime; title_text_color=\u00a0\u00bb#000000&Prime; title_font=\u00a0\u00bb|700|||||||\u00a0\u00bb title_font_size=\u00a0\u00bb16px\u00a0\u00bb closed_title_font=\u00a0\u00bb|700|||||||\u00a0\u00bb body_font_size=\u00a0\u00bb15px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: justify;\">La connaissance de votre propre syst\u00e8me d&rsquo;information est un pr\u00e9alable important \u00e0 sa s\u00e9curisation. S&rsquo;il comprend des \u00e9quipements omis des inventaires, ceux-ci risquent de devenir rapidement obsol\u00e8tes, ce qui en fera donc des cibles de choix pour un attaquant.<\/p>\n<p style=\"text-align: justify;\">C&rsquo;est pourquoi il est essentiel de disposer d&rsquo;une connaissance pr\u00e9cise de l&rsquo;installation informatique de votre entit\u00e9.<\/p>\n<p style=\"text-align: justify;\">L&rsquo;analyse de risques est une \u00e9tape pr\u00e9alable \u00e0 la s\u00e9curisation de votre syst\u00e8me d&rsquo;information, et permet d&rsquo;\u00e9valuer les \u00e9ventualit\u00e9s et les cons\u00e9quences plausibles de multiples risques, avant de d\u00e9cider des actions \u00e0 mener et de leur ordonnancement.<\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00a0\u00bbAide contre les ransomware\u00a0\u00bb open_toggle_text_color=\u00a0\u00bb#e02b20&Prime; closed_toggle_text_color=\u00a0\u00bb#474747&Prime; icon_color=\u00a0\u00bb#e02b20&Prime; open_icon_color=\u00a0\u00bb#e02b20&Prime; _builder_version=\u00a0\u00bb4.16&Prime; title_text_color=\u00a0\u00bb#000000&Prime; title_font=\u00a0\u00bb|700|||||||\u00a0\u00bb title_font_size=\u00a0\u00bb16px\u00a0\u00bb closed_title_font=\u00a0\u00bb|700|||||||\u00a0\u00bb body_font_size=\u00a0\u00bb15px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Les Ransomware ou ran\u00e7ongiciels, aussi couramment appel\u00e9s par abus de langage \u00ab\u00a0cryptolockers\u00a0\u00bb du nom du plus connu d&rsquo;entre eux, sont une menace informatique ayant pour objectif de faire payer une ran\u00e7on aux victimes. G\u00e9n\u00e9ralement, ils emp\u00eachent l&rsquo;acc\u00e8s aux fichiers personnels des utilisateurs compromis. Une variante plus r\u00e9cente, appel\u00e9e extorsionware, menacent de bloquer l&rsquo;acc\u00e8s \u00e0 des comptes en ligne, ou de diffuser des donn\u00e9es personnelles ou vid\u00e9os compromettantes.<\/p>\n<p>De mani\u00e8re g\u00e9n\u00e9rale, se prot\u00e9ger des ransomware demande du temps et de l&rsquo;investissement dans des comp\u00e9tences et des outils. Le jeu en vaut-il la chandelle ? Tout d\u00e9pend de l&rsquo;importance que vous accordez \u00e0 vos donn\u00e9es, ainsi que de la perte de temps et du stress que vous \u00eatres pr\u00eats \u00e0 accepter en cas d&rsquo;infection.<\/p>\n<p>[\/et_pb_toggle][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.16&Prime; background_color=\u00a0\u00bbrgba(10,10,10,0.65)\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/03\/callout-section.jpg\u00a0\u00bb background_blend=\u00a0\u00bbcolor\u00a0\u00bb custom_padding=\u00a0\u00bb||42px||false|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.16&Prime; animation_style=\u00a0\u00bbzoom\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/example2.demodomain1.com\/wp-content\/uploads\/2020\/11\/play-button.png\u00a0\u00bb title_text=\u00a0\u00bbplay-button\u00a0\u00bb align=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; width=\u00a0\u00bb5%\u00a0\u00bb filter_brightness=\u00a0\u00bb0%\u00a0\u00bb filter_contrast=\u00a0\u00bb0%\u00a0\u00bb filter_sepia=\u00a0\u00bb22%\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; text_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb text_font_size=\u00a0\u00bb18px\u00a0\u00bb header_2_font=\u00a0\u00bb|600|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb header_2_font_size=\u00a0\u00bb35px\u00a0\u00bb header_2_letter_spacing=\u00a0\u00bb2px\u00a0\u00bb header_2_line_height=\u00a0\u00bb1.3em\u00a0\u00bb custom_margin=\u00a0\u00bb||9px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb||||false|false\u00a0\u00bb text_font_size_tablet=\u00a0\u00bb\u00a0\u00bb text_font_size_phone=\u00a0\u00bb17px\u00a0\u00bb