{"id":37,"date":"2021-07-05T17:02:41","date_gmt":"2021-07-05T17:02:41","guid":{"rendered":"https:\/\/cyberawareness.tn\/?page_id=37"},"modified":"2021-07-05T17:34:05","modified_gmt":"2021-07-05T17:34:05","slug":"about","status":"publish","type":"page","link":"https:\/\/cyberawareness.tn\/fr\/about\/","title":{"rendered":"\u00c0 propos"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;3.25.1&#8243; background_color=&#8221;#f1fafe&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#00ffd8&#8243; background_color_gradient_end=&#8221;#0029e2&#8243; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top&#8221; background_image=&#8221;https:\/\/cyberawareness.tn\/wp-content\/uploads\/2021\/07\/cyber-security-08.png&#8221; custom_padding=&#8221;||0px|||&#8221; background_last_edited=&#8221;on|phone&#8221; background_position_tablet=&#8221;center_right&#8221; locked=&#8221;off&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;3.25.1&#8243;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;3.25.1&#8243;][et_pb_image src=&#8221;https:\/\/cyberawareness.tn\/wp-content\/uploads\/2021\/07\/cyber-security-10.png&#8221; _builder_version=&#8221;3.25.3&#8243; max_width_tablet=&#8221;400px&#8221; max_width_phone=&#8221;200px&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;|||-20vw&#8221; custom_margin_tablet=&#8221;|||0vw&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; animation_style=&#8221;zoom&#8221; animation_intensity_zoom=&#8221;5%&#8221; locked=&#8221;off&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;3.25.1&#8243;][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;||||||||&#8221; header_font=&#8221;Overpass|900|||||||&#8221; header_font_size=&#8221;84px&#8221; header_font_size_tablet=&#8221;54px&#8221; header_font_size_phone=&#8221;32px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221;]<\/p>\n<h1>\u00c0 propos<\/h1>\n<p>&nbsp;<\/p>\n<p><strong>Nous sommes une organisation nationale \u00e0 but non lucratif bas\u00e9e en Tunisie.<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.8em&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221;]<\/p>\n<h2>Mission<\/h2>\n<p>L\u2019objectif majeur de Cyber Awareness Tunisia est de sensibiliser les internautes tunisiens aux\nenjeux et risques \u00e9ventuels qu\u2019ils peuvent encourir en ligne. Ce faisant, notre association vise \u00e0\nassurer la s\u00e9curit\u00e9 des Tunisiens en ligne en les aidant \u00e0 \u00eatre des cybercitoyens responsables et\navis\u00e9s pouvant tirer le meilleur parti de leur exp\u00e9rience sur le web en toute s\u00fbret\u00e9.<\/p>\n<p>Nous croyons pertinemment que la sensibilisation est essentielle dans la cr\u00e9ation d\u2019une meilleure\nexp\u00e9rience en ligne, non seulement en termes de s\u00e9curit\u00e9, mais aussi de productivit\u00e9 et de bien-\n\u00eatre social et psychologique. Notre mission est de promouvoir l\u2019usage s\u00fbr des appareils mobiles\net d\u2019Internet en visant diff\u00e9rents groupes d\u2019\u00e2ges (enfants, adolescents, adultes) et diff\u00e9rents\nstatuts (\u00e9l\u00e8ves, \u00e9tudiants, parents, professionnels, etc.)<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; prev_background_color=&#8221;#f1fafe&#8221; admin_label=&#8221;Features&#8221; _builder_version=&#8221;3.25.3&#8243; custom_margin=&#8221;||&#8221; custom_padding=&#8221;273px||||false|&#8221; top_divider_style=&#8221;slant&#8221; top_divider_height=&#8221;20vw&#8221; bottom_divider_height=&#8221;20vw&#8221;][et_pb_row _builder_version=&#8221;3.25.3&#8243; custom_margin=&#8221;||-4vw&#8221; locked=&#8221;off&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25.1&#8243;][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_3_font=&#8221;Overpass|600|||||||&#8221; header_3_text_color=&#8221;#00b4ff&#8221; header_3_font_size=&#8221;30px&#8221; header_3_line_height=&#8221;1.2em&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_3_font_tablet=&#8221;&#8221; header_3_font_phone=&#8221;Overpass|700|||||||&#8221; header_3_font_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;24px&#8221; header_3_font_size_phone=&#8221;18px&#8221; header_3_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221;]<\/p>\n<h3><span style=\"color: #000000;\">Objectifs<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>Nous cherchons \u00e0 assurer la s\u00e9curit\u00e9 informatique des Tunisiens en sensibilisant \u00e0 un certain\nnombre de probl\u00e8mes li\u00e9s \u00e0 Internet incluant sans toutefois s\u2019y limiter\u00a0:<\/p>\n<ul>\n<li>1 - L\u2019importance de l\u2019empreinte num\u00e9rique et de la cyber r\u00e9putation.