{"id":38351,"date":"2026-03-23T16:45:52","date_gmt":"2026-03-23T15:45:52","guid":{"rendered":"https:\/\/niryo.com\/?p=38351"},"modified":"2026-03-28T09:36:53","modified_gmt":"2026-03-28T08:36:53","slug":"enseigner-la-cybersecurite-sur-des-robots-collaboratifs","status":"publish","type":"post","link":"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/","title":{"rendered":"Pourquoi enseigner la cybers\u00e9curit\u00e9 \u00e0 l\u2019aide de syst\u00e8mes physiques tels que des robots collaboratifs ?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">La cybers\u00e9curit\u00e9 est aujourd\u2019hui un enjeu central pour les entreprises, les institutions et les infrastructures industrielles. Pourtant, son enseignement reste souvent tr\u00e8s th\u00e9orique : analyses de r\u00e9seaux abstraits, exercices sur des machines virtuelles ou \u00e9tudes de cas \u00e9loign\u00e9es du monde r\u00e9el.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Face \u00e0 ce constat, de nouvelles approches p\u00e9dagogiques \u00e9mergent. Parmi elles, <a href=\"https:\/\/niryo.com\/fr\/produit\/pack-cybersecurite-reseaux-enseignement-robotique\/\">l\u2019apprentissage de la cybers\u00e9curit\u00e9<\/a> \u00e0 travers des <\/span><b>cas d\u2019application int\u00e9grant des syst\u00e8mes physiques r\u00e9els<\/b><span style=\"font-weight: 400;\">, comme des robots collaboratifs, s\u2019impose comme une m\u00e9thode particuli\u00e8rement pertinente.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Pourquoi cette approche transforme-t-elle l\u2019apprentissage ? Quels b\u00e9n\u00e9fices concrets apporte-t-elle aux apprenants ? C\u2019est ce que nous allons explorer.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Rendre la cybers\u00e9curit\u00e9 concr\u00e8te et compr\u00e9hensible<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Dans de nombreux cursus, la cybers\u00e9curit\u00e9 est pr\u00e9sent\u00e9e \u00e0 travers des syst\u00e8mes abstraits : serveurs distants, infrastructures cloud ou machines virtuelles. Bien que ces environnements soient utiles, ils peuvent parfois rendre l\u2019apprentissage difficile pour les d\u00e9butants.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">L\u2019utilisation d\u2019un <\/span><a href=\"https:\/\/niryo.com\/fr\/produit\/bras-robotise-6-axes\/\"><b>robot r\u00e9el et programmable<\/b><\/a><span style=\"font-weight: 400;\"> change compl\u00e8tement la perspective.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Au lieu d\u2019un simple ordinateur simul\u00e9, l\u2019apprenant travaille sur un <\/span><b>syst\u00e8me physique connect\u00e9<\/b><span style=\"font-weight: 400;\"> qu\u2019il peut observer, manipuler et programmer. Le robot devient alors une porte d\u2019entr\u00e9e id\u00e9ale pour comprendre que :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">un robot est avant tout <\/span><b>un syst\u00e8me informatique connect\u00e9<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">il poss\u00e8de <\/span><b>des services r\u00e9seau actifs<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">il peut \u00eatre <\/span><b>cibl\u00e9 par des attaques informatiques<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">sa compromission peut avoir <\/span><b>des cons\u00e9quences physiques<\/b><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Cette approche permet de relier imm\u00e9diatement <\/span><b>les concepts de cybers\u00e9curit\u00e9 \u00e0 leurs impacts concrets<\/b><span style=\"font-weight: 400;\">, ce qui facilite fortement la compr\u00e9hension.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Apprendre la cybers\u00e9curit\u00e9 \u00e0 travers une approche projet<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Une autre limite fr\u00e9quente de l\u2019enseignement traditionnel est la s\u00e9paration entre th\u00e9orie et pratique. Les apprenants \u00e9tudient des concepts sans toujours savoir comment les appliquer.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">C\u2019est pourquoi certaines <a href=\"https:\/\/niryo.com\/fr\/niryoacademy\/\">solutions p\u00e9dagogiques<\/a>, comme celles propos\u00e9es par Niryo, adoptent une <\/span><b>approche par projet et par exp\u00e9rimentation<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Dans ce contexte, l\u2019apprenant ne se contente pas d\u2019\u00e9tudier la cybers\u00e9curit\u00e9 : il <\/span><b>agit directement sur un robot collaboratif r\u00e9el<\/b><span style=\"font-weight: 400;\">, comme le <a href=\"https:\/\/niryo.com\/fr\/niryo-pour-l-education\/\">robot Ned2<\/a>.