{"id":4404,"date":"2024-08-29T07:40:11","date_gmt":"2024-08-29T05:40:11","guid":{"rendered":"https:\/\/www.informatiqueauchateau.be\/?page_id=4404"},"modified":"2025-10-06T11:13:05","modified_gmt":"2025-10-06T09:13:05","slug":"atelier-cybersecurite","status":"publish","type":"page","link":"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/","title":{"rendered":"Atelier Cybers\u00e9curit\u00e9"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4404\" class=\"elementor elementor-4404\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-61f14ba elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"61f14ba\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e848008\" data-id=\"e848008\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-146efd1 elementor-widget elementor-widget-image\" data-id=\"146efd1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"580\" height=\"145\" src=\"https:\/\/www.informatiqueauchateau.be\/wp-content\/uploads\/2024\/09\/Logo-2019-Banniere-1024x256.png\" class=\"attachment-large size-large wp-image-4681\" alt=\"\" srcset=\"https:\/\/www.informatiqueauchateau.be\/wp-content\/uploads\/2024\/09\/Logo-2019-Banniere-1024x256.png 1024w, https:\/\/www.informatiqueauchateau.be\/wp-content\/uploads\/2024\/09\/Logo-2019-Banniere-300x75.png 300w, https:\/\/www.informatiqueauchateau.be\/wp-content\/uploads\/2024\/09\/Logo-2019-Banniere-768x192.png 768w, https:\/\/www.informatiqueauchateau.be\/wp-content\/uploads\/2024\/09\/Logo-2019-Banniere.png 1031w\" sizes=\"(max-width: 580px) 100vw, 580px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21825cf elementor-align-center elementor-widget elementor-widget-button\" data-id=\"21825cf\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/forms.gle\/ss7J4A94XEY7SpBJ8\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Vers le formulaire de demande d'inscription ou de renseignements<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fc53f2 elementor-widget elementor-widget-text-editor\" data-id=\"1fc53f2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Tu souhaites prot\u00e9ger tes informations en ligne et \u00e9viter les pi\u00e8ges des cybercriminels ? Participe \u00e0 notre nouvel atelier participatif sur la cybers\u00e9curit\u00e9 au quotidien ! Dans une ambiance conviviale, tu apprendras les bonnes pratiques pour s\u00e9curiser tes mots de passe, comprendre ce qu&#8217;est une fuite de donn\u00e9es et ses cons\u00e9quences, prot\u00e9ger ta messagerie, comprendre l&#8217;importance de l&#8217;authentification \u00e0 2 facteurs et te d\u00e9fendre contre les arnaques comme le phishing, le quishing ou le smishing.<\/p><p>Au travers d&#8217;exemples v\u00e9cus, nous t&#8217;expliquerons le modus operandi des arnaques les plus courantes comme l&#8217;arnaque aux sentiments, au faux conseiller bancaire, au faux support Microsoft, et bien d&#8217;autres encore&#8230;<\/p><p>Gr\u00e2ce \u00e0 nos conseils et astuces, tu sauras comment r\u00e9agir face aux menaces. Ne laisse plus ta s\u00e9curit\u00e9 num\u00e9rique au hasard !<\/p><p><strong style=\"font-size: inherit; text-align: inherit; font-family: var( --e-global-typography-text-font-family ), Sans-serif;\">Pr\u00e9requis demand\u00e9<\/strong><\/p><ul><li>Aucun pr\u00e9requis n&#8217;est demand\u00e9<\/li><\/ul><p><strong>Localisation et dur\u00e9e<\/strong><\/p><p>L&#8217;atelier comprend 6 s\u00e9ances de 3 heures \u00e0 raison d\u2019une s\u00e9ance par semaine hors vacances scolaires et jours f\u00e9ri\u00e9s.\u00a0 Chaque s\u00e9ance est agr\u00e9ment\u00e9e d\u2019une pause-caf\u00e9.<\/p><p>La formation se donne dans les locaux du club, au 1er \u00e9tage des Anciennes Ecuries du Ch\u00e2teau Communale de Ham-sur-Heure\/Nalinnes.<\/p><p><strong>Nombre de participants<\/strong><\/p><p>Cette formation de groupe est limit\u00e9e \u00e0 un maximum de 10 participants par session. Plusieurs sessions pourraient \u00eatre organis\u00e9es dans l\u2019ann\u00e9e acad\u00e9mique.<\/p><p><strong>Informations\u00a0<\/strong><\/p><p>Pour toute demande d\u2019information, contacte le 0498\/48.86.53.<\/p><p><strong>IMPORTANT<\/strong> : en cas d\u2019appel en absence, laisse ton nom, pr\u00e9nom, un num\u00e9ro de t\u00e9l\u00e9phone et en deux mots (pas trois\u2026) la raison de ton appel.\u00a0 Nous te recontacterons avec plaisir.<\/p><p><span style=\"color: #000000; font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: bold; font-size: inherit; text-align: inherit;\">Participation aux frais<\/span><\/p><p style=\"font-size: 21px; text-align: left; color: #000000;\">Une participation aux frais de 2\u20ac par s\u00e9ance sera demand\u00e9e. Cela inclut le caf\u00e9 \u2026<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb89c9f elementor-widget elementor-widget-text-editor\" data-id=\"eb89c9f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L&#8217;organisation de la formation (<em>mise en place et d\u00e9finition du moment dans la semaine<\/em>) est fonction de la disponibilit\u00e9 de l&#8217;animateur et du nombre d&#8217;inscriptions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Vers le formulaire de demande d&#8217;inscription ou de renseignements Tu souhaites prot\u00e9ger tes informations en ligne et \u00e9viter les pi\u00e8ges des cybercriminels ? Participe \u00e0 notre nouvel atelier participatif sur la cybers\u00e9curit\u00e9 au quotidien ! Dans une