{"id":4597,"date":"2023-06-27T15:13:20","date_gmt":"2023-06-27T13:13:20","guid":{"rendered":"https:\/\/controlc.fr\/?post_type=lp_course&#038;p=4597"},"modified":"2025-02-25T15:34:05","modified_gmt":"2025-02-25T14:34:05","slug":"formation-securite-informatique-utilisateurs","status":"publish","type":"lp_course","link":"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/","title":{"rendered":"SECURITE ET BONNES PRATIQUES INFORMATIQUES FORMATION DES UTILISATEURS"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4597\" class=\"elementor elementor-4597\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2c5c0c41 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2c5c0c41\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34355a46\" data-id=\"34355a46\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e49b2df elementor-widget elementor-widget-text-editor\" data-id=\"5e49b2df\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"detailles-objectif\"><h2 id=\"detailles-objectif\">Programme<\/h2><div>Au cours de cette formation, vous aborderez notamment les points suivants :<\/div><div>\u00a0<\/div><p><strong>DEFINITION DE LA SECURITE INFORMATIQUE<\/strong><br \/>Panorama de la cyber menace, son contexte, ses enjeux<br \/>L\u2019importance de la prise en compte de la s\u00e9curit\u00e9<br \/>informatique pour les entreprises et organisations<br \/>Les r\u00e9seaux d&rsquo;entreprise (locaux, distantes, Internet).<br \/>Les r\u00e9seaux sans fil et mobilit\u00e9<br \/>Les applications \u00e0 risques : Web, messagerie&#8230;<br \/>La base de donn\u00e9es et syst\u00e8me de fichiers : menaces et <br \/>risques<br \/><strong>PRESENTATION DES SITUATIONS A RISQUE<\/strong><\/p><p><br \/><strong>Les gestes du quotidien<\/strong><br \/>Acc\u00e8s internet<br \/>Mises \u00e0 jour<br \/>Les r\u00e9seaux sociaux<\/p><p><br \/><strong>Gestion des mots de passe<\/strong><br \/>Identifier et savoir cr\u00e9er un mot de passe fort<br \/>Apprendre \u00e0 g\u00e9rer ses mots de passe<\/p><p><br \/><strong>D\u00e9tection d&rsquo;attaques<\/strong><br \/>Conna\u00eetre le principe du phishing<br \/>Conna\u00eetre le ransomware<br \/>Reconna\u00eetre les techniques utilis\u00e9es par les pirates <br \/>informatiques<br \/>Donner les bonnes pratiques en cas d\u2019attaque<\/p><p><br \/><strong>D\u00e9placements professionnels et nomadisme<\/strong><br \/>Apprendre \u00e0 cloisonner le professionnel et le personnel<br \/>Cr\u00e9er des sessions diff\u00e9rentes pour chaque usage et <br \/>utilisateur<br \/>Se m\u00e9fier des objets connect\u00e9s<\/p><p><br \/><strong>Le processus d&rsquo;authentification<\/strong><br \/>Les contr\u00f4les d&rsquo;acc\u00e8s : l\u2019authentification et l\u2019autorisation<br \/>L\u2019authentification par certificats et par token.<br \/>La connexion \u00e0 distance via Internet.<br \/>Qu\u2019est-ce qu\u2019un VPN ?<br \/>Pourquoi utiliser une authentification renforc\u00e9e<\/p><p><br \/><strong>SENSIBILISATION RGPD<\/strong><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f2e979f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f2e979f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-b74c8eb\" data-id=\"b74c8eb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c1a74cf elementor-button-danger elementor-align-center animated-slow elementor-invisible elementor-widget elementor-widget-button\" data-id=\"c1a74cf\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/controlc.fr\/wp-content\/uploads\/2023\/06\/SECURITE-INFORMATIQUE-UTILISATEURS-FORMATION-1J.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">La fiche formation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-ce32191\" data-id=\"ce32191\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-99a1f45 elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"99a1f45\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/controlc.fr\/wp-content\/uploads\/2023\/08\/ControlC_Tarifs_pack-office-PAO-DAO_2023.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Nos tarifs<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-716c061\" data-id=\"716c061\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4924622 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"4924622\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/controlc.fr\/wp-content\/uploads\/2022\/12\/ControlC_planning-interentreprises_bureautique-2023.