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">I<\/span><span style=\"font-weight: 400;\">l peut par exemple :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">programmer des <\/span><b>mouvements et des actions robotis\u00e9es<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">cr\u00e9er des <\/span><b>scripts et des services<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">observer les <\/span><b>communications r\u00e9seau du robot<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">analyser les <\/span><b>points d\u2019exposition du syst\u00e8me<\/b><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Cette immersion permet de comprendre que la cybers\u00e9curit\u00e9 ne se limite pas \u00e0 la protection d\u2019ordinateurs : elle concerne <\/span><b>tout syst\u00e8me connect\u00e9<\/b><span style=\"font-weight: 400;\">, y compris les machines physiques.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Comprendre les risques r\u00e9els d\u2019une attaque sur un syst\u00e8me robotis\u00e9<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">L\u2019un des avantages majeurs d\u2019un robot p\u00e9dagogique est qu\u2019il permet d\u2019illustrer tr\u00e8s concr\u00e8tement les cons\u00e9quences d\u2019une attaque.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Lorsqu\u2019un apprenant s\u00e9curise un robot, il comprend rapidement que plusieurs \u00e9l\u00e9ments doivent \u00eatre prot\u00e9g\u00e9s :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">les <\/span><b>donn\u00e9es<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">les <\/span><b>services r\u00e9seau<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">les <\/span><b>scripts de contr\u00f4le<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">le <\/span><b>robot lui-m\u00eame<\/b><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Il d\u00e9couvre \u00e9galement des notions essentielles comme :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">les <\/span><b>services r\u00e9seau actifs (SSH, ports, protocoles)<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">les <\/span><b>failles potentielles d\u2019un syst\u00e8me connect\u00e9<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">les <\/span><b>vecteurs d\u2019attaque possibles<\/b><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Cette approche permet de d\u00e9velopper une <\/span><b>vision syst\u00e9mique de la cybers\u00e9curit\u00e9<\/b><span style=\"font-weight: 400;\">, o\u00f9 l\u2019on prot\u00e8ge \u00e0 la fois le logiciel, le r\u00e9seau et le mat\u00e9riel.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Une cybers\u00e9curit\u00e9 accessible m\u00eame pour les d\u00e9butants<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Contrairement \u00e0 une id\u00e9e re\u00e7ue, la cybers\u00e9curit\u00e9 n\u2019est pas r\u00e9serv\u00e9e aux experts techniques. Lorsqu\u2019elle est bien structur\u00e9e, elle peut \u00eatre enseign\u00e9e de mani\u00e8re progressive, m\u00eame \u00e0 des apprenants d\u00e9butants.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">L\u2019utilisation d\u2019un robot r\u00e9el facilite cet apprentissage en rendant les concepts plus intuitifs.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Les \u00e9tudiants apprennent progressivement \u00e0 :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>identifier les failles d\u2019un syst\u00e8me<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>d\u00e9terminer ce qui doit \u00eatre prot\u00e9g\u00e9<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">comprendre le fonctionnement des <\/span><b>services r\u00e9seau<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">mettre en place <\/span><b>des mesures de protection concr\u00e8tes<\/b><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Ils d\u00e9couvrent ainsi une <\/span><b>m\u00e9thode cyber claire et r\u00e9utilisable<\/b><span style=\"font-weight: 400;\">, applicable \u00e0 d\u2019autres environnements techniques.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>D\u00e9velopper des comp\u00e9tences professionnelles compl\u00e8tes<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Au-del\u00e0 de la technique, l\u2019apprentissage par projet permet \u00e9galement de d\u00e9velopper des comp\u00e9tences essentielles pour le monde professionnel.