ambiance conviviale, tu apprendras les bonnes pratiques pour s\u00e9curiser tes mots de passe, comprendre ce qu&#8217;est une fuite [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_theme","meta":{"footnotes":""},"class_list":["post-4404","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Atelier Cybers\u00e9curit\u00e9 -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Atelier Cybers\u00e9curit\u00e9 -\" \/>\n<meta property=\"og:description\" content=\"Vers le formulaire de demande d&#8217;inscription ou de renseignements Tu souhaites prot\u00e9ger tes informations en ligne et \u00e9viter les pi\u00e8ges des cybercriminels ? Participe \u00e0 notre nouvel atelier participatif sur la cybers\u00e9curit\u00e9 au quotidien ! Dans une ambiance conviviale, tu apprendras les bonnes pratiques pour s\u00e9curiser tes mots de passe, comprendre ce qu&#8217;est une fuite [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-06T09:13:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.informatiqueauchateau.be\/wp-content\/uploads\/2024\/09\/Logo-2019-Banniere.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1031\" \/>\n\t<meta property=\"og:image:height\" content=\"258\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/\",\"url\":\"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/\",\"name\":\"Atelier Cybers\u00e9curit\u00e9 -\",\"isPartOf\":{\"@id\":\"https:\/\/www.informatiqueauchateau.be\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.informatiqueauchateau.be\/wp-content\/uploads\/2024\/09\/Logo-2019-Banniere-1024x256.png\",\"datePublished\":\"2024-08-29T05:40:11+00:00\",\"dateModified\":\"2025-10-06T09:13:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/#primaryimage\",\"url\":\"https:\/\/www.informatiqueauchateau.be\/wp-content\/uploads\/2024\/09\/Logo-2019-Banniere.png\",\"contentUrl\":\"https:\/\/www.informatiqueauchateau.be\/wp-content\/uploads\/2024\/09\/Logo-2019-Banniere.png\",\"width\":1031,\"height\":258},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.informatiqueauchateau.be\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Atelier Cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.informatiqueauchateau.be\/#website\",\"url\":\"https:\/\/www.informatiqueauchateau.be\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.informatiqueauchateau.be\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Atelier Cybers\u00e9curit\u00e9 -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/","og_locale":"en_US","og_type":"article","og_title":"Atelier Cybers\u00e9curit\u00e9 -","og_description":"Vers le formulaire de demande d&#8217;inscription ou de renseignements Tu souhaites prot\u00e9ger tes informations en ligne et \u00e9viter les pi\u00e8ges des cybercriminels ? Participe \u00e0 notre nouvel atelier participatif sur la cybers\u00e9curit\u00e9 au quotidien ! Dans une ambiance conviviale, tu apprendras les bonnes pratiques pour s\u00e9curiser tes mots de passe, comprendre ce qu&#8217;est une fuite [&hellip;]","og_url":"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/","article_modified_time":"2025-10-06T09:13:05+00:00","og_image":[{"width":1031,"height":258,"url":"https:\/\/www.informatiqueauchateau.be\/wp-content\/uploads\/2024\/09\/Logo-2019-Banniere.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/","url":"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/","name":"Atelier Cybers\u00e9curit\u00e9 -","isPartOf":{"@id":"https:\/\/www.informatiqueauchateau.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.informatiqueauchateau.be\/wp-content\/uploads\/2024\/09\/Logo-2019-Banniere-1024x256.png","datePublished":"2024-08-29T05:40:11+00:00","dateModified":"2025-10-06T09:13:05+00:00","breadcrumb":{"@id":"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/#primaryimage","url":"https:\/\/www.informatiqueauchateau.be\/wp-content\/uploads\/2024\/09\/Logo-2019-Banniere.png","contentUrl":"https:\/\/www.informatiqueauchateau.be\/wp-content\/uploads\/2024\/09\/Logo-2019-Banniere.png","width":1031,"height":258},{"@type":"BreadcrumbList","@id":"https:\/\/www.informatiqueauchateau.be\/index.php\/atelier-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.informatiqueauchateau.be\/"},{"@type":"ListItem","position":2,"name":"Atelier Cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.informatiqueauchateau.be\/#website","url":"https:\/\/www.informatiqueauchateau.be\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.informatiqueauchateau.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.informatiqueauchateau.be\/index.php\/wp-json\/wp\/v2\/pages\/4404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.informatiqueauchateau.be\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.informatiqueauchateau.be\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.informatiqueauchateau.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.informatiqueauchateau.be\/index.php\/wp-json\/wp\/v2\/comments?post=4404"}],"version-history":[{"count":35,"href":"https:\/\/www.informatiqueauchateau.be\/index.php\/wp-json\/wp\/v2\/pages\/4404\/revisions"}],"predecessor-version":[{"id":5464,"href":"https:\/\/www.informatiqueauchateau.be\/index.php\/wp-json\/wp\/v2\/pages\/4404\/revisions\/5464"}],"wp:attachment":[{"href":"https:\/\/www.informatiqueauchateau.be\/index.php\/wp-json\/wp\/v2\/media?parent=4404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}