{"id":637,"date":"2025-06-12T21:16:22","date_gmt":"2025-06-12T19:16:22","guid":{"rendered":"https:\/\/links.cerist.dz\/?page_id=637"},"modified":"2025-06-21T22:17:27","modified_gmt":"2025-06-21T20:17:27","slug":"speakers-2","status":"publish","type":"page","link":"https:\/\/links.cerist.dz\/index.php\/speakers-2\/","title":{"rendered":"Speakers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"637\" class=\"elementor elementor-637\">\n\t\t\t\t<div class=\"elementor-element elementor-element-29a7a37 e-flex e-con-boxed e-con e-parent\" data-id=\"29a7a37\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9ff3b85 e-con-full e-flex e-con e-child\" data-id=\"9ff3b85\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79cc974 elementor-widget elementor-widget-spacer\" data-id=\"79cc974\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fce428a elementor-widget__width-inherit elementor-widget elementor-widget-shortcode\" data-id=\"fce428a\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"tmm tmm_speakers2\"><div class=\"tmm_3_columns tmm_wrap tmm_plugin_f\"><span class=\"tmm_two_containers_tablet\"><\/span><div class=\"tmm_container\"><div class=\"tmm_member\" style=\"border-top:#d90101 solid 5px;\"><div class=\"tmm_photo tmm_pic_speakers2_0\" style=\"background: url(http:\/\/links.cerist.dz\/wp-content\/uploads\/2025\/06\/Kim.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Dmitry<\/span> <span class=\"tmm_lname\">KIM<\/span><\/div><div class=\"tmm_job\"><p style=\"color:#D90101\"><b>Introducing Positive Technologies &amp; PT Network Attack Discovery: Full network visibility<\/b><\/p><\/div><div class=\"tmm_scblock\"><\/div><\/div><\/div><div class=\"tmm_member\" style=\"border-top:#d90101 solid 5px;\"><div class=\"tmm_photo tmm_pic_speakers2_1\" style=\"background: url(http:\/\/links.cerist.dz\/wp-content\/uploads\/2025\/06\/Mark-1.jpeg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Mark<\/span> <span class=\"tmm_lname\">VOLFSON<\/span><\/div><div class=\"tmm_job\"><p style=\"color:#D90101\"><b>Application security:  The strategy around secure development processes<\/b><\/p><\/div><div class=\"tmm_scblock\"><\/div><\/div><\/div><span class=\"tmm_two_containers_tablet\"><\/span><div class=\"tmm_member\" style=\"border-top:#d90101 solid 5px;\"><div class=\"tmm_photo tmm_pic_speakers2_2\" style=\"background: url(http:\/\/links.cerist.dz\/wp-content\/uploads\/2025\/06\/benkhelifa.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Imane<\/span> <span class=\"tmm_lname\">BENKHELIFA<\/span><\/div><div class=\"tmm_job\"><p style=\"color:#D90101\"><b>CERIST Innovation Hub Offer for Insurance Companies<\/b><\/p><\/div><div class=\"tmm_scblock\"><\/div><\/div><\/div><div style=\"clear:both;\"><\/div><\/div><\/div><\/div>\n\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e4262a elementor-widget elementor-widget-shortcode\" data-id=\"6e4262a\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"tmm tmm_speakers2-2\"><div class=\"tmm_3_columns tmm_wrap tmm_plugin_f\"><span class=\"tmm_two_containers_tablet\"><\/span><div class=\"tmm_container\"><div class=\"tmm_member\" style=\"border-top:#d90101 solid 5px;\"><div class=\"tmm_photo tmm_pic_speakers2-2_0\" style=\"background: url(http:\/\/links.cerist.dz\/wp-content\/uploads\/2025\/06\/idriss.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Idris <\/span> <span class=\"tmm_lname\">SI-AHMED<\/span><\/div><div class=\"tmm_job\"><p style=\"color:#D90101\"><b>Proxylan: The Trusted Partner for Your Digital Transformation Security<\/b><\/p><\/div><div class=\"tmm_scblock\"><\/div><\/div><\/div><div class=\"tmm_member\" style=\"border-top:#d90101 solid 5px;\"><div class=\"tmm_photo tmm_pic_speakers2-2_1\" style=\"background: url(http:\/\/links.cerist.dz\/wp-content\/uploads\/2025\/06\/Haddou.jpeg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Abdenour<\/span> <span class=\"tmm_lname\">HADDOU<\/span><\/div><div class=\"tmm_job\"><p style=\"color:#D90101\"><b>National Venture Building Studio: CyberSecurity for Fintech<\/b><\/p><\/div><div class=\"tmm_scblock\"><\/div><\/div><\/div><span class=\"tmm_two_containers_tablet\"><\/span><div class=\"tmm_member\" style=\"border-top:#d90101 solid 5px;\"><div class=\"tmm_photo tmm_pic_speakers2-2_2\" style=\"background: url(http:\/\/links.cerist.dz\/wp-content\/uploads\/2025\/06\/ayoub-next.