{"id":5160,"date":"2025-01-03T10:00:00","date_gmt":"2025-01-03T10:00:00","guid":{"rendered":"https:\/\/educap.io\/?p=5160"},"modified":"2025-01-28T08:58:16","modified_gmt":"2025-01-28T08:58:16","slug":"cybersecurite-dans-leducation","status":"publish","type":"post","link":"https:\/\/educap.io\/en\/cybersecurite-dans-leducation\/","title":{"rendered":"Cybers\u00e9curit\u00e9 dans l\u2019\u00e9ducation"},"content":{"rendered":"<figure class=\"wp-block-image size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"724\" height=\"483\" src=\"https:\/\/educap.io\/wp-content\/uploads\/2024\/12\/iStock-1226332356.jpg\" alt=\"\" class=\"wp-image-5165\" style=\"width:551px;height:auto\" srcset=\"https:\/\/educap.io\/wp-content\/uploads\/2024\/12\/iStock-1226332356.jpg 724w, https:\/\/educap.io\/wp-content\/uploads\/2024\/12\/iStock-1226332356-300x200.jpg 300w\" sizes=\"(max-width: 724px) 100vw, 724px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Cybers\u00e9curit\u00e9 dans l\u2019\u00e9ducation :Prot\u00e9ger les Donn\u00e9es des \u00c9l\u00e8ves dans un Monde Connect\u00e9<\/h2>\n\n\n\n<p>L&rsquo;\u00e9ducation \u00e9volue rapidement gr\u00e2ce \u00e0 la technologie. Les outils num\u00e9riques, les plateformes d\u2019apprentissage en ligne et les solutions bas\u00e9es sur l\u2019intelligence artificielle transforment les salles de classe. Cependant, cette transformation pose une question cruciale : comment garantir la cybers\u00e9curit\u00e9 et prot\u00e9ger les donn\u00e9es personnelles des \u00e9l\u00e8ves dans un monde de plus en plus interconnect\u00e9 ?<\/p>\n\n\n\n<p>Dans cet article, nous explorons les enjeux, les d\u00e9fis et les solutions pour pr\u00e9server la vie priv\u00e9e des \u00e9l\u00e8ves tout en tirant parti des opportunit\u00e9s offertes par le num\u00e9rique.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. L\u2019\u00e8re num\u00e9rique : une opportunit\u00e9 et un d\u00e9fi<\/strong><\/h3>\n\n\n\n<p>Les \u00e9coles et universit\u00e9s adoptent des solutions num\u00e9riques pour am\u00e9liorer l\u2019\u00e9ducation. Ces outils permettent une personnalisation de l\u2019apprentissage, un acc\u00e8s rapide aux ressources et une communication simplifi\u00e9e entre les parties prenantes.<\/p>\n\n\n\n<p>Cependant, ces avantages s&rsquo;accompagnent de risques :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Fuites de donn\u00e9es<\/strong> : Les informations personnelles des \u00e9l\u00e8ves, telles que leurs identifiants ou leurs performances scolaires, peuvent \u00eatre expos\u00e9es.<\/li>\n\n\n\n<li><strong>Cyberattaques<\/strong> : Les institutions \u00e9ducatives sont devenues des cibles pour les hackers, souvent \u00e0 cause de syst\u00e8mes de s\u00e9curit\u00e9 obsol\u00e8tes.<\/li>\n\n\n\n<li><strong>Utilisation abusive des donn\u00e9es<\/strong> : Certaines plateformes exploitent les donn\u00e9es des utilisateurs \u00e0 des fins commerciales sans consentement explicite.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Cybers\u00e9curit\u00e9 dans l\u2019\u00e9ducation<\/strong>:<strong> Comprendre la valeur des donn\u00e9es des \u00e9l\u00e8ves<\/strong><\/h3>\n\n\n\n<p>Les donn\u00e9es \u00e9ducatives sont particuli\u00e8rement sensibles :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Informations personnelles<\/strong> : Noms, adresses, photos, ou informations de sant\u00e9.<\/li>\n\n\n\n<li><strong>Donn\u00e9es comportementales<\/strong> : Habitudes d&rsquo;apprentissage, temps pass\u00e9 sur des plateformes, r\u00e9sultats d&rsquo;\u00e9valuations.<\/li>\n\n\n\n<li><strong>Donn\u00e9es biom\u00e9triques<\/strong> : Avec l&rsquo;essor des outils d&rsquo;authentification (comme la reconnaissance faciale), ces donn\u00e9es deviennent une cible.