{"id":22465,"date":"2025-07-17T09:18:00","date_gmt":"2025-07-17T09:18:00","guid":{"rendered":"https:\/\/www.synetis.com\/training\/"},"modified":"2026-05-11T12:04:25","modified_gmt":"2026-05-11T12:04:25","slug":"training","status":"publish","type":"page","link":"https:\/\/www.synetis.com\/en\/training\/","title":{"rendered":"Training"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"22465\" class=\"elementor elementor-22465 elementor-742\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-420c7b2 e-flex e-con-boxed e-con e-parent\" data-id=\"420c7b2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9480d00 elementor-widget elementor-widget-shortcode\" data-id=\"9480d00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.synetis.com\/en\/\" title=\"Accueil\">Accueil<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u203a<\/span><span class=\"aioseo-breadcrumb\">\n\tTraining\n<\/span><\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce408c4 elementor-widget elementor-widget-heading\" data-id=\"ce408c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Build and develop your cyber skills <br \/>\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4592a9b elementor-widget elementor-widget-heading\" data-id=\"4592a9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Synetis offers a range of training courses covering a broad spectrum of cybersecurity issues, to help you master tomorrow's challenges and guarantee your agility in the face of cyberthreats.<\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dc8dab elementor-widget elementor-widget-button\" data-id=\"2dc8dab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#formations\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Discover our training courses<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-985ea1c e-flex e-con-boxed e-con e-parent\" data-id=\"985ea1c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-267767a e-grid e-con-full elementor-invisible e-con e-child\" data-id=\"267767a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t<div class=\"elementor-element elementor-element-15e204c e-con-full e-flex e-con e-child\" data-id=\"15e204c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9bc0195 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"9bc0195\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-graduation-cap\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M622.34 153.2L343.4 67.5c-15.2-4.67-31.6-4.67-46.79 0L17.66 153.2c-23.54 7.23-23.54 38.36 0 45.59l48.63 14.94c-10.67 13.19-17.23 29.28-17.88 46.9C38.78 266.15 32 276.11 32 288c0 10.78 5.68 19.85 13.86 25.65L20.33 428.53C18.11 438.52 25.71 448 35.94 448h56.11c10.24 0 17.84-9.48 15.62-19.47L82.14 313.65C90.32 307.85 96 298.78 96 288c0-11.57-6.47-21.25-15.66-26.87.76-15.02 8.44-28.3 20.69-36.72L296.6 284.5c9.06 2.78 26.44 6.25 46.79 0l278.95-85.7c23.55-7.24 23.55-38.36 0-45.6zM352.79 315.09c-28.53 8.76-52.84 3.92-65.59 0l-145.02-44.55L128 384c0 35.35 85.96 64 192 64s192-28.65 192-64l-14.18-113.47-145.03 44.56z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f8069c elementor-widget elementor-widget-counter\" data-id=\"6f8069c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Training sessions<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"4000\" data-to-value=\"19\" data-from-value=\"\" data-delimiter=\",\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-714fbd0 e-con-full e-flex e-con e-child\" data-id=\"714fbd0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d72446 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"2d72446\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-users\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm448 0c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm32 32h-64c-17.6 0-33.5 7.1-45.1 18.6 40.3 22.1 68.9 62 75.1 109.4h66c17.7 0 32-14.3 32-32v-32c0-35.3-28.7-64-64-64zm-256 0c61.9 0 112-50.1 112-112S381.9 32 320 32 208 82.1 208 144s50.1 112 112 112zm76.8 32h-8.3c-20.8 10-43.9 16-68.5 16s-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48v-28.8c0-63.6-51.6-115.2-115.2-115.2zm-223.7-13.4C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-878929b elementor-widget elementor-widget-counter\" data-id=\"878929b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Trainees<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\">+<\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"4000\" data-to-value=\"100\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-77305fb e-con-full e-flex e-con e-child\" data-id=\"77305fb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-677a4f2 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"677a4f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84661d2 elementor-widget elementor-widget-counter\" data-id=\"84661d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Level of satisfaction<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"4000\" data-to-value=\"90\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">%<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3695d4f elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"3695d4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>*General data for Synetis 2024 and 2025.