text_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb header_2_font_size_tablet=\u00a0\u00bb\u00a0\u00bb header_2_font_size_phone=\u00a0\u00bb25px\u00a0\u00bb header_2_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb header_2_text_shadow_style=\u00a0\u00bbpreset3&Prime; locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p class=\"tm-custom-heading \" style=\"text-align: center;\"><em><strong>La vision de notre soci\u00e9t\u00e9<\/strong><\/em><\/p>\n<h2 class=\"tm-custom-heading \" style=\"text-align: center;\"><\/h2>\n<h2 class=\"tm-custom-heading \" style=\"text-align: center;\"><strong>IT-CyberSec Expert<\/strong> appuie sa d\u00e9marche sur une vision globale du syst\u00e8me d&rsquo;information. En pla\u00e7ant l&rsquo;innovation au c\u0153ur de l&rsquo;entreprise.<\/h2>\n<h2 class=\"tm-custom-heading \" style=\"text-align: center;\"><em> IT-CyberSec Expert investit dans l&rsquo;avenir<\/em><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.16&Prime; animation_style=\u00a0\u00bbflip\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; text_font=\u00a0\u00bbPoppins||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#6b6b6b\u00a0\u00bb text_font_size=\u00a0\u00bb16px\u00a0\u00bb header_2_font=\u00a0\u00bb|700|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bb#000000&Prime; header_2_font_size=\u00a0\u00bb33px\u00a0\u00bb custom_margin=\u00a0\u00bb||9px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb||||false|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p class=\"tm-custom-heading\" align=\"center\" style=\"text-align: center;\">\u00c9QUIPE EXCEPTIONNELLE<o:p><\/o:p><\/p>\n<h2 class=\"tm-custom-heading \" style=\"text-align: center;\">Nos consultants appr\u00e9cient leur m\u00e9tier<\/h2>\n<p>[\/et_pb_text][et_pb_divider color=\u00a0\u00bb#0c71c3&Prime; divider_weight=\u00a0\u00bb3px\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; width=\u00a0\u00bb5%\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb||-21px||false|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_4,1_4,1_4,1_4&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; _builder_version=\u00a0\u00bb4.19.2&Prime; width=\u00a0\u00bb90%\u00a0\u00bb max_width=\u00a0\u00bb2080px\u00a0\u00bb animation_style=\u00a0\u00bbbounce\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.19.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_testimonial author=\u00a0\u00bbKHELIFI Saif\u00a0\u00bb job_title=\u00a0\u00bbCEO &#8211; Founder &#038; Expert SSI\u00a0\u00bb portrait_url=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2023\/05\/01011.jpg\u00a0\u00bb quote_icon_color=\u00a0\u00bbrgba(0,0,0,0)\u00a0\u00bb portrait_width=\u00a0\u00bb120px\u00a0\u00bb portrait_height=\u00a0\u00bb120px\u00a0\u00bb _builder_version=\u00a0\u00bb4.21.0&Prime; body_font=\u00a0\u00bbPoppins|300|||||||\u00a0\u00bb body_text_align=\u00a0\u00bbcenter\u00a0\u00bb author_font=\u00a0\u00bbAlegreya Sans SC|800|||||||\u00a0\u00bb author_text_color=\u00a0\u00bb#000000&Prime; author_font_size=\u00a0\u00bb20px\u00a0\u00bb author_letter_spacing=\u00a0\u00bb2px\u00a0\u00bb position_font=\u00a0\u00bb|600|||||||\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; author_text_shadow_style=\u00a0\u00bbpreset2&Prime; border_radii=\u00a0\u00bboff|||15px|15px\u00a0\u00bb border_color_all=\u00a0\u00bb#e02b20&Prime; border_width_bottom=\u00a0\u00bb3px\u00a0\u00bb border_color_bottom=\u00a0\u00bb#3bad71&Prime; box_shadow_style=\u00a0\u00bbpreset1&Prime; box_shadow_spread=\u00a0\u00bb-8px\u00a0\u00bb box_shadow_style_image=\u00a0\u00bbpreset2&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb border_radii__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb border_radii__hover=\u00a0\u00bboff|||155px|15px\u00a0\u00bb title_text=\u00a0\u00bb01011&Prime; sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<p style=\"text-align: justify;\"><span><strong>Expert Auditeur SSI certifi\u00e9\u00a0 par l&rsquo;Agence Nationale de la S\u00e9curit\u00e9 Informatique,<\/strong> <strong>ISO\/IEC 27001Senior Lead Auditor &#8211; ISO\/IEC 27001 Senior Lead