<\/li>\n<\/ul>\n\n\n\n<p>La protection de ces informations est essentielle, car leur exploitation ou leur divulgation pourrait nuire aux \u00e9l\u00e8ves, aux familles et aux institutions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Les d\u00e9fis majeurs en cybers\u00e9curit\u00e9 \u00e9ducative<\/strong><\/h3>\n\n\n\n<p>Le secteur \u00e9ducatif fait face \u00e0 plusieurs d\u00e9fis en mati\u00e8re de cybers\u00e9curit\u00e9 :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Budget limit\u00e9<\/strong> : Beaucoup d\u2019\u00e9coles manquent de ressources pour investir dans des syst\u00e8mes de s\u00e9curit\u00e9 performants.<\/li>\n\n\n\n<li><strong>Formation insuffisante<\/strong> : Les enseignants et administrateurs ne sont pas toujours form\u00e9s aux bonnes pratiques num\u00e9riques.<\/li>\n\n\n\n<li><strong>Complexit\u00e9 croissante des menaces<\/strong> : Les attaques deviennent plus sophistiqu\u00e9es, ciblant des vuln\u00e9rabilit\u00e9s sp\u00e9cifiques.<\/li>\n\n\n\n<li><strong>Conformit\u00e9 r\u00e9glementaire<\/strong> : Respecter les lois sur la protection des donn\u00e9es, comme le RGPD, peut \u00eatre complexe pour certaines institutions.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Solutions pour prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves<\/strong><\/h3>\n\n\n\n<p>Pour relever ces d\u00e9fis, plusieurs mesures peuvent \u00eatre mises en place :<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>4.1. Mettre \u00e0 jour les syst\u00e8mes<\/strong><\/h4>\n\n\n\n<p>Les \u00e9coles doivent utiliser des logiciels r\u00e9guli\u00e8rement mis \u00e0 jour pour corriger les failles de s\u00e9curit\u00e9.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>4.2. Investir dans la formation<\/strong><\/h4>\n\n\n\n<p>Former le personnel \u00e9ducatif et les \u00e9l\u00e8ves aux pratiques de cybers\u00e9curit\u00e9 est crucial. Par exemple, reconna\u00eetre les tentatives de phishing ou cr\u00e9er des mots de passe forts.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>4.3. Adopter des solutions de s\u00e9curit\u00e9 avanc\u00e9es<\/strong><\/h4>\n\n\n\n<p>Les institutions peuvent int\u00e9grer :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Des pare-feu modernes.<\/li>\n\n\n\n<li>Des outils de d\u00e9tection des intrusions.<\/li>\n\n\n\n<li>Des plateformes de cryptage pour prot\u00e9ger les donn\u00e9es sensibles.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>4.4. S\u00e9curiser les acc\u00e8s<\/strong><\/h4>\n\n\n\n<p>L\u2019authentification multifactorielle (MFA) est une m\u00e9thode efficace pour prot\u00e9ger les comptes des utilisateurs.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>4.5. \u00c9tablir des politiques de confidentialit\u00e9 claires<\/strong><\/h4>\n\n\n\n<p>Les \u00e9coles doivent informer les parents et les \u00e9l\u00e8ves sur l\u2019utilisation des donn\u00e9es collect\u00e9es. Cela inclut des politiques transparentes sur le stockage et le partage des informations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Cybers\u00e9curit\u00e9 dans l\u2019\u00e9ducation<\/strong>: <strong>L\u2019importance de la conformit\u00e9 r\u00e9glementaire<\/strong><\/h3>\n\n\n\n<p>Des r\u00e9glementations comme le RGPD en Europe ou la FERPA aux \u00c9tats-Unis imposent des standards stricts pour prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves.<\/p>\n\n\n\n<p>Ces lois exigent :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Un consentement clair pour collecter les donn\u00e9es.<\/li>\n\n\n\n<li>La limitation de l\u2019acc\u00e8s aux informations personnelles.<\/li>\n\n\n\n<li>La suppression des donn\u00e9es lorsqu\u2019elles ne sont plus n\u00e9cessaires.