﻿{"id":1927,"date":"2020-12-15T17:06:11","date_gmt":"2020-12-15T21:06:11","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?page_id=1927"},"modified":"2023-05-29T12:46:31","modified_gmt":"2023-05-29T17:46:31","slug":"atn-lacademie-de-la-transformation-numerique","status":"publish","type":"page","link":"https:\/\/www.uqac.ca\/cybersecurite\/atn-lacademie-de-la-transformation-numerique\/","title":{"rendered":"ATN &#8211; L&rsquo;acad\u00e9mie de la transformation num\u00e9rique"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Formations adapt\u00e9es aux membres du personnel de la fonction publique<\/h3>\n\n\n\n<p><\/p>\n\n\n\n<p>L\u2019Acad\u00e9mie de la transformation num\u00e9rique, de l&rsquo;Universit\u00e9 Laval, propose un catalogue de formations offertes\u00a0<strong>sp\u00e9cifiquement<\/strong>\u00a0aux membres du personnel de la fonction publique.  Des modules de cyberd\u00e9fense et de protection des renseignements personnels gratuits sont actuellement propos\u00e9s. <\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.brioeducation.ca\/inscription\/activite-formation\/Nrfez1uEKYY+CKMP1Y5xmQ==%23ZTFtV6PrUIinpu8vG35jTu1XMT2wHKAAd91FYBfZOdfOZzpF7S%2FHyLLVHV7K3nrbUqJYbDzlSjNp5ucgLIE6a+EaYqTJ%2Fiy4NO5GFtFOX2hmo9eKo0LjcvyxBZ1KlbiV5BbQjuiMn2NTeGBVNTOD+hv%2FcvSLMOSnXg==\/\">Cyberd\u00e9fense \u2013 les menaces num\u00e9riques&nbsp;: la s\u00e9curit\u00e9 des appareils mobiles<\/a><br><\/strong>Dur\u00e9e&nbsp;: 15&nbsp;minutes <a href=\"https:\/\/transformation-numerique.ulaval.ca\/wp-content\/uploads\/2020\/06\/plan-de-formation-sct-securite-appareils-mobiles.pdf\">Voir le plan de cours<\/a><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.brioeducation.ca\/inscription\/activite-formation\/Kf85+Onbjdq%2F+knrXSDGIg==%23TbQVGmoCs8vMAdGh08OjMeY%2FFc+XJV+FZ94jyCjPPDLJ9uaEpIXItRFLIFbi67EmP3ftFypOVFmvJDW6PraG0UkKpiv4hVqq3yzqNjaCMnyX%2FyxUzu1o51OT%2FK1q8QVpursQJ6DberOHvuM+I3OTMvIRdN%2F0oamb2Q==\/\">Cyberd\u00e9fense \u2013 les menaces num\u00e9riques&nbsp;: l\u2019hame\u00e7onnage<\/a><br><\/strong>Dur\u00e9e&nbsp;: 15&nbsp;minutes <a href=\"https:\/\/transformation-numerique.ulaval.ca\/wp-content\/uploads\/2020\/06\/plan-de-formation-sct-menaces-numeriques-hameconnage.pdf\">Voir le plan de cours<\/a><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.brioeducation.ca\/inscription\/activite-formation\/Yaz3TC07WDys+pYVEcw4KA==%23l09FIUVh4sW7tOPw9e+Xv0UO%2FEhB2rDXWLGtD7drJ9BkHZABl8Nmhh%2FOihHgwmBkvCVFcrMl6tQV7UQgZn%2FV7PINUgovjcl5je0B1GPJ79bDOMn7AvX8PgkU5RB3QkONJ9ZmeRPPE9FLfenh7w92vfgNm+EQtD2WrCg=\/\">Cyberd\u00e9fense \u2013 les menaces num\u00e9riques&nbsp;: l\u2019ing\u00e9nierie sociale ou l\u2019art de la manipulation<\/a><br><\/strong>Dur\u00e9e&nbsp;: 15&nbsp;minutes <a href=\"https:\/\/transformation-numerique.ulaval.ca\/wp-content\/uploads\/2020\/06\/plan-de-formation-sct-menaces-numeriques-ingenierie-sociale.pdf\">Voir le plan de cours<\/a><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.brioeducation.ca\/inscription\/activite-formation\/KfsloSC5hsVFbnVfe53i6g==%23+He2V0eR76u0mliwb1zqs+79ZRFOEPhtOG8mhbK36RGBG44sjfK4pOPqMEfpLeQ+BYEwLQ3QB9Z088u3RgI5e9d7Vrh4gkJS+HRPPK7XdyiE8PQgQiBHY3dbA6hY8MqbfZxCoG9TD9Dra9O52NjiqGuBxyVUCq2CSp8=\/\">Cyberd\u00e9fense \u2013 les menaces num\u00e9riques&nbsp;: virus et ran\u00e7ongiciels<\/a><br><\/strong>Dur\u00e9e&nbsp;: 15&nbsp;minutes <a href=\"https:\/\/transformation-numerique.ulaval.ca\/wp-content\/uploads\/2020\/06\/plan-de-formation-sct-menaces-numeriques-virus-rancongiciels.pdf\"> Voir le plan de cours<\/a><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.brioeducation.ca\/inscription\/activite-formation\/59zQu4U6AD5sJ%2FxXFMRDhg==%23fOqmuHWMG%2Fonr8bi6UQ9BlnPsYNjxCnPpEt+aSSO1EGEo8ZovWSzuDzfubcrHpE7qwJ5oJvW47NG0ZxN7r1SJxdxJY1hWp0Du63kq6GFI7ZcbaKoKMfmMYkOTA62aSkFVbQbCWLyYaX3mO8joqLK9eS6pfOJaI5fFw==\/\">Introduction \u00e0 la s\u00e9curit\u00e9 de l\u2019information pour les responsables organisationnels<\/a><br><\/strong>Dur\u00e9e&nbsp;: 45&nbsp;minutes <a href=\"https:\/\/transformation-numerique.ulaval.ca\/wp-content\/uploads\/2020\/06\/plan-de-formation-sct-introduction-securite-information.pdf\">Voir le plan de cours <\/a><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.brioeducation.ca\/inscription\/activite-formation\/IOaTp86UzZqrCRZ23j0vJQ==%23N5haPM7Lv7HFxUrh938ro1icjIadeco30Pmkw48kbPjsPgK%2FCrIbc8d3%2F2KE4Nz7naiXXxdCEB++fpLsDYXHtNNd%2F72cgOAHEtD2GWXvq9QGZCrghRmoDkKCqzINFvF9Gir2gpOY1CL2uuQbZ1GqkgxYFrnnYsyJ\/\">Introduction \u00e0 la gouvernance de la s\u00e9curit\u00e9 de l&rsquo;information<\/a><\/strong><br>Dur\u00e9e : 60 minutes <a href=\"https:\/\/transformation-numerique.ulaval.ca\/wp-content\/uploads\/2020\/06\/plan-de-formation-sct-introduction-gouvernance-securite-information.pdf\">Voir le plan de cours<\/a> <br><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.brioeducation.ca\/inscription\/cours-activites\/v2~IXDk1OAJWnhVPWSHFGj4IA~gZYJ6tSOi_da_PdwaNTX-7HiznVkMOvHuTvyjLcLR1eU5BgStZ585SO3chQQ2PujwfMvjYWdlAh79f_SRpXDGhrPX_VqQSUVCYsB87WAoCL4mCJv1tS0IrmURg5l6hOs82oFI2OfKxthdhABMqEmXzZBkGU9_73Rlr6GXiuf-ypFA4v_Z9JnyXm0udGaXjI6hcDNnzHzLFOUnt1NI7nVZCy3SB5ppLvFnCZ5rv2p\/\">Introduction \u00e0 la protection\u00a0des\u00a0renseignements\u00a0personnels<\/a><\/strong><br>Dur\u00e9e : 60 minutes<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Formations adapt\u00e9es aux membres du personnel de la fonction publique L\u2019Acad\u00e9mie de la transformation num\u00e9rique, de l&rsquo;Universit\u00e9 Laval, propose un catalogue de formations offertes\u00a0sp\u00e9cifiquement\u00a0aux membres du personnel de la fonction publique. Des modules de cyberd\u00e9fense et de protection des renseignements personnels gratuits sont actuellement propos\u00e9s. Cyberd\u00e9fense \u2013 les menaces num\u00e9riques&nbsp;: la s\u00e9curit\u00e9 des appareils mobilesDur\u00e9e&nbsp;: [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1927","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/pages\/1927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=1927"}],"version-history":[{"count":19,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/pages\/1927\/revisions"}],"predecessor-version":[{"id":2754,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/pages\/1927\/revisions\/2754"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=1927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}