{"id":27461,"date":"2019-08-06T10:33:01","date_gmt":"2019-08-06T00:33:01","guid":{"rendered":"https:\/\/www.institutedata.com\/courses\/cyber-security-program\/"},"modified":"2026-04-07T21:21:34","modified_gmt":"2026-04-07T10:21:34","slug":"cyber-security-program","status":"publish","type":"portfolio","link":"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/","title":{"rendered":"Cyber Security Program"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row css=&#8221;.vc_custom_1648796564794{margin-top: -30px !important;margin-bottom: 30px !important;}&#8221;][vc_column][vc_column_text]\n<h4><span style=\"color: #0020ff;\">[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1571968629318{padding-bottom: 3vh !important;}&#8221;]\t<div id=\"thb-slidetype-6a03a6b149b94\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h1><span class=\"thb-slidetype-entry\"><span class=\"lines\">Cybersecurity Course<\/span><\/span><\/h1>\n\t\t\t<\/div>\n\n\t[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;Share This Course&#8221; font_container=&#8221;tag:h6|text_align:right|color:%230020ff&#8221; use_theme_fonts=&#8221;yes&#8221;]\t<div class=\"thb-share-icons thb-right style1\">\n\t\t\t\t<ul>\n\t\t\t\t\t\t<li><a href=\"http:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fwww.institutedata.com%2Fus%2Fcourses%2Fcyber-security-program%2F\" class=\"social boxed-icon facebook\"><i class=\"fa fa-facebook\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t<li><a href=\"https:\/\/twitter.com\/intent\/tweet?text=Cyber%20Security%20Program&url=https%3A%2F%2Fwww.institutedata.com%2Fus%2Fcourses%2Fcyber-security-program%2F&via=Institute%20of%20Data\" class=\"social boxed-icon twitter\"><i class=\"fa fa-twitter\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"https:\/\/www.linkedin.com\/cws\/share?url=https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\" class=\"social boxed-icon linkedin\"><i class=\"fa fa-linkedin\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t<li><a href=\"https:\/\/wa.me\/?text=Cyber%20Security%20Program%20https%3A%2F%2Fwww.institutedata.com%2Fus%2Fcourses%2Fcyber-security-program%2F\" class=\"social boxed-icon whatsapp\" data-href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\" data-action=\"share\/whatsapp\/share\"><i class=\"fa fa-whatsapp\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"fb-messenger:\/\/share\/?link=https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/&app_id=\" class=\"social boxed-icon facebook-messenger\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"14\" height=\"14\" viewBox=\"96 93 322 324\"><path d=\"M257 93c-88.918 0-161 67.157-161 150 0 47.205 23.412 89.311 60 116.807V417l54.819-30.273C225.449 390.801 240.948 393 257 393c88.918 0 161-67.157 161-150S345.918 93 257 93zm16 202l-41-44-80 44 88-94 42 44 79-44-88 94z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t[\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;align-justify&#8221;][vc_column width=&#8221;2\/3&#8243;]\t<div id=\"thb-image-6a03a6b149ea0\" class=\"caption-style1 animation bottom-to-top alignleft full  thb_image_link wp-caption \">\n\t\t\t<a class=\"\" href=\"https:\/\/www.institutedata.com\/us\/consultation\/\" target=\"_self\" title=\"\" data-thb-group=\"\">\n\t\t\t<div class=\"thb-image-inner size_100\">\n\t\t\t<img decoding=\"async\" class=\"thb_image  large-shadow  \" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/12\/Cyber-Security-Program.jpg\" width=\"800\" height=\"500\" alt=\"Cyber Security Program\" title=\"Cyber Security Program\" loading=\"lazy\" \/>\t\t\t\t\t<\/div>\n\t\t\t<\/a>\n\t\t\t\t\t\t<style>\n\t\t\t\t#thb-image-6a03a6b149ea0,\n\t\t\t\t#thb-image-6a03a6b149ea0 img {\n\t\t\t\t\tborder-radius: 0px;\n\t\t\t\t}\n\t\t<\/style>\n\t\t<\/div>\n\t[vc_empty_space height=&#8221;40px&#8221;][vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]The Cybersecurity course is designed for IT and non-IT professionals who are interested in transitioning to a career in cybersecurity. The program includes practical training, industry certification and job placement support to help professionals secure a job in the cybersecurity industry.[\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1746443188590{margin-top: 55px !important;margin-bottom: 55px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 10px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-style: solid !important;border-right-style: solid !important;border-top-style: solid !important;border-bottom-style: solid !important;border-color: #002395 !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a03a6b14a0d6\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h2><span class=\"thb-slidetype-entry\"><span class=\"lines\">Overview<\/span><\/span><\/h2>\n\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a03a6b14a0d6 .thb-slidetype-entry {\n\t\t\t\tcolor: #002395;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221;]The Cybersecurity course is delivered in a 24-week part-time or 12-week full-time format and is designed for career-driven professionals to transition into the cybersecurity industry.<\/p>\n<p>&nbsp;<\/p>\n<p>Our program includes pre-work, intensive practical training, industry certification and a job outcomes program in collaboration with university partners. The course content has been tailored to give you the skills that are demanded by businesses in today\u2019s rapidly evolving job market.<\/p>\n<p>&nbsp;<\/p>\n<p>If you&#8217;re concerned about balancing work and family commitments while advancing your career, finding an accessible cybersecurity course online could be your priority.<\/p>\n<p>&nbsp;<\/p>\n<p>Real time remote learning is available for this program. The remote format enabled by video conferencing technology is a rich and connected experience featuring virtual break-out rooms, shared screens, digital whiteboards, peer-to-peer collaboration and instructor support.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1573518951818{margin-right: -35px !important;margin-left: -35px !important;}&#8221; el_id=&#8221;outline&#8221;][vc_column_inner css=&#8221;.vc_custom_1573085319162{margin-top: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 15px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:%23000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;2px&#8221;][vc_column_text css=&#8221;.vc_custom_1573522055029{margin-top: -25px !important;}&#8221;]<div class='_form_20'><\/div><script type='text\/javascript' src='https:\/\/blackcatdata.activehosted.com\/f\/embed.php?static=0&id=20&6A03A6B14A157&nostyles=1&preview=0'><\/script>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;20px&#8221; height=&#8221;&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1571981852249{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1573087132920{margin-top: 5px !important;margin-bottom: 30px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 5px !important;padding-right: 30px !important;padding-bottom: 10px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Ready to Enrol?&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]<span style=\"font-size: 12pt;\">Click to view upcoming course dates and enrol in this course.