{"id":722,"date":"2021-09-08T17:31:12","date_gmt":"2021-09-08T17:31:12","guid":{"rendered":"https:\/\/esi.ac.ma\/formation\/formation-continue\/formation-a-la-carte\/cybersecurite-et-securite-des-systemes-dinformation\/"},"modified":"2021-09-08T17:31:12","modified_gmt":"2021-09-08T17:31:12","slug":"cybersecurite-et-securite-des-systemes-dinformation","status":"publish","type":"page","link":"https:\/\/esi.ac.ma\/en\/formation\/formation-continue\/cybersecurite-et-securite-des-systemes-dinformation\/","title":{"rendered":"Cybers\u00e9curit\u00e9 et S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information"},"content":{"rendered":"<p>[vc_row][vc_column][vc_custom_heading text=&#8221;Objectifs&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Partager les principes d&#8217;Impl\u00e9mentation ISO27001 \u00ab ISMS Lead Impl\u00e9menter \u00bb.<\/li>\n<li>Appr\u00e9hender les exigences de la norme ISO 27001.<\/li>\n<li>Acqu\u00e9rir les connaissances n\u00e9cessaires \u00e0 l&#8217;impl\u00e9mentation d&#8217;un syst\u00e8me de management de la s\u00e9curit\u00e9 de l&#8217;information (SMSI).<\/li>\n<li>Comprendre les relations entre ISO27001 et ISO17799 (ISO 27002).<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_custom_heading text=&#8221;Contenu&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;Initiation \u00e0 la S\u00e9curit\u00e9 des syst\u00e8mes d\u2019information : Norme ISO-27001&#8243; font_container=&#8221;tag:h4|text_align:left&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Pr\u00e9requis du projet (proposition d\u2019affaire interne)<\/li>\n<li>\u00c9tude de faisabilit\u00e9<\/li>\n<li>Fournir et organiser une \u00e9quipe<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_custom_heading text=&#8221;Mise \u00e0 jour, am\u00e9lioration et cl\u00f4ture du projet&#8221; font_container=&#8221;tag:h4|text_align:left&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Am\u00e9lioration du SMSI<\/li>\n<li>Action corrective et pr\u00e9ventive<\/li>\n<li>Cl\u00f4ture du projet<\/li>\n<li>\u00c9valuation et accomplissement du projet<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;Planification et d\u00e9veloppement&#8221; font_container=&#8221;tag:h4|text_align:left&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_column_text]<\/p>\n<ul>\n<li>D\u00e9finition des domaines d\u2019applicabilit\u00e9 et de politique du SMSI<\/li>\n<li>Analyse des risques<\/li>\n<li>D\u00e9claration d\u2019applicabilit\u00e9<\/li>\n<li>Gestion des ressources<\/li>\n<li>Objectifs et mesures de s\u00e9curit\u00e9<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;D\u00e9ploiement et contr\u00f4le&#8221; font_container=&#8221;tag:h4|text_align:left&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Cr\u00e9er un plan de documentation du SMSI<\/li>\n<li>Formation et sensibilisation<\/li>\n<li>Gestion des incidents<\/li>\n<li>Contr\u00f4les de l\u2019efficacit\u00e9<\/li>\n<li>\u00c9valuation du SMSI<\/li>\n<li>Programme d\u2019audit interne<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_custom_heading text=&#8221;Objectifs&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_column_text] Partager les principes d&#8217;Impl\u00e9mentation ISO27001 \u00ab ISMS Lead Impl\u00e9menter \u00bb. Appr\u00e9hender les exigences de la norme ISO 27001. Acqu\u00e9rir les connaissances n\u00e9cessaires \u00e0 l&#8217;impl\u00e9mentation d&#8217;un syst\u00e8me de management de la s\u00e9curit\u00e9 de l&#8217;information (SMSI). Comprendre les relations entre ISO27001 et ISO17799 (ISO 27002). [\/vc_column_text][vc_custom_heading text=&#8221;Contenu&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;Initiation \u00e0 la S\u00e9curit\u00e9 des [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":706,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-722","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/pages\/722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/comments?post=722"}],"version-history":[{"count":0,"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/pages\/722\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/pages\/706"}],"wp:attachment":[{"href":"https:\/\/esi.ac.ma\/en\/wp-json\/wp\/v2\/media?parent=722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}