HTTP Client

1 Total requests
0 HTTP errors

Clients

http_client 1

Requests

GET https://frontest.simplyform.lmosoft.com/api/module/details/R%C3%89S31 Profile
Response 200
[
  "info" => [
    "header_size" => 303
    "request_size" => 159
    "total_time" => 0.521011
    "namelookup_time" => 0.000985
    "connect_time" => 0.00142
    "pretransfer_time" => 0.009733
    "size_download" => 14487.0
    "speed_download" => 27806.0
    "starttransfer_time" => 0.502146
    "primary_ip" => "185.181.163.147"
    "primary_port" => 443
    "local_ip" => "10.52.26.243"
    "local_port" => 55812
    "http_version" => 3
    "protocol" => 2
    "scheme" => "HTTPS"
    "appconnect_time_us" => 9572
    "connect_time_us" => 1420
    "namelookup_time_us" => 985
    "pretransfer_time_us" => 9733
    "starttransfer_time_us" => 502146
    "total_time_us" => 521011
    "effective_method" => "GET"
    "start_time" => 1765190957.1449
    "original_url" => "https://frontest.simplyform.lmosoft.com/api/module/details/R%C3%89S31"
    "pause_handler" => Closure(float $duration) {#1502
      class: "Symfony\Component\HttpClient\Response\CurlResponse"
      use: {
        $ch: CurlHandle {#1476 …}
        $multi: Symfony\Component\HttpClient\Internal\CurlClientState {#1487 …}
        $execCounter: -9223372036854775808
      }
    }
    "debug" => """
      *   Trying 185.181.163.147:443...\n
      * Connected to frontest.simplyform.lmosoft.com (185.181.163.147) port 443 (#0)\n
      * ALPN, offering h2\n
      * ALPN, offering http/1.1\n
      * successfully set certificate verify locations:\n
      *  CAfile: /etc/ssl/certs/ca-certificates.crt\n
      *  CApath: /etc/ssl/certs\n
      * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384\n
      * ALPN, server accepted to use h2\n
      * Server certificate:\n
      *  subject: CN=frontest.simplyform.lmosoft.com\n
      *  start date: Nov 25 23:17:47 2025 GMT\n
      *  expire date: Feb 23 23:17:46 2026 GMT\n
      *  issuer: C=US; O=Let's Encrypt; CN=R13\n
      *  SSL certificate verify ok.\n
      * Using HTTP2, server supports multi-use\n
      * Connection state changed (HTTP/2 confirmed)\n
      * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0\n
      * Using Stream ID: 1 (easy handle 0x38aa530)\n
      > GET /api/module/details/R%C3%89S31 HTTP/2\r\n
      Host: frontest.simplyform.lmosoft.com\r\n
      accept: */*\r\n
      user-agent: Symfony HttpClient (Curl)\r\n
      accept-encoding: gzip\r\n
      \r\n
      * old SSL session ID is stale, removing\n
      * Connection state changed (MAX_CONCURRENT_STREAMS == 30)!\n
      < HTTP/2 200 \r\n
      < date: Mon, 08 Dec 2025 10:49:17 GMT\r\n
      < server: Apache\r\n
      < cache-control: no-cache, private\r\n
      < x-debug-token: 55dfb0\r\n
      < x-debug-token-link: https://frontest.simplyform.lmosoft.com/_profiler/55dfb0\r\n
      < x-robots-tag: noindex\r\n
      < strict-transport-security: max-age=16000000\r\n
      < content-type: application/json\r\n
      < \r\n
      """
  ]
  "response_headers" => [
    "HTTP/2 200 "
    "date: Mon, 08 Dec 2025 10:49:17 GMT"
    "server: Apache"
    "cache-control: no-cache, private"
    "x-debug-token: 55dfb0"
    "x-debug-token-link: https://frontest.simplyform.lmosoft.com/_profiler/55dfb0"
    "x-robots-tag: noindex"
    "strict-transport-security: max-age=16000000"
    "content-type: application/json"
  ]
  "response_content" => [