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3a7c0f0 e-flex e-con-boxed e-con e-parent\" data-id=\"3a7c0f0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-691ed4b e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"691ed4b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1c8706 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"f1c8706\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training with Synetis<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b38ed8f elementor-widget elementor-widget-text-editor\" data-id=\"b38ed8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Faced with the rapid evolution of the business world and the multitude of cyber risks that can paralyze your activity, it&#8217;s vital to understand why and how to control the security of your infrastructures.<\/p><p> <\/p><p>Our training courses are designed for all types of audience, and can be adapted to suit individual needs and skill levels.<br\/>If you have a specific need, our experts can tailor a training course to suit your needs and environment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d6d5d90 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"d6d5d90\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-21fbc80 elementor-widget elementor-widget-image\" data-id=\"21fbc80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/certifopac.fr\/qualiopi\/certification\/verification\/?siren=522945153\" target=\"_blank\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"227\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/Qualiopi-300x227.png\" class=\"attachment-medium size-medium wp-image-22466\" alt=\"Synetis is Qualiopi certified\" srcset=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/Qualiopi-300x227.png 300w, https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/Qualiopi.png 430w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a05f63d elementor-widget elementor-widget-text-editor\" data-id=\"a05f63d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Training center, registered under number: 11755716275<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-80c5ed0 e-flex e-con-boxed e-con e-parent\" data-id=\"80c5ed0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a735651 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"a735651\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Make training the driving force behind your performance<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-be0a58a e-grid e-con-full elementor-invisible e-con e-child\" data-id=\"be0a58a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t<div class=\"elementor-element elementor-element-f7a8135 e-con-full e-flex e-con e-child\" data-id=\"f7a8135\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f75eb12 e-con-full e-flex e-con e-child\" data-id=\"f75eb12\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ae1670c elementor-widget elementor-widget-heading\" data-id=\"ae1670c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Meeting your customers' expectations\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3457ac elementor-widget elementor-widget-text-editor\" data-id=\"a3457ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Your customers demand totally reliable service providers. By training your talents in cutting-edge technologies, you give them the means to design and deliver highly secure solutions. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d1d636 e-con-full e-flex e-con e-child\" data-id=\"5d1d636\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d065d0 elementor-widget elementor-widget-heading\" data-id=\"9d065d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">A complete range of training courses\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-884c129 elementor-widget elementor-widget-text-editor\" data-id=\"884c129\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Your employees have access to the most sought-after techniques on the cybersecurity market. Our programs are designed to transform your teams into high-level experts, capable of meeting today&#8217;s cyber challenges. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7bd59b5 e-con-full e-flex e-con e-child\" data-id=\"7bd59b5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fe5893b elementor-widget elementor-widget-heading\" data-id=\"fe5893b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Make people the driving force behind your loyalty drive<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6005a5c elementor-widget elementor-widget-text-editor\" data-id=\"6005a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Develop your talents by investing in their future. An employee who improves his or her skills is an employee who is committed and loyal. Training is the most powerful lever for transforming your teams into lasting pillars of your company.  <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8fb613d e-con-full e-flex e-con e-child\" data-id=\"8fb613d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f24f4c e-flex e-con-boxed e-con e-parent\" data-id=\"7f24f4c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e17208d e-grid e-con-full elementor-invisible e-con e-child\" data-id=\"e17208d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t<div class=\"elementor-element elementor-element-470c0fe e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex elementor-invisible e-con e-child\" data-id=\"470c0fe\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-803fa9f e-con-full e-flex e-con e-child\" data-id=\"803fa9f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab38dfc elementor-widget elementor-widget-heading\" data-id=\"ab38dfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">In-company training\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-722a9c4 elementor-widget elementor-widget-text-editor\" data-id=\"722a9c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Bring your staff together around a customized program, either on your premises or remotely. This method enables us to adapt our content to your specific challenges and infrastructures, while strengthening the cohesion of your teams around a common project. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44d08e7 elementor-widget elementor-widget-heading\" data-id=\"44d08e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Inter-company training\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4e7c4c elementor-widget elementor-widget-text-editor\" data-id=\"a4e7c4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Give your employees the opportunity to learn alongside peers from other backgrounds. These sessions encourage the sharing of best practices and the exchange of experience on a wide range of cyber issues, providing a valuable open-minded approach to innovation within your organization. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-97ee496 e-flex e-con-boxed e-con e-parent\" data-id=\"97ee496\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a7af22 elementor-widget elementor-widget-menu-anchor\" data-id=\"8a7af22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"training\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-479bcb3 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"479bcb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Explore our cybersecurity training courses\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ccb815 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"1ccb815\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Courses to suit every profile: our training courses are accessible to all levels.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-870fb93 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"870fb93\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8fbb7e4 elementor-widget elementor-widget-ucaddon_ue_buttons_post_filter\" data-id=\"8fbb7e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_ue_buttons_post_filter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Tabs Filter -->\n\t\t<link id='font-awesome-css' href='https:\/\/www.synetis.com\/wp-content\/plugins\/unlimited-elements-for-elementor-premium\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/www.synetis.com\/wp-content\/plugins\/unlimited-elements-for-elementor-premium\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Tabs Filter *\/\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4{\n  min-height: 1px;\n  position: relative;\n}\n\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4.uc-filter-initing{\n    opacity:0.8;\n    cursor:default;\n}\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4 .ue-debug-meta{\n  font-size:10px;\n  border:1px solid red;\n  padding:10px;\n}\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4 .ue_taxonomy_image img{\n  display:block;\n}\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4.ue_taxonomy{\n  flex-wrap: wrap;\n}\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4 .ue_taxonomy_item{\n  display:block;\n  text-decoration: none;\n}\n\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4 .uc-item-hidden{\n\tdisplay:none !important;\n}\n\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4.uc-filter-initing a{\n   cursor:default;\n   background-color:lightgray !important;\n}\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4.uc-filter-initing .ue_taxonomy_item_content{\n\tvisibility:hidden;\n}\n\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4.uc-filter-hidden,\n#uc_ue_buttons_post_filter_elementor_8fbb7e4.uc-filter-initing.uc-initing-filter-hidden{\n  display:none !important;\n}\n\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4 .ue_taxonomy_item_content{\n  display:flex;\n  align-items:center;\n}\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4 .ue_taxonomy_item_icon{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4 .ue_taxonomy_item_icon_spacer{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4 .ue_taxonomy_item_num_posts{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4 .ue_taxonomy_item_title{\n  flex-grow:1;\n}\n\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4 .ue_taxonomy_item_num_posts_spacer{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4 .uc-hide-loading-item{\n\tdisplay:none !important;\n}\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4-toggle{\n  display:none;\n}\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4-toggle .