{"version":"1.0","provider_name":"AFRIK Management","provider_url":"https:\/\/afrikmanagement.com","author_name":"admin","author_url":"https:\/\/afrikmanagement.com\/index.php\/author\/wxrmg2xuqd\/","title":"Hacker \u00e9thique - AFRIK Management","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"G9QLlU94AU\"><a href=\"https:\/\/afrikmanagement.com\/index.php\/2024\/06\/15\/hacker-ethique-2\/\">Hacker \u00e9thique<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/afrikmanagement.com\/index.php\/2024\/06\/15\/hacker-ethique-2\/embed\/#?secret=G9QLlU94AU\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Hacker \u00e9thique\u00a0\u00bb &#8212; AFRIK Management\" data-secret=\"G9QLlU94AU\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/afrikmanagement.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/afrikmanagement.com\/wp-content\/uploads\/2024\/06\/D.jpg","thumbnail_width":1024,"thumbnail_height":682,"description":"Expert de la s\u00e9curit\u00e9 informatique, les hackers \u00e9thiques sont des profils de plus en plus recherch\u00e9s car pr\u00e9cieux pour les entreprises qui les emploient. Si toi aussi tu te sens une \u00e2me de Mr Robot, sans vouloir basculer du c\u00f4t\u00e9 obscur de la force, d\u00e9couvre vite ce m\u00e9tier. Professionnel de la\u00a0cybers\u00e9curit\u00e9, le hacker \u00e9thique est employ\u00e9 par une entreprise afin d&#8217;assurer la protection de ses syst\u00e8mes informatiques d&#8217;\u00e9ventuels\u00a0piratages. \u00c9galement connus sous le nom de \u00ab Pentester \u00bb (pour\u00a0penetration test) ou encore pirates bienveillants, les hackers \u00e9thiques ont pour mission d&#8217;\u00e9valuer la s\u00e9curit\u00e9 d&#8217;un syst\u00e8me d&#8217;information ou d&#8217;un parc informatique, en [&hellip;]"}