    "{"id":31,"heures":35,"min":0,"financeurs":[],"path":"Hacking-et-Pentest","dateupdate":"26-09-2025","statistiques":{"tauxobtention":"","tauxabandon":"","tauxsatisfaction":"","tauxpoursuiteetude":"","tauxemployabilite":"","salairemoyen":""},"archive":false,"certification":false,"public":"Responsables, architectes s\u00e9curit\u00e9. Techniciens et administrateurs syst\u00e8mes et r\u00e9seaux.","infopratique":"HORAIRES DE LA FORMATION de 9 h 00 \u00e0 12 h 30 et de 13 h 30 \u00e0 17 h 00","cpf":false,"code":"R\u00c9S31","intitule":"Hacking et Pentest (module)","duree":2100,"mode":"Pr\u00e9sentiel","modes":["Classe virtuelle","Pr\u00e9sentiel"],"niveaumateriel":"4 - Niveau d\u0027\u00e9quipement mat\u00e9riel excellent","niveautechnique":"Expert","description":{"publie":true,"prerequis":"Bonnes connaissances en s\u00e9curit\u00e9 SI, r\u00e9seaux, syst\u00e8mes (en particulier Linux).","objectif":"D\u00e9finir l\u0027impact et la port\u00e9e d\u0027une vuln\u00e9rabilit\u00e9\r\nComprendre les techniques des pirates informatiques et pouvoir contrer leurs attaques\r\nMesurer le niveau de s\u00e9curit\u00e9 d\u0027une architecture embarqu\u00e9e\r\nR\u00e9aliser un test de p\u00e9n\u00e9tration","plus":"Acc\u00e8s \u00e0 la biblioth\u00e8que num\u00e9rique pendant 3 mois : + de 1000 tutos, livres num\u00e9riques et vid\u00e9os Salles de formation climatis\u00e9es \u00e9quip\u00e9es d\u2019ordinateurs PC de derni\u00e8re g\u00e9n\u00e9ration Vid\u00e9os projecteurs interactifs Support de cours du formateur.","accessibiliteHandicap":"Dans votre espace candidat, une rubrique d\u00e9di\u00e9e au handicap vous permettra d\u0027exprimer vos besoins d\u0027adaptation afin que vous puissiez suivre votre formation dans les meilleures conditions.","modalitesDelaisAcces":"L\u2019inscription doit \u00eatre finalis\u00e9e 72 heures avant le d\u00e9but de la formation.","modulesExigeAvant":"\u003Cul\u003E\u003C\/ul\u003E","modulesSouhaitableAvant":"\u003Cul\u003E\u003Cli\u003ELinux : Administration avanc\u00e9e\u003C\/li\u003E\u003Cli\u003ELinux : Administrer le syst\u00e8me\u003C\/li\u003E\u003C\/ul\u003E","modulesConseilleApres":"\u003Cul\u003E\u003C\/ul\u003E","infopratique":"HORAIRES DE LA FORMATION de 9 h 00 \u00e0 12 h 30 et de 13 h 30 \u00e0 17 h 00","description":"L\u0027architecture de base est la plupart du temps compos\u00e9e d\u0027une unit\u00e9 centrale de traitement (CPU), d\u0027un syst\u00e8me d\u0027exploitation (ou logiciel sp\u00e9cifique) et de sa connectivit\u00e9 : autant de composants vuln\u00e9rables aux attaques qu\u2019il faut \u00e9valuer et prot\u00e9ger san","modalitepedagogiques":"Alternance \u00e9quilibr\u00e9e de pr\u00e9sentations, d\u0027ateliers sur simulateur et de mises en situation dans des conditions similaires \u00e0 celles de l\u0027examen.","modaliteevaluationinitial":"Test de positionnement en amont de la session de formation.","modaliteevaluationfinal":"Le formateur \u00e9value la progression p\u00e9dagogique du participant tout au long de la formation au moyen de QCM, mises en situation, travaux pratiques."