<\/span>[\/vc_column_text]\t<a id=\"thb-button-6a03a6b14a1d0\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"\/enrol\/cyber-security-part-time-program\/\" target=\"_self\" role=\"button\">\n\t\t<span>View Part Time Dates &amp; Enrol<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space mobile_height=&#8221;10px&#8221; height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a03a6b14a26a\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"\/enrol\/cyber-security-full-time-program\/\" target=\"_self\" role=\"button\">\n\t\t<span>View Full Time Dates &amp; Enrol<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;50px&#8221; height=&#8221;&#8221;]\t<div id=\"thb-slidetype-6a03a6b14a2cd\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h2><span class=\"thb-slidetype-entry\"><span class=\"lines\">Practical Cybersecurity Training at the Institute<\/span><\/span><\/h2>\n\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]Learn in-demand skills to protect and secure businesses and government with education from the best cyber industry trainers.<\/p>\n<p>&nbsp;<\/p>\n<p>The Cybersecurity Program is a structured training program designed to help you develop the practical skills you will need, allowing you to progress into roles such as a Cybersecurity Analyst, Penetration Tester or SOC (Security Operations Consultant). After completing your Cyber Security Program, you will receive the recognition as a Certified Cyber Security Professional (CCSP)\u2122\ufe0f from the Institute of Data\u00ae.<\/p>\n<p>&nbsp;<\/p>\n<p>Hundreds of professionals choose the Institute of Data every year to prepare them for their future careers after careful consideration of their desired career progression and to attain maximum return on investment for their education. Leading the future of the profession, the Institute of Data offers a collaborative and successful program driven to ensure you have the best start to your career.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;]\t<div id=\"thb-slidetype-6a03a6b14a2f9\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h2><span class=\"thb-slidetype-entry\"><span class=\"lines\">What is Practical Cybersecurity Training?<\/span><\/span><\/h2>\n\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]Practical cybersecurity training is an essential requirement to practice as a cybersecurity professional.<\/p>\n<p>&nbsp;<\/p>\n<p>Through intensive and dedicated cybersecurity training programs, such as the one we offer at the Institute of Data, you will learn from industry experts on how to defend from cyber-attacks and develop business solutions for businesses and government organizations, including consulting techniques and simulating commercial projects. This means you will be ready to work as a cybersecurity professional.[\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1746443249801{margin-top: 55px !important;margin-bottom: 5vh !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 25px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-style: solid !important;border-right-style: solid !important;border-top-style: solid !important;border-bottom-style: solid !important;border-color: #71A9F7 !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a03a6b14a320\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h2><span class=\"thb-slidetype-entry\"><span class=\"lines\">Why The<\/span><\/span><span class=\"thb-slidetype-entry\"><span class=\"lines\">Institute Of Data?<\/span><\/span><\/h2>\n\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a03a6b14a320 .thb-slidetype-entry {\n\t\t\t\tcolor: #71A9F7;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t\t<div id=\"thb-slidetype-6a03a6b14a354\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h4><span class=\"thb-slidetype-entry\"><span class=\"lines\">Students Will:<\/span><\/span><\/h4>\n\t\t\t<\/div>\n\n\t[vc_empty_space mobile_height=&#8221;30px&#8221; height=&#8221;30px&#8221;]\t<div id=\"thb-iconbox-6a03a6b14a397\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Be ready to practice cyber security<\/h5>\t\t\t<p>The Institute of Data\u2019s courses are designed to prepare students for real commercial work in the area of cyber security. It is focused on practical in-class training, labs and real-life projects.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a397.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a397.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a03a6b14a397.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a03a6b14a397.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a03a6b14a397.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a397.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a03a6b14a397.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a397.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a03a6b14a397.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a03a6b14a397.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a03a6b14a397.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a03a6b14a397.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a03a6b14a397.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a03a6b14a45c\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Receive the best training and the latest curriculum<\/h5>\t\t\t<p>The Institute of Data trainers are actively working in the industry and will teach students how to practice cyber security in the real world. The curriculum is developed by the Institute of Data Academic Board with decades of experience working in cyber security.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a45c.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a45c.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a03a6b14a45c.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a03a6b14a45c.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a03a6b14a45c.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a45c.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a03a6b14a45c.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a45c.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a03a6b14a45c.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a03a6b14a45c.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a03a6b14a45c.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a03a6b14a45c.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a03a6b14a45c.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a03a6b14a4f2\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Be more attractive to employers<\/h5>\t\t\t<p>The Institute of Data\u2019s Cyber Security Program results in the Certified Cyber Security Professional (CCSP)\u2122\ufe0f Industry Certification which signals to employers that you are ready to join the industry. Your resume and profile will be reviewed by your Job Outcomes team to give you the best possible chance of success.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a4f2.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a4f2.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a03a6b14a4f2.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a03a6b14a4f2.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a03a6b14a4f2.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a4f2.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a03a6b14a4f2.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a4f2.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a03a6b14a4f2.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a03a6b14a4f2.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a03a6b14a4f2.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a03a6b14a4f2.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a03a6b14a4f2.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a03a6b14a588\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Get more support and guidance<\/h5>\t\t\t<p>The member network offers support and guidance from mentors and direct connections to the industry.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a588.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a588.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a03a6b14a588.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a03a6b14a588.