<\/li>\n<\/ul>\n\n\n\n<p>Se conformer \u00e0 ces r\u00e9glementations ne prot\u00e8ge pas seulement les \u00e9l\u00e8ves, mais renforce \u00e9galement la confiance des familles envers les institutions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>6. Construire un avenir num\u00e9rique s\u00e9curis\u00e9 pour l\u2019\u00e9ducation<\/strong><\/h3>\n\n\n\n<p>Pour r\u00e9ussir la transition num\u00e9rique, il est crucial de placer la cybers\u00e9curit\u00e9 et la vie priv\u00e9e au c\u0153ur des strat\u00e9gies \u00e9ducatives. Cela n\u00e9cessite une collaboration entre :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Les institutions \u00e9ducatives.<\/li>\n\n\n\n<li>Les fournisseurs de technologies.<\/li>\n\n\n\n<li>Les gouvernements et les r\u00e9gulateurs.<\/li>\n<\/ul>\n\n\n\n<p>Ensemble, ils peuvent d\u00e9velopper des outils plus s\u00fbrs, sensibiliser les utilisateurs et anticiper les nouvelles menaces.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conclusion : Pr\u00e9parer aujourd\u2019hui pour prot\u00e9ger demain<\/strong><\/h3>\n\n\n\n<p>La protection des donn\u00e9es des \u00e9l\u00e8ves est un enjeu majeur dans un monde num\u00e9rique. Chez <strong>Educap<\/strong>, nous aidons les institutions \u00e9ducatives \u00e0 relever ces d\u00e9fis en leur offrant des solutions innovantes et conformes aux normes.<\/p>\n\n\n\n<p><strong>Pr\u00eats \u00e0 s\u00e9curiser vos plateformes \u00e9ducatives ?<\/strong> Contactez <strong>Educap<\/strong> d\u00e8s maintenant et d\u00e9couvrez comment nous pouvons prot\u00e9ger vos donn\u00e9es tout en transformant votre \u00e9ducation num\u00e9rique.<\/p>\n\n\n\n<p>\ud83d\udc49 <strong><a href=\"https:\/\/educap.io\/en\/\">D\u00e9couvrez nos solutions<\/a><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Cybers\u00e9curit\u00e9 dans l\u2019\u00e9ducation :Prot\u00e9ger les Donn\u00e9es des \u00c9l\u00e8ves dans un Monde Connect\u00e9 L&rsquo;\u00e9ducation \u00e9volue rapidement gr\u00e2ce \u00e0 la technologie. Les outils num\u00e9riques, les plateformes d\u2019apprentissage en ligne et les solutions bas\u00e9es sur l\u2019intelligence artificielle transforment les salles de classe. Cependant, cette transformation pose une question cruciale : comment garantir la cybers\u00e9curit\u00e9 et prot\u00e9ger les donn\u00e9es [&hellip;]<\/p>","protected":false},"author":9,"featured_media":5165,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5160","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybers\u00e9curit\u00e9 dans l\u2019\u00e9ducation - Educap<\/title>\n<meta name=\"description\" content=\"Comment prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves dans un monde connect\u00e9 ? D\u00e9couvrez les enjeux de la cybers\u00e9curit\u00e9 et les solutions pour garantir la vie priv\u00e9e dans l\u2019\u00e9ducation num\u00e9rique.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/educap.io\/en\/cybersecurite-dans-leducation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 dans l\u2019\u00e9ducation - Educap\" \/>\n<meta property=\"og:description\" content=\"Comment prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves dans un monde connect\u00e9 ? D\u00e9couvrez les enjeux de la cybers\u00e9curit\u00e9 et les solutions pour garantir la vie priv\u00e9e dans l\u2019\u00e9ducation num\u00e9rique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/educap.io\/en\/cybersecurite-dans-leducation\/\" \/>\n<meta property=\"og:site_name\" content=\"Educap\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/educap.io\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-03T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-28T08:58:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/educap.io\/wp-content\/uploads\/2024\/12\/iStock-1226332356.