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Ayoub<\/span> <span class=\"tmm_lname\">SI-AHMED<\/span><\/div><div class=\"tmm_job\"><p style=\"color:#D90101\"><b>Strengthening Cyber Defense with Modern SOC<\/b><\/p><\/div><div class=\"tmm_scblock\"><\/div><\/div><\/div><div style=\"clear:both;\"><\/div><\/div><\/div><\/div>\n\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c4fe0a7 e-flex e-con-boxed e-con e-parent\" data-id=\"c4fe0a7\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-44d82b3 e-flex e-con-boxed e-con e-parent\" data-id=\"44d82b3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a698b1b elementor-widget elementor-widget-heading\" data-id=\"a698b1b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Biographies<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ab1440 e-flex e-con-boxed e-con e-parent\" data-id=\"7ab1440\" data-element_type=\"container\" id=\"biographykim\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d10e1ba elementor-widget elementor-widget-heading\" data-id=\"d10e1ba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dmitry KIM<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5ec661 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"b5ec661\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div dir=\"ltr\" style=\"text-align: justify;\"><span style=\"color: #000000;\">Dmitry in his current role of director for network security has deep expertise in ethical hacking, anti-crisis cybersecurity, and nation-scale cyber defence. Dmitry brings unique insight into how to protect entire industries and ministries before and after cyberattacks. <\/span><span style=\"color: #000000;\">At Positive Technologies, he leads key platform initiatives on how to build ultimate network security and has successfully delivered projects for multiple ministries and mission critical objects.<\/span><\/div><div id=\"m_4609125154625692979AppleMailSignature\" dir=\"ltr\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><img decoding=\"async\" class=\"an1\" src=\"https:\/\/fonts.gstatic.com\/s\/e\/notoemoji\/16.0\/1f6e1_fe0f\/32.png\" alt=\"\" width=\"17\" height=\"17\" data-emoji=\"\" aria-label=\"\" \/>\u00a0 <strong>Superpowers\u00a0<\/strong><\/span><\/div><div id=\"m_4609125154625692979AppleMailSignature\" dir=\"ltr\" style=\"text-align: justify;\"><span style=\"color: #000000;\">\u00a0\u2022 Ethical hacking platform leadership<\/span><\/div><div id=\"m_4609125154625692979AppleMailSignature\" dir=\"ltr\" style=\"text-align: justify;\"><span style=\"color: #000000;\">\u00a0\u2022 Cybersecurity strategy Before and After attacks<\/span><\/div><div id=\"m_4609125154625692979AppleMailSignature\" dir=\"ltr\" style=\"text-align: justify;\"><span style=\"color: #000000;\">\u00a0\u2022 Crisis management in real-time<\/span><\/div><div id=\"m_4609125154625692979AppleMailSignature\" dir=\"ltr\" style=\"text-align: justify;\"><span style=\"color: #000000;\">\u00a0\u2022 National-scale project execution\u00a0<\/span><\/div><div id=\"m_4609125154625692979AppleMailSignature\" dir=\"ltr\" style=\"text-align: justify;\"><span style=\"color: #000000;\">Dmitry\u2019s talk will provide rare, real-world insight into managing cyber crises, protecting critical infrastructure, and leading secure digital transformation at scale.<\/span><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1476ffe e-flex e-con-boxed e-con e-parent\" data-id=\"1476ffe\" data-element_type=\"container\" id=\"biographymark\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac4618b elementor-widget elementor-widget-heading\" data-id=\"ac4618b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mark VOLFSON<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c07556b elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"c07556b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div dir=\"ltr\" style=\"text-align: justify;\"><span style=\"color: #000000;\">Mark comes with 8 years of Cyber Security experience of which 5 years in DevSecOps in various large and boutique consulting companies in North America. During the past 3 years he has build complex DevSecOps programs for organizations in the financial and telecom industries. <\/span><\/div><div dir=\"ltr\" style=\"text-align: justify;\"><span style=\"color: #000000;\">During this current role at Positive Technologies, he is focused on building out our Application Security business on global markets. In particular to our partners business, he is committed in building long-lasting and scalable relationships with the focus on DevSecOps expertise.