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a03a6b14a588.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a588.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a03a6b14a588.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a588.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a03a6b14a588.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a03a6b14a588.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a03a6b14a588.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a03a6b14a588.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a03a6b14a588.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a03a6b14a615\" class=\"thb-iconbox top type3  has-img  text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t\t\t\t\t<div class=\"iconbox-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"505\" height=\"505\" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2019\/04\/iod_seal_tp_black_c.svg\" class=\"thb_image  attachment-full\" alt=\"\" title=\"iod_seal_tp_black_c\" \/>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Meet great people and become a member of the Institute<\/h5>\t\t\t<p>Beyond a healthy discipline of practical education and learning, students meet great friends in your virtual or real classroom and become a member of the Institute of Data. Many students continue to keep in touch with their fellow students and the community becomes a strong network as students enter the industry.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a615.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a615.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a03a6b14a615.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a03a6b14a615.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a03a6b14a615.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a615.thb-iconbox .iconbox-image img {\n\t\t\t\t\twidth: 84px;\n\t\t\t\t\theight: auto;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a615.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a03a6b14a615.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14a615.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a03a6b14a615.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a03a6b14a615.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a03a6b14a615.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a03a6b14a615.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a03a6b14a615.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-testimonials-6a03a6b14ab55\" class=\"thb-testimonials thb-testimonial-style2 thb-carousel style2   \" data-columns=\"1\" data-pagination=\"\" data-navigation=\"false\"\n\t\t\t\t\t\t data-autoplay=\"\" data-autoplay-speed=\"4000\" data-fade=\"true\" data-adaptive=\"false\">\n\t\t\t<div class=\"small-12  columns\">\n\t\t\t\t\t\t\t<div class=\"thb-testimonial has-avatar\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<blockquote><p>\u201cI gained an idea of what companies need and how we need to use our skills. This made it pretty easy for me to get my first job.\u201d<\/p>\n<\/blockquote>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"author_image \" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2019\/04\/katya-140x140.jpg\" width=\"140\" height=\"140\" alt=\"katya\" title=\"katya\" loading=\"lazy\" \/>\t\t\t\t\t\t\t<div class=\"testimonial-author\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<cite>Katya<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"title\">Institute of Data Certified Professional<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t<\/div>\n\t[\/vc_column][vc_column fixed=&#8221;thb-fixed&#8221; width=&#8221;1\/3&#8243;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796352796{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571981187779{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: -25px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:%23000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;2px&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJfZm9ybV84MCUyMiUzRSUzQyUyRmRpdiUzRSUzQ3NjcmlwdCUyMHNyYyUzRCUyMmh0dHBzJTNBJTJGJTJGYmxhY2tjYXRkYXRhLmFjdGl2ZWhvc3RlZC5jb20lMkZmJTJGZW1iZWQucGhwJTNGaWQlM0Q4MCUyMiUyMHR5cGUlM0QlMjJ0ZXh0JTJGamF2YXNjcmlwdCUyMiUyMGNoYXJzZXQlM0QlMjJ1dGYtOCUyMiUzRSUzQyUyRnNjcmlwdCUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796317949{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571967184695{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 25px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Ready to Enroll?&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Click to view upcoming part time cyber security program course dates.[\/vc_column_text]\t<a id=\"thb-button-6a03a6b14ae52\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"https:\/\/www.institutedata.com\/us\/enroll\/cyber-security-part-time-program\/\" target=\"_blank\" role=\"button\">\n\t\t<span>View Part Time Dates &amp; Enroll<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a03a6b14aed6\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"https:\/\/www.institutedata.com\/us\/enroll\/cyber-security-full-time-program\/\" target=\"_blank\" role=\"button\">\n\t\t<span>View Full Time Dates &amp; Enroll<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a03a6b14af44\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"https:\/\/www.institutedata.com\/us\/enroll\/cyber-security-part-time-program-upfront\/\" target=\"_blank\" role=\"button\">\n\t\t<span>Part Time (Upfront Payment - Save $3,750)<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a03a6b14afa3\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"https:\/\/www.institutedata.com\/us\/enroll\/cyber-security-full-time-program-upfront\/\" target=\"_blank\" role=\"button\">\n\t\t<span>Full Time (Upfront Payment - Save $3,750)<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1746443324775{margin-top: 8vh !important;margin-bottom: 10vh !important;border-top-width: 2px !important;border-bottom-width: 2px !important;padding-top: 9vh !important;padding-bottom: 8vh !important;background-color: #f7f7f7 !important;border-top-style: solid !important;border-bottom-style: solid !important;border-color: #F15946 !important;}&#8221;][vc_column animation=&#8221;animation bottom-to-top&#8221;][vc_row_inner css=&#8221;.vc_custom_1571968515353{padding-bottom: 50px !important;}&#8221;][vc_column_inner]\t<div id=\"thb-slidetype-6a03a6b14affe\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h2><span class=\"thb-slidetype-entry\"><span class=\"lines\">Program Structure<\/span><\/span><\/h2>\n\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a03a6b14affe .thb-slidetype-entry {\n\t\t\t\tcolor: #F15946;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243; animation=&#8221;animation bottom-to-top&#8221; css=&#8221;.vc_custom_1571199244193{padding-right: 20% !important;}&#8221;]\t<div id=\"thb-iconbox-6a03a6b14b03e\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path d=\"m1 1h46v62h-46z\"\/><path d=\"m9 63v-61\"\/><path d=\"m14 15h28\"\/><path d=\"m14 21h28\"\/><path d=\"m63 3v50l-4 8-4-8v-50z\"\/><path d=\"m55 7h-4v10\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Pre-Work<\/h5>\t\t\t<p>Students complete curated pre-work as an interactive online learning experience designed to prepare every student with the required skills and knowledge to complete all coursework and training.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b03e.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b03e.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a03a6b14b03e.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a03a6b14b03e.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a03a6b14b03e.