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Dans un sc\u00e9nario p\u00e9dagogique bas\u00e9 sur un robot r\u00e9el, l\u2019apprenant doit :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">r\u00e9aliser une <\/span><b>analyse de risques<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">mettre en \u0153uvre une <\/span><b>strat\u00e9gie de s\u00e9curisation<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">effectuer une <\/span><b>surveillance et un contr\u00f4le du syst\u00e8me<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>documenter ses choix techniques<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">expliquer sa <\/span><b>logique d\u2019attaque et de d\u00e9fense<\/b><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Cette approche favorise l\u2019autonomie, la r\u00e9flexion critique et la capacit\u00e9 \u00e0 r\u00e9soudre des probl\u00e8mes complexes.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Autrement dit, l\u2019\u00e9tudiant ne se contente pas d\u2019apprendre des outils : il d\u00e9veloppe une <\/span><b>v\u00e9ritable d\u00e9marche de cybers\u00e9curit\u00e9<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Comprendre la logique attaque \/ d\u00e9fense<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">L\u2019un des piliers de la cybers\u00e9curit\u00e9 est la compr\u00e9hension de la relation entre les attaquants et les d\u00e9fenseurs.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Un robot p\u00e9dagogique permet d\u2019illustrer parfaitement cette dynamique. L\u2019apprenant peut analyser :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">comment un syst\u00e8me peut \u00eatre <\/span><b>exploit\u00e9<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">quelles sont les <\/span><b>failles exploitables<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">quelles mesures permettent <\/span><b>d\u2019emp\u00eacher ou limiter une attaque<\/b><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Cette d\u00e9marche permet de mieux comprendre les <\/span><b>m\u00e9canismes r\u00e9els de la cybers\u00e9curit\u00e9<\/b><span style=\"font-weight: 400;\">, plut\u00f4t que de simplement m\u00e9moriser des concepts th\u00e9oriques.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Une approche align\u00e9e avec les enjeux de l\u2019industrie<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Dans l\u2019industrie moderne, les syst\u00e8mes cyber-physiques sont de plus en plus pr\u00e9sents : robots industriels, machines connect\u00e9es, infrastructures intelligentes.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">La cybers\u00e9curit\u00e9 doit donc d\u00e9sormais prot\u00e9ger <\/span><b>des environnements hybrides m\u00ealant informatique et syst\u00e8mes physiques<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Former les apprenants sur des robots collaboratifs permet de les pr\u00e9parer \u00e0 cette r\u00e9alit\u00e9.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Ils comprennent que la cybers\u00e9curit\u00e9 concerne aujourd\u2019hui :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">l\u2019IT traditionnel<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">l\u2019IoT<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">les syst\u00e8mes industriels<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">la robotique<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Cette vision correspond directement aux besoins des entreprises et aux enjeux de <\/span><b>l\u2019industrie 4.0<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Conclusion<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">L\u2019enseignement de la cybers\u00e9curit\u00e9 \u00e9volue rapidement pour s\u2019adapter aux nouveaux environnements technologiques.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">L\u2019utilisation de syst\u00e8mes physiques comme les robots collaboratifs repr\u00e9sente aujourd\u2019hui <\/span><b>une approche p\u00e9dagogique particuli\u00e8rement efficace<\/b><span style=\"font-weight: 400;\">. Elle permet de rendre la cybers\u00e9curit\u00e9 :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">plus <\/span><b>concr\u00e8te<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">plus <\/span><b>compr\u00e9hensible<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">plus <\/span><b>engageante<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">et plus <\/span><b>align\u00e9e avec les r\u00e9alit\u00e9s industrielles<\/b><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">En int\u00e9grant des robots r\u00e9els dans les parcours d\u2019apprentissage, les apprenants ne se contentent plus d\u2019\u00e9tudier la cybers\u00e9curit\u00e9 : ils <\/span><b>la pratiquent dans des situations proches du monde professionnel<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Avec notre <a href=\"https:\/\/niryo.com\/fr\/produit\/pack-cybersecurite-reseaux-enseignement-robotique\/\">Pack Cybers\u00e9curit\u00e9 &amp; R\u00e9seaux<\/a>, c\u2019est pr\u00e9cis\u00e9ment cette immersion qui permet de former les experts capables de s\u00e9curiser les syst\u00e8mes cyber-physiques de demain.