{"id":1826,"date":"2025-10-01T17:29:39","date_gmt":"2025-10-01T17:29:39","guid":{"rendered":"https:\/\/careerplustraining.com\/?post_type=product&#038;p=1826"},"modified":"2025-11-04T08:26:50","modified_gmt":"2025-11-04T08:26:50","slug":"cyber-security","status":"publish","type":"product","link":"https:\/\/careerplustraining.com\/?product=cyber-security","title":{"rendered":"Cyber Security"},"content":{"rendered":"<p>[vc_custom_heading text=&#8221;Cyber Security Course \u2013 Kickstart Your Cybersecurity Career&#8221; font_container=&#8221;tag:h2|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;]<\/p>\n<p>Secure your future in the fast-growing world of cybersecurity with our Cyber Security Course. Gain hands-on experience in protecting networks, systems, and data while learning the latest tools, techniques, and best practices used by industry professionals.<\/p>\n<h3 style=\"margin-top: -10px;\">Key Highlights<\/h3>\n<ul>\n<li>100 Hours of Advanced Cybersecurity Training<\/li>\n<li>Learn Network Security, Ethical Hacking &#038; Threat Analysis<\/li>\n<li>Work on Real-Time Projects &#038; Case Studies<\/li>\n<li>One-on-One Mentorship from Cybersecurity Experts<\/li>\n<li>Internship Certificate &#038; Placement Support<\/li>\n<\/ul>\n<p>Our Cyber Security Course equips you with practical skills to identify vulnerabilities, prevent cyber attacks, and safeguard critical information. Build a strong cybersecurity portfolio, gain confidence in real-world scenarios, and prepare for top certifications.<br \/>\nTake the first step toward becoming a skilled Cybersecurity Analyst, Ethical Hacker, or Security Engineer.<br \/>\n Enroll today and launch your cybersecurity career with CareerPlus Training.<\/p>\n<p>[vc_custom_heading text=&#8221;Cyber Security &#8211; Course Modules&#8221; font_container=&#8221;tag:h2|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;]<\/p>\n<p>[vc_tta_accordion collapsible_all=&#8221;true&#8221; active_section=&#8221;&#8221;]<\/p>\n<p>[vc_tta_section title=&#8221;Module 1: Introduction to Cybersecurity&#8221; tab_id=&#8221;cyber_section1&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb038b\">\n        Lecture: Fundamentals, importance, cybersecurity roles <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb038b\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb0422\">\n        Practice: Identify threats in sample scenarios <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb0422\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb048a\">\n        Internal Assessment: Cybersecurity Basics Quiz <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb048a\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 2: Types of Cyber Attacks&#8221; tab_id=&#8221;cyber_section2&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb04eb\">\n        Lecture: Phishing, malware, DDoS, ransomware, social engineering <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb04eb\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb0547\">\n        Practice: Map attacks to real-world examples <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb0547\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb05ab\">\n        Internal Assessment: Cyber Attacks Quiz <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb05ab\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 3: Network Security&#8221; tab_id=&#8221;cyber_section3&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb0619\">\n        Lecture: Firewalls, VPNs, intrusion detection <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb0619\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb067a\">\n        Practice: Configure a firewall rule <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb067a\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb06db\">\n        Internal Assessment: Network Security Quiz <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb06db\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 4: Cryptography Basics&#8221; tab_id=&#8221;cyber_section4&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb073d\">\n        Lecture: Encryption, hashing, digital certificates <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb073d\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb079f\">\n        Practice: Encrypt and decrypt messages <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb079f\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb07fe\">\n        Internal Assessment: Cryptography Quiz <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb07fe\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 5: Web Security&#8221; tab_id=&#8221;cyber_section5&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb0860\">\n        Lecture: Securing web apps, OWASP Top 10 <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb0860\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb08bf\">\n        Practice: Identify vulnerabilities in a sample web app <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb08bf\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb091f\">\n        Internal Assessment: Web Security Quiz <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb091f\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 6: Malware &amp; Ransomware&#8221; tab_id=&#8221;cyber_section6&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb097d\">\n        Lecture: Types, prevention, and response strategies <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb097d\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb09dc\">\n        Practice: Analyze a mock malware incident <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb09dc\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb0a3e\">\n        Internal Assessment: Malware Quiz <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb0a3e\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 7: Ethical Hacking Basics&#8221; tab_id=&#8221;cyber_section7&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb0a9e\">\n        Lecture: Pen testing methodology <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb0a9e\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb0afc\">\n        Practice: Perform a basic penetration test on a demo app <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb0afc\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb0b63\">\n        Internal Assessment: Ethical Hacking Quiz <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb0b63\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 8: Incident Response&#8221; tab_id=&#8221;cyber_section8&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb0bce\">\n        Lecture: Responding to security breaches <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb0bce\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb1c07\">\n        Practice: Build an incident response plan <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb1c07\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb1cac\">\n        Internal Assessment: Incident Response Quiz <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb1cac\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 9: Cybersecurity Tools&#8221; tab_id=&#8221;cyber_section9&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb1d18\">\n        Lecture: Wireshark, Nessus, Metasploit basics <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb1d18\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb1d81\">\n        Practice: Capture and analyze network traffic <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb1d81\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb1ddb\">\n        Internal Assessment: Cybersecurity Tools Quiz <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb1ddb\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[vc_tta_section title=&#8221;Module 10: Final Security Project&#8221; tab_id=&#8221;cyber_section10&#8243;]<br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb1e31\">\n        Lecture: Secure a network or application <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb1e31\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb1e8b\">\n        Practice: Conduct a mini security audit <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb1e8b\">\n    <\/div><br \/>\n<div class=\"lesson-title\">\n    <a href=\"javascript:;\" data-id=\"lesson_content_69e8899eb1ef1\">\n        Internal Assessment: Final Cybersecurity Project Assessment <span><i class=\"fa fa-caret-down\"><\/i><\/span>\n    <\/a>\n    <div class=\"meta\">\n        <span class=\"lesson-icon\"><i class=\"\" data-toggle=\"tooltip\" data-placement=\"top\" title=\"\"><\/i><\/span>\n        <span class=\"preview-video\" >\n                     <\/span>\n        <span class=\"estimate-time\">\n                    <\/span>\n        <span class=\"badge \">\n                        <\/span>\n    <\/div>\n\n<\/div>\n<div class=\"lesson-content\" id=\"lesson_content_69e8899eb1ef1\">\n    <\/div><br \/>\n[\/vc_tta_section]<\/p>\n<p>[\/vc_tta_accordion]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_custom_heading text=&#8221;Cyber Security Course \u2013 Kickstart Your Cybersecurity Career&#8221; font_container=&#8221;tag:h2|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;] Secure your future in the fast-growing world of cybersecurity with our Cyber Security Course. Gain hands-on experience in protecting networks, systems, and data while learning the latest tools, techniques, and best practices used by industry professionals. Key Highlights 100 Hours of Advanced Cybersecurity Training [&hellip;]<\/p>\n","protected":false},"featured_media":1841,"comment_status":"open","ping_status":"closed","template":"","meta":[],"product_cat":[95],"product_tag":[],"class_list":{"0":"post-1826","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-internship-courses","8":"first","9":"instock","10":"sale","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/careerplustraining.com\/index.php?rest_route=\/wp\/v2\/product\/1826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/careerplustraining.com\/index.php?rest_route=\/wp\/v2\/product"}],"about":[{"href":"https:\/\/careerplustraining.com\/index.php?rest_route=\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/careerplustraining.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1826"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/careerplustraining.com\/index.php?rest_route=\/wp\/v2\/media\/1841"}],"wp:attachment":[{"href":"https:\/\/careerplustraining.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1826"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/careerplustraining.com\/index.php?rest_route=%2Fwp%2Fv2%2Fproduct_cat&post=1826"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/careerplustraining.com\/index.php?rest_route=%2Fwp%2Fv2%2Fproduct_tag&post=1826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}