<\/span><\/div><div id=\"m_-6569841294038234753AppleMailSignature\" dir=\"ltr\" style=\"text-align: justify;\"><strong><span style=\"color: #000000;\">Education<\/span><\/strong><\/div><div id=\"m_-6569841294038234753AppleMailSignature\" dir=\"ltr\" style=\"text-align: justify;\"><span style=\"color: #000000;\">\u2022 Ryerson University (Toronto, Canada)<\/span><\/div><div id=\"m_-6569841294038234753AppleMailSignature\" dir=\"ltr\" style=\"text-align: justify;\"><span style=\"color: #000000;\">\u2022 BSc (Hons) Computer Science; Minor: Finance<\/span><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc32a5b e-flex e-con-boxed e-con e-parent\" data-id=\"dc32a5b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-96932d7 elementor-widget elementor-widget-heading\" data-id=\"96932d7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Imane BENKHELIFA<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c67b92c elementor-widget elementor-widget-text-editor\" data-id=\"c67b92c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"gs\"><div class=\"\"><div id=\":1kd\" class=\"ii gt\"><div id=\":1kc\" class=\"a3s aiL \"><div><div><p style=\"text-align: justify;\"><span style=\"color: #000000;\">Dr. Imane Benkhelifa is a dynamic entrepreneur and leading cybersecurity expert, recognized for her ability to transform high-impact research into deep tech startups with real-world applications. As the founder of Proxylan SPA, she has been at the forefront of digital security innovation, supporting both public organizations in navigating complex cybersecurity landscape. <\/span><span style=\"color: #000000;\">Driven by a passion for solving pressing societal challenges through technology, she has successfully led the development of multiple IoT-based smart city solutions, spanning urban mobility, intelligent recommended systems,\u00a0 smart building, healthcare innovations, and UAV-based platforms. Her work bridges the gap between research excellence and entrepreneurial execution, consistently delivering ventures that blend cutting-edge tech with sustainable, scalable models. <\/span><span style=\"color: #000000; font-size: 16px;\">As the founder and manager of CERIST Innovation Hub, an incubator\/accelerator dedicated to emerging technologies, she aims to build a robust pipeline of deep tech ventures. With startegic partenerships with key stakeholders, the incubator is promising to become a national reference point, consistently identifying, supporting, and preparing high-potential startups for market launch and investment-readiness. Her strategic vision and execution help researchers and innovators to fast-track their projects from concept to commercialization. <\/span><span style=\"color: #000000;\">She is also a catalyst for national and international collaboration, having initiated and led strategic partnerships between research teams and key industry players. These partnerships have resulted in joint workshops, co-development projects, and innovation-driven alliances aimed at accelerating tech adoption in critical sectors.\u00a0<\/span><\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9c63e1f e-flex e-con-boxed e-con e-parent\" data-id=\"9c63e1f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c1bed2 elementor-widget elementor-widget-heading\" data-id=\"0c1bed2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Idris SI-AHMED<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3942c6b elementor-widget elementor-widget-text-editor\" data-id=\"3942c6b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Idris is the General Manager of PROXYLAN, a subsidiary of CERIST, and a public company specializing in digital services and cybersecurity. He has over seven years of experience in managing cybersecurity projects, conducting IT security audits, and coordinating technical teams. <\/span><span style=\"color: #000000;\">In his managerial role, he is responsible for developing and monitoring strategic execution plans aligned with the company\u2019s overall objectives. His missions include risk analysis and management, as well as the operational steering of cybersecurity activities. He also plays an active role in the implementation of innovative solutions aimed at strengthening information system security and promoting Algerian digital sovereignty. <\/span><span style=\"color: #000000;\">A cybersecurity trainer and author of a recognized vulnerability (CVE-2020-13150), he is deeply committed to fostering a culture of digital security within Algerian institutions.