{"id":9501,"date":"2025-12-17T10:23:26","date_gmt":"2025-12-17T10:23:26","guid":{"rendered":"https:\/\/v2.synetis.com\/?post_type=formation&#038;p=9501"},"modified":"2026-05-05T08:39:06","modified_gmt":"2026-05-05T08:39:06","slug":"cti01-introduction-a-la-cyber-threat-intelligence","status":"publish","type":"formation","link":"https:\/\/www.synetis.com\/en\/formation\/cti01-introduction-a-la-cyber-threat-intelligence\/","title":{"rendered":"CTI01 &#8211; Introduction \u00e0 la Cyber Threat Intelligence"},"content":{"rendered":"","protected":false},"featured_media":4726,"template":"","meta":{"_acf_changed":false,"content-type":""},"categorie":[16],"class_list":["post-9501","formation","type-formation","status-publish","has-post-thumbnail","hentry","categorie-formation-cyberdefense"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/formation\/9501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/formation"}],"about":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/types\/formation"}],"version-history":[{"count":11,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/formation\/9501\/revisions"}],"predecessor-version":[{"id":22037,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/formation\/9501\/revisions\/22037"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/media\/4726"}],"wp:attachment":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/media?parent=9501"}],"wp:term":[{"taxonomy":"categorie","embeddable":true,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/categorie?post=9501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}