},"tarifVenteInter":"2100 \u20ac HT","modulesExigeAvant":[],"modulesSouhaitableAvant":[{"id":9,"isnew":false,"statistiques":"\u003Cp\u003ETaux de satisfaction : 100%\u003C\/p\u003E\u003Cp\u003ETaux d\u0027abandon : 0%\u003C\/p\u003E","description":"Le syst\u00e8me GNU\/Linux s\u0027est impos\u00e9 comme une alternative s\u00e9rieuse sur le segment des serveurs d\u0027entreprise. Cette formation permettra de ma\u00eetriser le comportement de ses serveurs Linux en disposant d\u0027une v\u00e9ritable autonomie dans le diagnostic des dysfoncti","archive":false,"cpf":true,"code":"SYS9","intitule":"Linux : Administration avanc\u00e9e (module)","duree":"5 jours","soustheme":"Linux, Unix, MAC","tarif":"2100 \u20ac HT","mode":"Pr\u00e9sentiel","images":{"banniere":"https:\/\/frontest.simplyform.lmosoft.com\/uploads\/module\/banniere\/Banniere-Linux-68d11ccf39eae.png","vignette":"https:\/\/frontest.simplyform.lmosoft.com\/uploads\/module\/vignette\/Vignette-Linux-68d11ccf39962.png","altBanniere":"Linux","altVignette":"Linux"}},{"id":17,"isnew":false,"statistiques":null,"description":null,"archive":true,"cpf":true,"code":"ENI\u00ae8","intitule":"Linux : Administrer le syst\u00e8me (certification)","duree":"1 jour","soustheme":"","tarif":"Tarif sur demande","mode":"Classe virtuelle","images":{"banniere":"","vignette":"","altBanniere":null,"altVignette":null}}],"modulesConseilleApres":[],"theme":"R\u00e9seaux, s\u00e9curit\u00e9 \u0026 t\u00e9l\u00e9coms","soustheme":"S\u00e9curit\u00e9, sauvegarde et supervision","tarifVenteIntra":"Tarif sur demande","modalitepedagogiques":"Alternance \u00e9quilibr\u00e9e de pr\u00e9sentations, d\u0027ateliers sur simulateur et de mises en situation dans des conditions similaires \u00e0 celles de l\u0027examen.","modaliteevaluationinitial":"Test de positionnement en amont de la session de formation.","modaliteevaluationfinal":"Le formateur \u00e9value la progression p\u00e9dagogique du participant tout au long de la formation au moyen de QCM, mises en situation, travaux pratiques.","listecertifications":[],"listemodules":null,"sessions":[],"competences":{"moduleCompetences":[{"id":65,"intitule":"D\u00e9finir l\u0027impact et la port\u00e9e d\u0027une vuln\u00e9rabilit\u00e9","ordre":1,"duree":30,"type":"module","aevaluer":true,"evaluations":"L\u0027impact et la port\u00e9e d\u0027une vuln\u00e9rabilit\u00e9 sont d\u00e9finies.","criteres":"L\u0027impact et la port\u00e9e d\u0027une vuln\u00e9rabilit\u00e9 sont d\u00e9finies.","modaliteEvaluation":"Une mise en situation professionnelle est propos\u00e9e","quiz":"","quizId":null,"documents":[],"procedeevaluations":"\u003Cul\u003E\u003Cli\u003EMise en situation professionnelle\u003C\/li\u003E\u003C\/ul\u003E","procedeevaluationIds":[268]},{"id":66,"intitule":"Comprendre les techniques des pirates informatiques et pouvoir contrer leurs attaques","ordre":2,"duree":30,"type":"module","aevaluer":true,"evaluations":"Les techniques des pirates informatiques et pouvoir contrer leurs attaques sont connues.","criteres":"Les techniques des pirates informatiques et pouvoir contrer leurs attaques sont connues.","modaliteEvaluation":"Une mise en situation professionnelle est propos\u00e9e","quiz":"","quizId":null,"documents":[],"procedeevaluations":"\u003Cul\u003E\u003Cli\u003EMise en situation professionnelle\u003C\/li\u003E\u003C\/ul\u003E","procedeevaluationIds":[268]},{"id":67,"intitule":"Mesurer le niveau de s\u00e9curit\u00e9 d\u0027une architecture embarqu\u00e9e","ordre":3,"duree":30,"type":"module","aevaluer":true,"evaluations":"Le niveau de s\u00e9curit\u00e9 d\u0027une architecture embarqu\u00e9e est mesur\u00e9.","criteres":"Le niveau de s\u00e9curit\u00e9 d\u0027une architecture embarqu\u00e9e est mesur\u00e9.","modaliteEvaluation":"Une mise en situation professionnelle est propos\u00e9e","quiz":"","quizId":null,"documents":[],"procedeevaluations":"\u003Cul\u003E\u003Cli\u003EMise