HTTP Client
1
Total requests
0
HTTP errors
Clients
http_client 1
Requests
| GET | https://frontest.simplyform.lmosoft.com/api/module/details/INT32 | Profile | |
|---|---|---|---|
| Response |
200
[ "info" => [ "header_size" => 303 "request_size" => 154 "total_time" => 0.527892 "namelookup_time" => 0.000824 "connect_time" => 0.001171 "pretransfer_time" => 0.009474 "size_download" => 12804.0 "speed_download" => 24296.0 "starttransfer_time" => 0.510439 "primary_ip" => "185.181.163.147" "primary_port" => 443 "local_ip" => "10.52.26.243" "local_port" => 55844 "http_version" => 3 "protocol" => 2 "scheme" => "HTTPS" "appconnect_time_us" => 9335 "connect_time_us" => 1171 "namelookup_time_us" => 824 "pretransfer_time_us" => 9474 "starttransfer_time_us" => 510439 "total_time_us" => 527892 "effective_method" => "GET" "start_time" => 1765337994.0359 "original_url" => "https://frontest.simplyform.lmosoft.com/api/module/details/INT32" "pause_handler" => Closure(float $duration) {#1513 : "Symfony\Component\HttpClient\Response\CurlResponse" : { : CurlHandle {#1487 …} : Symfony\Component\HttpClient\Internal\CurlClientState {#1498 …} : -9223372036854775808 } } "debug" => """ * Trying 185.181.163.147:443...\n * Connected to frontest.simplyform.lmosoft.com (185.181.163.147) port 443 (#0)\n * ALPN, offering h2\n * ALPN, offering http/1.1\n * successfully set certificate verify locations:\n * CAfile: /etc/ssl/certs/ca-certificates.crt\n * CApath: /etc/ssl/certs\n * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384\n * ALPN, server accepted to use h2\n * Server certificate:\n * subject: CN=frontest.simplyform.lmosoft.com\n * start date: Nov 25 23:17:47 2025 GMT\n * expire date: Feb 23 23:17:46 2026 GMT\n * issuer: C=US; O=Let's Encrypt; CN=R13\n * SSL certificate verify ok.\n * Using HTTP2, server supports multi-use\n * Connection state changed (HTTP/2 confirmed)\n * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0\n * Using Stream ID: 1 (easy handle 0x38bd630)\n > GET /api/module/details/INT32 HTTP/2\r\n Host: frontest.simplyform.lmosoft.com\r\n accept: */*\r\n user-agent: Symfony HttpClient (Curl)\r\n accept-encoding: gzip\r\n \r\n * old SSL session ID is stale, removing\n * Connection state changed (MAX_CONCURRENT_STREAMS == 30)!\n < HTTP/2 200 \r\n < date: Wed, 10 Dec 2025 03:39:54 GMT\r\n < server: Apache\r\n < cache-control: no-cache, private\r\n < x-debug-token: 4d6f47\r\n < x-debug-token-link: https://frontest.simplyform.lmosoft.com/_profiler/4d6f47\r\n < x-robots-tag: noindex\r\n < strict-transport-security: max-age=16000000\r\n < content-type: application/json\r\n < \r\n """ ] "response_headers" => [ "HTTP/2 200 " "date: Wed, 10 Dec 2025 03:39:54 GMT" "server: Apache" "cache-control: no-cache, private" "x-debug-token: 4d6f47" "x-debug-token-link: https://frontest.simplyform.lmosoft.com/_profiler/4d6f47" "x-robots-tag: noindex" "strict-transport-security: max-age=16000000" "content-type: application/json" ] "response_content" => [ "{"id":32,"heures":35,"min":0,"financeurs":[],"path":"L-intelligence-artificielle-et-la-securite-operationnelle","dateupdate":"26-09-2025","statistiques":{"tauxobtention":"","tauxabandon":"","tauxsatisfaction":"","tauxpoursuiteetude":"","tauxemployabilite":"","salairemoyen":""},"archive":false,"certification":false,"public":"D\u00e9cideur, chef de projet, ing\u00e9nieur, d\u00e9veloppeur, chercheurs.","infopratique":"HORAIRES DE LA FORMATION de 9 h 00 \u00e0 12 h 30 et de 13 h 30 \u00e0 17 h 00","cpf":false,"code":"INT32","intitule":"L\u0027intelligence artificielle et la s\u00e9curit\u00e9 op\u00e9rationnelle (module)","duree":2100,"mode":"Pr\u00e9sentiel","modes":["Classe virtuelle","Pr\u00e9sentiel"],"niveaumateriel":"4 - Niveau d\u0027\u00e9quipement mat\u00e9riel excellent","niveautechnique":"Expert","description":{"publie":true,"prerequis":"Connaissance pr\u00e9alable d\u0027un langage de l\u0027outil informatique et d\u0027un langage de programmation.","objectif":"Comprendre en quoi l\u0027intelligence artificielle peut \u00eatre utile \u00e0 la cybers\u00e9curit\u00e9.