<\/li>\n<li>2 - La N\u00e9tiquette ou l\u2019\u00e9tiquette sur Internet.<\/li>\n<li>3 - La protection de la vie priv\u00e9e en ligne et la pr\u00e9vention des cybercrimes tels que l&#039;usurpation\nd&#039;identit\u00e9, le partage, la propagation ou l&#039;utilisation de donn\u00e9es personnelles, le chantage, etc.<\/li>\n<li>4- Les diff\u00e9rents types d&#039;arnaques courantes sur Internet telles que le phishing, les scarewares, les\nransomwares, etc.<\/li>\n<li>5- Les comportements trompeurs en ligne, en particulier sur les r\u00e9seaux sociaux (par exemple, le\n\u00ab\u00a0catfishing\u00a0\u00bb).<\/li>\n<li>6- La cyberintimidation et ses r\u00e9percussions.<\/li>\n<li>7- Les jeux vid\u00e9o en ligne et leurs effets addictifs sur les enfants et les adolescents.<\/li>\n<li>8- Les effets psychologiques nocifs de l&#039;utilisation excessive des m\u00e9dias sociaux, en particulier\nsur les enfants et les adolescents.<\/li>\n<li>9- La n\u00e9cessit\u00e9 de prot\u00e9ger les enfants contre les contenus inappropri\u00e9s en ligne (par exemple,\u00a0<span>\u00a0<\/span><span><\/span>mat\u00e9riel graphique, violent, raciste, pornographique)<\/li>\n<li>10- La n\u00e9cessit\u00e9 d&#039;\u00e9valuer les contenus en ligne (par exemple, reconna\u00eetre les intox, les sources\npeu cr\u00e9dibles, etc.)<\/li>\n<li>11- L&#039;importance d&#039;adapter les programmes scolaires \u00e0 l\u2019omnipr\u00e9sence d&#039;Internet (int\u00e9gration de\ncours sur la culture num\u00e9rique, l&#039;utilisation d&#039;Internet, la s\u00e9curit\u00e9 en ligne, etc.)<\/li>\n<li>12- L&#039;importance des lois num\u00e9riques et la n\u00e9cessit\u00e9 d&#039;adapter les l\u00e9gislations actuelles aux d\u00e9lits\nnum\u00e9riques en constante \u00e9volution.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; prev_background_color=&#8221;#ffffff&#8221; admin_label=&#8221;About&#8221; _builder_version=&#8221;3.25.3&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#004183&#8243; background_color_gradient_end=&#8221;#001f4c&#8221; background_color_gradient_type=&#8221;radial&#8221; background_image=&#8221;https:\/\/cyberawareness.tn\/wp-content\/uploads\/2021\/07\/cyber-security-04.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_center&#8221; custom_margin=&#8221;||16vw&#8221; custom_padding=&#8221;||16vw|||&#8221; top_divider_style=&#8221;slant&#8221; top_divider_height=&#8221;20vw&#8221; locked=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;3.25.3&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25.1&#8243; custom_padding=&#8221;9vw||&#8221; custom_padding_tablet=&#8221;0vw||&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_3_font=&#8221;Overpass|600|||||||&#8221; header_3_text_color=&#8221;#00b4ff&#8221; header_3_font_size=&#8221;30px&#8221; header_3_line_height=&#8221;1.2em&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_3_font_tablet=&#8221;&#8221; header_3_font_phone=&#8221;Overpass|700|||||||&#8221; header_3_font_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;24px&#8221; header_3_font_size_phone=&#8221;18px&#8221; header_3_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221;]<\/p>\n<h3>Moyens et strat\u00e9gies :\u00a0<\/h3>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#00b4ff&#8221; divider_weight=&#8221;2px&#8221; _builder_version=&#8221;3.25.1&#8243; width=&#8221;100px&#8221; custom_margin=&#8221;||0px&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221;]<\/p>\n<p>&nbsp;<\/p>\n<p>L'objectif majeur de l'association, \u00e0 savoir sensibiliser les Tunisiens aux enjeux et dangers importants li\u00e9s \u00e0 Internet, et ainsi garantir leur bien-\u00eatre et leur s\u00e9curit\u00e9 en ligne, sera r\u00e9alis\u00e9 \u00e0 travers la combinaison de diff\u00e9rents types d'actions :<\/p>\n<ul>\n<li>1- Mener r\u00e9guli\u00e8rement des campagnes de cyber sensibilisation et des journ\u00e9es de sensibilisation\ndans diff\u00e9rents \u00e9tablissements d&#039;enseignement (\u00e9coles primaires et secondaires, universit\u00e9s).