{"id":1213,"date":"2016-01-27T08:57:00","date_gmt":"2016-01-27T08:57:00","guid":{"rendered":"https:\/\/careerplustraining.com\/?post_type=product&#038;p=482"},"modified":"2026-02-12T21:14:37","modified_gmt":"2026-02-12T21:14:37","slug":"cyber-security-3","status":"publish","type":"product","link":"https:\/\/careerplustraining.com\/?product=cyber-security-3","title":{"rendered":"Cyber Security"},"content":{"rendered":"<p>Begin your professional journey with our Cyber Security course, designed to build a strong foundation in protecting digital systems and information. Gain practical experience in threat detection, network security, and incident response to prepare for a successful career in the cybersecurity field.<\/p>\n<h3 style=\"margin-top: -10px;\">Key Highlights<\/h3>\n<ul>\n<li>20 Hours of Comprehensive Cyber Security Training<\/li>\n<li>Learn Network Protection, Threat Detection &#038; Data Security<\/li>\n<li>Work on Real-Time Case Studies &#038; Practical Exercises<\/li>\n<li>One-on-One Mentorship from Industry Experts<\/li>\n<li>Certification Upon Completion<\/li>\n<\/ul>\n<p>Our Cyber Security course equips you with the essential skills to identify cyber threats, safeguard digital assets, and implement effective security measures across systems and networks.<br \/>\nEnroll today and take your first step toward becoming a skilled Cyber Security Professional.<\/p>\n<p>[vc_custom_heading text=&#8221;Course Modules&#8221; font_container=&#8221;tag:h2|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;]<\/p>\n<p>[vc_tta_accordion collapsible_all=&#8221;true&#8221; active_section=&#8221;&#8221;]<\/p>\n<p>[vc_tta_section title=&#8221;Module 1: Introduction to Cyber Security&#8221; tab_id=&#8221;section1&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368255\">\n        Lecture: What is Cyber Security &amp; Why It Matters <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368255\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368302\">\n        Lecture: Key Concepts &amp; Terminologies <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368302\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b36837b\">\n        Practice: Identify Real-Life Cyber Risks <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b36837b\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 2: Cyber Threats &amp; Attack Methods&#8221; tab_id=&#8221;section2&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b3683e6\">\n        Lecture: Malware, Phishing, Ransomware <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b3683e6\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368442\">\n        Lecture: Social Engineering Attacks <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368442\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b3684a8\">\n        Practice: Spot &amp; Analyze Common Threats <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b3684a8\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 3: Password &amp; Authentication Security&#8221; tab_id=&#8221;section3&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368511\">\n        Lecture: Strong Passwords &amp; Best Practices <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368511\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b36857c\">\n        Lecture: Multi-Factor Authentication (MFA) <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b36857c\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b3685e7\">\n        Practice: Secure Your Accounts <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b3685e7\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 4: Safe Internet &amp; Email Practices&#8221; tab_id=&#8221;section4&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b36865d\">\n        Lecture: Identifying Suspicious Links &amp; Attachments <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b36865d\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b3686cb\">\n        Lecture: Secure Browsing &amp; HTTPS <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b3686cb\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368735\">\n        Practice: Email Safety Scenarios <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368735\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 5: Social Media &amp; Digital Footprint&#8221; tab_id=&#8221;section5&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368796\">\n        Lecture: Privacy Settings &amp; Oversharing Risks <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368796\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b36880f\">\n        Lecture: Protecting Your Digital Identity <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b36880f\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368875\">\n        Practice: Review &amp; Secure Your Accounts <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368875\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 6: Device &amp; Software Security&#8221; tab_id=&#8221;section6&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b3688d8\">\n        Lecture: Antivirus, Firewalls &amp; Updates <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b3688d8\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b36893b\">\n        Lecture: Mobile &amp; IoT Device Security <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b36893b\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b3689a4\">\n        Practice: Secure Your Devices <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b3689a4\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 7: Network Security Basics&#8221; tab_id=&#8221;section7&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368a14\">\n        Lecture: Wi-Fi Security &amp; VPNs <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368a14\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368a7c\">\n        Lecture: Public Network Risks <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368a7c\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368ae1\">\n        Practice: Secure a Home\/Office Network <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368ae1\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 8: Data Protection &amp; Backup&#8221; tab_id=&#8221;section8&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368b49\">\n        Lecture: Encryption &amp; Secure Storage <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368b49\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368bb0\">\n        Lecture: Backup Strategies &amp; Cloud Security <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368bb0\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368c18\">\n        Practice: Implement a Backup Plan <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368c18\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 9: Introduction to Ethical Hacking&#8221; tab_id=&#8221;section9&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368c7e\">\n        Lecture: Basics of Ethical Hacking <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368c7e\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368ce7\">\n        Lecture: Penetration Testing Overview <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368ce7\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368d4e\">\n        Practice: Simple Vulnerability Testing <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368d4e\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 10: Incident Response &amp; Cyber Laws&#8221; tab_id=&#8221;section10&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368db5\">\n        Lecture: Steps in Incident Response <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368db5\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368e22\">\n        Lecture: Cyber Laws &amp; Regulations <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368e22\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e394b368e90\">\n        Internal Assessment: Final Quiz &amp; Case Study <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e394b368e90\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[\/vc_tta_accordion]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Begin your professional journey with our Cyber Security course, designed to build a strong foundation in protecting digital systems and information. Gain practical experience in threat detection, network security, and incident response to prepare for a successful career in the cybersecurity field. Key Highlights 20 Hours of Comprehensive Cyber Security Training Learn Network Protection, Threat [&hellip;]<\/p>\n","protected":false},"featured_media":1804,"comment_status":"open","ping_status":"closed","template":"","meta":[],"product_cat":[93],"product_tag":[],"class_list":{"0":"post-1213","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bootcamp-courses","8":"first","9":"instock","10":"sale","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/careerplustraining.com\/index.php?rest_route=\/wp\/v2\/product\/1213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/careerplustraining.com\/index.php?rest_route=\/wp\/v2\/product"}],"about":[{"href":"https:\/\/careerplustraining.com\/index.php?rest_route=\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/careerplustraining.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/careerplustraining.com\/index.php?rest_route=\/wp\/v2\/media\/1804"}],"wp:attachment":[{"href":"https:\/\/careerplustraining.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1213"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/careerplustraining.com\/index.php?rest_route=%2Fwp%2Fv2%2Fproduct_cat&post=1213"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/careerplustraining.com\/index.php?rest_route=%2Fwp%2Fv2%2Fproduct_tag&post=1213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}