\r\nAppr\u00e9hender les probl\u00e8mes de s\u00e9curit\u00e9 li\u00e9s aux objets connect\u00e9s.\r\nD\u00e9couvrir les outils et moyens de d\u00e9tection contre les attaques d\u2019Ing\u00e9nierie sociale, biom\u00e9trique, usurpation.","plus":"Acc\u00e8s \u00e0 la biblioth\u00e8que num\u00e9rique pendant 3 mois : + de 1000 tutos, livres num\u00e9riques et vid\u00e9os Salles de formation climatis\u00e9es \u00e9quip\u00e9es d\u2019ordinateurs PC de derni\u00e8re g\u00e9n\u00e9ration Vid\u00e9os projecteurs interactifs Support de cours du formateur.","accessibiliteHandicap":"Dans votre espace candidat, une rubrique d\u00e9di\u00e9e au handicap vous permettra d\u0027exprimer vos besoins d\u0027adaptation afin que vous puissiez suivre votre formation dans les meilleures conditions.","modalitesDelaisAcces":"L\u2019inscription doit \u00eatre finalis\u00e9e 72 heures avant le d\u00e9but de la formation.","modulesExigeAvant":"\u003Cul\u003E\u003C\/ul\u003E","modulesSouhaitableAvant":"\u003Cul\u003E\u003C\/ul\u003E","modulesConseilleApres":"\u003Cul\u003E\u003C\/ul\u003E","infopratique":"HORAIRES DE LA FORMATION de 9 h 00 \u00e0 12 h 30 et de 13 h 30 \u00e0 17 h 00","description":"Cette formation permet de comprendre ce qu\u2019est l\u2019Intelligence Artificielle (IA), comment la d\u00e9finir dans le contexte de la cybers\u00e9curit\u00e9 et aussi de mesurer l\u2019importance de s\u00e9curiser nos objets connect\u00e9s, nos identit\u00e9s, nos donn\u00e9es personnelles, etc. et d","modalitepedagogiques":"Alternance \u00e9quilibr\u00e9e de pr\u00e9sentations, d\u0027ateliers sur simulateur et de mises en situation dans des conditions similaires \u00e0 celles de l\u0027examen.","modaliteevaluationinitial":"Test de positionnement en amont de la session de formation.","modaliteevaluationfinal":"Le formateur \u00e9value la progression p\u00e9dagogique du participant tout au long de la formation au moyen de QCM, mises en situation, travaux pratiques."},"tarifVenteInter":"2100 \u20ac HT","modulesExigeAvant":[],"modulesSouhaitableAvant":[],"modulesConseilleApres":[],"theme":"Intelligence artificielle","soustheme":"S\u00e9curit\u00e9 \u0026 intelligence artificielle","tarifVenteIntra":"Tarif sur demande","modalitepedagogiques":"Alternance \u00e9quilibr\u00e9e de pr\u00e9sentations, d\u0027ateliers sur simulateur et de mises en situation dans des conditions similaires \u00e0 celles de l\u0027examen.","modaliteevaluationinitial":"Test de positionnement en amont de la session de formation.","modaliteevaluationfinal":"Le formateur \u00e9value la progression p\u00e9dagogique du participant tout au long de la formation au moyen de QCM, mises en situation, travaux pratiques.","listecertifications":[],"listemodules":null,"sessions":[],"competences":{"moduleCompetences":[{"id":69,"intitule":"Comprendre en quoi l\u0027intelligence artificielle peut \u00eatre utile \u00e0 la cybers\u00e9curit\u00e9.","ordre":1,"duree":60,"type":"module","aevaluer":true,"evaluations":"La participant a compris en quoi l\u0027intelligence artificielle peut \u00eatre utile \u00e0 la cybers\u00e9curit\u00e9","criteres":"La participant a compris en quoi l\u0027intelligence artificielle peut \u00eatre utile \u00e0 la cybers\u00e9curit\u00e9","modaliteEvaluation":"Un Quiz est propos\u00e9 en fin de s\u00e9quence.","quiz":"","quizId":null,"documents":[],"procedeevaluations":"\u003Cul\u003E\u003Cli\u003EQuiz\u003C\/li\u003E\u003C\/ul\u003E","procedeevaluationIds":[6447]},{"id":70,"intitule":"Appr\u00e9hender