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Le planning<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Programme Au cours de cette formation, vous aborderez notamment les points suivants : DEFINITION DE LA SECURITE INFORMATIQUE Panorama de la cyber menace, son contexte, ses enjeux L\u2019importance de la prise en compte de la s\u00e9curit\u00e9 informatique pour les entreprises et organisations Les r\u00e9seaux d&rsquo;entreprise (locaux, distantes, Internet). Les r\u00e9seaux&hellip;<\/p>\n","protected":false},"author":6,"featured_media":6030,"comment_status":"closed","ping_status":"closed","template":"","course_category":[34,10,12],"course_tag":[],"class_list":["post-4597","lp_course","type-lp_course","status-publish","has-post-thumbnail","hentry","course_category-approche-de-linformatique","course_category-bureautique","course_category-informatique","course"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SECURITE ET BONNES PRATIQUES INFORMATIQUES FORMATION DES UTILISATEURS -<\/title>\n<meta name=\"description\" content=\"Il s&#039;agit ici d&#039;une formation pour sensibiliser les utilisateurs aux les cyber menaces gr\u00e2ce \u00e0 la ma\u00eetrise de bonnes pratiques au quotidien\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Control^C Melun - Formation aux m\u00e9dias sociaux\" \/>\n<meta property=\"og:description\" content=\"ce module de formation vous permettra de comprendre et ma\u00eetriser les outils pour construire une strat\u00e9gie de communication efficace et de ma\u00eetriser l\u2019e-r\u00e9putation de l\u2019entreprise, d\u00e9velopper sa notori\u00e9t\u00e9 en g\u00e9n\u00e9rant du trafic qualifi\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-25T14:34:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/controlc.fr\/wp-content\/uploads\/2023\/06\/icons8-des-medias-sociaux-64.png\" \/>\n\t<meta property=\"og:image:width\" content=\"64\" \/>\n\t<meta property=\"og:image:height\" content=\"64\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Control^C Melun - Formation aux m\u00e9dias sociaux\" \/>\n<meta name=\"twitter:description\" content=\"Ce module de formation vous permettra de comprendre et ma\u00eetriser les outils pour construire une strat\u00e9gie de communication efficace et de ma\u00eetriser l\u2019e-r\u00e9putation de l\u2019entreprise, d\u00e9velopper sa notori\u00e9t\u00e9 en g\u00e9n\u00e9rant du trafic qualifi\u00e9.\" \/>\n<meta name=\"twitter:site\" content=\"@controlcmelun\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/\",\"url\":\"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/\",\"name\":\"SECURITE ET BONNES PRATIQUES INFORMATIQUES FORMATION DES UTILISATEURS -\",\"isPartOf\":{\"@id\":\"https:\/\/controlc.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/controlc.fr\/wp-content\/uploads\/2025\/02\/icons8-cyber-security-100.png\",\"datePublished\":\"2023-06-27T13:13:20+00:00\",\"dateModified\":\"2025-02-25T14:34:05+00:00\",\"description\":\"Il s'agit ici d'une formation pour sensibiliser les utilisateurs aux les cyber menaces gr\u00e2ce \u00e0 la ma\u00eetrise de bonnes pratiques au quotidien\",\"breadcrumb\":{\"@id\":\"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/#primaryimage\",\"url\":\"https:\/\/controlc.fr\/wp-content\/uploads\/2025\/02\/icons8-cyber-security-100.png\",\"contentUrl\":\"https:\/\/controlc.fr\/wp-content\/uploads\/2025\/02\/icons8-cyber-security-100.png\",\"width\":100,\"height\":100,\"caption\":\"Cyber Security ic\u00f4ne par Icons8\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/controlc.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cours\",\"item\":\"https:\/\/controlc.fr\/index.php\/cours-2\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SECURITE ET BONNES PRATIQUES INFORMATIQUES FORMATION DES UTILISATEURS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/controlc.fr\/#website\",\"url\":\"https:\/\/controlc.fr\/\",\"name\":\"Controlc.fr\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/controlc.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/controlc.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/controlc.fr\/#organization\",\"name\":\"Control^C\",\"url\":\"https:\/\/controlc.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/controlc.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/controlc.fr\/wp-content\/uploads\/2020\/12\/cropped-cropped-cropped-logo-melun.png\",\"contentUrl\":\"https:\/\/controlc.fr\/wp-content\/uploads\/2020\/12\/cropped-cropped-cropped-logo-melun.png\",\"width\":427,\"height\":100,\"caption\":\"Control^C\"},\"image\":{\"@id\":\"https:\/\/controlc.fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/controlcmelun\",\"https:\/\/www.linkedin.com\/company\/8009384\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SECURITE ET BONNES PRATIQUES INFORMATIQUES FORMATION DES UTILISATEURS -","description":"Il s'agit ici d'une formation pour sensibiliser les utilisateurs aux les cyber menaces gr\u00e2ce \u00e0 la ma\u00eetrise de bonnes pratiques au quotidien","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/","og_locale":"fr_FR","og_type":"article","og_title":"Control^C Melun - Formation aux m\u00e9dias sociaux","og_description":"ce module de formation vous permettra de comprendre et ma\u00eetriser les outils pour construire une strat\u00e9gie de communication efficace et de ma\u00eetriser l\u2019e-r\u00e9putation de l\u2019entreprise, d\u00e9velopper sa notori\u00e9t\u00e9 en g\u00e9n\u00e9rant du trafic qualifi\u00e9.","og_url":"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/","article_modified_time":"2025-02-25T14:34:05+00:00","og_image":[{"width":64,"height":64,"url":"https:\/\/controlc.fr\/wp-content\/uploads\/2023\/06\/icons8-des-medias-sociaux-64.