#uc_ue_buttons_post_filter_elementor_8fbb7e4-toggle{\n  display:none;\n}\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4-toggle .ue_taxonomy_toggle_icon{\n  display:inline-flex;\n  align-items:center;\n  justify-content:center;\n  line-height:1em;\n  cursor:pointer;\n}\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4-toggle .ue_taxonomy_toggle_icon svg{\n  height:1em;\n  width:1em;\n}\n\n\n#uc_ue_buttons_post_filter_elementor_8fbb7e4-toggle .ue_taxonomy_toggle_icon_close{\n  display:none;\n}\n\n  #uc_ue_buttons_post_filter_elementor_8fbb7e4 .uc-item-all .ue_taxonomy_item_num_posts_spacer,\n  #uc_ue_buttons_post_filter_elementor_8fbb7e4 .uc-item-all .ue_taxonomy_item_num_posts{\n\t \tdisplay:none !important;\n  }\n\n\n\n\n\n<\/style>\n\n\n  <div class=\"ue_taxonomy_toggle\" id=\"uc_ue_buttons_post_filter_elementor_8fbb7e4-toggle\">\n    <div class=\"ue_taxonomy_toggle_icon\">\n      <div class=\"ue_taxonomy_toggle_icon_open\"><i class='fas fa-bars'><\/i><\/div>\n      <div class=\"ue_taxonomy_toggle_icon_close\"><i class='fas fa-times'><\/i><\/div>\n    <\/div>\n  <\/div>\n\n  <div id=\"uc_ue_buttons_post_filter_elementor_8fbb7e4-container\">\n\n  <div id=\"uc_ue_buttons_post_filter_elementor_8fbb7e4\" class=\"ue_taxonomy  uc-grid-filter \"  data-isfilter=\"\" data-filtertype=\"terms_list\"  style=\"\">\n\n    \n    \n          \n\n      <a href=\"javascript:void(0)\" class=\"ue_taxonomy_item  uc-item-all uc-selected  \"     >\n\n        \n        <div class=\"ue_taxonomy_item_content\">\n                    <span  class=\"ue_taxonomy_item_title\">All<\/span>                  <\/div>\n\n        \n        \n      <\/a>  \n\n    \n          \n\n      <a href=\"javascript:void(0)\" class=\"ue_taxonomy_item   \"  data-id=\"20\" data-type=\"term\" data-slug=\"formation-audit\" data-taxonomy=\"categorie\" data-title=\"AUDIT\" data-key=\"term|categorie|formation-audit\"     >\n\n        \n        <div class=\"ue_taxonomy_item_content\">\n                    <span  class=\"ue_taxonomy_item_title\">AUDIT<\/span>                  <\/div>\n\n        \n        \n      <\/a>  \n\n    \n          \n\n      <a href=\"javascript:void(0)\" class=\"ue_taxonomy_item   \"  data-id=\"16\" data-type=\"term\" data-slug=\"formation-cyberdefense\" data-taxonomy=\"categorie\" data-title=\"CYBERDEFENSE\" data-key=\"term|categorie|formation-cyberdefense\"     >\n\n        \n        <div class=\"ue_taxonomy_item_content\">\n                    <span  class=\"ue_taxonomy_item_title\">CYBERDEFENSE<\/span>                  <\/div>\n\n        \n        \n      <\/a>  \n\n    \n          \n\n      <a href=\"javascript:void(0)\" class=\"ue_taxonomy_item   \"  data-id=\"17\" data-type=\"term\" data-slug=\"formation-grc\" data-taxonomy=\"categorie\" data-title=\"GRC\" data-key=\"term|categorie|formation-grc\"     >\n\n        \n        <div class=\"ue_taxonomy_item_content\">\n                    <span  class=\"ue_taxonomy_item_title\">GRC<\/span>                  <\/div>\n\n        \n        \n      <\/a>  \n\n    \n          \n\n      <a href=\"javascript:void(0)\" class=\"ue_taxonomy_item   \"  data-id=\"18\" data-type=\"term\" data-slug=\"formation-in\" data-taxonomy=\"categorie\" data-title=\"IDENTITE NUMERIQUE\" data-key=\"term|categorie|formation-in\"     >\n\n        \n        <div class=\"ue_taxonomy_item_content\">\n                    <span  class=\"ue_taxonomy_item_title\">IDENTITE NUMERIQUE<\/span>                  <\/div>\n\n        \n        \n      <\/a>  \n\n    \n          \n\n      <a href=\"javascript:void(0)\" class=\"ue_taxonomy_item   \"  data-id=\"19\" data-type=\"term\" data-slug=\"formation-secop\" data-taxonomy=\"categorie\" data-title=\"SECURITE OPERATIONNELLE\" data-key=\"term|categorie|formation-secop\"     >\n\n        \n        <div class=\"ue_taxonomy_item_content\">\n                    <span  class=\"ue_taxonomy_item_title\">SECURITE OPERATIONNELLE<\/span>                  <\/div>\n\n        \n        \n      <\/a>  \n\n      \n  <\/div>\n\n  \n  <\/div>\n\n<!-- end Tabs Filter -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3e4a95 elementor-widget elementor-widget-ucaddon_posts_search_filter\" data-id=\"a3e4a95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_posts_search_filter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Search Filter -->\n\n<style>\/* widget: Search Filter *\/\n\n#uc_posts_search_filter_elementor_a3e4a95-wrapper\n{\n  display:flex;\n}\n\n#uc_posts_search_filter_elementor_a3e4a95\n{\n  width:100%;\n}\n#uc_posts_search_filter_elementor_a3e4a95 .uc-search-filter__input\n{\n  width:100%;\n  flex-grow:1;\n}\n\n#uc_posts_search_filter_elementor_a3e4a95 .uc-search-filter-btn\n{\n  display:flex;\n  align-items:center;\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n#uc_posts_search_filter_elementor_a3e4a95 .uc-search-filter-input-wrapper\n{\n  position: relative;\n  display:flex;\n  align-items:center;\n}\n\n\n#uc_posts_search_filter_elementor_a3e4a95 .uc-search-filter-btn .ue-btn-icon\n{\n  line-height:1em;\n}\n\n\n\n#uc_posts_search_filter_elementor_a3e4a95 .uc-search-filter-btn .ue-btn-icon svg\n{\n  height:1em;\n  width:1em;\n}\n\n#uc_posts_search_filter_elementor_a3e4a95 ::-webkit-input-placeholder { \/* Edge *\/\n  color: #1C1C1C !important;\n}\n\n#uc_posts_search_filter_elementor_a3e4a95 :-ms-input-placeholder { \/* Internet Explorer 10-11 *\/\n  color: #1C1C1C !important;\n}\n\n#uc_posts_search_filter_elementor_a3e4a95 ::placeholder {\n  color: #1C1C1C !important;\n}\n\n#uc_posts_search_filter_elementor_a3e4a95 .uc-search-filter-indicator{\n\tposition: absolute;\n  \ttop: 50%;\n    transform: translate(0, -50%);\n    height: 100%;\n  \tdisplay: flex;\n    align-items: center;\n    justify-content: center;\n}\n\n<\/style>\n\n\n<div class=\"uc-search-filter-wrapper\" id=\"uc_posts_search_filter_elementor_a3e4a95-wrapper\" >\n  <div id=\"uc_posts_search_filter_elementor_a3e4a95\" class=\"uc-search-filter uc-grid-filter\" data-filtertype=\"search\"  > \n\n      \n      <div class=\"uc-search-filter-input-wrapper\">\n\t\t\n        <input type=\"text\" class=\"uc-search-filter__input\" placeholder=\"Search\" value=\"\">\n\n        \n          \n\n      <\/div>\n\n  <\/div>\n<\/div>\n<!