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #F15946;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b03e.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a03a6b14b03e.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b03e.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a03a6b14b03e.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a03a6b14b03e.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a03a6b14b03e.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a03a6b14b03e.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a03a6b14b03e.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner thb_color=&#8221;thb-light-column&#8221; width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1556240953838{padding-right: 20% !important;}&#8221;]\t<div id=\"thb-iconbox-6a03a6b14b0f6\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m23 36l7 7 13-13\"\/><path d=\"m46 10h-28\"\/><path d=\"m12 10h-11v48h62v-48h-11\"\/><path d=\"m12 6h6v8h-6z\"\/><path d=\"m46 6h6v8h-6z\"\/><path d=\"m1 18h62\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Remote and In Class Training<\/h5>\t\t\t<p>Students undertake a professional in-classroom course from a team of expert industry trainers from leading consultancies and enterprises to acquire the most sought-after practical training in the country.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b0f6.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b0f6.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a03a6b14b0f6.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a03a6b14b0f6.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a03a6b14b0f6.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #F15946;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b0f6.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a03a6b14b0f6.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b0f6.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a03a6b14b0f6.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a03a6b14b0f6.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a03a6b14b0f6.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a03a6b14b0f6.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a03a6b14b0f6.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner thb_color=&#8221;thb-light-column&#8221; width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1571199248343{padding-right: 20% !important;}&#8221;]\t<div id=\"thb-iconbox-6a03a6b14b1bf\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path d=\"m5 41l6-40h42l6 40\"\/><path d=\"M21,41c0,6.075,4.925,11,11,11s11-4.925,11-11h16v22\n\tH5V41H21z\"\/><circle cx=\"29\" cy=\"21\" r=\"6\"\/><path d=\"m33 25l8 8\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Job Outcomes<\/h5>\t\t\t<p>Students will undergo a Job Outcomes Program through the Institute of Data which will help position students for the best chance of a new job opportunity and\/or internal promotion. Land a job in one of the most sought after fields in tech with the guidance of Professional Career Coaches.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b1bf.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b1bf.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a03a6b14b1bf.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a03a6b14b1bf.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a03a6b14b1bf.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #F15946;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b1bf.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a03a6b14b1bf.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b1bf.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a03a6b14b1bf.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a03a6b14b1bf.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a03a6b14b1bf.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a03a6b14b1bf.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a03a6b14b1bf.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1571204006887{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#dddddd&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;]\t<div id=\"thb-iconbox-6a03a6b14b264\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>How Will Students Be Assessed?<\/h5>\t\t\t<p>The Institute of Data \u2013 Cyber Security Program is assessed through completion of labs and a final capstone project. There is no formal exam. The capstone project is a real-life project and is assessed against the Institute of Data Certification Standards set by the Academic Board and Examination Board.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b264.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b264.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a03a6b14b264.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a03a6b14b264.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a03a6b14b264.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b264.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a03a6b14b264.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b264.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a03a6b14b264.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a03a6b14b264.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a03a6b14b264.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a03a6b14b264.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a03a6b14b264.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1571705355222{padding-top: 25px !important;padding-bottom: 30px !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#dddddd&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;]\t<div id=\"thb-iconbox-6a03a6b14b2e8\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Post Course<\/h5>\t\t\t<p>We'll help you transition into the big data and cyber security industry. We have a 93% job outcome success rate within 180 days of graduation for active job seekers.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b2e8.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b2e8.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a03a6b14b2e8.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a03a6b14b2e8.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a03a6b14b2e8.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b2e8.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a03a6b14b2e8.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b2e8.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a03a6b14b2e8.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a03a6b14b2e8.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a03a6b14b2e8.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a03a6b14b2e8.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a03a6b14b2e8.