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Control^C Melun - Formation aux m\u00e9dias sociaux","twitter_description":"Ce module de formation vous permettra de comprendre et ma\u00eetriser les outils pour construire une strat\u00e9gie de communication efficace et de ma\u00eetriser l\u2019e-r\u00e9putation de l\u2019entreprise, d\u00e9velopper sa notori\u00e9t\u00e9 en g\u00e9n\u00e9rant du trafic qualifi\u00e9.","twitter_site":"@controlcmelun","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/","url":"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/","name":"SECURITE ET BONNES PRATIQUES INFORMATIQUES FORMATION DES UTILISATEURS -","isPartOf":{"@id":"https:\/\/controlc.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/#primaryimage"},"image":{"@id":"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/#primaryimage"},"thumbnailUrl":"https:\/\/controlc.fr\/wp-content\/uploads\/2025\/02\/icons8-cyber-security-100.png","datePublished":"2023-06-27T13:13:20+00:00","dateModified":"2025-02-25T14:34:05+00:00","description":"Il s'agit ici d'une formation pour sensibiliser les utilisateurs aux les cyber menaces gr\u00e2ce \u00e0 la ma\u00eetrise de bonnes pratiques au quotidien","breadcrumb":{"@id":"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/#primaryimage","url":"https:\/\/controlc.fr\/wp-content\/uploads\/2025\/02\/icons8-cyber-security-100.png","contentUrl":"https:\/\/controlc.fr\/wp-content\/uploads\/2025\/02\/icons8-cyber-security-100.png","width":100,"height":100,"caption":"Cyber Security ic\u00f4ne par Icons8"},{"@type":"BreadcrumbList","@id":"https:\/\/controlc.fr\/index.php\/courses\/formation-securite-informatique-utilisateurs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/controlc.fr\/"},{"@type":"ListItem","position":2,"name":"Cours","item":"https:\/\/controlc.fr\/index.php\/cours-2\/"},{"@type":"ListItem","position":3,"name":"SECURITE ET BONNES PRATIQUES INFORMATIQUES FORMATION DES UTILISATEURS"}]},{"@type":"WebSite","@id":"https:\/\/controlc.fr\/#website","url":"https:\/\/controlc.fr\/","name":"Controlc.fr","description":"","publisher":{"@id":"https:\/\/controlc.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/controlc.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/controlc.fr\/#organization","name":"Control^C","url":"https:\/\/controlc.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/controlc.fr\/#\/schema\/logo\/image\/","url":"https:\/\/controlc.fr\/wp-content\/uploads\/2020\/12\/cropped-cropped-cropped-logo-melun.png","contentUrl":"https:\/\/controlc.fr\/wp-content\/uploads\/2020\/12\/cropped-cropped-cropped-logo-melun.png","width":427,"height":100,"caption":"Control^C"},"image":{"@id":"https:\/\/controlc.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/controlcmelun","https:\/\/www.linkedin.com\/company\/8009384"]}]}},"_links":{"self":[{"href":"https:\/\/controlc.fr\/index.php\/wp-json\/wp\/v2\/lp_course\/4597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/controlc.fr\/index.php\/wp-json\/wp\/v2\/lp_course"}],"about":[{"href":"https:\/\/controlc.fr\/index.php\/wp-json\/wp\/v2\/types\/lp_course"}],"author":[{"embeddable":true,"href":"https:\/\/controlc.fr\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/controlc.fr\/index.php\/wp-json\/wp\/v2\/comments?post=4597"}],"version-history":[{"count":13,"href":"https:\/\/controlc.fr\/index.php\/wp-json\/wp\/v2\/lp_course\/4597\/revisions"}],"predecessor-version":[{"id":5060,"href":"https:\/\/controlc.fr\/index.php\/wp-json\/wp\/v2\/lp_course\/4597\/revisions\/5060"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/controlc.fr\/index.php\/wp-json\/wp\/v2\/media\/6030"}],"wp:attachment":[{"href":"https:\/\/controlc.fr\/index.php\/wp-json\/wp\/v2\/media?parent=4597"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/controlc.fr\/index.php\/wp-json\/wp\/v2\/course_category?post=4597"},{"taxonomy":"course_tag","embeddable":true,"href":"https:\/\/controlc.fr\/index.php\/wp-json\/wp\/v2\/course_tag?post=4597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}