-- end Search Filter -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4818d32 e-con-full ajax-search-results e-flex elementor-invisible e-con e-child\" data-id=\"4818d32\" data-element_type=\"container\" data-e-type=\"container\" id=\"ajax-search-results\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e24046b e-transform elementor-widget elementor-widget-ucaddon_post_grid\" data-id=\"e24046b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_scaleX_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scaleX_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scaleX_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scaleY_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scaleY_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scaleY_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"ucaddon_post_grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Post Grid -->\n\n<style>\/* widget: Post Grid *\/\n\n\n\n#uc_post_grid_elementor_e24046b{\n  min-height: 1px;\n}\n\n#uc_post_grid_elementor_e24046b.uc_post_grid_style_one .uc_post_grid_style_one_wrap {\n   display:grid;\n}\n\n\n#uc_post_grid_elementor_e24046b .uc_post_grid_style_one_item{\n  position:relative;\n}\n\n#uc_post_grid_elementor_e24046b .uc_post_image{\n  transition:0.3s;\n  position:relative;\n  overflow:hidden;\n}\n\n#uc_post_grid_elementor_e24046b .uc_post_image img{\n  width:100%;\n  display:block;\n  transition:0.3s;\n}\n\n\t#uc_post_grid_elementor_e24046b .ue-item:hover .uc_post_image img    {\n      transform:scale(1.1,1.1);\n    }\n\t\n\n#uc_post_grid_elementor_e24046b .uc_post_image_overlay{\n  position:absolute;\n  top:0px;\n  left:0px;\n  height:100%;\n  width:100%;\n  transition:0.3s;\n}\n\n#uc_post_grid_elementor_e24046b .uc_more_btn-custom-field{\n  display:inline-block;\n  text-align:center;\n  text-decoration:none;\n  transition:0.3s;\n}\n\n#uc_post_grid_elementor_e24046b .uc_more_btn{\n  display:inline-block;\n  text-align:center;\n  text-decoration:none;\n  transition:0.3s;\n}\n\n.ue-grid-item-category a{\n  display:inline-block;\n  font-size:10px;\n  position: relative;\n  z-index: 1;\n}\n\n#uc_post_grid_elementor_e24046b .ue-grid-item-posttype{\n  display:inline-block;\n  position: relative;\n  z-index: 1;\n}\n\n#uc_post_grid_elementor_e24046b .ue-grid-item-category a{\n    cursor: text;\n  }\n\n.uc_post_title{\n  font-size:21px;\n}\n\n\n#uc_post_grid_elementor_e24046b.uc_post_grid_style_one.ue-list-view .uc_content{\n flex-grow:1;\n}\n\n\n  #uc_post_grid_elementor_e24046b:not(.ue-list-view) .ue_post_grid_item{\n    display:flex;\n    flex-direction:column;\n  }\n  \n  #uc_post_grid_elementor_e24046b.uc_post_grid_style_one:not(.ue-list-view) .uc_content{\n   flex-grow:1;\n  }\n\n  #uc_post_grid_elementor_e24046b.uc_post_grid_style_one .uc_content > div{\n    height:100%;\n    display:flex;\n    flex-direction:column;\n      }\n\n  \n\n\n\n\n\n\n\n\n\n\n\n\n\/*  for grid\/list layout switcher*\/\n\t#uc_post_grid_elementor_e24046b.ue-list-view .uc_post_grid_style_one_item {\n     display:flex;  \n     flex-direction:row;\n    }\n    #uc_post_grid_elementor_e24046b.ue-list-view .uc_post_grid_style_one_item > div{\n     width:50%;\n    }\n   \n    #uc_post_grid_elementor_e24046b.ue-list-view .uc_content    {\n      display:flex;\n      flex-direction:column;\n      justify-content:center;\n    }\n \n\/*  for grid\/list layout switcher*\/\n\n#uc_post_grid_elementor_e24046b .ue-meta-data{  \n  display:flex !important;\n  flex-wrap: wrap;\n  line-height:1em;\n}\n\n#uc_post_grid_elementor_e24046b .ue-grid-item-meta-data{\n  display:inline-flex;\n  align-items:center;\n}\n\n#uc_post_grid_elementor_e24046b .ue-grid-item-meta-data a{\n  color:inherit;\n}\n\n.ue-grid-item-meta-data{\n  font-size:12px;\n}\n\n#uc_post_grid_elementor_e24046b .ue-grid-item-meta-data-icon{\n  line-height:1em;\n}\n\n#uc_post_grid_elementor_e24046b .ue-grid-item-meta-data-icon svg{\n  width:1em;\n  height:1em;\n}\n\n#uc_post_grid_elementor_e24046b .ue-debug-meta{\n  padding:10px;\n  border:1px solid red;\n  position:relative;\n  line-height:1.5em;\n  font-size:11px;\n  width:100%;\n}\n\n#uc_post_grid_elementor_e24046b .uc_btn_inner{\n  display:inline-flex;\n  align-items:center;\n  pointer-events:none;\n}\n\n#uc_post_grid_elementor_e24046b .uc_btn_inner svg{\n  width:1em;\n  height:1em;\n}\n#uc_post_grid_elementor_e24046b .ue_p_title{\n  pointer-events:none;\n}\n\n\n#uc_post_grid_elementor_e24046b .uc_content_inner{\n  width: 100%;\n}\n\n\n#uc_post_grid_elementor_e24046b .view-switcher-button{\n  display: flex;\n  align-items: center;\n}\n\n#uc_post_grid_elementor_e24046b .view-switcher-icon{\n  display: flex;\n  align-items: center;\n  line-height: 1;\n  cursor: pointer;\n  transition: all .3s ease;\n}\n\n#uc_post_grid_elementor_e24046b .view-switcher-icon svg{\n  height:1em;\n  width:1em;\n}\n\n#uc_post_grid_elementor_e24046b .view-switcher-icon.ue-hidden{\n  display: none;\n}\n\n\n#uc_post_grid_elementor_e24046b_item1 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item2 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item3 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item4 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item5 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item6 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item7 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item8 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item9 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item10 