<?xml version="1.0" encoding="UTF-8"?>
<!-- Ce plan de site a été généré dynamiquement le 2026-04-03 à 7:15 pm par All in One SEO v4.9.5.1 - l’extension SEO originale pour WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://progik.net/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Progik</title>
		<link><![CDATA[https://progik.net]]></link>
		<description><![CDATA[Progik]]></description>
		<lastBuildDate><![CDATA[Tue, 24 Feb 2026 14:11:51 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://progik.net/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://progik.net/?daltech_footer=footer-one]]></guid>
			<link><![CDATA[https://progik.net/?daltech_footer=footer-one]]></link>
			<title>Footer One</title>
			<pubDate><![CDATA[Tue, 24 Feb 2026 14:11:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/gaelle-dejo/]]></guid>
			<link><![CDATA[https://progik.net/gaelle-dejo/]]></link>
			<title>Gaëlle Dejo</title>
			<pubDate><![CDATA[Tue, 17 Feb 2026 10:14:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/moussa-doucoure/]]></guid>
			<link><![CDATA[https://progik.net/moussa-doucoure/]]></link>
			<title>Moussa Doucouré</title>
			<pubDate><![CDATA[Tue, 17 Feb 2026 10:13:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/services/]]></guid>
			<link><![CDATA[https://progik.net/services/]]></link>
			<title>Nos services</title>
			<pubDate><![CDATA[Thu, 03 Apr 2025 09:03:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/blog/]]></guid>
			<link><![CDATA[https://progik.net/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Sun, 26 May 2024 20:50:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/]]></guid>
			<link><![CDATA[https://progik.net/]]></link>
			<title>Accueil</title>
			<pubDate><![CDATA[Tue, 24 Feb 2026 14:04:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/echange-de-carte-sim/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/echange-de-carte-sim/]]></link>
			<title>Échange de carte sim</title>
			<pubDate><![CDATA[Tue, 08 Apr 2025 12:58:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/]]></link>
			<title>Cybersécurité : la base</title>
			<pubDate><![CDATA[Thu, 27 Nov 2025 18:11:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/quizzes/les-logiciels-malveillants/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/quizzes/les-logiciels-malveillants/]]></link>
			<title>Les logiciels malveillants</title>
			<pubDate><![CDATA[Tue, 08 Apr 2025 17:50:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/quizzes/quiz-rancongiciels/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/quizzes/quiz-rancongiciels/]]></link>
			<title>Quiz : rançongiciels</title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:29:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/formation/]]></guid>
			<link><![CDATA[https://progik.net/formation/]]></link>
			<title>Formation</title>
			<pubDate><![CDATA[Thu, 01 May 2025 20:01:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/privacy-policy/]]></guid>
			<link><![CDATA[https://progik.net/privacy-policy/]]></link>
			<title>politique de confidentialité</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 14:08:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/contact/]]></guid>
			<link><![CDATA[https://progik.net/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 09:39:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/?daltech_header=header-one]]></guid>
			<link><![CDATA[https://progik.net/?daltech_header=header-one]]></link>
			<title>Header One</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 09:31:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/?daltech_header=header-two]]></guid>
			<link><![CDATA[https://progik.net/?daltech_header=header-two]]></link>
			<title>Header Two</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 09:29:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/reutilisation-des-mots-de-passe/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/reutilisation-des-mots-de-passe/]]></link>
			<title>Réutilisation des mots de passe</title>
			<pubDate><![CDATA[Tue, 08 Apr 2025 12:57:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/reperer-et-signaler/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/reperer-et-signaler/]]></link>
			<title>Repérer et signaler</title>
			<pubDate><![CDATA[Tue, 08 Apr 2025 12:57:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/quizzes/quiz-sur-lauthentification-multifacteurs/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/quizzes/quiz-sur-lauthentification-multifacteurs/]]></link>
			<title>Quiz sur l&#8217;authentification multifacteurs</title>
			<pubDate><![CDATA[Tue, 08 Apr 2025 12:54:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/quizzes/quiz-hameconnage/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/quizzes/quiz-hameconnage/]]></link>
			<title>Quiz sur hameçonnage</title>
			<pubDate><![CDATA[Tue, 08 Apr 2025 12:44:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/quizzes/quiz-sur-les-mots-de-passe/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/quizzes/quiz-sur-les-mots-de-passe/]]></link>
			<title>Quiz sur les mots de passe</title>
			<pubDate><![CDATA[Tue, 08 Apr 2025 12:44:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/quizzes/quiz-introduction/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/quizzes/quiz-introduction/]]></link>
			<title>Quiz introduction</title>
			<pubDate><![CDATA[Tue, 08 Apr 2025 12:38:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/lauthentification-multi-facteur-2/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/lauthentification-multi-facteur-2/]]></link>
			<title>L&#8217;authentification multi-facteur 2</title>
			<pubDate><![CDATA[Fri, 04 Apr 2025 15:44:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/les-menaces-internes/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/les-menaces-internes/]]></link>
			<title>Les menaces internes</title>
			<pubDate><![CDATA[Fri, 04 Apr 2025 15:20:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/methodes-dattaques-courantes/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/methodes-dattaques-courantes/]]></link>
			<title>Méthodes d&#8217;attaques courantes</title>
			<pubDate><![CDATA[Fri, 04 Apr 2025 14:58:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/lhameconnage/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/lhameconnage/]]></link>
