<?xml version="1.0" encoding="UTF-8"?>
<!-- Ce plan de site a été généré dynamiquement le mai 11, 2026 à 11:52 pm par All in One SEO Pro v4.9.6.2 - l’extension SEO originale pour WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.synetis.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Synetis</title>
		<link><![CDATA[https://www.synetis.com]]></link>
		<description><![CDATA[Synetis]]></description>
		<lastBuildDate><![CDATA[Tue, 10 Mar 2026 12:23:55 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.synetis.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.synetis.com/blog/]]></guid>
			<link><![CDATA[https://www.synetis.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 12:23:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/]]></guid>
			<link><![CDATA[https://www.synetis.com/]]></link>
			<title>Accueil</title>
			<pubDate><![CDATA[Thu, 07 May 2026 08:43:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/operational-safety/building-your-sensitive-or-sovereign-information-systems/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/operational-safety/building-your-sensitive-or-sovereign-information-systems/]]></link>
			<title>Building your sensitive or sovereign information systems</title>
			<pubDate><![CDATA[Mon, 11 May 2026 15:10:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/formation/grc02-maitriser-les-risques-cyber-tout-au-long-du-cycle-de-vie-de-vos-projets-lapproche-isp/]]></guid>
			<link><![CDATA[https://www.synetis.com/formation/grc02-maitriser-les-risques-cyber-tout-au-long-du-cycle-de-vie-de-vos-projets-lapproche-isp/]]></link>
			<title>GRC02 – Maîtriser les risques cyber tout au long du cycle de vie de vos projets : l’approche ISP</title>
			<pubDate><![CDATA[Mon, 11 May 2026 14:23:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/formation/in08-deployer-et-administrer-la-solution-cyberark-identity/]]></guid>
			<link><![CDATA[https://www.synetis.com/formation/in08-deployer-et-administrer-la-solution-cyberark-identity/]]></link>
			<title>IN08 – Déployer et administrer la solution CyberArk Identity©</title>
			<pubDate><![CDATA[Mon, 11 May 2026 14:22:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/formation/mic01-active-directory-tiering-ad-et-durcissement-des-os-avec-harden-ad-enterprise-by-synetis/]]></guid>
			<link><![CDATA[https://www.synetis.com/formation/mic01-active-directory-tiering-ad-et-durcissement-des-os-avec-harden-ad-enterprise-by-synetis/]]></link>
			<title>MIC01 – Active Directory : Tiering AD et durcissement des OS avec Harden AD Enterprise by Synetis</title>
			<pubDate><![CDATA[Mon, 11 May 2026 14:19:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/formation/in06-deployer-et-administrer-la-solution-sailpoint-identity-security-cloud/]]></guid>
			<link><![CDATA[https://www.synetis.com/formation/in06-deployer-et-administrer-la-solution-sailpoint-identity-security-cloud/]]></link>
			<title>IN06 – Déployer et administrer la solution Sailpoint Identity Security Cloud ©</title>
			<pubDate><![CDATA[Mon, 11 May 2026 14:15:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/formation/in04-deployer-et-administrer-la-solution-okta/]]></guid>
			<link><![CDATA[https://www.synetis.com/formation/in04-deployer-et-administrer-la-solution-okta/]]></link>
			<title>IN04 – Déployer et administrer la solution Okta©</title>
			<pubDate><![CDATA[Mon, 11 May 2026 14:14:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/formation/secop02-comprendre-et-avoir-les-bonnes-pratiques-de-la-gestion-des-certificats-pki-hsm-clm/]]></guid>
			<link><![CDATA[https://www.synetis.com/formation/secop02-comprendre-et-avoir-les-bonnes-pratiques-de-la-gestion-des-certificats-pki-hsm-clm/]]></link>
			<title>SECOP02 – Comprendre et avoir les bonnes pratiques de la gestion des certificats : PKI, HSM &amp; CLM</title>
			<pubDate><![CDATA[Mon, 11 May 2026 14:13:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/formation/secop01-administrer-et-exploiter-son-pare-feu-fortigate/]]></guid>
			<link><![CDATA[https://www.synetis.com/formation/secop01-administrer-et-exploiter-son-pare-feu-fortigate/]]></link>
			<title>SECOP01 – Administrer et exploiter son pare-feu Fortigate</title>
			<pubDate><![CDATA[Mon, 11 May 2026 14:11:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/digital-identity/board/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/digital-identity/board/]]></link>
			<title>Board</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:21:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/identite-numerique/conseil/]]></guid>
			<link><![CDATA[https://www.synetis.com/identite-numerique/conseil/]]></link>
			<title>Conseil</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:21:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/about-us/a-committed-firm/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/about-us/a-committed-firm/]]></link>
			<title>A committed firm</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/cyber-defense/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/cyber-defense/]]></link>
			<title>Cyber defense</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/ssi-audit/audit-under-passi-qualification/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/ssi-audit/audit-under-passi-qualification/]]></link>
			<title>Audit under PASSI qualification</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/cyber-defense/cti/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/cyber-defense/cti/]]></link>
			<title>CTI</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/grc/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/grc/]]></link>
			<title>GRC</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/digital-identity/realization/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/digital-identity/realization/]]></link>
			<title>Realization</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/digital-identity/operation/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/digital-identity/operation/]]></link>
			<title>Operation</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/terms-of-use/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/terms-of-use/]]></link>