en situation professionnelle\u003C\/li\u003E\u003C\/ul\u003E","procedeevaluationIds":[268]},{"id":68,"intitule":"R\u00e9aliser un test de p\u00e9n\u00e9tration.","ordre":4,"duree":30,"type":"module","aevaluer":true,"evaluations":"Un test de p\u00e9n\u00e9tration est r\u00e9alis\u00e9.","criteres":"Un test de p\u00e9n\u00e9tration est r\u00e9alis\u00e9.","modaliteEvaluation":"Une mise en situation professionnelle est propos\u00e9e","quiz":"","quizId":null,"documents":[],"procedeevaluations":"\u003Cul\u003E\u003Cli\u003EMise en situation professionnelle\u003C\/li\u003E\u003C\/ul\u003E","procedeevaluationIds":[268]}]},"seo":{"publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EPubli\u00e9\u003C\/span\u003E","seotitre":"Hacking et Pentest","seodescription":"Hacking et Pentest","contenuavant":"Hacking et Pentest","contenuapres":"Hacking et Pentest"},"plus":"Acc\u00e8s \u00e0 la biblioth\u00e8que num\u00e9rique pendant 3 mois : + de 1000 tutos, livres num\u00e9riques et vid\u00e9os Salles de formation climatis\u00e9es \u00e9quip\u00e9es d\u2019ordinateurs PC de derni\u00e8re g\u00e9n\u00e9ration Vid\u00e9os projecteurs interactifs Support de cours du formateur.","Images":{"banniere":"https:\/\/frontest.simplyform.lmosoft.com\/uploads\/module\/banniere\/Banniere-Hacking-68d2abe8f0a49.png","vignette":"https:\/\/frontest.simplyform.lmosoft.com\/uploads\/module\/vignette\/Vignette-Hacking-68d2abe8f062d.png","altBanniere":"Hacking et Pentest","altVignette":"Hacking et Pentest"},"Programmes":{"chapitres":[{"id":75,"intitule":"Rappel sur les architectures embarqu\u00e9es","ordre":1,"commentaire":"Syst\u00e8me informatique ordinaire et syst\u00e8me embarqu\u00e9.\r\nLes diff\u00e9rents types d\u0027architectures embarqu\u00e9es.\r\nLes diff\u00e9rentes contraintes li\u00e9es \u00e0 la solution embarqu\u00e9e.","travauxpratiques":"Exercice en groupe."},{"id":76,"intitule":"Le hacking et la s\u00e9curit\u00e9","ordre":2,"commentaire":"Formes d\u0027attaques, modes op\u00e9ratoires, acteurs, enjeux.\r\nAudits et tests d\u0027intrusion.","travauxpratiques":"Tutoriel individuel."},{"id":77,"intitule":"L\u0027environnement de l\u0027embarqu\u00e9","ordre":3,"commentaire":"R\u00e9seau : 4G, LTE, LoRA, WiFi, MQTT, 802.11.15.4, ZigBee, Z-Wave, 6LoWPAN et BLE (Bluetooth LE).\r\nFirmware, le syst\u00e8me d\u0027exploitation de l\u0027appareil : Windows, Linux x86\/x64 bits ou Raspbian.\r\nCryptage : prot\u00e8ge les communications et les donn\u00e9es stock\u00e9es su","travauxpratiques":"Exercices divers."},{"id":78,"intitule":"Vuln\u00e9rabilit\u00e9s des architectures embarqu\u00e9es","ordre":4,"commentaire":"La recherche de vuln\u00e9rabilit\u00e9s.\r\nLes m\u00e9canismes d\u0027authentification.\r\nLes liaisons d\u0027un syst\u00e8me embarqu\u00e9 avec son environnement (connectivit\u00e9) : r\u00e9seau, capteur et p\u00e9riph\u00e9rique.\r\nIdentifier et utiliser les applications et programmes h\u00e9berg\u00e9 sur un syst\u00e8me ","travauxpratiques":"Mesurer le niveau de s\u00e9curit\u00e9 d\u0027une architecture embarqu\u00e9e."},{"id":79,"intitule":"Les attaques","ordre":5,"commentaire":"Les attaques physiques.\r\nMat\u00e9riels : acc\u00e8s aux diff\u00e9rents composants.\r\nConnectivit\u00e9s sans fil, protocole de communication. Analyse d\u2019\u00e9mission.\r\nLogiciel : structure du syst\u00e8me de fichier, faille des applications h\u00e9berg\u00e9es, acc\u00e8s aux services via les appli","travauxpratiques":"Acc\u00e9der \u00e0 un syst\u00e8me embarqu\u00e9 via diff\u00e9rentes attaques. R\u00e9aliser un test de p\u00e9n\u00e9tration."