{"id":34,"date":"2025-01-21T15:23:06","date_gmt":"2025-01-21T14:23:06","guid":{"rendered":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-moulin\/?p=34"},"modified":"2025-10-03T11:59:27","modified_gmt":"2025-10-03T09:59:27","slug":"competences-du-bts-sio","status":"publish","type":"post","link":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-moulin\/2025\/01\/21\/competences-du-bts-sio\/","title":{"rendered":"Comp\u00e9tences du BTS SIO"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"34\" class=\"elementor elementor-34\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e714a3b e-flex e-con-boxed e-con e-parent\" data-id=\"e714a3b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bba6bab e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"bba6bab\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"196766635\" aria-label=\"Onglets. Ouvrez des \u00e9l\u00e9ments avec Entrer ou Espace, fermez-les avec Echape et naviguez \u00e0 l&#039;aide des touches fl\u00e9ch\u00e9es.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1967666351\" data-tab-title-id=\"e-n-tab-title-1967666351\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1967666351\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tBloc 1\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1967666352\" data-tab-title-id=\"e-n-tab-title-1967666352\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1967666352\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-network-wired\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M640 264v-16c0-8.84-7.16-16-16-16H344v-40h72c17.67 0 32-14.33 32-32V32c0-17.67-14.33-32-32-32H224c-17.67 0-32 14.33-32 32v128c0 17.67 14.33 32 32 32h72v40H16c-8.84 0-16 7.16-16 16v16c0 8.84 7.16 16 16 16h104v40H64c-17.67 0-32 14.33-32 32v128c0 17.67 14.33 32 32 32h160c17.67 0 32-14.33 32-32V352c0-17.67-14.33-32-32-32h-56v-40h304v40h-56c-17.67 0-32 14.33-32 32v128c0 17.67 14.33 32 32 32h160c17.67 0 32-14.33 32-32V352c0-17.67-14.33-32-32-32h-56v-40h104c8.84 0 16-7.16 16-16zM256 128V64h128v64H256zm-64 320H96v-64h96v64zm352 0h-96v-64h96v64z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-network-wired\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M640 264v-16c0-8.84-7.16-16-16-16H344v-40h72c17.67 0 32-14.33 32-32V32c0-17.67-14.33-32-32-32H224c-17.67 0-32 14.33-32 32v128c0 17.67 14.33 32 32 32h72v40H16c-8.84 0-16 7.16-16 16v16c0 8.84 7.16 16 16 16h104v40H64c-17.67 0-32 14.33-32 32v128c0 17.67 14.33 32 32 32h160c17.67 0 32-14.33 32-32V352c0-17.67-14.33-32-32-32h-56v-40h304v40h-56c-17.67 0-32 14.33-32 32v128c0 17.67 14.33 32 32 32h160c17.67 0 32-14.33 32-32V352c0-17.67-14.33-32-32-32h-56v-40h104c8.84 0 16-7.16 16-16zM256 128V64h128v64H256zm-64 320H96v-64h96v64zm352 0h-96v-64h96v64z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tBloc 2\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1967666353\" data-tab-title-id=\"e-n-tab-title-1967666353\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1967666353\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tBloc 3\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1967666351\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1967666351\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-9339a19 e-con-full e-flex e-con e-child\" data-id=\"9339a19\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-cd8c734 e-con-full e-flex e-con e-child\" data-id=\"cd8c734\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1375829 elementor-widget elementor-widget-heading\" data-id=\"1375829\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1 Support et mise \u00e0 disposition de services informatiques<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0899337 elementor-widget elementor-widget-text-editor\" data-id=\"0899337\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>1.1 Gestion du patrimoine informatique<\/strong><br \/>\u00a0 \u00a0\u2022 Recenser et identifier les ressources num\u00e9riques<br \/>\u00a0 \u00a0\u2022 Exploiter des r\u00e9f\u00e9rentiels, normes et standards adopt\u00e9s par le prestataire informatique<br \/>\u00a0 \u00a0\u2022 Mettre en place et v\u00e9rifier les niveaux d\u2019habilitation associ\u00e9s \u00e0 un service<br \/>\u00a0 \u00a0\u2022 V\u00e9rifier les conditions de la continuit\u00e9 d\u2019un service informatique<br \/>\u00a0 \u00a0\u2022 G\u00e9rer des sauvegardes<br \/>\u00a0 \u00a0\u2022 V\u00e9rifier le respect des r\u00e8gles d\u2019utilisation des ressources num\u00e9riques<br \/><strong>1.2 R\u00e9ponse aux incidents et aux demandes d\u2019assistance et <\/strong><br \/><strong>d\u2019\u00e9volution<\/strong><br \/>\u00a0 \u00a0\u2022 Collecter, suivre et orienter des demandes<br \/>\u00a0 \u00a0\u2022 Traiter des demandes concernant les services r\u00e9seau et syst\u00e8me, applicatifs<br \/>\u00a0 \u00a0\u2022 Traiter des demandes concernant les applications<br \/><a href=\"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-moulin\/\"><strong>1.3 D\u00e9veloppement de la pr\u00e9sence en ligne de l\u2019organisation<\/strong><\/a><br \/>\u00a0 \u00a0\u2022 Participer \u00e0 la valorisation de l\u2019image de l\u2019organisation sur les m\u00e9dias num\u00e9riques en<br \/>tenant compte du cadre juridique et des enjeux \u00e9conomiques<br \/>\u00a0 \u00a0\u2022 R\u00e9f\u00e9rencer les services en ligne de l\u2019organisation et mesurer leur visibilit\u00e9.<br \/>\u00a0 \u00a0\u2022 Participer \u00e0 l\u2019\u00e9volution d\u2019un site Web exploitant les donn\u00e9es de l\u2019organisation<br \/><strong>1.4 Travail en mode projet<\/strong><br \/>\u00a0 \u00a0\u2022 Analyser les objectifs et les modalit\u00e9s d\u2019organisation d\u2019un projet<br \/>\u00a0 \u00a0\u2022 Planifier les activit\u00e9s<br \/>\u00a0 \u00a0\u2022 \u00c9valuer les indicateurs de suivi d\u2019un projet et analyser les \u00e9carts<br \/><strong>1.5 Mise \u00e0 disposition des utilisateurs d\u2019un service <\/strong><br \/><strong>informatique<\/strong><br \/>\u00a0 \u00a0\u2022 R\u00e9aliser les tests d\u2019int\u00e9gration et d\u2019acceptation d\u2019un service <br \/>\u00a0 \u00a0\u2022 D\u00e9ployer un service<br \/>\u00a0 \u00a0\u2022 Accompagner les utilisateurs dans la mise en place d\u2019un service<br \/><strong>1.6 Organisation de son d\u00e9veloppement professionnel<\/strong><br \/>\u00a0 \u00a0\u2022 Mettre en place son environnement d\u2019apprentissage personnel<br \/>\u00a0 \u00a0\u2022 Mettre en \u0153uvre des outils et strat\u00e9gies de veille informationnelle<br \/>\u00a0 \u00a0\u2022 G\u00e9rer son identit\u00e9 professionnelle<br \/>\u00a0 \u00a0\u2022 D\u00e9velopper son projet professionnel<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1967666352\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1967666352\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-c4f02dd e-con-full e-flex e-con e-child\" data-id=\"c4f02dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bfab13f e-con-full e-flex e-con e-child\" data-id=\"bfab13f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f7b0e68 e-con-full e-flex e-con e-child\" data-id=\"f7b0e68\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-368162c elementor-widget elementor-widget-heading\" data-id=\"368162c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><strong>2 Administration des syst\u00e8mes et des r\u00e9seaux<\/strong><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2587d39 elementor-widget elementor-widget-text-editor\" data-id=\"2587d39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>2.1 Conception d\u2019une solution d\u2019infrastructure<\/strong><br \/>\u00a0 \u00a0\u2022 Analyser un besoin exprim\u00e9 et son contexte juridique<br \/>\u00a0 \u00a0\u2022 \u00c9tudier l\u2019impact d\u2019une \u00e9volution d\u2019un \u00e9l\u00e9ment d\u2019infrastructure sur le syst\u00e8me informatique<br \/>\u00a0 \u00a0\u2022 \u00c9laborer un dossier de choix d\u2019une solution d\u2019infrastructure et r\u00e9diger les sp\u00e9cifications techniques<br \/>\u00a0 \u00a0\u2022 Choisir les \u00e9l\u00e9ments n\u00e9cessaires pour assurer la qualit\u00e9 et la disponibilit\u00e9 d\u2019un service<br \/>\u00a0 \u00a0\u2022 Maquetter et prototyper une solution d\u2019infrastructure permettant d\u2019atteindre la qualit\u00e9 de service attendue<br \/>\u00a0 \u00a0\u2022 D\u00e9terminer et pr\u00e9parer les