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La cybers\u00e9curit\u00e9 est aujourd\u2019hui un enjeu central pour les entreprises, les institutions et les infrastructures industrielles. Pourtant, son enseignement reste souvent tr\u00e8s th\u00e9orique : analyses de r\u00e9seaux abstraits, exercices sur des machines virtuelles ou \u00e9tudes de cas \u00e9loign\u00e9es du monde r\u00e9el. Face \u00e0 ce constat, de nouvelles approches p\u00e9dagogiques \u00e9mergent. Parmi elles, l\u2019apprentissage de la [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":39762,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[81,90,202],"tags":[],"class_list":["post-38351","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apprendre-sur-la-robotique","category-ned2-2","category-robotique-educative"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pourquoi enseigner la Cybers\u00e9curit\u00e9 sur des robots collaboratifs ?<\/title>\n<meta name=\"description\" content=\"Comment l\u2019apprentissage de la cybers\u00e9curit\u00e9 sur des robots collaboratifs rend la formation plus concr\u00e8te et adapt\u00e9e aux enjeux industriels.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pourquoi enseigner la Cybers\u00e9curit\u00e9 sur des robots collaboratifs ?\" \/>\n<meta property=\"og:description\" content=\"Comment l\u2019apprentissage de la cybers\u00e9curit\u00e9 sur des robots collaboratifs rend la formation plus concr\u00e8te et adapt\u00e9e aux enjeux industriels.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/\" \/>\n<meta property=\"og:site_name\" content=\"Niryo\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-23T15:45:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-28T08:36:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/niryo.com\/wp-content\/uploads\/2026\/03\/Cybersecurite-et-systeme-physique-robots-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1514\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Malcom Radigon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Malcom Radigon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/\"},\"author\":{\"name\":\"Malcom Radigon\",\"@id\":\"https:\/\/niryo.com\/fr\/#\/schema\/person\/007002f1540e132d33bb39fd4282c0f0\"},\"headline\":\"Pourquoi enseigner la cybers\u00e9curit\u00e9 \u00e0 l\u2019aide de syst\u00e8mes physiques tels que des robots collaboratifs ?\",\"datePublished\":\"2026-03-23T15:45:52+00:00\",\"dateModified\":\"2026-03-28T08:36:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/\"},\"wordCount\":1165,\"publisher\":{\"@id\":\"https:\/\/niryo.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/niryo.com\/wp-content\/uploads\/2026\/03\/Cybersecurite-et-systeme-physique-robots-1.webp\",\"articleSection\":[\"Apprendre sur la robotique\",\"Ned2\",\"Robotique \u00e9ducative\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/\",\"url\":\"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/\",\"name\":\"Pourquoi enseigner la Cybers\u00e9curit\u00e9 sur des robots collaboratifs ?\",\"isPartOf\":{\"@id\":\"https:\/\/niryo.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/niryo.com\/wp-content\/uploads\/2026\/03\/Cybersecurite-et-systeme-physique-robots-1.webp\",\"datePublished\":\"2026-03-23T15:45:52+00:00\",\"dateModified\":\"2026-03-28T08:36:53+00:00\",\"description\":\"Comment l\u2019apprentissage de la cybers\u00e9curit\u00e9 sur des robots collaboratifs rend la formation plus concr\u00e8te et adapt\u00e9e aux enjeux industriels.\",\"breadcrumb\":{\"@id\":\"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/#primaryimage\",\"url\":\"https:\/\/niryo.com\/wp-content\/uploads\/2026\/03\/Cybersecurite-et-systeme-physique-robots-1.webp\",\"contentUrl\":\"https:\/\/niryo.com\/wp-content\/uploads\/2026\/03\/Cybersecurite-et-systeme-physique-robots-1.webp\",\"width\":2560,\"height\":1514,\"caption\":\"Illustration de la cybers\u00e9curit\u00e9 appliqu\u00e9e aux robots collaboratifs avec interaction humain-machine et protection des donn\u00e9es\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/niryo.