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner el_class=&#8221;text-right&#8221; width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-xs&#8221;]\t<div class=\"thb-counter counter-style1 thb-side left\" id=\"thb-counter-6a03a6b14b358\" data-separator=\"\" data-format=\"(,ddd).dd\">\n\t\t\t\t\t<div class=\"counter-container\">\n\t\t\t\t\t\t\t\t<div class=\"h1\" data-count=\"1000\" data-speed=\"4000\">0<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"h1 counter-text counter\">+<\/div>\t\t\t<\/div>\n\t\t\t<h6>Employers have hired our certified professionals<\/h6>\n\t\t\t\t\t\t\t\t\t\t<style>\n\t\t\t#thb-counter-6a03a6b14b358 .odometer.odometer-auto-theme.odometer-animating-up .odometer-ribbon-inner,\n\t\t\t#thb-counter-6a03a6b14b358 .odometer.odometer-theme-minimal.odometer-animating-up .odometer-ribbon-inner {\n\t\t\t\ttransition: transform 4s;\n\t\t\t}\n\t\t\t\t\t\t\t#thb-counter-6a03a6b14b358.thb-counter .h1,\n\t\t\t\t#thb-counter-6a03a6b14b358.thb-counter .counter {\n\t\t\t\t\tcolor: #F15946;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-counter-6a03a6b14b358.thb-counter h6,\n\t\t\t\t#thb-counter-6a03a6b14b358.thb-counter .thb-title {\n\t\t\t\t\tcolor: #F15946;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-counter-6a03a6b14b358.thb-counter figure svg path,\n\t\t\t\t#thb-counter-6a03a6b14b358.thb-counter figure svg circle,\n\t\t\t\t#thb-counter-6a03a6b14b358.thb-counter figure svg rect,\n\t\t\t\t#thb-counter-6a03a6b14b358.thb-counter figure svg ellipse {\n\t\t\t\t\tstroke: #F15946;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row content_placement=&#8221;top&#8221; el_class=&#8221;align-justify&#8221; css=&#8221;.vc_custom_1621556855638{margin-top: 6vh !important;margin-bottom: 8vh !important;}&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_row_inner css=&#8221;.vc_custom_1572411820192{margin-bottom: 55px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 20px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #000000 !important;border-left-style: solid !important;border-right-color: #000000 !important;border-right-style: solid !important;border-top-color: #000000 !important;border-top-style: solid !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a03a6b14b38a\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h2><span class=\"thb-slidetype-entry\"><span class=\"lines\">Syllabus Breakdown<\/span><\/span><\/h2>\n\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a03a6b14b38a .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t\t<div id=\"thb-accordion-6a03a6b14b3b0\" class=\"thb-accordion style1 has-accordion\" data-scroll=\"\" data-index=\"0\">\n\t\t[vc_tta_section title=&#8221;Introduction: Cybersecurity Fundamentals&#8221; tab_id=&#8221;1572411205441-0bd5ab61-aba40c49-8b26ef59-35b7&#8243;][vc_column_text]\n<ul>\n<li>A game of defense and attack, ruled on both sides by economics<\/li>\n<li>Compliance vs Security<\/li>\n<li>Definitions and Language<\/li>\n<li>Encryption<\/li>\n<li>Cyber Security Practice (ongoing)<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Risk Management&#8221; tab_id=&#8221;1572411322036-b01789c9-dab20c49-8b26ef59-35b7&#8243;][vc_column_text css=&#8221;&#8221;]\n<ul>\n<li>Business Email Compromise<\/li>\n<li>Intellectual Property Theft<\/li>\n<li>Ransomware<\/li>\n<li>Other notable Case Studies<\/li>\n<li>Risk Treatment<\/li>\n<li>Cyber Security Practice (ongoing)<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Information Technology Foundations&#8221; tab_id=&#8221;1572411438174-63ec584e-38b60c49-8b26ef59-35b7&#8243;][vc_column_text css=&#8221;&#8221;]\n<ul>\n<li>Networks and Network protocols<\/li>\n<li>Authentication<\/li>\n<li>Systems<\/li>\n<li>Cloud Computing<\/li>\n<li>Cyber Security Practice (ongoing)<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Consulting and Interpersonal Skills&#8221; tab_id=&#8221;1572411462444-c510f9d7-659a0c49-8b26ef59-35b7&#8243;][vc_column_text css=&#8221;&#8221;]\n<ul>\n<li>Questioning technique<\/li>\n<li>Critical thinking<\/li>\n<li>Documentation<\/li>\n<li>Presentation skills<\/li>\n<li>Strategy &amp; Project Management<\/li>\n<li>Cyber Security Practice (ongoing)<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Offensive Cybersecurity Concepts and Techniques&#8221; tab_id=&#8221;1572411481055-aa0e8f44-83460c49-8b26ef59-35b7&#8243;][vc_column_text]\n<ul>\n<li>The Attacker\u2019s Mindset<\/li>\n<li>Technical Attacks<\/li>\n<li>Attack Software and Tooling<\/li>\n<li>OWASP<\/li>\n<li>Cyber Security Practice (ongoing)<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;The Defensive Mindset&#8221; tab_id=&#8221;1572411499794-30830090-09850c49-8b26ef59-35b7&#8243;][vc_column_text]\n<ul>\n<li>Economics of Defense<\/li>\n<li>Defensive Architecture<\/li>\n<li>Assets and Perimeters<\/li>\n<li>Logs and Monitoring<\/li>\n<li>Threat Intelligence<\/li>\n<li>Cyber Security Practice (ongoing)<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Incident Response&#8221; tab_id=&#8221;1572411584028-69dfd619-46470c49-8b26ef59-35b7&#8243;][vc_column_text]\n<ul>\n<li>Security vs ITIL<\/li>\n<li>Incident Playbooks<\/li>\n<li>Incident Management<\/li>\n<li>Crisis Communication<\/li>\n<li>Cyber Security Practice (ongoing)<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;DevSecOps \u2013 Securing In-House Development&#8221; tab_id=&#8221;1572411607499-67011be8-75db0c49-8b26ef59-35b7&#8243;][vc_column_text css=&#8221;&#8221;]\n<ul>\n<li>Full life cycle of \u201chome-grown\u201d tools<\/li>\n<li>Development Frameworks<\/li>\n<li>Software Development Lifecycle<\/li>\n<li>AppSec \/ DevSecOps<\/li>\n<li>Cyber Security Practice (ongoing)<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Vendor &amp; Supply Chain Security&#8221; tab_id=&#8221;1572411635261-7ea3c582-a4bb0c49-8b26ef59-35b7&#8243;][vc_column_text css=&#8221;&#8221;]\n<ul>\n<li>Corporate Supply Chain<\/li>\n<li>Third Party Lifecycle<\/li>\n<li>Case Studies<\/li>\n<li>Cyber Security Practice (ongoing)<\/li>\n<li>Capstone Project (ongoing)<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Compliance and Compliance Frameworks&#8221; tab_id=&#8221;1572411655577-68b420ac-c02f0c49-8b26ef59-35b7&#8243;][vc_column_text css=&#8221;&#8221;]\n<ul>\n<li>Categories of Compliance<\/li>\n<li>Governance vs Risk Assurance vs Compliance<\/li>\n<li>Common Frameworks<\/li>\n<li>Security Policies and Related Documents<\/li>\n<li>Cyber Security Practice (ongoing)<\/li>\n<li>Capstone Project (ongoing)<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Ongoing Modules&#8221; tab_id=&#8221;1572411685849-49b2a6cb-70510c49-8b26ef59-35b7&#8243;][vc_column_text]\n<ul>\n<li>Additional Topics: determined by students and Lead Trainer<\/li>\n<li>Job Outcomes Program<\/li>\n<li>Consultation and Presentation training<\/li>\n<li>Cyber Security Practice<\/li>\n<li>Capstone Project<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section]\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1648797419272{margin-bottom: 55px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 10px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #000000 !important;border-left-style: solid !important;border-right-color: #000000 !important;border-right-style: solid !important;border-top-color: #000000 !important;border-top-style: solid !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a03a6b14b3f2\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h1><span class=\"thb-slidetype-entry\"><span class=\"lines\">When Can I Start?<\/span><\/span><\/h1>\n\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a03a6b14b3f2 .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_empty_space height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a03a6b14b422\" class=\"btn style1 large full gradient no-radius    arrow-enabled\" href=\"https:\/\/www.institutedata.com\/us\/enroll\/cyber-security-part-time-program\/\" target=\"_self\" role=\"button\">\n\t\t<span>View Part Time Dates<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t\t<style>\n\n\t\t\t\t\t\t\t\t\/* Style1 *\/\n\t\t\t\t#thb-button-6a03a6b14b422.style1 {\n\t\t\t\t\tbackground:#F15946;background:linear-gradient( -135deg,#F15946,#F15946 );\t\t\t\t}\n\t\t\t\t#thb-button-6a03a6b14b422.style1:after {\n\t\t\t\t\tbackground: #F15946;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t\t[vc_empty_space height=&#8221;55px&#8221;]\t<a id=\"thb-button-6a03a6b14b48c\" class=\"btn style1 large full gradient no-radius    arrow-enabled\" href=\"https:\/\/www.institutedata.com\/us\/enroll\/cyber-security-full-time-program\/\" target=\"_self\" role=\"button\">\n\t\t<span>View Full Time Dates<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t\t<style>\n\n\t\t\t\t\t\t\t\t\/* Style1 *\/\n\t\t\t\t#thb-button-6a03a6b14b48c.style1 {\n\t\t\t\t\tbackground:#F15946;background:linear-gradient( -135deg,#F15946,#F15946 );\t\t\t\t}\n\t\t\t\t#thb-button-6a03a6b14b48c.style1:after {\n\t\t\t\t\tbackground: #F15946;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t\t[vc_empty_space height=&#8221;55px&#8221;]\t<div id=\"thb-iconbox-6a03a6b14b4ee\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Fees &amp; Payment<\/h5>\t\t\t<p>Pre-payment deposit of $300 is required to enroll. Current fees are USD $12,500 for the full time and part time program. Finance options are available.