les probl\u00e8mes de s\u00e9curit\u00e9 li\u00e9s aux objets connect\u00e9s","ordre":2,"duree":60,"type":"module","aevaluer":true,"evaluations":"Les probl\u00e8mes de s\u00e9curit\u00e9 li\u00e9s aux objets connect\u00e9s sont connus.","criteres":"Les probl\u00e8mes de s\u00e9curit\u00e9 li\u00e9s aux objets connect\u00e9s sont connus.","modaliteEvaluation":"Une \u00e9tude de cas est propos\u00e9e en fin de s\u00e9quence.","quiz":"","quizId":null,"documents":[],"procedeevaluations":"\u003Cul\u003E\u003Cli\u003E\u00c9tude de cas\u003C\/li\u003E\u003C\/ul\u003E","procedeevaluationIds":[264]},{"id":71,"intitule":"D\u00e9couvrir les outils et moyens de d\u00e9tection contre les attaques d\u2019Ing\u00e9nierie sociale, biom\u00e9trique, usurpation.","ordre":3,"duree":60,"type":"module","aevaluer":true,"evaluations":"Les outils sont connus.","criteres":"Les outils sont connus.","modaliteEvaluation":"Un Quiz est propos\u00e9 en fin de s\u00e9quence. ","quiz":"","quizId":null,"documents":[],"procedeevaluations":"\u003Cul\u003E\u003Cli\u003EQuiz\u003C\/li\u003E\u003C\/ul\u003E","procedeevaluationIds":[6447]}]},"seo":{"publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EPubli\u00e9\u003C\/span\u003E","seotitre":"Intelligence artificielle","seodescription":"Intelligence artificielle","contenuavant":"Intelligence artificielle","contenuapres":"Intelligence artificielle"},"plus":"Acc\u00e8s \u00e0 la biblioth\u00e8que num\u00e9rique pendant 3 mois : + de 1000 tutos, livres num\u00e9riques et vid\u00e9os Salles de formation climatis\u00e9es \u00e9quip\u00e9es d\u2019ordinateurs PC de derni\u00e8re g\u00e9n\u00e9ration Vid\u00e9os projecteurs interactifs Support de cours du formateur.","Images":{"banniere":"https:\/\/frontest.simplyform.lmosoft.com\/uploads\/module\/banniere\/Banniere-IA-68d2bbff94bf3.png","vignette":"https:\/\/frontest.simplyform.lmosoft.com\/uploads\/module\/vignette\/Vignette-IA-68d2bbff9461b.png","altBanniere":"Intelligence artificielle","altVignette":"Intelligence artificielle"},"Programmes":{"chapitres":[{"id":81,"intitule":"D\u00e9finir les enjeux entre : IA, robotique et cybers\u00e9curit\u00e9","ordre":1,"commentaire":"D\u00e9finition et concepts.\r\nEnjeux pour les \u00e9tats, les arm\u00e9es et toute organisation li\u00e9e \u00e0 l\u2019informatique.\r\nPossibilit\u00e9s et limites de la cybers\u00e9curit\u00e9 li\u00e9es \u00e0 l\u2019IA.\r\nMenaces logicielles. Outils de d\u00e9tection de logiciels malveillants.\r\nProbl\u00e8mes de s\u00e9curit\u00e9s","travauxpratiques":"D\u00e9monstrations : logiciels polymorphiques, algorithmes g\u00e9n\u00e9tiques utiles \u00e0 la g\u00e9n\u00e9ration de codes polymorphes, mat\u00e9riels \u00e9lectroniques et robotiques."},{"id":82,"intitule":"Ing\u00e9nierie sociale et intelligence artificielle","ordre":2,"commentaire":"Qu\u2019est ce qu\u2019une attaque d\u2019ing\u00e9nierie sociale ? Quelles en sont les cons\u00e9quences ?\r\nPrincipes des \u00ab deepfakes \u00bb (fausses identit\u00e9s, images, voix et vid\u00e9os).\r\nPossibilit\u00e9s et limites d\u2019un r\u00e9seau GAN (Generative Adversarial Networks).\r\nDe nouveaux outils co","travauxpratiques":"Mise en \u0153uvre d\u2019un r\u00e9seau GAN pour produire des images aux styles factices."},{"id":83,"intitule":"L\u0027IA comme outil de d\u00e9tection, protection, surveillance, identification","ordre":3,"commentaire":"Des syst\u00e8mes \u00e0 la \u00ab complexit\u00e9 \u00bb toujours plus croissante.\r\nDes indicateurs statistiques \u00ab classiques \u00bb insuffisants pour surveiller un syst\u00e8me complexe.\r\nMachine Learning (ML) et Deep Learning (DP) pour la d\u00e9tection et la pr\u00e9vention des anomalies.