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pourquoi enseigner la cybers\u00e9curit\u00e9 \u00e0 l\u2019aide de syst\u00e8mes physiques tels que des robots collaboratifs ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/niryo.com\/fr\/#website\",\"url\":\"https:\/\/niryo.com\/fr\/\",\"name\":\"Niryo\",\"description\":\"Empower your robotics potential - Collaborative robots\",\"publisher\":{\"@id\":\"https:\/\/niryo.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/niryo.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/niryo.com\/fr\/#organization\",\"name\":\"Niryo\",\"url\":\"https:\/\/niryo.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/niryo.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/niryo.com\/wp-content\/uploads\/2026\/02\/Favicon-Niryo.svg\",\"contentUrl\":\"https:\/\/niryo.com\/wp-content\/uploads\/2026\/02\/Favicon-Niryo.svg\",\"width\":512,\"height\":512,\"caption\":\"Niryo\"},\"image\":{\"@id\":\"https:\/\/niryo.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/10970402\/admin\/feed\/posts\/\",\"https:\/\/www.tiktok.com\/@niryo_robotics\",\"https:\/\/www.instagram.com\/niryo_robotics\/\",\"https:\/\/discord.com\/invite\/EqpPYTf9FJ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/niryo.com\/fr\/#\/schema\/person\/007002f1540e132d33bb39fd4282c0f0\",\"name\":\"Malcom Radigon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/niryo.com\/wp-content\/uploads\/2026\/02\/Malcom-96x96.webp\",\"url\":\"https:\/\/niryo.com\/wp-content\/uploads\/2026\/02\/Malcom-96x96.webp\",\"contentUrl\":\"https:\/\/niryo.com\/wp-content\/uploads\/2026\/02\/Malcom-96x96.webp\",\"caption\":\"Malcom Radigon\"},\"description\":\"Application Engineer at NIRYO since January 2024, Malcom Radigon holds a degree in electrical and mechanical engineering, with a specialization in robotics. He contributes his expertise to the Education team by analyzing user needs and developing advanced educational use cases, aiming to optimize learning, deployment, and operation of robotic solutions in educational and technical training environments.\",\"url\":\"https:\/\/niryo.com\/fr\/author\/malcom\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pourquoi enseigner la Cybers\u00e9curit\u00e9 sur des robots collaboratifs ?","description":"Comment l\u2019apprentissage de la cybers\u00e9curit\u00e9 sur des robots collaboratifs rend la formation plus concr\u00e8te et adapt\u00e9e aux enjeux industriels.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/","og_locale":"fr_FR","og_type":"article","og_title":"Pourquoi enseigner la Cybers\u00e9curit\u00e9 sur des robots collaboratifs ?","og_description":"Comment l\u2019apprentissage de la cybers\u00e9curit\u00e9 sur des robots collaboratifs rend la formation plus concr\u00e8te et adapt\u00e9e aux enjeux industriels.","og_url":"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/","og_site_name":"Niryo","article_published_time":"2026-03-23T15:45:52+00:00","article_modified_time":"2026-03-28T08:36:53+00:00","og_image":[{"width":2560,"height":1514,"url":"https:\/\/niryo.com\/wp-content\/uploads\/2026\/03\/Cybersecurite-et-systeme-physique-robots-1.webp","type":"image\/webp"}],"author":"Malcom Radigon","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Malcom Radigon","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/#article","isPartOf":{"@id":"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/"},"author":{"name":"Malcom Radigon","@id":"https:\/\/niryo.com\/fr\/#\/schema\/person\/007002f1540e132d33bb39fd4282c0f0"},"headline":"Pourquoi enseigner la cybers\u00e9curit\u00e9 \u00e0 l\u2019aide de syst\u00e8mes physiques tels que des robots collaboratifs ?","datePublished":"2026-03-23T15:45:52+00:00","dateModified":"2026-03-28T08:36:53+00:00","mainEntityOfPage":{"@id":"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/"},"wordCount":1165,"publisher":{"@id":"https:\/\/niryo.com\/fr\/#organization"},"image":{"@id":"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/#primaryimage"},"thumbnailUrl":"https:\/\/niryo.com\/wp-content\/uploads\/2026\/03\/Cybersecurite-et-systeme-physique-robots-1.webp","articleSection":["Apprendre sur la robotique","Ned2","Robotique \u00e9ducative"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/","url":"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/","name":"Pourquoi enseigner la Cybers\u00e9curit\u00e9 sur des robots collaboratifs ?","isPartOf":{"@id":"https:\/\/niryo.