},{"id":80,"intitule":"Le rapport d\u0027audit","ordre":6,"commentaire":"Son contenu.\r\nSes rubriques \u00e0 ne pas n\u00e9gliger.","travauxpratiques":"Compl\u00e9ter un rapport pr\u00e9-rempli."}]},"programme":"","Othersdomaines":[{"id":23,"intitule":"NOUVEAUTHEME","code":"NOUV","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#48cb8e","archive":false,"commentaire":"NOUVEAUTHEME","seodescription":"NOUVEAUTHEME","seotitre":"NOUVEAUTHEME","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"","vignette":"","altBanniere":"","altVignette":""},{"id":22,"intitule":"MEGATHEME","code":"MEG","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#3f9aec","archive":false,"commentaire":"1234","seodescription":"MEGATHEM","seotitre":"MEGATHEME","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"","vignette":"","altBanniere":"","altVignette":""},{"id":21,"intitule":"Agenda","code":"agenda","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#000000","archive":false,"commentaire":"agenda","seodescription":"agenda","seotitre":"agenda","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"","vignette":"","altBanniere":"","altVignette":""},{"id":20,"intitule":"Hypertest","code":"HYP","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#249b91","archive":false,"commentaire":"Hypertest","seodescription":"Hypertest","seotitre":"Hypertest","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"https:\/\/frontest.simplyform.lmosoft.com\/uploads\/theme\/banniere\/Screenshot-from-2024-05-19-19-26-32-6909edddcacd7.png","vignette":"https:\/\/frontest.simplyform.lmosoft.com\/uploads\/theme\/vignette\/Screenshot-from-2024-05-19-19-26-32-6909edddca904.png","altBanniere":"banniere","altVignette":"vignette*"},{"id":19,"intitule":"Gigatheme","code":"GIG","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#cd2727","archive":false,"commentaire":"Gigatheme","seodescription":"Gigatheme","seotitre":"Gigatheme","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"","vignette":"","altBanniere":"","altVignette":""},{"id":18,"intitule":"Sauvetage","code":"SAUV","path":"","etat":"\u003Cspan class=\u0022badge bg-success\u0022\u003EActif\u003C\/span\u003E","ordre":2,"couleur":"#ddd052","archive":false,"commentaire":"Sauvetage","seodescription":"Sauvetage","seotitre":"Sauvetage","publication":"\u003Cspan class=\u0022badge bg-success\u0022\u003EOui\u003C\/span\u003E","banniere":"","vignette":"","altBanniere":"","altVignette":""}],"Details":{"identifiantDokelio":"","public":"Responsables, architectes s\u00e9curit\u00e9. Techniciens et administrateurs syst\u00e8mes et r\u00e9seaux.","commentaire":"","iscpf":false,"cpf":"\u003Cspan class=\u0022badge bg-danger\u0022\u003ESans CPF\u003C\/span\u003E","niveautechnique":"Expert","niveaumateriel":"4 - Niveau d\u0027\u00e9quipement mat\u00e9riel excellent","autoriteDelivranceCpf":null,"codeCpfSalarie":"","codeCpfDemandeurEmploi":"","financeurs":"\u003Cul\u003E\u003C\/ul\u003E","sessions":[]},"Certifications":{"certifiante":"\u003Cspan class=\u0022badge bg-danger\u0022\u003ENon\u003C\/span\u003E","certifiantes":"\u003Cspan class=\u0022badge bg-danger\u0022\u003ENon\u003C\/span\u003E","certificationcommentaire":"","certifications":"\u003Cul\u003E\u003C\/ul\u003E"},"type":"module","urlFront":"https:\/\/frontest.simplyform.lmosoft.com\/31\/module-export-pdf-front"}"
  ]
]
55dfb0