<\/li>\n<li>2- Animation d&#039;ateliers pour enfants et adolescents visant \u00e0 les aider \u00e0 se prot\u00e9ger en ligne et \u00e0\n\u00eatre des cybercitoyens responsables.<\/li>\n<li>3- Organiser des \u00e9v\u00e9nements o\u00f9 nous invitons des experts et des passionn\u00e9s de la cybers\u00e9curit\u00e9,\ndes psychologues, des informaticiens, des \u00e9ducateurs, etc.<\/li>\n<li>4- Projeter des films et des documentaires sur des questions pertinentes, telles que la\ncyberintimidation, le \u00ab\u00a0catfishing\u00a0\u00bb, les m\u00e9dias sociaux, et animer des d\u00e9bats apr\u00e8s les\nprojections.<\/li>\n<li>5- Travailler avec les parents et leur fournir les bonnes strat\u00e9gies et outils pour aider leurs enfants\n\u00e0 utiliser Internet, surveiller leur pr\u00e9sence en ligne et les assister en cas de probl\u00e8mes.<\/li>\n<li>6- Encourager les jeunes \u00e0 partager leurs exp\u00e9riences de harc\u00e8lement en ligne, de\ncyberintimidation, de probl\u00e8mes de confidentialit\u00e9, etc., dans une vis\u00e9e \u00e9ducative.<\/li>\n<li>7- Encourager les \u00e9ducateurs et les institutions \u00e0 int\u00e9grer des modules ou des cours, au choix, sur\nla cyber alphab\u00e9tisation et la s\u00e9curit\u00e9 num\u00e9rique dans leurs programmes, et les aider \u00e0 trouver les\nressources appropri\u00e9es pour une utilisation en classe.<\/li>\n<li>8- Organiser des ateliers pour familiariser les jeunes avec les lois cybern\u00e9tiques.<\/li>\n<li>9- Souligner l&#039;importance d&#039;adapter les l\u00e9gislations aux nouvelles formes de cybercriminalit\u00e9.<\/li>\n<li>10- Coop\u00e9rer avec d'autres organisations \u00e0 but non lucratif et minist\u00e8res (par exemple, le minist\u00e8re de l'\u00c9ducation, le minist\u00e8re des Technologies de l'information et de la communication, le minist\u00e8re de la Femme et de la Famille) pour mettre en \u0153uvre les objectifs susmentionn\u00e9s.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25.1&#8243; custom_padding=&#8221;29vw||&#8221; custom_padding_tablet=&#8221;0vw||&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221;][et_pb_image src=&#8221;https:\/\/cyberawareness.tn\/wp-content\/uploads\/2021\/07\/cyber-security-13-3.png&#8221; title_text=&#8221;cyber-security-13-3&#8243; align=&#8221;right&#8221; _builder_version=&#8221;4.9.7&#8243; positioning=&#8221;relative&#8221; z_index=&#8221;-169&#8243; width=&#8221;82%&#8221; max_width_tablet=&#8221;400px&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;-5vw|-10vw||-10vw||true&#8221; custom_margin_tablet=&#8221;0vw|0vw||0vw||true&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;|||0px||&#8221; animation_style=&#8221;zoom&#8221; animation_intensity_zoom=&#8221;5%&#8221; locked=&#8221;off&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Footer&#8221; _builder_version=&#8221;3.25.3&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#3122b2&#8243; background_color_gradient_end=&#8221;#00ffd8&#8243; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top right&#8221; background_image=&#8221;https:\/\/cyberawareness.tn\/wp-content\/uploads\/2021\/07\/cyber-security-17.png&#8221; z_index=&#8221;10&#8243; overflow-x=&#8221;visible&#8221; overflow-y=&#8221;visible&#8221; custom_padding=&#8221;||10vw|||&#8221; locked=&#8221;off&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;3.25.3&#8243; background_color=&#8221;#ffffff&#8221; custom_margin=&#8221;-146px|auto|-2px|auto||&#8221; custom_padding=&#8221;0px||0px||true&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;60px&#8221; box_shadow_spread=&#8221;-8px&#8221; box_shadow_color=&#8221;rgba(10,45,97,0.48)&#8221; locked=&#8221;off&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;3.25.3&#8243; custom_padding=&#8221;60px|40px|60px|40px|true|true&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221;]<\/p>\n<h2>Nous contacter<\/h2>\n<p>[\/et_pb_text][et_pb_blurb title=&#8221;contact@cyberawareness.tn&#8221; use_icon=&#8221;on&#8221; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;24px&#8221; _builder_version=&#8221;4.9.7&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; font_icon_last_edited=&#8221;off|desktop&#8221; font_icon=&#8221;%%148%%&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][et_pb_blurb