Implementer,<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span>Expert Consultant\u00a0Nationale de S\u00e9curit\u00e9 &amp; S\u00fbret\u00e9 \u00ab\u00a0certifi\u00e9 par le minist\u00e8re de transport\u00a0\u00bb et Internationale \u00ab\u00a0certifi\u00e9 par l&rsquo;OACI\u00a0\u00bb<\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_testimonial author=\u00a0\u00bbARFAOUI Anis\u00a0\u00bb job_title=\u00a0\u00bbExpert Auditeur Senoir  SSI\u00a0\u00bb portrait_url=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2022\/12\/dddd.jpg\u00a0\u00bb quote_icon_color=\u00a0\u00bbrgba(0,0,0,0)\u00a0\u00bb portrait_width=\u00a0\u00bb120px\u00a0\u00bb portrait_height=\u00a0\u00bb120px\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.2&Prime; body_font=\u00a0\u00bbPoppins|300|||||||\u00a0\u00bb body_text_align=\u00a0\u00bbcenter\u00a0\u00bb author_font=\u00a0\u00bbAlegreya Sans SC|800|||||||\u00a0\u00bb author_text_color=\u00a0\u00bb#000000&Prime; author_font_size=\u00a0\u00bb20px\u00a0\u00bb author_letter_spacing=\u00a0\u00bb2px\u00a0\u00bb position_font=\u00a0\u00bb|600|||||||\u00a0\u00bb author_text_shadow_style=\u00a0\u00bbpreset2&Prime; border_radii=\u00a0\u00bboff|||15px|15px\u00a0\u00bb border_color_all=\u00a0\u00bb#e02b20&Prime; border_width_bottom=\u00a0\u00bb3px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; box_shadow_spread=\u00a0\u00bb-8px\u00a0\u00bb box_shadow_style_image=\u00a0\u00bbpreset2&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb border_radii__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb border_radii__hover=\u00a0\u00bboff|||155px|15px\u00a0\u00bb]<\/p>\n<p style=\"text-align: justify;\"><strong>Expert, ing\u00e9nieur et consultant en s\u00e9curit\u00e9 informatique, <span>ISO\/IEC 27001Senior Lead Auditor &#8211; ISO\/IEC 27001 Senior Lead Implementer,<\/span><\/strong><\/p>\n<p style=\"text-align: justify;\">Formateur depuis 17 ans dans le domaine d\u2019IT, pentester en blue Team, formateur de Cyberd\u00e9fense Qualifi\u00e9 .<\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.19.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_testimonial author=\u00a0\u00bbNACHET Iheb\u00a0\u00bb job_title=\u00a0\u00bbExpert DevSecOps &#038; Auditeur SSI\u00a0\u00bb portrait_url=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2022\/12\/dsfs.jpg\u00a0\u00bb quote_icon_color=\u00a0\u00bbrgba(0,0,0,0)\u00a0\u00bb portrait_width=\u00a0\u00bb120px\u00a0\u00bb portrait_height=\u00a0\u00bb120px\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.2&Prime; body_font=\u00a0\u00bbPoppins|300|||||||\u00a0\u00bb body_text_align=\u00a0\u00bbcenter\u00a0\u00bb author_font=\u00a0\u00bbAlegreya Sans SC|800|||||||\u00a0\u00bb author_text_color=\u00a0\u00bb#000000&Prime; author_font_size=\u00a0\u00bb20px\u00a0\u00bb author_letter_spacing=\u00a0\u00bb2px\u00a0\u00bb position_font=\u00a0\u00bb|600|||||||\u00a0\u00bb author_text_shadow_style=\u00a0\u00bbpreset2&Prime; border_radii=\u00a0\u00bboff|||15px|15px\u00a0\u00bb border_color_all=\u00a0\u00bb#e02b20&Prime; border_width_bottom=\u00a0\u00bb3px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; box_shadow_spread=\u00a0\u00bb-8px\u00a0\u00bb box_shadow_style_image=\u00a0\u00bbpreset2&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb border_radii__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb border_radii__hover=\u00a0\u00bboff|||155px|15px\u00a0\u00bb]<\/p>\n<p style=\"text-align: justify;\"><strong>Expert, ing\u00e9nieur DevSecOps et consultant\u00a0 en s\u00e9curit\u00e9 informatique, <span>,<\/span><\/strong><\/p>\n<p style=\"text-align: justify;\">DevSecOps depuis 06 ans, expert dans le domaine d\u2019IT, pentester en blue Team, formateur de Cyberd\u00e9fense Qualifi\u00e9 .