			<title>Terms of use</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/credits/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/credits/]]></link>
			<title>Credits</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/ssi-audit/safety-audits/configuration-audit-2/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/ssi-audit/safety-audits/configuration-audit-2/]]></link>
			<title>Configuration audit</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/ssi-audit/safety-audits/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/ssi-audit/safety-audits/]]></link>
			<title>Safety audits</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/ssi-audit/safety-audits/architecture-audit/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/ssi-audit/safety-audits/architecture-audit/]]></link>
			<title>Architecture audit</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/ssi-audit/safety-audits/source-code-audit/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/ssi-audit/safety-audits/source-code-audit/]]></link>
			<title>Source code audit</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/cyber-defense/cert/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/cyber-defense/cert/]]></link>
			<title>CERT</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/cyber-defense/soc/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/cyber-defense/soc/]]></link>
			<title>SOC</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/grc/governance/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/grc/governance/]]></link>
			<title>Governance</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/grc/risks/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/grc/risks/]]></link>
			<title>Risks</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/grc/continuity/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/grc/continuity/]]></link>
			<title>Continuity</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/grc/compliance/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/grc/compliance/]]></link>
			<title>Compliance</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:06:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/digital-identity/customer-identity-and-access-management/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/digital-identity/customer-identity-and-access-management/]]></link>
			<title>Customer Identity and Access Management</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/digital-identity/access-management/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/digital-identity/access-management/]]></link>
			<title>Access Management</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/white-papers/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/white-papers/]]></link>
			<title>White papers</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/cert-reports/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/cert-reports/]]></link>
			<title>CERT reports</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/training-contact/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/training-contact/]]></link>
			<title>Training contact</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/resources/webinars/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/resources/webinars/]]></link>
			<title>Webinars</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/digital-identity/privileged-access-management/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/digital-identity/privileged-access-management/]]></link>
			<title>Privileged Access Management</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/digital-identity/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/digital-identity/]]></link>
			<title>Digital Identity</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/ssi-audit/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/ssi-audit/]]></link>
			<title>SSI audit</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/operational-safety/infrastructure-and-data-security/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/operational-safety/infrastructure-and-data-security/]]></link>
			<title>Infrastructure and data security</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/operational-safety/microsoft-ecosystem-security/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/operational-safety/microsoft-ecosystem-security/]]></link>
			<title>Microsoft ecosystem security</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/ssi-audit/social-engineering/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/ssi-audit/social-engineering/]]></link>
			<title>Social Engineering</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/ssi-audit/penetration-testing-pentest/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/ssi-audit/penetration-testing-pentest/]]></link>
			<title>Penetration testing (Pentest)</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/ssi-audit/architecture-audit/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/ssi-audit/architecture-audit/]]></link>
			<title>Architecture audit</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/ssi-audit/organizational-and-physical-audit/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/ssi-audit/organizational-and-physical-audit/]]></link>
			<title>Organizational and physical audit</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/ssi-audit/hardware-penetration-testing/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/ssi-audit/hardware-penetration-testing/]]></link>
			<title>Hardware penetration testing</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/ssi-audit/configuration-audit/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/ssi-audit/configuration-audit/]]></link>
			<title>Configuration audit</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/ssi-audit/source-code-audit/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/ssi-audit/source-code-audit/]]></link>
			<title>Source code audit</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.synetis.com/en/ssi-audit/red-team-purple-team/]]></guid>
			<link><![CDATA[https://www.synetis.com/en/ssi-audit/red-team-purple-team/]]></link>
			<title>Red Team &#038; Purple Team</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:05:01 +0000]]></pubDate>
		</item>
				</channel>
</rss>
