Site static pour le portfolio VAE. Site créé avec MyScenari. https://portfolio.ledufinfra.fr/
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

1 lines
4.6 KiB

{"menu":{"children":[{"url":"co/Portfolio_VAE.html","label":"Présentation","source":"page","className":"outPage","id":"ELP1b4sOu8gErV8cT1bwQd"},{"url":"co/Curriculum_vitae.html","label":"Curriculum Vitae","source":"section","className":"outSec ","id":"KHimBYvCTql5MJLiKv1L8"},{"url":"co/Bloc_de_competences_1.html","label":"Satisfaire les besoins clients","source":"section","className":"outSec ","id":"HegOkDQds1i14W4l2X7u0g","children":[{"url":"co/Bloc_de_competences_1_1.html","label":"Lancement du projet","source":"section","className":"outSec ","id":"nnloxed9GmcAnXP8pBsiMi"},{"url":"co/Bloc_de_competences_1_2.html","label":"Recueil et analyse de besoin","source":"section","className":"outSec ","id":"VBruZcon3OkJhNRg9CiVbb"},{"url":"co/Bloc_de_competences_1_3.html","label":"Formalisation du besoin","source":"section","className":"outSec ","id":"xj3LuR6shmkWl68tWzMRFf"},{"url":"co/Bloc_de_competences_1_4.html","label":"Réalisation de maquettes ou preuves de concept","source":"section","className":"outSec ","id":"etvxkuBVBgl3uvV67ubV5h"}]},{"url":"co/Bloc_de_competences_2.html","label":"Concevoir des infrastructures systèmes et réseau","source":"section","className":"outSec ","id":"jflAKg8T5fkxkn9TdwGe","children":[{"url":"co/Bloc_de_competences_2_1.html","label":"Sélection des technologies, outils, services et dimensionnement de la plate-forme de service","source":"section","className":"outSec ","id":"f8rgWsRR20becvVbgdk5cf"},{"url":"co/Bloc_de_competences_2_2.html","label":"Analyse du retour sur investissement (ROI)","source":"section","className":"outSec ","id":"d8Xx3YK2PYVKAMGMjb3vf"},{"url":"co/Bloc_de_competences_2_3.html","label":"Conception et modélisation de la solution","source":"section","className":"outSec ","id":"OEu6FVtrSPiTDqxLcDJkne"},{"url":"co/Bloc_de_competences_2_4.html","label":"Pilotages des intégrateurs externes","source":"section","className":"outSec ","id":"QLVGSDHpuvhYj0nDeyd4md"}]},{"url":"co/Bloc_de_competences_3.html","label":"Intégrer et déployer une solution technique","source":"section","className":"outSec ","id":"cuu0hhxwljcIURxcPk67pc","children":[{"url":"co/Bloc_de_competences_3_1.html","label":"Réalisation de la solution","source":"section","className":"outSec ","id":"xBlLvp7bQgegI8BVgxS9vd"},{"url":"co/Bloc_de_competences_3_2.html","label":"Test de la solution","source":"section","className":"outSec ","id":"MtInw6iUQ7hwJ3y3mGiV1h"},{"url":"co/Bloc_de_competences_3_3.html","label":"Déploiement de la solution","source":"section","className":"outSec ","id":"VNadPluJYse1GkfUVYSA8g"}]},{"url":"co/Bloc_de_competences_4.html","label":"Assister et former les utilisateurs","source":"section","className":"outSec ","id":"LnbnzG7RwmfsJgWZuC8Qzd","children":[{"url":"co/Bloc_de_competences_4_1.html","label":"Formation des utilisateurs","source":"section","className":"outSec ","id":"xVk6dcXmjVdrMrtHRB3iPh"},{"url":"co/Bloc_de_competences_4_2.html","label":"Assistance aux utilisateurs","source":"section","className":"outSec ","id":"sixYuKntCJhVn7ML1IALNh"}]},{"url":"co/Bloc_de_competences_5.html","label":"Gérer un projet","source":"section","className":"outSec ","id":"gMDpDAbOAZjh28f1wgxR6d","children":[{"url":"co/Bloc_de_competences_5_1.html","label":"Organisation initiale du projet","source":"section","className":"outSec ","id":"tL5ezRREQxjAq1f1LME07c"},{"url":"co/Bloc_de_competences_5_2.html","label":"Planification et budgétisation","source":"section","className":"outSec ","id":"hBWSqcvtDlhcnJVbAJjCQe"},{"url":"co/Bloc_de_competences_5_3.html","label":"Pilotage et communication","source":"section","className":"outSec ","id":"AqfGiwebJih4WBQ4uLQ7Ch"},{"url":"co/Bloc_de_competences_5_4.html","label":"Clôture du projet","source":"section","className":"outSec ","id":"ityWK5jFEBuITx26N1HRi"}]},{"url":"co/Bloc_de_competences_6.html","label":"Administrer et gérer la sécurité","source":"section","className":"outSec ","id":"ns4WOwxKe3gAz4nqpWbTA","children":[{"url":"co/Bloc_de_competences_6_1.html","label":"Exploitation de la solution (infrastructure systèmes et réseaux)","source":"section","className":"outSec ","id":"muymxZKa0BheI5qzgfNtm"},{"url":"co/Bloc_de_competences_6_2.html","label":"Supervision de la solution","source":"section","className":"outSec ","id":"KZ7EIi4UJafQku5BiUbvEd"},{"url":"co/Bloc_de_competences_6_3.html","label":"Audit de sécurité","source":"section","className":"outSec ","id":"vGs6HVd61scFl8MnNNvtri"},{"url":"co/Bloc_de_competences_6_4.html","label":"Gestion de la sécurité","source":"section","className":"outSec ","id":"gnoigtHB4seIaXHjAXTLUd"}]},{"url":"co/Conclusion.html","label":"Résumé","source":"section","className":"outSec ","id":"UzWWshYcwOf3eFv34axbxf"}]}}