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item11 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item12 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item13 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item14 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item15 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item16 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item17 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n#uc_post_grid_elementor_e24046b_item18 [href=\"javascript:void(0)\"]{\n  cursor: unset;\n}\n\n\n<\/style>\n\n<div class=\"uc_post_grid_style_one uc-filterable-grid \" id=\"uc_post_grid_elementor_e24046b\"  data-ajax='true'  data-filterbehave='ajax'  querydata='{&quot;count_posts&quot;:18,&quot;total_posts&quot;:18,&quot;page&quot;:1,&quot;num_pages&quot;:1,&quot;orderby&quot;:&quot;title&quot;,&quot;orderdir&quot;:&quot;asc&quot;}' >\n  \t\n  <div class=\"uc_post_grid_style_one_wrap ue_post_grid uc-items-wrapper ue-woo-grid\">\n\t\t\t\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item1\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/cti01-introduction-a-la-cyber-threat-intelligence\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/08\/cyberArk-proteger-attaques-ad-768x512.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/08\/cyberArk-proteger-attaques-ad-768x512.jpg\" alt=\"cyberark proteger attaques ad\" width=\"768\" height=\"512\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-cyberdefense\">CYBERDEFENSE<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/cti01-introduction-a-la-cyber-threat-intelligence\/' target=\"_self\"><div class=\"ue_p_title\">CTI01 - Introduction \u00e0 la Cyber Threat Intelligence<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item2\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/for01-comprendre-les-bases-du-forensic-de-la-reponse-a-incidents\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/08\/attaque-soft-taken-768x433.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/08\/attaque-soft-taken-768x433.jpg\" alt=\"attaque soft taken\" width=\"768\" height=\"433\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-cyberdefense\">CYBERDEFENSE<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/for01-comprendre-les-bases-du-forensic-de-la-reponse-a-incidents\/' target=\"_self\"><div class=\"ue_p_title\">FOR01 \u2013 Comprendre les bases du Forensic \/ de la r\u00e9ponse \u00e0 incidents<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item3\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/grc01-cultiver-les-bonnes-pratiques-ssi-pour-se-proteger-des-cyber-menaces\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/08\/collaboration-securisation-si-768x512.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/08\/collaboration-securisation-si-768x512.jpg\" alt=\"Collaboration securisation si\" width=\"768\" height=\"512\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-grc\">GRC<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/grc01-cultiver-les-bonnes-pratiques-ssi-pour-se-proteger-des-cyber-menaces\/' target=\"_self\"><div class=\"ue_p_title\">GRC01 \u2013 Cultiver les bonnes pratiques SSI pour se prot\u00e9ger des cyber menaces<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item4\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/grc02-maitriser-les-risques-cyber-tout-au-long-du-cycle-de-vie-de-vos-projets-lapproche-isp\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/08\/ciso-rssi-roadmap-768x430.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/08\/ciso-rssi-roadmap-768x430.jpg\" alt=\"Conseil IN AMOA\" width=\"768\" height=\"430\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-grc\">GRC<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/grc02-maitriser-les-risques-cyber-tout-au-long-du-cycle-de-vie-de-vos-projets-lapproche-isp\/' target=\"_self\"><div class=\"ue_p_title\">GRC02 \u2013 Ma\u00eetriser les risques cyber tout au long du cycle de vie de vos projets : l\u2019approche ISP<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item5\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/grc03-identifier-et-gerer-vos-risques-a-laide-de-la-methodologie-ebios-risk-manager\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/08\/attaques-par-canaux-auxiliaires-768x384.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/08\/attaques-par-canaux-auxiliaires-768x384.jpg\" alt=\"attaques par canaux auxiliaires\" width=\"768\" height=\"384\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-grc\">GRC<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/grc03-identifier-et-gerer-vos-risques-a-laide-de-la-methodologie-ebios-risk-manager\/' target=\"_self\"><div class=\"ue_p_title\">GRC03 \u2013 Identifier et g\u00e9rer vos risques \u00e0 l\u2019aide de la m\u00e9thodologie EBIOS Risk Manager<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item6\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/in01-comprendre-la-gestion-des-identites-et-des-acces-iam\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/IN01-768x432.