tests n\u00e9cessaires \u00e0 la validation de la solution d\u2019infrastructure retenue<br \/><strong>2.2 Installation, test et d\u00e9ploiement d\u2019une solution <\/strong><br \/><strong>d\u2019infrastructure r\u00e9seau<\/strong><br \/>\u00a0 \u00a0\u2022 Installer et configurer des \u00e9l\u00e9ments d\u2019infrastructure<br \/>\u00a0 \u00a0\u2022 Installer et configurer des \u00e9l\u00e9ments n\u00e9cessaires pour assurer la continuit\u00e9 des services<br \/>\u00a0 \u00a0\u2022 Installer et configurer des \u00e9l\u00e9ments n\u00e9cessaires pour assurer la qualit\u00e9 de service<br \/>\u00a0 \u00a0\u2022 R\u00e9diger ou mettre \u00e0 jour la documentation technique et utilisateur d\u2019une solution<br \/>d\u2019infrastructure<br \/>\u00a0 \u00a0\u2022 Tester l\u2019int\u00e9gration et l\u2019acceptation d\u2019une solution d\u2019infrastructure<br \/>\u00a0 \u00a0\u2022 D\u00e9ployer une solution d\u2019infrastructure<br \/><strong>2.3 Exploitation, d\u00e9pannage et supervision d\u2019une solution<\/strong><br \/><strong>d\u2019infrastructure r\u00e9seau<\/strong><br \/>\u00a0 \u00a0\u2022 Administrer sur site et \u00e0 distance des \u00e9l\u00e9ments d\u2019une infrastructure<br \/>\u00a0 \u00a0\u2022 Automatiser des t\u00e2ches d\u2019administration<br \/>\u00a0 \u00a0\u2022 G\u00e9rer des indicateurs et des fichiers d\u2019activit\u00e9 des \u00e9l\u00e9ments d\u2019une infrastructure<br \/>\u00a0 \u00a0\u2022 Identifier, qualifier, \u00e9valuer et r\u00e9agir face \u00e0 un incident ou \u00e0 un probl\u00e8me<br \/>\u00a0 \u00a0\u2022 \u00c9valuer, maintenir et am\u00e9liorer la qualit\u00e9 d\u2019un service<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1967666353\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1967666353\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-3ca832d e-con-full e-flex e-con e-child\" data-id=\"3ca832d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2a99c57 e-con-full e-flex e-con e-child\" data-id=\"2a99c57\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf6e135 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"bf6e135\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3 Cybers\u00e9curit\u00e9 des services informatiques\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c4ac66 elementor-widget elementor-widget-text-editor\" data-id=\"5c4ac66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>3.1 Protection des donn\u00e9es \u00e0 caract\u00e8re personnel<\/strong><br \/>\u00a0 \u00a0\u2022 Recenser les traitements sur les donn\u00e9es \u00e0 caract\u00e8re personnel au sein de\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 l\u2019organisation<br \/>\u00a0 \u00a0\u2022 Identifier les risques li\u00e9s \u00e0 la collecte, au traitement, au stockage et \u00e0 la diffusion des donn\u00e9es \u00e0 caract\u00e8re personnel<br \/>\u00a0 \u00a0\u2022 Appliquer la r\u00e9glementation en mati\u00e8re de collecte, de traitement et de conservation des donn\u00e9es \u00e0 caract\u00e8re personnel<br \/>\u00a0 \u00a0\u2022 Sensibiliser les utilisateurs \u00e0 la protection des donn\u00e9es \u00e0 caract\u00e8re personnel<br \/><strong>3.2 Pr\u00e9servation de l&rsquo;identit\u00e9 num\u00e9rique de l\u2019organisation<\/strong><br \/>\u00a0 \u00a0\u2022 Prot\u00e9ger l\u2019identit\u00e9 num\u00e9rique d\u2019une organisation<br \/>\u00a0 \u00a0\u2022 D\u00e9ployer les moyens appropri\u00e9s de preuve \u00e9lectronique<br \/><strong>3.3 S\u00e9curisation des \u00e9quipements et des usages des <\/strong><br \/><strong>utilisateurs<\/strong><br \/>\u00a0 \u00a0\u2022 Informer les utilisateurs sur les risques associ\u00e9s \u00e0 l\u2019utilisation d\u2019une ressource num\u00e9rique et promouvoir les bons usages \u00e0 adopter<br \/>\u00a0 \u00a0\u2022 Identifier les menaces et mettre en \u0153uvre les d\u00e9fenses appropri\u00e9es<br \/>\u00a0 \u00a0\u2022 G\u00e9rer les acc\u00e8s et les privil\u00e8ges appropri\u00e9s<br \/>\u00a0 \u00a0\u2022 V\u00e9rifier l\u2019efficacit\u00e9 de la protection<br \/><strong>3.4 Garantie de la disponibilit\u00e9, de l\u2019int\u00e9grit\u00e9 et de la <\/strong><br \/><strong>confidentialit\u00e9 