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ac27bae e-flex e-con-boxed e-con e-parent\" data-id=\"ac27bae\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dd3c7f elementor-widget elementor-widget-heading\" data-id=\"9dd3c7f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abdenour HADDOU<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d50d63d elementor-widget elementor-widget-text-editor\" data-id=\"d50d63d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p style=\"text-align: justify;\"><span style=\"color: #000000;\">An Algerian entrepreneur with a focus on advanced technology, known for his global perspective and strategic approach. He has a strong academic background, holding a Ph.D. in economics with a specialization in international trade, as well as degrees in engineering and international law. Deeply interested in the practical applications of artificial intelligence, he works to explore innovative solutions for complex global challenges. <\/span><span style=\"color: #000000;\">His academic journey has taken him through institutions in Russia and Canada, and he completed his Ph.D. at a university in South Korea, demonstrating a commitment to multidisciplinary and international learning. <\/span><span style=\"color: #000000;\">As a co-founder of the DeepMinds Venture Building Studio, he has contributed to developing a platform dedicated to fostering startups and technological solutions. Currently, as Chief Technology Officer, he applies his expertise in technology, economics, and law to support initiatives that bring emerging technologies closer to practical use. His efforts reflect a thoughtful integration of leadership, technical knowledge, and a dedication to contributing to the evolving technological landscape.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3ed5258 e-flex e-con-boxed e-con e-parent\" data-id=\"3ed5258\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f03f529 elementor-widget elementor-widget-heading\" data-id=\"f03f529\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ayoub SI-AHMED<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c7788e elementor-widget elementor-widget-text-editor\" data-id=\"3c7788e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p style=\"text-align: justify;\"><span style=\"color: #000000;\">is a cybersecurity expert specializing in intelligent systems and information technologies applied to the medical field. He holds a Master\u2019s degree in Information Systems Security, awarded in July 2019 from Saad Dahleb University of Blida, where he graduated top of his class with a thesis focused on log analysis. <\/span><span style=\"color: #000000;\">Currently pursuing a PhD at the University of Blida, his research centers on securing Internet of Medical Things (IoMT) systems, with a particular emphasis on applying Machine Learning and Deep Learning techniques to enhance threat detection. <\/span><span style=\"color: #000000;\">In March 2023, his work was published in the journal\u00a0<em>Applied Soft Computing<\/em>, presenting a scientific article on intrusion detection systems (IDS) tailored for the IoMT environment. <\/span><span style=\"color: #000000;\">Since 2019, Ayoub has served as an IT security consultant and team coordinator at PROXYLAN, a subsidiary of CERIST. In this role, he has conducted numerous security audits on information systems, covering both infrastructure and web applications. He has also developed scanning tools and delivered extensive training on application security and the protection of sensitive data.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5663a73 e-flex e-con-boxed e-con e-parent\" data-id=\"5663a73\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Biographies Dmitry KIM Dmitry in his current role of director for network security has deep expertise in ethical hacking, anti-crisis [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-637","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/links.cerist.dz\/index.php\/wp-json\/wp\/v2\/pages\/637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/links.cerist.dz\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/links.cerist.dz\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/links.cerist.dz\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/links.cerist.dz\/index.php\/wp-json\/wp\/v2\/comments?post=637"}],"version-history":[{"count":76,"href":"https:\/\/links.cerist.dz\/index.php\/wp-json\/wp\/v2\/pages\/637\/revisions"}],"predecessor-version":[{"id":1506,"href":"https:\/\/links.cerist.dz\/index.php\/wp-json\/wp\/v2\/pages\/637\/revisions\/1506"}],"wp:attachment":[{"href":"https:\/\/links.cerist.dz\/index.php\/wp-json\/wp\/v2\/media?parent=637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}