{"version":"1.0","provider_name":"issen Learn","provider_url":"https:\/\/issenlearn.com\/fr","author_name":"Chabouni","author_url":"https:\/\/issenlearn.com\/fr\/author\/rachid-chabouni\/","title":"Module 6 \u2013 S\u00e9curit\u00e9 des r\u00e9seaux sociaux","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"TthUwxDGFv\"><a href=\"https:\/\/issenlearn.com\/fr\/courses\/for-mobilis\/lesson\/module-6-securite-des-reseaux-sociaux\/\">Module 6 \u2013 S\u00e9curit\u00e9 des r\u00e9seaux sociaux<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/issenlearn.com\/fr\/courses\/for-mobilis\/lesson\/module-6-securite-des-reseaux-sociaux\/embed\/#?secret=TthUwxDGFv\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Module 6 \u2013 S\u00e9curit\u00e9 des r\u00e9seaux sociaux\u00a0\u00bb &#8212; issen Learn\" data-secret=\"TthUwxDGFv\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>","description":"\ud83d\udcda Dur\u00e9e estim\u00e9e : 1h30\ud83c\udfaf Objectif p\u00e9dagogique : Identifier les menaces li\u00e9es aux r\u00e9seaux sociaux et savoir appliquer des pratiques de s\u00e9curit\u00e9 adapt\u00e9es \u00e0 un usage professionnel. Prot\u00e9ger efficacement leurs comptes sociaux contre le piratage et les fuites de donn\u00e9es.Adopter une posture proactive de s\u00e9curit\u00e9 pour les \u00e9quipes. \u00c0 l\u2019issue de ce module, les participants [&hellip;]"}