{"id":1926,"date":"2025-07-22T15:00:41","date_gmt":"2025-07-22T15:00:41","guid":{"rendered":"https:\/\/v2.synetis.com\/?post_type=formation&#038;p=1926"},"modified":"2026-05-05T08:12:09","modified_gmt":"2026-05-05T08:12:09","slug":"secof02-comprendre-le-developpement-securise-vu-par-un-attaquant","status":"publish","type":"formation","link":"https:\/\/www.synetis.com\/en\/formation\/secof02-comprendre-le-developpement-securise-vu-par-un-attaquant\/","title":{"rendered":"SECOF02 \u2013 Comprendre le d\u00e9veloppement s\u00e9curis\u00e9 vu par un attaquant"},"content":{"rendered":"","protected":false},"featured_media":3592,"template":"","meta":{"_acf_changed":false,"content-type":""},"categorie":[20],"class_list":["post-1926","formation","type-formation","status-publish","has-post-thumbnail","hentry","categorie-formation-audit"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/formation\/1926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/formation"}],"about":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/types\/formation"}],"version-history":[{"count":13,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/formation\/1926\/revisions"}],"predecessor-version":[{"id":22042,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/formation\/1926\/revisions\/22042"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/media\/3592"}],"wp:attachment":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/media?parent=1926"}],"wp:term":[{"taxonomy":"categorie","embeddable":true,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/categorie?post=1926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}