			<title>L&#8217;hameçonnage</title>
			<pubDate><![CDATA[Fri, 04 Apr 2025 14:45:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/boutique/]]></guid>
			<link><![CDATA[https://progik.net/boutique/]]></link>
			<title>Boutique</title>
			<pubDate><![CDATA[Wed, 05 Mar 2025 15:14:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/notre-entreprise/]]></guid>
			<link><![CDATA[https://progik.net/notre-entreprise/]]></link>
			<title>Notre entreprise</title>
			<pubDate><![CDATA[Thu, 03 Apr 2025 09:02:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/lingenerie-social-avec-pretexte/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/lingenerie-social-avec-pretexte/]]></link>
			<title>L&#8217;ingénérie social avec prétexte</title>
			<pubDate><![CDATA[Tue, 01 Apr 2025 16:19:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/lingenerie-sociale/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/lingenerie-sociale/]]></link>
			<title>L&#8217;ingénérie sociale</title>
			<pubDate><![CDATA[Tue, 01 Apr 2025 16:17:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/la-securite-des-donnees/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/la-securite-des-donnees/]]></link>
			<title>La sécurité des données</title>
			<pubDate><![CDATA[Tue, 01 Apr 2025 16:13:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon2-4/]]></guid>
			<link><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon2-4/]]></link>
			<title>Leçon2</title>
			<pubDate><![CDATA[Thu, 06 Mar 2025 09:30:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon1-4/]]></guid>
			<link><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon1-4/]]></link>
			<title>Leçon1</title>
			<pubDate><![CDATA[Thu, 06 Mar 2025 09:30:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon2-3/]]></guid>
			<link><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon2-3/]]></link>
			<title>Leçon2</title>
			<pubDate><![CDATA[Thu, 06 Mar 2025 09:29:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon1-3/]]></guid>
			<link><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon1-3/]]></link>
			<title>Leçon1</title>
			<pubDate><![CDATA[Thu, 06 Mar 2025 09:29:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/introduction-a-la-cybersecurite/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/introduction-a-la-cybersecurite/]]></link>
			<title>Introduction à la cybersécurité</title>
			<pubDate><![CDATA[Mon, 31 Mar 2025 15:22:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/la-securite-des-appareils/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/la-securite-des-appareils/]]></link>
			<title>La sécurité des appareils</title>
			<pubDate><![CDATA[Mon, 31 Mar 2025 15:15:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/la-securite-des-reseaux/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/la-securite-des-reseaux/]]></link>
			<title>La sécurité des réseaux</title>
			<pubDate><![CDATA[Mon, 31 Mar 2025 15:15:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/rancongiciels/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/rancongiciels/]]></link>
			<title>Rançongiciels</title>
			<pubDate><![CDATA[Mon, 31 Mar 2025 15:02:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/les-logiciels-malveillants/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/les-logiciels-malveillants/]]></link>
			<title>Les logiciels malveillants</title>
			<pubDate><![CDATA[Mon, 31 Mar 2025 14:59:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/authentification-multi-facteurs/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/authentification-multi-facteurs/]]></link>
			<title>Authentification multi-facteurs</title>
			<pubDate><![CDATA[Mon, 31 Mar 2025 14:49:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/les-mots-de-passe/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/les-mots-de-passe/]]></link>
			<title>Les mots de passe</title>
			<pubDate><![CDATA[Mon, 31 Mar 2025 14:26:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon2-2/]]></guid>
			<link><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon2-2/]]></link>
			<title>Leçon2</title>
			<pubDate><![CDATA[Thu, 06 Mar 2025 09:28:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon1-2/]]></guid>
			<link><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon1-2/]]></link>
			<title>Leçon1</title>
			<pubDate><![CDATA[Thu, 06 Mar 2025 09:27:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon3/]]></guid>
			<link><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon3/]]></link>
			<title>Leçon3</title>
			<pubDate><![CDATA[Thu, 06 Mar 2025 09:27:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/pourquoi-la-cybersecurite-est-elle-importante/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/pourquoi-la-cybersecurite-est-elle-importante/]]></link>
			<title>Pourquoi la cybersécurité est-elle importante?</title>
			<pubDate><![CDATA[Fri, 28 Mar 2025 08:45:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon2/]]></guid>
			<link><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon2/]]></link>
			<title>Lecon2</title>
			<pubDate><![CDATA[Thu, 06 Mar 2025 09:26:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon1/]]></guid>
			<link><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/lecon1/]]></link>
			<title>Leçon1</title>
			<pubDate><![CDATA[Thu, 06 Mar 2025 09:26:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/pourquoi-est-elle-importante/]]></guid>
			<link><![CDATA[https://progik.net/cours/cybersecurite-base/leçon/pourquoi-est-elle-importante/]]></link>
			<title>Pourquoi est-elle importante?</title>
			<pubDate><![CDATA[Fri, 28 Mar 2025 08:32:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/exploiter-les-ressources-gratuites-en-ligne/]]></guid>
			<link><![CDATA[https://progik.net/cours/les-bases-de-linformatique/leçon/exploiter-les-ressources-gratuites-en-ligne/]]></link>
			<title>Exploiter les ressources gratuites en ligne</title>
			<pubDate><![CDATA[Sun, 02 Mar 2025 11:29:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://progik.net/team-details/]]></guid>
			<link><![CDATA[https://progik.net/team-details/]]></link>
			<title>François Ouellette</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 14:17:07 +0000]]></pubDate>
		</item>
				</channel>
</rss>
