{"id":52,"date":"2019-06-19T11:04:34","date_gmt":"2019-06-19T09:04:34","guid":{"rendered":"http:\/\/www.ests.uca.ma\/?page_id=52"},"modified":"2024-09-06T12:31:51","modified_gmt":"2024-09-06T10:31:51","slug":"dut-genie-informatique","status":"publish","type":"page","link":"https:\/\/www.ests.uca.ma\/?page_id=52","title":{"rendered":"DUT G\u00c9NIE INFORMATIQUE"},"content":{"rendered":"<p style=\"text-align: justify;\"><em><span style=\"color: #3366ff;\"><strong><span style=\"font-size: 18pt;\">Objectifs de la formation<\/span><\/strong><\/span><\/em><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: helvetica, arial, sans-serif;\">Cette formation vise \u00e0 doter les \u00e9tudiants des comp\u00e9tences essentielles en informatique, en couvrant des domaines cl\u00e9s. Les \u00e9tudiants apprendront \u00e0 concevoir, analyser et optimiser des algorithmes, \u00e0 ma\u00eetriser divers langages de programmation tels que C, Python et Java, et \u00e0 comprendre et \u00e0 ma\u00eetriser l&rsquo;utilisation des structures de donn\u00e9es ainsi que des technologies web. En outre, la formation inclut des modules avanc\u00e9s tels que les bases de donn\u00e9es, la s\u00e9curit\u00e9 des syst\u00e8mes et r\u00e9seaux, et des techniques modernes comme l&rsquo;apprentissage automatique et le Deep Learning. Ainsi, cette formation pr\u00e9pare les \u00e9tudiants \u00e0 relever les d\u00e9fis technologiques actuels et futurs. <\/span><\/p>\n<p style=\"text-align: justify;\"><em><span style=\"color: #3366ff;\"><strong><span style=\"font-size: 18pt;\">Comp\u00e9tences\u00a0<\/span><\/strong><\/span><\/em><\/p>\n<ul>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Ma\u00eetrise des langages de programmation tels que C, Python et Java, ainsi que des algorithmes.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Compr\u00e9hension des principes d&rsquo;architecture des ordinateurs.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Comp\u00e9tence en optimisation des performances des syst\u00e8mes informatiques.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Conception et d\u00e9veloppement d&rsquo;applications web.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Capacit\u00e9 \u00e0 utiliser la m\u00e9thode Merise et le langage UML pour la mod\u00e9lisation des syst\u00e8mes d&rsquo;information.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Expertise en bases de donn\u00e9es relationnelles.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Ma\u00eetrise des principes et techniques de cryptographie pour s\u00e9curiser les donn\u00e9es.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Connaissance approfondie de la s\u00e9curit\u00e9 des syst\u00e8mes et des r\u00e9seaux.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Capacit\u00e9 \u00e0 appliquer des techniques d&rsquo;apprentissage automatique pour la mod\u00e9lisation pr\u00e9dictive et l&rsquo;analyse des donn\u00e9es.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Comp\u00e9tence dans l&rsquo;utilisation des frameworks de deep learning pour d\u00e9velopper et entra\u00eener des mod\u00e8les de r\u00e9seaux de neurones.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Aptitude \u00e0 interpr\u00e9ter et \u00e9valuer les performances des mod\u00e8les d&rsquo;apprentissage automatique et de deep learning.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"color: #3366ff;\"><em><span style=\"font-size: 18pt;\"><strong>D\u00e9bouch\u00e9s de la formation<\/strong><\/span><\/em><\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">Les dipl\u00f4m\u00e9s de cette formation seront hautement qualifi\u00e9s pour s&rsquo;int\u00e9grer rapidement dans le march\u00e9 du travail, acc\u00e9dant \u00e0 des postes au sein de soci\u00e9t\u00e9s de services informatiques, de fabricants d&rsquo;\u00e9quipements informatiques, ainsi que dans divers secteurs industriels et de services.<\/span><br \/>\n<span style=\"font-family: helvetica, arial, sans-serif;\">Les secteurs d&rsquo;activit\u00e9 potentiels comprennent :<\/span><\/p>\n<ul>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Services informatiques,<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">D\u00e9veloppement d&rsquo;applications,<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Administration technique des r\u00e9seaux,<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Banques et assurances,<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Entreprises commerciales,<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif;\">Secteur public.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: helvetica, arial, sans-serif;\">De plus, les laur\u00e9ats auront la possibilit\u00e9 de poursuivre leurs \u00e9tudes en acc\u00e9dant \u00e0 divers programmes de licence ou \u00e0 des \u00e9coles d&rsquo;ing\u00e9nieurs pour approfondir leurs connaissances et se sp\u00e9cialiser davantage.