<?xml version="1.0" encoding="UTF-8"?>
<!-- Ce plan de site a été généré dynamiquement le avril 3, 2026 à 8:27 pm par All in One SEO v4.7.7.2 - l’extension SEO originale pour WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://d2y-consulting.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>D2Y-Consulting</title>
		<link><![CDATA[https://d2y-consulting.com]]></link>
		<description><![CDATA[D2Y-Consulting]]></description>
		<lastBuildDate><![CDATA[Tue, 18 Mar 2025 23:33:58 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://d2y-consulting.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-a-venir/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-a-venir/]]></link>
			<title>BOOTCAMP À VENIR</title>
			<pubDate><![CDATA[Tue, 18 Mar 2025 23:33:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/la-cybersecurite-en-4-points/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/la-cybersecurite-en-4-points/]]></link>
			<title>La cybersécurité en 4 points</title>
			<pubDate><![CDATA[Thu, 09 Jan 2025 20:26:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/faq/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/faq/]]></link>
			<title>FAQ</title>
			<pubDate><![CDATA[Thu, 06 Feb 2025 15:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/]]></link>
			<title>Accueil</title>
			<pubDate><![CDATA[Sun, 05 Jan 2025 04:19:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/formation-collecte-et-analyse-des-logs-avec-splunk-2-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/formation-collecte-et-analyse-des-logs-avec-splunk-2-jours/]]></link>
			<title>BOOTCAMP &#8211; Collecte et analyse des Logs avec Splunk : 2 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 13:50:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-securite-informatique-vocabulaire-concepts-et-technologies-pour-non-inities-2-jour/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-securite-informatique-vocabulaire-concepts-et-technologies-pour-non-inities-2-jour/]]></link>
			<title>BOOTCAMP &#8211; Sécurité informatique : vocabulaire, concepts et technologies pour les débutants : 2 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 13:13:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/a-propos-de-d2y-consulting-2/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/a-propos-de-d2y-consulting-2/]]></link>
			<title>A propos</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 09:45:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-cybersecurite-synthese-technique-3-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-cybersecurite-synthese-technique-3-jours/]]></link>
			<title>BOOTCAMP &#8211; Cybersécurité &#8211; Synthèse technique : 3 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 09:41:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-comment-se-proteger-de-la-cybercriminalite-2-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-comment-se-proteger-de-la-cybercriminalite-2-jours/]]></link>
			<title>BOOTCAMP &#8211; Comment se protéger de la cybercriminalité : 2 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 09:34:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-parcours-introductif-a-la-cybersecurite-10-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-parcours-introductif-a-la-cybersecurite-10-jours/]]></link>
			<title>BOOTCAMP &#8211; Parcours introductif à la Cybersécurité : 10 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 09:29:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-ethical-hacking-niveau-expert-3-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-ethical-hacking-niveau-expert-3-jours/]]></link>
			<title>BOOTCAMP &#8211; Ethical Hacking &#8211; niveau expert : 5 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 09:24:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-analyse-inforensic-et-reponse-a-incidents-de-securite-3-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-analyse-inforensic-et-reponse-a-incidents-de-securite-3-jours/]]></link>
			<title>BOOTCAMP &#8211; Analyse forensic et réponse à incidents de sécurité &#8211; 3 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 09:17:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/ethical-hacking-les-fondamentaux-3-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/ethical-hacking-les-fondamentaux-3-jours/]]></link>
			<title>BOOTCAMP &#8211; Ethical Hacking &#8211; Les fondamentaux : 3 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 09:13:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-audit-de-securite-de-sites-web-3-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-audit-de-securite-de-sites-web-3-jours/]]></link>
			<title>BOOTCAMP &#8211; Audit de sécurité de sites Web : 3 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 09:07:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-tests-dintrusion-mise-en-situation-daudit-3-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-tests-dintrusion-mise-en-situation-daudit-3-jours/]]></link>