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/#primaryimage"},"image":{"@id":"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/#primaryimage"},"thumbnailUrl":"https:\/\/niryo.com\/wp-content\/uploads\/2026\/03\/Cybersecurite-et-systeme-physique-robots-1.webp","datePublished":"2026-03-23T15:45:52+00:00","dateModified":"2026-03-28T08:36:53+00:00","description":"Comment l\u2019apprentissage de la cybers\u00e9curit\u00e9 sur des robots collaboratifs rend la formation plus concr\u00e8te et adapt\u00e9e aux enjeux industriels.","breadcrumb":{"@id":"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/#primaryimage","url":"https:\/\/niryo.com\/wp-content\/uploads\/2026\/03\/Cybersecurite-et-systeme-physique-robots-1.webp","contentUrl":"https:\/\/niryo.com\/wp-content\/uploads\/2026\/03\/Cybersecurite-et-systeme-physique-robots-1.webp","width":2560,"height":1514,"caption":"Illustration de la cybers\u00e9curit\u00e9 appliqu\u00e9e aux robots collaboratifs avec interaction humain-machine et protection des donn\u00e9es"},{"@type":"BreadcrumbList","@id":"https:\/\/niryo.com\/fr\/enseigner-la-cybersecurite-sur-des-robots-collaboratifs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/niryo.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Pourquoi enseigner la cybers\u00e9curit\u00e9 \u00e0 l\u2019aide de syst\u00e8mes physiques tels que des robots collaboratifs ?"}]},{"@type":"WebSite","@id":"https:\/\/niryo.com\/fr\/#website","url":"https:\/\/niryo.com\/fr\/","name":"Niryo","description":"Empower your robotics potential - Collaborative robots","publisher":{"@id":"https:\/\/niryo.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/niryo.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/niryo.com\/fr\/#organization","name":"Niryo","url":"https:\/\/niryo.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/niryo.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/niryo.com\/wp-content\/uploads\/2026\/02\/Favicon-Niryo.svg","contentUrl":"https:\/\/niryo.com\/wp-content\/uploads\/2026\/02\/Favicon-Niryo.svg","width":512,"height":512,"caption":"Niryo"},"image":{"@id":"https:\/\/niryo.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/10970402\/admin\/feed\/posts\/","https:\/\/www.tiktok.com\/@niryo_robotics","https:\/\/www.instagram.com\/niryo_robotics\/","https:\/\/discord.com\/invite\/EqpPYTf9FJ"]},{"@type":"Person","@id":"https:\/\/niryo.com\/fr\/#\/schema\/person\/007002f1540e132d33bb39fd4282c0f0","name":"Malcom Radigon","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/niryo.com\/wp-content\/uploads\/2026\/02\/Malcom-96x96.webp","url":"https:\/\/niryo.com\/wp-content\/uploads\/2026\/02\/Malcom-96x96.webp","contentUrl":"https:\/\/niryo.com\/wp-content\/uploads\/2026\/02\/Malcom-96x96.webp","caption":"Malcom Radigon"},"description":"Application Engineer at NIRYO since January 2024, Malcom Radigon holds a degree in electrical and mechanical engineering, with a specialization in robotics. He contributes his expertise to the Education team by analyzing user needs and developing advanced educational use cases, aiming to optimize learning, deployment, and operation of robotic solutions in educational and technical training environments.","url":"https:\/\/niryo.com\/fr\/author\/malcom\/"}]}},"_links":{"self":[{"href":"https:\/\/niryo.com\/fr\/wp-json\/wp\/v2\/posts\/38351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/niryo.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/niryo.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/niryo.com\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/niryo.com\/fr\/wp-json\/wp\/v2\/comments?post=38351"}],"version-history":[{"count":12,"href":"https:\/\/niryo.com\/fr\/wp-json\/wp\/v2\/posts\/38351\/revisions"}],"predecessor-version":[{"id":38376,"href":"https:\/\/niryo.com\/fr\/wp-json\/wp\/v2\/posts\/38351\/revisions\/38376"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/niryo.com\/fr\/wp-json\/wp\/v2\/media\/39762"}],"wp:attachment":[{"href":"https:\/\/niryo.com\/fr\/wp-json\/wp\/v2\/media?parent=38351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/niryo.com\/fr\/wp-json\/wp\/v2\/categories?post=38351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/niryo.com\/fr\/wp-json\/wp\/v2\/tags?post=38351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}