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #3366ff;\"><em><strong><span style=\"font-size: 18pt;\">Programme<\/span><\/strong><\/em><\/span><\/p>\n<p style=\"text-align: justify;\"><strong><em><u>Semestre <\/u><\/em><\/strong><strong><em>I<\/em><\/strong><\/p>\n<table style=\"width: 100%; border-collapse: collapse; border-style: solid;\">\n<tbody>\n<tr>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module<\/strong><strong> 1\u00a0<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 2<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 3<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 4<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 5<\/strong><\/em><\/td>\n<td style=\"width: 8.33335%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 6<\/strong><\/em><\/td>\n<td style=\"width: 8.33335%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 7<\/strong><\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Algorithmique<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Programmation C<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Analyse<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Architecture des ordinateurs et programmation assembleur<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Syst\u00e8mes d\u2019information<\/td>\n<td style=\"width: 8.33335%; background-color: #81ecec; border-style: solid;\">Langues Etrang\u00e8res 1<\/td>\n<td style=\"width: 8.33335%; background-color: #81ecec; border-style: solid;\">M\u00e9thodologie de Travail Universitaire<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: justify;\"><strong><em>Semestre II<\/em><\/strong><\/p>\n<table style=\"width: 100%; border-collapse: collapse; border-style: solid;\">\n<tbody>\n<tr>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 8<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 9<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 10<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 11<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 12<\/strong><\/em><\/td>\n<td style=\"width: 8.33335%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 13<\/strong><\/em><\/td>\n<td style=\"width: 8.33335%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 14<\/strong><\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Bases de Donn\u00e9es<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Programmation structur\u00e9e avanc\u00e9e et programmation web<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">R\u00e9seaux informatiques<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Les syst\u00e8mes d&rsquo;exploitation<\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid;\">Alg\u00e8bre<\/td>\n<td style=\"width: 8.33335%; background-color: #81ecec; border-style: solid;\">Langues Etrang\u00e8res 2<\/td>\n<td style=\"width: 8.33335%; background-color: #81ecec; border-style: solid;\">Culture digitale<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: justify;\"><strong><em>Semestre III<\/em><\/strong><\/p>\n<table style=\"width: 100%; border-collapse: collapse; border-style: solid;\">\n<tbody>\n<tr>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 15<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 16<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 17<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 18<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 19<\/strong><\/em><\/td>\n<td style=\"width: 8.33335%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 20<\/strong><\/em><\/td>\n<td style=\"width: 8.33335%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 21<\/strong><\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid; text-align: left;\"><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Programmation orient\u00e9e objet<\/span><\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid; text-align: left;\"><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Option1:<\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Cryptographie<\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Option2:<\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Analyse Num\u00e9rique<\/span><\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid; text-align: left;\"><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Option1:<\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Administration des R\u00e9seaux<\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Option2:<\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Probabilit\u00e9s et statistiques<\/span><\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid; text-align: left;\"><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Mod\u00e9lisation UML et Gestion de Projet<\/span><\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid; text-align: left;\"><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Option1:<\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Algorithmes pour les graphes<\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Option2:<\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Machine Learning<\/span><\/td>\n<td style=\"width: 8.33335%; background-color: #81ecec; border-style: solid; text-align: left;\"><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Probabilit\u00e9s et statistiques<\/span><\/td>\n<td style=\"width: 8.33335%; background-color: #81ecec; border-style: solid; text-align: left;\"><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Comp\u00e9tences culturelles et artistiques<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: justify;\"><strong><em>Semestre IV<\/em><\/strong><\/p>\n<table style=\"width: 100%; border-collapse: collapse; border-style: solid;\">\n<tbody>\n<tr>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 22<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 23<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 24<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 25<\/strong><\/em><\/td>\n<td style=\"width: 16.6667%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 26<\/strong><\/em><\/td>\n<td style=\"width: 8.33335%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 