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"724\" \/>\n\t<meta property=\"og:image:height\" content=\"483\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julie CENTI\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julie CENTI\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/educap.io\/cybersecurite-dans-leducation\/\",\"url\":\"https:\/\/educap.io\/cybersecurite-dans-leducation\/\",\"name\":\"Cybers\u00e9curit\u00e9 dans l\u2019\u00e9ducation - Educap\",\"isPartOf\":{\"@id\":\"https:\/\/educap.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/educap.io\/cybersecurite-dans-leducation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/educap.io\/cybersecurite-dans-leducation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/educap.io\/wp-content\/uploads\/2024\/12\/iStock-1226332356.jpg\",\"datePublished\":\"2025-01-03T10:00:00+00:00\",\"dateModified\":\"2025-01-28T08:58:16+00:00\",\"author\":{\"@id\":\"https:\/\/educap.io\/#\/schema\/person\/4dffe41e9714c247c451c98157113d60\"},\"description\":\"Comment prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves dans un monde connect\u00e9 ? D\u00e9couvrez les enjeux de la cybers\u00e9curit\u00e9 et les solutions pour garantir la vie priv\u00e9e dans l\u2019\u00e9ducation num\u00e9rique.\",\"breadcrumb\":{\"@id\":\"https:\/\/educap.io\/cybersecurite-dans-leducation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/educap.io\/cybersecurite-dans-leducation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/educap.io\/cybersecurite-dans-leducation\/#primaryimage\",\"url\":\"https:\/\/educap.io\/wp-content\/uploads\/2024\/12\/iStock-1226332356.jpg\",\"contentUrl\":\"https:\/\/educap.io\/wp-content\/uploads\/2024\/12\/iStock-1226332356.jpg\",\"width\":724,\"height\":483,\"caption\":\"Rear View of Asian student learning with teacher over the physics formular in thai laguage on black board via video call conference when Covid-19 pandemic, education and Social distancing concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/educap.io\/cybersecurite-dans-leducation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/educap.io\/fr_fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9 dans l\u2019\u00e9ducation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/educap.io\/#website\",\"url\":\"https:\/\/educap.io\/\",\"name\":\"Educap\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/educap.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/educap.io\/#\/schema\/person\/4dffe41e9714c247c451c98157113d60\",\"name\":\"Julie CENTI\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/educap.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f6ee0f918680eebf0bf9c06fdceae83423496df35825a3bb0ef85fc06548d5a1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f6ee0f918680eebf0bf9c06fdceae83423496df35825a3bb0ef85fc06548d5a1?s=96&d=mm&r=g\",\"caption\":\"Julie CENTI\"},\"url\":\"https:\/\/educap.io\/en\/author\/emna-benfraj\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 dans l\u2019\u00e9ducation - Educap","description":"Comment prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves dans un monde connect\u00e9 ? D\u00e9couvrez les enjeux de la cybers\u00e9curit\u00e9 et les solutions pour garantir la vie priv\u00e9e dans l\u2019\u00e9ducation num\u00e9rique.