<\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_testimonial author=\u00a0\u00bbMANSOURI Mohamed \u00a0\u00bb job_title=\u00a0\u00bbExpert S\u00e9curit\u00e9 Infrastructure &#038; R\u00e9seau \u00a0\u00bb portrait_url=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/04\/Capture-decran-2021-04-08-214033.png\u00a0\u00bb quote_icon_color=\u00a0\u00bbrgba(0,0,0,0)\u00a0\u00bb quote_icon_background_color=\u00a0\u00bbrgba(0,0,0,0)\u00a0\u00bb portrait_width=\u00a0\u00bb120px\u00a0\u00bb portrait_height=\u00a0\u00bb120px\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; body_font=\u00a0\u00bbPoppins|300|||||||\u00a0\u00bb body_text_align=\u00a0\u00bbcenter\u00a0\u00bb author_font=\u00a0\u00bbAlegreya Sans SC|800|||||||\u00a0\u00bb author_text_color=\u00a0\u00bb#000000&Prime; author_font_size=\u00a0\u00bb20px\u00a0\u00bb author_letter_spacing=\u00a0\u00bb2px\u00a0\u00bb position_font=\u00a0\u00bb|600|||||||\u00a0\u00bb author_text_shadow_style=\u00a0\u00bbpreset1&Prime; border_radii=\u00a0\u00bboff|||15px|15px\u00a0\u00bb border_color_all=\u00a0\u00bb#e02b20&Prime; border_width_bottom=\u00a0\u00bb3px\u00a0\u00bb border_color_bottom=\u00a0\u00bb#e09900&Prime; box_shadow_style=\u00a0\u00bbpreset1&Prime; box_shadow_spread=\u00a0\u00bb-8px\u00a0\u00bb box_shadow_style_image=\u00a0\u00bbpreset2&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb border_radii__hover_enabled=\u00a0\u00bbon|desktop\u00a0\u00bb border_radii__hover=\u00a0\u00bboff|||155px|15px\u00a0\u00bb]<\/p>\n<p style=\"text-align: justify;\"><strong>Administrateur Senior Syst\u00e8me &amp; R\u00e9seau,\u00a0<\/strong>Certifi\u00e9 Linux Administration syst\u00e8me et r\u00e9seau LPIC 1,\u00a0Certifi\u00e9 DevOps Tools Engineer \u00e0 LPI,\u00a0Certifi\u00e9 CCNA Routing &amp; Switching 200-120, Expert en Cisco technologie<\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; disabled_on=\u00a0\u00bbon|on|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; background_color=\u00a0\u00bb#f7f7f7&Prime; locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; _builder_version=\u00a0\u00bb4.16&Prime; width=\u00a0\u00bb90%\u00a0\u00bb width_tablet=\u00a0\u00bb\u00a0\u00bb width_phone=\u00a0\u00bb70%\u00a0\u00bb width_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb max_width=\u00a0\u00bb1280px\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb module_alignment_tablet=\u00a0\u00bb\u00a0\u00bb module_alignment_phone=\u00a0\u00bbcenter\u00a0\u00bb module_alignment_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/03\/llll.png\u00a0\u00bb title_text=\u00a0\u00bbllll\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.2&Prime; max_width=\u00a0\u00bb75%\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/03\/logo2222.png\u00a0\u00bb title_text=\u00a0\u00bbclient-logo2&Prime; _builder_version=\u00a0\u00bb4.16&Prime; max_width=\u00a0\u00bb88%\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/it-cybersec.expert\/wp-content\/uploads\/2021\/04\/0606.png\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; max_width=\u00a0\u00bb48%\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NOS SERVICES D&rsquo;AUDIT Au sein de notre\u00a0\u00e9quipe offensive, notre catalogue est vari\u00e9Audit de configuration Nous auditons la conformit\u00e9 de vos syst\u00e8mes (serveurs, infrastructures &#8230;) vis-\u00e0-vis de r\u00e9f\u00e9rentiels de s\u00e9curit\u00e9. &nbsp; Audit Red Team Nous simulons une attaque r\u00e9elle pour tester la s\u00e9curit\u00e9 globale de votre syst\u00e8me d&rsquo;information &nbsp; Audit d&rsquo;application web Nous r\u00e9alisons des tests [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"_links":{"self":[{"href":"https:\/\/it-cybersec.expert\/index.php\/wp-json\/wp\/v2\/pages\/74"}],"collection":[{"href":"https:\/\/it-cybersec.expert\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/it-cybersec.expert\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/it-cybersec.expert\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/it-cybersec.expert\/index.php\/wp-json\/wp\/v2\/comments?post=74"}],"version-history":[{"count":36,"href":"https:\/\/it-cybersec.expert\/index.php\/wp-json\/wp\/v2\/pages\/74\/revisions"}],"predecessor-version":[{"id":676,"href":"https:\/\/it-cybersec.expert\/index.php\/wp-json\/wp\/v2\/pages\/74\/revisions\/676"}],"wp:attachment":[{"href":"https:\/\/it-cybersec.expert\/index.php\/wp-json\/wp\/v2\/media?parent=74"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}