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b4ee.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b4ee.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a03a6b14b4ee.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a03a6b14b4ee.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a03a6b14b4ee.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #002395;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b4ee.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a03a6b14b4ee.thb-iconbox figure h5 {\n\t\t\t\tcolor: #002395;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b4ee.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a03a6b14b4ee.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #002395;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a03a6b14b4ee.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a03a6b14b4ee.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #002395;\n\t\t\t}\n\t\t\t#thb-iconbox-6a03a6b14b4ee.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a03a6b14b4ee.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #002395;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space height=&#8221;10px&#8221;][vc_separator color=&#8221;custom&#8221; border_width=&#8221;2&#8243; css_animation=&#8221;bottom-to-top&#8221; css=&#8221;&#8221; accent_color=&#8221;#002395&#8243;][vc_empty_space height=&#8221;20px&#8221;]\t<div id=\"thb-iconbox-6a03a6b14b568\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Course Entry Requirements<\/h5>\t\t\t<p>Completion of an associate degree or equivalent post-secondary qualification or training in any field of study<\/p>\n<p>Completion of any previous qualification undertaken in English<\/p>\n<p>Completion of assigned online pre-work provided to you when you enroll<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b568.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b568.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a03a6b14b568.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a03a6b14b568.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a03a6b14b568.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b568.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a03a6b14b568.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b568.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a03a6b14b568.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a03a6b14b568.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a03a6b14b568.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a03a6b14b568.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a03a6b14b568.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t\t<div id=\"thb-iconbox-6a03a6b14b5c9\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Time Commitment: Part Time Program<\/h5>\t\t\t<p>24 weeks intensive remote or in-class training | 2 night classes per week + 1 Saturday class every other week<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b5c9.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b5c9.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a03a6b14b5c9.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a03a6b14b5c9.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a03a6b14b5c9.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b5c9.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a03a6b14b5c9.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b5c9.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a03a6b14b5c9.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a03a6b14b5c9.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a03a6b14b5c9.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a03a6b14b5c9.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a03a6b14b5c9.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t\t<div id=\"thb-iconbox-6a03a6b14b61a\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Time Commitment: Full Time Program<\/h5>\t\t\t<p>12 weeks intensive remote or in-class training | Monday-Friday<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b61a.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b61a.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a03a6b14b61a.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a03a6b14b61a.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a03a6b14b61a.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b61a.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a03a6b14b61a.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b61a.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a03a6b14b61a.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a03a6b14b61a.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a03a6b14b61a.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a03a6b14b61a.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a03a6b14b61a.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t\t<div id=\"thb-iconbox-6a03a6b14b669\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Location<\/h5>\t\t\t<p>United States (Remote or In-person)<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b669.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b669.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a03a6b14b669.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a03a6b14b669.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a03a6b14b669.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b669.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a03a6b14b669.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a03a6b14b669.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a03a6b14b669.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a03a6b14b669.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a03a6b14b669.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a03a6b14b669.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a03a6b14b669.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1573518960940{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1573087378964{margin-top: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 20px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:%23000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]<div class='_form_20'><\/div><script type='text\/javascript' src='https:\/\/blackcatdata.activehosted.com\/f\/embed.php?static=0&id=20&6A03A6B14B6E0&nostyles=1&preview=0'><\/script>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;20px&#8221; height=&#8221;&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1571981852249{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1573087311403{margin-top: 5px !important;margin-bottom: 30px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 25px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Discuss with a Career Consultant&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]<span style=\"font-size: 12pt;\">You can schedule a call with an Institute of Data Career Consultant to discuss this course.