{"id":5542,"date":"2025-07-24T13:35:31","date_gmt":"2025-07-24T13:35:31","guid":{"rendered":"https:\/\/techhub.saworks.io\/docs\/tutoriel-github\/securite-avancee-sur-github-partie-1-sur-2\/resume\/"},"modified":"2025-07-24T13:41:05","modified_gmt":"2025-07-24T13:41:05","slug":"resume","status":"publish","type":"docs","link":"https:\/\/techhub.saworks.io\/fr\/docs\/tutoriel-github\/securite-avancee-sur-github-partie-1-sur-2\/resume\/","title":{"rendered":"R\u00e9sum\u00e9"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p><strong>GitHub Advanced Security (GHAS)<\/strong>&nbsp;est une&nbsp;<strong>puissante suite d\u2019outils et de fonctionnalit\u00e9s<\/strong>&nbsp;qui vous permet d\u2019<strong>identifier les vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9<\/strong>&nbsp;dans votre base de code et votre environnement.<br>Ces fonctionnalit\u00e9s vous permettent de&nbsp;<strong>s\u00e9curiser votre code \u00e0 chaque \u00e9tape du cycle de d\u00e9veloppement logiciel<\/strong>, et pas seulement en production.<br>Vous pouvez ainsi&nbsp;<strong>anticiper les menaces et les violations de s\u00e9curit\u00e9<\/strong>,&nbsp;<strong>tirer parti de l\u2019expertise de la communaut\u00e9 s\u00e9curit\u00e9<\/strong>, et&nbsp;<strong>continuer \u00e0 utiliser des logiciels open source en toute s\u00e9curit\u00e9<\/strong>.<br>GHAS inclut \u00e9galement la mise en \u0153uvre de&nbsp;<strong>bonnes pratiques de s\u00e9curit\u00e9<\/strong>, favorisant une&nbsp;<strong>culture de la s\u00e9curit\u00e9<\/strong>&nbsp;au sein de votre organisation.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Dans ce module, vous avez appris \u00e0 :<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>D\u00e9finir GHAS<\/strong>\u00a0et comprendre l\u2019importance de ses fonctionnalit\u00e9s cl\u00e9s :<br><strong>Analyse de secrets<\/strong>,\u00a0<strong>analyse de code<\/strong>\u00a0et\u00a0<strong>Dependabot<\/strong><\/li>\n\n\n\n<li><strong>Utiliser GHAS<\/strong>\u00a0pour maximiser son impact en mati\u00e8re de s\u00e9curit\u00e9<\/li>\n\n\n\n<li><strong>Comprendre le r\u00f4le de GHAS<\/strong>\u00a0dans l\u2019\u00e9cosyst\u00e8me de la s\u00e9curit\u00e9<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd0d&nbsp;<strong>Pour aller plus loin :<\/strong><\/h3>\n\n\n\n<p>Utilisez les ressources suivantes pour approfondir vos connaissances sur GitHub Advanced Security :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/github.com\/orgs\/community\/discussions\/137197\"><strong>Pr\u00e9paration \u00e0 la certification GitHub Advanced Security<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.github.com\/en\/code-security\/security-overview\/about-security-overview\"><strong>Vue d\u2019ensemble de la s\u00e9curit\u00e9 GitHub<\/strong><\/a><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/docs.github.com\/en\/rest\/dependabot?apiVersion=2022-11-28\">Dependabot<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/docs.github.com\/en\/code-security\/code-scanning\">Analyse de code (Code scanning)<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/docs.github.com\/en\/code-security\/secret-scanning\">Analyse de secrets (Secret scanning)<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/docs.github.com\/en\/code-security\/code-scanning\/introduction-to-code-scanning\/about-code-scanning-with-codeql#about-code-scanning-with-codeql\">CodeQL<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/docs.github.com\/en\/code-security\/code-scanning\/integrating-with-code-scanning\">Int\u00e9gration avec l\u2019analyse de code<\/a><\/strong><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>GitHub Advanced Security (GHAS)&nbsp;est une&nbsp;puissante suite d\u2019outils et de fonctionnalit\u00e9s&nbsp;qui vous permet d\u2019identifier les vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9&nbsp;dans votre base de code et votre [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":5497,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"","doc_tag":[],"doc_badge":[],"class_list":["post-5542","docs","type-docs","status-publish","hentry"],"author_avatar":"https:\/\/secure.gravatar.com\/avatar\/6a70e7c73db9f245e650948d09d74f61?s=96&d=mm&r=g","author_name":"Annick N'dri","_links":{"self":[{"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/docs\/5542"}],"collection":[{"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/comments?post=5542"}],"version-history":[{"count":0,"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/docs\/5542\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/docs\/5497"}],"wp:attachment":[{"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/media?parent=5542"}],"wp:term":[{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/doc_tag?post=5542"},{"taxonomy":"doc_badge","embeddable":true,"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/doc_badge?post=5542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}