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/IN01-768x432.jpg\" alt=\"User People Network Circuit Board Link Connection Technology\" width=\"768\" height=\"432\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-in\">IDENTITE NUMERIQUE<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/in01-comprendre-la-gestion-des-identites-et-des-acces-iam\/' target=\"_self\"><div class=\"ue_p_title\">IN01 \u2013 Comprendre la gestion des identit\u00e9s et des acc\u00e8s (IAM)<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item7\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/in02-comprendre-et-utiliser-les-protocoles-de-federation-saml-oidc-oauth\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/08\/aes128-vs-aes256-768x439.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/08\/aes128-vs-aes256-768x439.jpg\" alt=\"aes128 vs aes256\" width=\"768\" height=\"439\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-in\">IDENTITE NUMERIQUE<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/in02-comprendre-et-utiliser-les-protocoles-de-federation-saml-oidc-oauth\/' target=\"_self\"><div class=\"ue_p_title\">IN02 \u2013 Comprendre et utiliser les protocoles de f\u00e9d\u00e9ration (SAML, OIDC, OAuth)<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item8\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/in03-comprendre-et-utiliser-le-protocole-ldap-lightweight-directory-access-protocol\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/IN03-768x439.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/IN03-768x439.jpg\" alt=\"IN03\" width=\"768\" height=\"439\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-in\">IDENTITE NUMERIQUE<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/in03-comprendre-et-utiliser-le-protocole-ldap-lightweight-directory-access-protocol\/' target=\"_self\"><div class=\"ue_p_title\">IN03 \u2013 Comprendre et utiliser le protocole LDAP (Lightweight Directory Access Protocol)<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item9\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/in04-deployer-et-administrer-la-solution-okta\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/IN04-768x482.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/IN04-768x482.jpg\" alt=\"3D abstract data technology background with low poly plexus desi\" width=\"768\" height=\"482\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-in\">IDENTITE NUMERIQUE<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/in04-deployer-et-administrer-la-solution-okta\/' target=\"_self\"><div class=\"ue_p_title\">IN04 \u2013 D\u00e9ployer et administrer la solution Okta\u00a9<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item10\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/in05-deployer-et-administrer-la-solution-sailpoint-identityiq\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/IN05-768x768.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/IN05-768x768.jpg\" alt=\"3D abstract techno background with connecting lines and dots\" width=\"768\" height=\"768\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-in\">IDENTITE NUMERIQUE<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/in05-deployer-et-administrer-la-solution-sailpoint-identityiq\/' target=\"_self\"><div class=\"ue_p_title\">IN05 \u2013 D\u00e9ployer et administrer la solution SailPoint IdentityIQ\u00a9<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item11\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/in06-deployer-et-administrer-la-solution-sailpoint-identity-security-cloud\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/IN06-768x988.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/IN06-768x988.jpg\" alt=\"IN06\" width=\"768\" height=\"988\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-in\">IDENTITE NUMERIQUE<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/in06-deployer-et-administrer-la-solution-sailpoint-identity-security-cloud\/' target=\"_self\"><div class=\"ue_p_title\">IN06 \u2013 D\u00e9ployer et administrer la solution Sailpoint Identity Security Cloud \u00a9<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item12\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/in08-deployer-et-administrer-la-solution-cyberark-identity\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/IN08-768x576.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/IN08-768x576.jpg\" alt=\"3D abstract background with a network communications design\" width=\"768\" height=\"576\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-in\">IDENTITE NUMERIQUE<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/in08-deployer-et-administrer-la-solution-cyberark-identity\/' target=\"_self\"><div class=\"ue_p_title\">IN08 \u2013 D\u00e9ployer et administrer la solution CyberArk Identity\u00a9<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item13\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/in10-decouvrir-la-solution-diga-myidentity-de-memority\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/08\/centre-de-service-in-aline-768x430.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/08\/centre-de-service-in-aline-768x430.jpg\" alt=\"centre de service in aline\" width=\"768\" height=\"430\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-in\">IDENTITE NUMERIQUE<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/in10-decouvrir-la-solution-diga-myidentity-de-memority\/' target=\"_self\"><div class=\"ue_p_title\">IN10 \u2013 D\u00e9couvrir la solution d\u2019IGA MyIdentity de Memority\u00a9<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item14\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/mic01-active-directory-tiering-ad-et-durcissement-des-os-avec-harden-ad-enterprise-by-synetis\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/MIC01-768x512.