<\/span>[\/vc_column_text]\t<a id=\"thb-button-6a03a6b14b710\" class=\"btn style1 medium full black small-radius  fancybox-inline  arrow-enabled\" href=\"#course-outline\" target=\"_blank\" role=\"button\">\n\t\t<span>Schedule a Call<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space mobile_height=&#8221;10px&#8221; height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;50px&#8221; height=&#8221;&#8221;]\t<div id=\"thb-slidetype-6a03a6b14b766\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h2><span class=\"thb-slidetype-entry\"><span class=\"lines\">Introducing Institute of Data Consulting Business Skills<\/span><\/span><\/h2>\n\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a03a6b14b766 .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_column_text]The Institute of Data Consulting Business Skills is an essential part of every Institute of Data certified professional. The Institute of Data educates and certifies professionals not only with technical skills but also with expertise in business consulting and communication to clients, managers, directors and stakeholders. Many certified professionals choose to work independently or join an existing consultancy.[\/vc_column_text]\t<div id=\"thb-slidetype-6a03a6b14b7a1\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h2><span class=\"thb-slidetype-entry\"><span class=\"lines\">Is a cybersecurity course really worth taking?<\/span><\/span><\/h2>\n\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a03a6b14b7a1 .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221;]Have you been looking at cybersecurity course outlines and thinking about taking a course? You\u2019re probably wondering if the training is actually worthwhile.<\/p>\n<p>&nbsp;<\/p>\n<p>At the Institute of Data, we believe that investing in your upskilling is definitely worth it. Here, we break down some reasons why we think so and how we make training worth it for all our students.<\/p>\n<p>&nbsp;<\/p>\n<h3>Quick answer: Yes, cybersecurity training is a great investment in your career.<\/h3>\n<p>As technology continues to shape every aspect of daily life, businesses across various sectors are continuing to venture into the digital sphere with a focus on cyber and data security. This shift has led many professionals to research whether investing in cybersecurity training is a smart move.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3>Cybersecurity training provides valuable career opportunities.<\/h3>\n<h4>As technology gets more advanced, so do its threats.<\/h4>\n<p>The shift to digital is transforming industries, streamlining processes and making communication more accessible. However, as technology becomes more advanced, the world also sees cybersecurity threats increase in sophistication and frequency.<\/p>\n<p>&nbsp;<\/p>\n<h4>Companies are willing to invest in cybersecurity.<\/h4>\n<p>As a result of these data protection and network security threats, filling cybersecurity job roles has become a top priority for companies. After all, having professionals manage this effectively is crucial to maintaining their entire business operation. This is why when employers look to hire, a certified cybersecurity professional tends to stand out.<\/p>\n<p>&nbsp;<\/p>\n<p>Thankfully, there are viable options for quality cybersecurity training, like our own program here at the Institute of Data.<\/p>\n<p>&nbsp;<\/p>\n<h4>Why choose the Institute of Data for cybersecurity training?<\/h4>\n<p>Through our cybersecurity program here at the Institute of Data, you\u2019ll learn from industry experts how to defend from cyber-attacks and create solutions for businesses and government organizations, including consulting techniques and simulating commercial projects.<\/p>\n<p>&nbsp;<\/p>\n<p>Plus, our cybersecurity course is designed for people with IT and non-IT backgrounds. So, whether you\u2019re looking for cybersecurity certification programs to launch your career or wondering how to start a career in cybersecurity, <a href=\"https:\/\/www.institutedata.com\/us\/consultation\/\" target=\"_blank\" rel=\"noopener\">schedule a consultation<\/a> and explore your training options with an industry expert.<\/p>\n<p>&nbsp;<\/p>\n<h4>Institute of Data\u2019s programs are current and practical.<\/h4>\n<p>All of our programs, from our data science to <a href=\"https:\/\/www.institutedata.com\/us\/courses\/software-engineering-program\/\" target=\"_blank\" rel=\"noopener\">software engineering<\/a> course alternatives, are developed by tech industry professionals and delivered in partnership with top universities. This way, our students learn practical skills and knowledge that\u2019s current and truly relevant in the industry.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3>You don\u2019t have to give up your other commitments to take a cybersecurity program.<\/h3>\n<h4>Institute of Data is all about flexible learning options.<\/h4>\n<p>Our cybersecurity program is designed for career-driven professionals to transition into the cybersecurity industry. What\u2019s more, our cybersecurity course outline shows you how we fast-track the process of learning the skills and knowledge you need. You can either study full-time and complete the program in three months over 12 weeks or study part-time and complete it in six months over 24 weeks.<\/p>\n<p>&nbsp;<\/p>\n<p>At the Institute of Data, you will be taught live by an industry expert lead trainer with years of experience. They personally teach each small cohort of students so you can ask questions and benefit from real-world experience. In addition, to make learning easier and to guide you through labs, students are supported by assistant trainers, made up of former students who excelled in the program.<\/p>\n<p>&nbsp;<\/p>\n<h3>Our cybersecurity programs provide personalized support.<\/h3>\n<h4>Is this different from learning it on your own?<\/h4>\n<p>Prospective students may question the value of formal training, given the abundance of online information available on cybersecurity and related skills. After all, why not just self-study?<\/p>\n<p>&nbsp;<\/p>\n<p>However, these resources often fail to address your unique goals and challenges and lack the structured support needed to truly maximize your learning and development. Not many people can learn various concepts just by reading books or using online resources.<\/p>\n<p>&nbsp;<\/p>\n<p>And what happens if you have questions? While these resources are useful, they\u2019re no substitute for actually getting answers and guidance from an expert who has real-world experience in the industry.<\/p>\n<p>&nbsp;<\/p>\n<h4>Invest in a personalized and collaborative learning experience.<\/h4>\n<p>At the Institute of Data, we don\u2019t believe in a one-size-fits-all approach to education. That\u2019s why we offer personalized support throughout our programs.<\/p>\n<p>&nbsp;<\/p>\n<p>Each student has access to a dedicated support team that assists them with any questions or challenges that arise during their studies. We even provide career coaching to help students understand how they can leverage their new skills to achieve their unique professional goals.<\/p>\n<p>&nbsp;<\/p>\n<p>What\u2019s more, we have the Institute of Data Consulting Business Skills, which is an essential part of every Institute of Data certified professional. We educate and certify professionals not only with technical skills but also with expertise in business consulting and communication with clients, managers, directors and stakeholders. Many certified professionals choose to work independently or join an existing consultancy.<\/p>\n<p>&nbsp;<\/p>\n<p>Additionally, we assign designated industry lead trainers and assistant trainers for every small group of students. This ratio guarantees individualized attention that helps you stay on track and fully grasp the material.