27<\/strong><\/em><\/td>\n<td style=\"width: 8.33335%; background-color: #55efc4; border-style: solid;\"><em><strong>Module 28<\/strong><\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid; text-align: left;\"><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Bases de Donn\u00e9es Avanc\u00e9es<\/span><\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid; text-align: left;\"><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Option1:<\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">S\u00e9curit\u00e9 des syst\u00e8mes<\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Option2:<\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Analyse de donn\u00e9es<\/span><\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid; text-align: left;\"><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Option1:<\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">S\u00e9curit\u00e9 des r\u00e9seaux<\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Option2:<\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Deep Learning<\/span><\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid; text-align: left;\"><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Langues Etrang\u00e8res 4<\/span><\/td>\n<td style=\"width: 16.6667%; background-color: #81ecec; border-style: solid; text-align: left;\"><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">D\u00e9veloppement Personnel<\/span><\/td>\n<td style=\"width: 8.33335%; background-color: #81ecec; border-style: solid; text-align: left;\"><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Stages professionnels<\/span><\/td>\n<td style=\"width: 8.33335%; background-color: #81ecec; border-style: solid; text-align: left;\"><span style=\"font-size: 10pt; font-family: georgia, palatino, serif; color: #333333;\">Projet de fin d&rsquo;\u00e9tudes (PFE)<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;\"><strong><span style=\"text-decoration: underline;\"><span style=\"color: #666699; text-decoration: underline;\"><em>Option1:<\/em><\/span> <\/span><span style=\"color: #333333;\">S\u00e9curit\u00e9 des Syst\u00e8mes et R\u00e9seaux<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt;\"><strong><span style=\"text-decoration: underline;\"><span style=\"color: #666699; text-decoration: underline;\"><em>Option2:<\/em> <\/span><\/span><span style=\"color: #333333;\">Intelligence Artificielle<\/span><\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><em><strong><span style=\"color: #3366ff; font-size: 18pt;\">Contact<\/span><\/strong><\/em><\/p>\n<table class=\" alignleft\" style=\"width: 100%; border-collapse: collapse; border-color: #ffffff;\">\n<tbody>\n<tr>\n<td style=\"width: 9.47711%;\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"http:\/\/www.ests.uca.ma\/wp-content\/uploads\/2019\/07\/img_311846.png\" alt=\"\" width=\"33\" height=\"33\" \/><\/td>\n<td style=\"width: 90.5229%; text-align: left;\"><strong>Responsable de la formation\u00a0:<\/strong> <span style=\"color: #003366;\">P<strong>r\u00a0 Jamal BAKKAS<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 9.47711%;\" rowspan=\"2\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"http:\/\/www.ests.uca.ma\/wp-content\/uploads\/2019\/07\/img_346970.png\" alt=\"\" width=\"33\" height=\"33\" \/><\/td>\n<td style=\"width: 90.5229%; text-align: left;\"><strong><span style=\"color: #003366;\">Secr\u00e9tariat de la formation :<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 90.5229%; text-align: left;\"><strong><span style=\"color: #003366;\">Responsable de la formation :\u00a0<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 9.47711%;\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"http:\/\/www.ests.uca.ma\/wp-content\/uploads\/2019\/07\/home-house-main-page-building-address-location-2-2684.png\" alt=\"\" width=\"33\" height=\"33\" \/><\/td>\n<td style=\"width: 90.5229%; text-align: left;\"><strong>ECOLE SUP\u00c9RIEURE DE TECHNOLOGIE, Route Dar Si A\u00efssa, BP 89, SAFI<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 9.47711%;\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"http:\/\/www.ests.uca.ma\/wp-content\/uploads\/2019\/07\/58485698e0bb315b0f7675a8.png\" alt=\"\" width=\"33\" height=\"33\" \/><\/td>\n<td style=\"width: 90.5229%; text-align: left;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Objectifs de la formation Cette formation vise \u00e0 doter les \u00e9tudiants des comp\u00e9tences essentielles en informatique, en couvrant des domaines cl\u00e9s. Les \u00e9tudiants apprendront \u00e0 concevoir, analyser et optimiser des algorithmes, \u00e0 ma\u00eetriser divers langages de programmation tels que C, Python et Java, et \u00e0 comprendre et \u00e0 ma\u00eetriser l&rsquo;utilisation des structures de donn\u00e9es ainsi<\/p>\n","protected":false},"author":1,"featured_media":165,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-52","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=\/wp\/v2\/pages\/52","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=52"}],"version-history":[{"count":29,"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=\/wp\/v2\/pages\/52\/revisions"}],"predecessor-version":[{"id":4809,"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=\/wp\/v2\/pages\/52\/revisions\/4809"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=\/wp\/v2\/media\/165"}],"wp:attachment":[{"href":"https:\/\/www.ests.uca.ma\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=52"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}