			<title>BOOTCAMP &#8211; Tests d’intrusion &#8211; Mise en situation d’audit : 3 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 08:17:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-cursus-expert-en-cybersecurite-1-mois/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-cursus-expert-en-cybersecurite-1-mois/]]></link>
			<title>BOOTCAMP- Cursus Expert en cybersécurité : 1 mois</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 08:10:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-sensibilisation-a-la-cybersecurite-1-jour/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-sensibilisation-a-la-cybersecurite-1-jour/]]></link>
			<title>BOOTCAMP &#8211; Sensibilisation à la cybersécurité : 1 jour</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 07:50:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-amazon-web-services-aws-ingenierie-securite/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-amazon-web-services-aws-ingenierie-securite/]]></link>
			<title>BOOTCAMP- Amazon Web Services (AWS) &#8211; Ingénierie Sécurité : 3 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 07:39:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/formation-amazon-web-services-aws-fondamentaux-de-la-securite-1-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/formation-amazon-web-services-aws-fondamentaux-de-la-securite-1-jours/]]></link>
			<title>BOOTCAMP &#8211; Amazon Web Services (AWS) &#8211; Fondamentaux de la sécurité : 1 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 07:38:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/formation-google-cloud-platform-securite-3-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/formation-google-cloud-platform-securite-3-jours/]]></link>
			<title>BOOTCAMP &#8211; Google Cloud Platform &#8211; Sécurité : 3 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 07:35:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/formation-microsoft-365-les-bases-de-ladministration-5-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/formation-microsoft-365-les-bases-de-ladministration-5-jours/]]></link>
			<title>BOOTCAMP- Microsoft 365 &#8211; Les bases de l’administration : 5 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 07:31:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-securite-systemes-et-reseaux-mise-en-oeuvre-5-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-securite-systemes-et-reseaux-mise-en-oeuvre-5-jours/]]></link>
			<title>BOOTCAMP &#8211; Sécurité systèmes et réseaux &#8211; Mise en oeuvre : 5 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 07:26:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-securite-systemes-et-reseaux-les-fondamentaux-3-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-securite-systemes-et-reseaux-les-fondamentaux-3-jours/]]></link>
			<title>BOOTCAMP &#8211; Sécurité systèmes et réseaux &#8211; Les fondamentaux : 3 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 07:24:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-analyse-inforensique-windows-3-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-analyse-inforensique-windows-3-jours/]]></link>
			<title>BOOTCAMP- Analyse forensique Windows : 3 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 07:16:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/bootcamp-analyse-inforensique-reseau/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/bootcamp-analyse-inforensique-reseau/]]></link>
			<title>BOOTCAMP &#8211; Analyse forensique réseau : 3 jours</title>
			<pubDate><![CDATA[Sat, 18 Jan 2025 07:14:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/contact/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/contact/]]></link>
			<title>Contactez-nous</title>
			<pubDate><![CDATA[Sat, 11 Jan 2025 20:28:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/cest-quoi-le-quishing/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/cest-quoi-le-quishing/]]></link>
			<title>C’EST QUOI LE QUISHING ?</title>
			<pubDate><![CDATA[Sat, 11 Jan 2025 13:41:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/formation-hacking-et-securite-utilisation-de-wireshark-3-jours/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/formation-hacking-et-securite-utilisation-de-wireshark-3-jours/]]></link>
			<title>BOOTCAMP &#8211; Hacking et sécurité &#8211; Utilisation de WireShark : 3 jours</title>
			<pubDate><![CDATA[Sat, 11 Jan 2025 12:54:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/sample-page/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/sample-page/]]></link>
			<title>Sample Page</title>
			<pubDate><![CDATA[Sun, 05 Jan 2025 04:14:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://d2y-consulting.com/nos-prestations/]]></guid>
			<link><![CDATA[https://d2y-consulting.com/nos-prestations/]]></link>
			<title>NOS PRESTATIONS</title>
			<pubDate><![CDATA[Fri, 10 Jan 2025 12:35:46 +0000]]></pubDate>
		</item>
				</channel>
</rss>