\r\nIA, o","travauxpratiques":"Mod\u00e8le de d\u00e9tection. Typologie des cam\u00e9ras (360, HD, 3D-RGBd...). D\u00e9monstrations des limites, des \u00ab biais \u00bb li\u00e9s \u00e0 l\u2019IA et des cas o\u00f9 l\u2019IA est plus efficace que l\u2019\u0153il humain."},{"id":84,"intitule":"Une \u00e9coute boost\u00e9e \u00e0 l\u2019IA","ordre":4,"commentaire":"Contexte d\u2019\u00e9coutes \u00ab boost\u00e9es \u00bb \u00e0 l\u2019intelligence artificielle.\r\nOutils et moyens pour \u00e9couter une conversation, d\u00e9celer un code secret, reconstituer un mail...\r\nDes projets men\u00e9s \u00e0 bien accessible \u00e0 tous.\r\nComment pr\u00e9server la confidentialit\u00e9 de nos \u00e9chan","travauxpratiques":"Outils et recherches utiles pour reconstruire, pr\u00e9dire des signaux indirects dans un environnement bruit\u00e9."}]},"programme":"","Othersdomaines":[{"id":23,"intitule":"NOUVEAUTHEME","code":"NOUV","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#48cb8e","archive":false,"commentaire":"NOUVEAUTHEME","seodescription":"NOUVEAUTHEME","seotitre":"NOUVEAUTHEME","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"","vignette":"","altBanniere":"","altVignette":""},{"id":22,"intitule":"MEGATHEME","code":"MEG","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#3f9aec","archive":false,"commentaire":"1234","seodescription":"MEGATHEM","seotitre":"MEGATHEME","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"","vignette":"","altBanniere":"","altVignette":""},{"id":21,"intitule":"Agenda","code":"agenda","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#000000","archive":false,"commentaire":"agenda","seodescription":"agenda","seotitre":"agenda","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"","vignette":"","altBanniere":"","altVignette":""},{"id":20,"intitule":"Hypertest","code":"HYP","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#249b91","archive":false,"commentaire":"Hypertest","seodescription":"Hypertest","seotitre":"Hypertest","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"https:\/\/frontest.simplyform.lmosoft.com\/uploads\/theme\/banniere\/Screenshot-from-2024-05-19-19-26-32-6909edddcacd7.png","vignette":"https:\/\/frontest.simplyform.lmosoft.com\/uploads\/theme\/vignette\/Screenshot-from-2024-05-19-19-26-32-6909edddca904.png","altBanniere":"banniere","altVignette":"vignette*"},{"id":19,"intitule":"Gigatheme","code":"GIG","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#cd2727","archive":false,"commentaire":"Gigatheme","seodescription":"Gigatheme","seotitre":"Gigatheme","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"","vignette":"","altBanniere":"","altVignette":""},{"id":18,"intitule":"Sauvetage","code":"SAUV","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#ddd052","archive":false,"commentaire":"Sauvetage","seodescription":"Sauvetage","seotitre":"Sauvetage","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"","vignette":"","altBanniere":"","altVignette":""}],"Details":{"identifiantDokelio":"","public":"D\u00e9cideur, chef de projet, ing\u00e9nieur, d\u00e9veloppeur, chercheurs.","commentaire":"","iscpf":false,"cpf":"\u003Cspan class=\u0022badge bg-danger\u0022\u003ESans CPF\u003C\/span\u003E","niveautechnique":"Expert","niveaumateriel":"4 - Niveau d\u0027\u00e9quipement mat\u00e9riel excellent","autoriteDelivranceCpf":null,"codeCpfSalarie":"","codeCpfDemandeurEmploi":"","financeurs":"\u003Cul\u003E\u003C\/ul\u003E","sessions":[]},"Certifications":{"certifiante":"\u003Cspan class=\u0022badge bg-danger\u0022\u003ENon\u003C\/span\u003E","certifiantes":"\u003Cspan class=\u0022badge bg-danger\u0022\u003ENon\u003C\/span\u003E","certificationcommentaire":"","certifications":"\u003Cul\u003E\u003C\/ul\u003E"},"type":"module","urlFront":"https:\/\/frontest.simplyform.lmosoft.com\/32\/module-export-pdf-front"}" ] ] |
4d6f47 | |