title=&#8221;Tunisia&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%249%%&#8221; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;24px&#8221; _builder_version=&#8221;3.25.3&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;3.25.3&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#00f6ff&#8221; background_color_gradient_end=&#8221;#00ffbf&#8221; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top right&#8221; background_image=&#8221;https:\/\/cyberawareness.tn\/wp-content\/uploads\/2021\/07\/cyber-security-010-1.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_left&#8221; transform_translate_linked=&#8221;off&#8221; custom_padding=&#8221;60px|40px|60px|20%|true&#8221; custom_padding_tablet=&#8221;80px|||40px&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; background_last_edited=&#8221;on|desktop&#8221; background_image_tablet=&#8221;http:\/\/zaib.sandbox.etdevs.com\/divi\/wp-content\/uploads\/sites\/2\/2019\/06\/cyber-security-11.png&#8221; background_enable_image_tablet=&#8221;on&#8221; background_position_tablet=&#8221;top_left&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; text_orientation=&#8221;center&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_text_align=&#8221;center&#8221; locked=&#8221;off&#8221;]<\/p>\n<h2>Commencer<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_text_color=&#8221;#0a2d61&#8243; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"row\">Votre contribution \u00e0 notre cause est la bienvenue ! Veuillez nous contacter au<span>\u00a0<\/span><span style=\"color: #000000;\"><a href=\"mailto:contact@cyberawareness.tn\" style=\"color: #000000;\">contact@cyberawareness.tn<\/a><\/span>.<\/div>\n<div class=\"row\">\n<div class=\"col-sm-6\"><\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;3.25.1&#8243; background_color=&#8221;#f1fafe&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#00ffd8&#8243; background_color_gradient_end=&#8221;#0029e2&#8243; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top&#8221; background_image=&#8221;https:\/\/cyberawareness.tn\/wp-content\/uploads\/2021\/07\/cyber-security-08.png&#8221; custom_padding=&#8221;||0px|||&#8221; background_last_edited=&#8221;on|phone&#8221; background_position_tablet=&#8221;center_right&#8221; locked=&#8221;off&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;3.25.1&#8243;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;3.25.1&#8243;][et_pb_image src=&#8221;https:\/\/cyberawareness.tn\/wp-content\/uploads\/2021\/07\/cyber-security-10.png&#8221; _builder_version=&#8221;3.25.3&#8243; max_width_tablet=&#8221;400px&#8221; max_width_phone=&#8221;200px&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;|||-20vw&#8221; custom_margin_tablet=&#8221;|||0vw&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; animation_style=&#8221;zoom&#8221; animation_intensity_zoom=&#8221;5%&#8221; locked=&#8221;off&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;3.25.1&#8243;][et_pb_text _builder_version=&#8221;3.27.4&#8243; text_font=&#8221;||||||||&#8221; header_font=&#8221;Overpass|900|||||||&#8221; header_font_size=&#8221;84px&#8221; header_font_size_tablet=&#8221;54px&#8221; header_font_size_phone=&#8221;32px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221;] About Us &nbsp; We are a national\u00a0 non-profit organisation based in Tunisia. [\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-37","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberawareness.tn\/fr\/wp-json\/wp\/v2\/pages\/37","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.tn\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberawareness.tn\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.tn\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.tn\/fr\/wp-json\/wp\/v2\/comments?post=37"}],"version-history":[{"count":4,"href":"https:\/\/cyberawareness.tn\/fr\/wp-json\/wp\/v2\/pages\/37\/revisions"}],"predecessor-version":[{"id":48,"href":"https:\/\/cyberawareness.tn\/fr\/wp-json\/wp\/v2\/pages\/37\/revisions\/48"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.tn\/fr\/wp-json\/wp\/v2\/media?parent=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}