des services informatiques et des <\/strong><br \/><strong>donn\u00e9es de l\u2019organisation face \u00e0 des cyberattaques<\/strong><br \/>\u00a0 \u00a0\u2022 Caract\u00e9riser les risques li\u00e9s \u00e0 l\u2019utilisation malveillante d\u2019un service informatique<br \/>\u00a0 \u00a0\u2022 Recenser les cons\u00e9quences d\u2019une perte de disponibilit\u00e9, d\u2019int\u00e9grit\u00e9 ou de confidentialit\u00e9<br \/>\u00a0 \u00a0\u2022 Identifier les obligations l\u00e9gales qui s\u2019imposent en mati\u00e8re d\u2019archivage et de protection des donn\u00e9es de l\u2019organisation<br \/>\u00a0 \u00a0\u2022 Organiser la collecte et la conservation des preuves num\u00e9riques<br \/>\u00a0 \u00a0\u2022 Appliquer les proc\u00e9dures garantissant le respect des obligations l\u00e9gales<br \/><strong>3.5 Cyber s\u00e9curisation d\u2019une infrastructure r\u00e9seau, d\u2019un <\/strong><br \/><strong>syst\u00e8me, d\u2019un service<\/strong><br \/>\u00a0 \u00a0\u2022 Participer \u00e0 la v\u00e9rification des \u00e9l\u00e9ments contribuant \u00e0 la suret\u00e9 d\u2019une infrastructure informatique<br \/>\u00a0 \u00a0\u2022 Prendre en compte la s\u00e9curit\u00e9 dans un projet de mise en \u0153uvre d\u2019une solution<br \/>d\u2019infrastructure<br \/>\u00a0 \u00a0\u2022 Mettre en \u0153uvre et v\u00e9rifier la conformit\u00e9 d\u2019une infrastructure \u00e0 un r\u00e9f\u00e9rentiel, une norme ou un standard de s\u00e9curit\u00e9<br \/>\u00a0 \u00a0\u2022 Pr\u00e9venir les attaques<br \/>\u00a0 \u00a0\u2022 D\u00e9tecter les actions malveillantes<br \/>\u00a0 \u00a0\u2022 Analyser les incidents de s\u00e9curit\u00e9, proposer et mettre en \u0153uvre des contre-mesures<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3cddfb13 e-flex e-con-boxed e-con e-parent\" data-id=\"3cddfb13\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-58d726c4 elementor-widget elementor-widget-text-editor\" data-id=\"58d726c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p><\/p>\n\n\n\n<p><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c2389bc e-flex e-con-boxed e-con e-parent\" data-id=\"c2389bc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-22be0eb e-flex e-con-boxed e-con e-parent\" data-id=\"22be0eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Bloc 1 Bloc 2 Bloc 3 1 Support et mise \u00e0 disposition de services informatiques 1.1 Gestion du patrimoine informatique\u00a0 \u00a0\u2022 Recenser et identifier les ressources num\u00e9riques\u00a0 \u00a0\u2022 Exploiter des r\u00e9f\u00e9rentiels, normes et standards adopt\u00e9s par le prestataire informatique\u00a0 \u00a0\u2022 Mettre en place et v\u00e9rifier les niveaux d\u2019habilitation associ\u00e9s \u00e0 un service\u00a0 \u00a0\u2022 V\u00e9rifier les <a class=\"read-more\" href=\"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-moulin\/2025\/01\/21\/competences-du-bts-sio\/\">READ MORE<\/a><\/p>\n","protected":false},"author":70,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-34","post","type-post","status-publish","format-standard","hentry","category-competences"],"_links":{"self":[{"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-moulin\/wp-json\/wp\/v2\/posts\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-moulin\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-moulin\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-moulin\/wp-json\/wp\/v2\/users\/70"}],"replies":[{"embeddable":true,"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-moulin\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":16,"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-moulin\/wp-json\/wp\/v2\/posts\/34\/revisions"}],"predecessor-version":[{"id":114,"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-moulin\/wp-json\/wp\/v2\/posts\/34\/revisions\/114"}],"wp:attachment":[{"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-moulin\/wp-json\/wp\/v2\/media?parent=34"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-moulin\/wp-json\/wp\/v2\/categories?post=34"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-moulin\/wp-json\/wp\/v2\/tags?post=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}