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/MIC01-768x512.jpg\" alt=\"MIC01\" width=\"768\" height=\"512\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-secop\">SECURITE OPERATIONNELLE<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/mic01-active-directory-tiering-ad-et-durcissement-des-os-avec-harden-ad-enterprise-by-synetis\/' target=\"_self\"><div class=\"ue_p_title\">MIC01 \u2013 Active Directory : Tiering AD et durcissement des OS avec Harden AD Enterprise by Synetis<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item15\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/secof01-comment-attaquer-un-site-web-pour-mieux-se-defendre\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/SECOF01-768x430.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/SECOF01-768x430.jpg\" alt=\"SECOF01\" width=\"768\" height=\"430\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-audit\">AUDIT<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/secof01-comment-attaquer-un-site-web-pour-mieux-se-defendre\/' target=\"_self\"><div class=\"ue_p_title\">SECOF01 \u2013 Comment attaquer un site web pour mieux se d\u00e9fendre<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item16\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/secof02-comprendre-le-developpement-securise-vu-par-un-attaquant\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/SECOF2-768x384.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/SECOF2-768x384.jpg\" alt=\"System background compromised by hacking\" width=\"768\" height=\"384\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-audit\">AUDIT<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/secof02-comprendre-le-developpement-securise-vu-par-un-attaquant\/' target=\"_self\"><div class=\"ue_p_title\">SECOF02 \u2013 Comprendre le d\u00e9veloppement s\u00e9curis\u00e9 vu par un attaquant<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item17\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/secop01-administrer-et-exploiter-son-pare-feu-fortigate\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/SECOP01-1-768x1152.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/SECOP01-1-768x1152.jpg\" alt=\"SECOP01\" width=\"768\" height=\"1152\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-secop\">SECURITE OPERATIONNELLE<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/secop01-administrer-et-exploiter-son-pare-feu-fortigate\/' target=\"_self\"><div class=\"ue_p_title\">SECOP01 \u2013 Administrer et exploiter son pare-feu Fortigate<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\n\n\n\n<div id=\"uc_post_grid_elementor_e24046b_item18\" class=\"uc_post_grid_style_one_item ue_post_grid_item ue-item \">\n  \n      <a class=\"uc_post_grid_style_one_image \" href='https:\/\/www.synetis.com\/en\/formation\/secop02-comprendre-et-avoir-les-bonnes-pratiques-de-la-gestion-des-certificats-pki-hsm-clm\/' target=\"_self\">\n     <div class=\"uc_post_image\">\n       <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/SECOP02-768x430.jpg\"  src=\"https:\/\/www.synetis.com\/wp-content\/uploads\/2025\/07\/SECOP02-768x430.jpg\" alt=\"Digital Security Data Privacy Agreement Concept\" width=\"768\" height=\"430\">\n       <div class=\"uc_post_image_overlay\"><\/div>\n     <\/div>\n    <\/a>\n   \n  <div class=\"uc_content\">\n    <div class=\"uc_content_inner\">\n      <div class=\"uc_content-info-wrapper\" >\n                \n          \n              \n    <div class=\"ue-grid-item-category\">\n                        <a href=\"javascript:void(0);\" class=\"formation-secop\">SECURITE OPERATIONNELLE<\/a>\n                  <\/div>\n                      <div class=\"ue-meta-data\">\n            \n                \t    \n                \n        \n\t\n                \n                \n                \n                \n    \t\t\t\n      \n            \n  <\/div>\t\n  \n        <div class=\"uc_post_title\"><a class=\"\" href='https:\/\/www.synetis.com\/en\/formation\/secop02-comprendre-et-avoir-les-bonnes-pratiques-de-la-gestion-des-certificats-pki-hsm-clm\/' target=\"_self\"><div class=\"ue_p_title\">SECOP02 \u2013 Comprendre et avoir les bonnes pratiques de la gestion des certificats : PKI, HSM &amp; CLM<\/div><\/a><\/div>\t\n                 \n                     \n                   \n                         \n                                              \n      <\/div>                      \n                            \n \t<\/div>  <\/div>      \n        \n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n  <div id=\"uc_post_grid_elementor_e24046b_empty_message\" class=\"ue-no-posts-found\"  style=\"display:none\" >No posts found<\/div>\n\n\n<!-- end Post Grid -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Discover our range of specialized cybersecurity training courses. Acquire the skills you need to protect your business effectively. <\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-22465","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages\/22465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/comments?post=22465"}],"version-history":[{"count":4,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages\/22465\/revisions"}],"predecessor-version":[{"id":22511,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages\/22465\/revisions\/22511"}],"wp:attachment":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/media?parent=22465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}