<\/p>\n<p>&nbsp;<\/p>\n<p>With our culture of collaboration and personalized support, the Institute of Data provides a level of support you can\u2019t find when you\u2019re just learning on your own. So, instead of settling for a cybersecurity course that leaves you without support, look into enrolling in our comprehensive and practical cybersecurity training programs instead.[\/vc_column_text]\t<div id=\"thb-slidetype-6a03a6b14b7c3\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h2><span class=\"thb-slidetype-entry\"><span class=\"lines\">Frequently Asked Questions (FAQ)<\/span><\/span><\/h2>\n\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a03a6b14b7c3 .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t\t<div id=\"thb-slidetype-6a03a6b14b7e4\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h2><span class=\"thb-slidetype-entry\"><span class=\"lines\">What is cybersecurity, and why is it important?<\/span><\/span><\/h2>\n\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a03a6b14b7e4 .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221;]Cybersecurity is the protection of digital assets from threats such as malware, phishing attacks, and data breaches. It is important because, without it, various facets of the business can be compromised, from the privacy of sensitive data to the integrity of the systems being used to keep business operations running.[\/vc_column_text]\t<div id=\"thb-slidetype-6a03a6b14b800\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h2><span class=\"thb-slidetype-entry\"><span class=\"lines\">What skills are essential for a career in cybersecurity?<\/span><\/span><\/h2>\n\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a03a6b14b800 .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221;]To succeed in cybersecurity, a strong foundation in problem-solving, technical skills and familiarity with various operating systems is essential. Key technical competencies include networking, system administration and proficiency in scripting or programming.<\/p>\n<p>&nbsp;<\/p>\n<p>Expertise in cyber risk management and incident response is also critical, enabling professionals to detect threats and implement effective security measures. The right cybersecurity course will cover all these and more.[\/vc_column_text]\t<div id=\"thb-slidetype-6a03a6b14b81b\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h2><span class=\"thb-slidetype-entry\"><span class=\"lines\">What certifications can I earn from completing a cybersecurity program?<\/span><\/span><\/h2>\n\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a03a6b14b81b .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221;]Upon completing the cybersecurity program at the Institute of Data, graduates receive a professional industry certification from the Institute of Data and a Certification of Completion from the university partner.<\/p>\n<h4><\/h4>\n<h3>Upskilling for the industries of the future<\/h3>\n<p>The Institute of Data empowers professionals to thrive in today\u2019s data-driven economy. We offer accessible, industry-aligned training not just in cybersecurity but also in software engineering and data science. Our quality and up-to-date programs help people get the skills they need to meet the demands of the modern job market.<\/p>\n<p>&nbsp;<\/p>\n<p>Download our cybersecurity outline now to learn more. In addition to cybersecurity, we also offer software engineering and <a href=\"https:\/\/www.institutedata.com\/us\/courses\/data-science-artificial-intelligence-program\/\" target=\"_blank\" rel=\"noopener\">data science &amp; AI<\/a> industry training courses.[\/vc_column_text][\/vc_column][vc_column fixed=&#8221;thb-fixed&#8221; width=&#8221;1\/3&#8243;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796352796{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571981187779{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: -25px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:%23000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;2px&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJfZm9ybV84MCUyMiUzRSUzQyUyRmRpdiUzRSUzQ3NjcmlwdCUyMHNyYyUzRCUyMmh0dHBzJTNBJTJGJTJGYmxhY2tjYXRkYXRhLmFjdGl2ZWhvc3RlZC5jb20lMkZmJTJGZW1iZWQucGhwJTNGaWQlM0Q4MCUyMiUyMHR5cGUlM0QlMjJ0ZXh0JTJGamF2YXNjcmlwdCUyMiUyMGNoYXJzZXQlM0QlMjJ1dGYtOCUyMiUzRSUzQyUyRnNjcmlwdCUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796317949{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571967184695{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 25px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Discuss with a Career Consultant&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]<span style=\"font-size: 12pt;\">You can schedule a call with an Institute of Data Career Consultant to discuss this course.<\/span>[\/vc_column_text]\t<a id=\"thb-button-6a03a6b14b83f\" class=\"btn style1 medium full black small-radius  fancybox-inline  arrow-enabled\" href=\"#course-outline\" target=\"_blank\" role=\"button\">\n\t\t<span>Schedule a Call<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;mobile-footer-fixed&#8221; css=&#8221;.vc_custom_1572216358905{margin-bottom: -19px !important;padding-top: 15px !important;background-color: #000000 !important;}&#8221;][vc_column thb_color=&#8221;thb-light-column&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221; el_class=&#8221;text-center&#8221;][vc_column_text]\n<h3 style=\"text-align: center;\"><a style=\"text-decoration: none;\" href=\"#outline\">Download Course Outline<\/a><\/h3>\n[\/vc_column_text][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1648796564794{margin-top: -30px !important;margin-bottom: 30px !important;}&#8221;][vc_column][vc_column_text] [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1571968629318{padding-bottom: 3vh !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;Share This Course&#8221; font_container=&#8221;tag:h6|text_align:right|color:%230020ff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;align-justify&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;40px&#8221;][vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]The Cybersecurity course is designed for IT and non-IT professionals who are interested in transitioning to a career in cybersecurity. The program includes practical training, industry certification and job placement support to&hellip;<\/p>\n","protected":false},"featured_media":27463,"comment_status":"closed","ping_status":"closed","template":"","tags":[480,481,482],"class_list":["post-27461","portfolio","type-portfolio","status-publish","has-post-thumbnail","hentry","tag-australia-us","tag-full-time-course-us","tag-part-time-course-us","portfolio-category-cyber-security-us","portfolio-category-full-time-courses-us","portfolio-category-part-time-courses-us"],"_links":{"self":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio\/27461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio"}],"about":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/types\/portfolio"}],"replies":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/comments?post=27461"}],"version-history":[{"count":37,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio\/27461\/revisions"}],"predecessor-version":[{"id":97200,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio\/27461\/revisions\/97200"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media\/27463"}],"wp:attachment":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media?parent=27461"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/tags?post=27461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}