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/educap.io\/en\/cybersecurite-dans-leducation\/","og_locale":"en_US","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 dans l\u2019\u00e9ducation - Educap","og_description":"Comment prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves dans un monde connect\u00e9 ? D\u00e9couvrez les enjeux de la cybers\u00e9curit\u00e9 et les solutions pour garantir la vie priv\u00e9e dans l\u2019\u00e9ducation num\u00e9rique.","og_url":"https:\/\/educap.io\/en\/cybersecurite-dans-leducation\/","og_site_name":"Educap","article_publisher":"https:\/\/www.facebook.com\/educap.io","article_published_time":"2025-01-03T10:00:00+00:00","article_modified_time":"2025-01-28T08:58:16+00:00","og_image":[{"width":724,"height":483,"url":"https:\/\/educap.io\/wp-content\/uploads\/2024\/12\/iStock-1226332356.jpg","type":"image\/jpeg"}],"author":"Julie CENTI","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Julie CENTI","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/educap.io\/cybersecurite-dans-leducation\/","url":"https:\/\/educap.io\/cybersecurite-dans-leducation\/","name":"Cybers\u00e9curit\u00e9 dans l\u2019\u00e9ducation - Educap","isPartOf":{"@id":"https:\/\/educap.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/educap.io\/cybersecurite-dans-leducation\/#primaryimage"},"image":{"@id":"https:\/\/educap.io\/cybersecurite-dans-leducation\/#primaryimage"},"thumbnailUrl":"https:\/\/educap.io\/wp-content\/uploads\/2024\/12\/iStock-1226332356.jpg","datePublished":"2025-01-03T10:00:00+00:00","dateModified":"2025-01-28T08:58:16+00:00","author":{"@id":"https:\/\/educap.io\/#\/schema\/person\/4dffe41e9714c247c451c98157113d60"},"description":"Comment prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves dans un monde connect\u00e9 ? D\u00e9couvrez les enjeux de la cybers\u00e9curit\u00e9 et les solutions pour garantir la vie priv\u00e9e dans l\u2019\u00e9ducation num\u00e9rique.","breadcrumb":{"@id":"https:\/\/educap.io\/cybersecurite-dans-leducation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/educap.io\/cybersecurite-dans-leducation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/educap.io\/cybersecurite-dans-leducation\/#primaryimage","url":"https:\/\/educap.io\/wp-content\/uploads\/2024\/12\/iStock-1226332356.jpg","contentUrl":"https:\/\/educap.io\/wp-content\/uploads\/2024\/12\/iStock-1226332356.jpg","width":724,"height":483,"caption":"Rear View of Asian student learning with teacher over the physics formular in thai laguage on black board via video call conference when Covid-19 pandemic, education and Social distancing concept"},{"@type":"BreadcrumbList","@id":"https:\/\/educap.io\/cybersecurite-dans-leducation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/educap.io\/fr_fr\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9 dans l\u2019\u00e9ducation"}]},{"@type":"WebSite","@id":"https:\/\/educap.io\/#website","url":"https:\/\/educap.io\/","name":"Educap","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/educap.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/educap.io\/#\/schema\/person\/4dffe41e9714c247c451c98157113d60","name":"Julie CENTI","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/educap.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f6ee0f918680eebf0bf9c06fdceae83423496df35825a3bb0ef85fc06548d5a1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f6ee0f918680eebf0bf9c06fdceae83423496df35825a3bb0ef85fc06548d5a1?s=96&d=mm&r=g","caption":"Julie CENTI"},"url":"https:\/\/educap.io\/en\/author\/emna-benfraj\/"}]}},"_links":{"self":[{"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/posts\/5160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/comments?post=5160"}],"version-history":[{"count":1,"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/posts\/5160\/revisions"}],"predecessor-version":[{"id":5166,"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/posts\/5160\/revisions\/5166"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/media\/5165"}],"wp:attachment":[{"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/media?parent=5160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/categories?post=5160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/tags?post=5160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}