{"id":87912,"date":"2024-11-13T13:43:49","date_gmt":"2024-11-13T02:43:49","guid":{"rendered":"https:\/\/www.institutedata.com\/?post_type=portfolio&#038;p=87912"},"modified":"2024-12-05T07:45:39","modified_gmt":"2024-12-04T20:45:39","slug":"cybersecurity-training","status":"publish","type":"portfolio","link":"https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-training\/","title":{"rendered":"Cybersecurity Training"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row css=&#8221;.vc_custom_1648796564794{margin-top: -30px !important;margin-bottom: 30px !important;}&#8221;][vc_column][vc_column_text]\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1571968629318{padding-bottom: 3vh !important;}&#8221;]\t<div id=\"thb-slidetype-6a076c55f3eb4\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\"><\/p>\n<h1>Cybersecurity Training<\/h1>\n<p><\/span><\/span>\t\t\t<\/div>\n\n\t[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;Share This Course&#8221; font_container=&#8221;tag:h6|text_align:right|color:0020ff&#8221; use_theme_fonts=&#8221;yes&#8221;]\t<div class=\"thb-share-icons thb-right style1\">\n\t\t\t\t<ul>\n\t\t\t\t\t\t<li><a href=\"http:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fwww.institutedata.com%2Fus%2Fcourses%2Fcybersecurity-training%2F\" class=\"social boxed-icon facebook\"><i class=\"fa fa-facebook\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t<li><a href=\"https:\/\/twitter.com\/intent\/tweet?text=Cybersecurity%20Training&url=https%3A%2F%2Fwww.institutedata.com%2Fus%2Fcourses%2Fcybersecurity-training%2F&via=Institute%20of%20Data\" class=\"social boxed-icon twitter\"><i class=\"fa fa-twitter\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"https:\/\/www.linkedin.com\/cws\/share?url=https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-training\/\" class=\"social boxed-icon linkedin\"><i class=\"fa fa-linkedin\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t<li><a href=\"https:\/\/wa.me\/?text=Cybersecurity%20Training%20https%3A%2F%2Fwww.institutedata.com%2Fus%2Fcourses%2Fcybersecurity-training%2F\" class=\"social boxed-icon whatsapp\" data-href=\"https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-training\/\" data-action=\"share\/whatsapp\/share\"><i class=\"fa fa-whatsapp\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"fb-messenger:\/\/share\/?link=https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-training\/&app_id=\" class=\"social boxed-icon facebook-messenger\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"14\" height=\"14\" viewBox=\"96 93 322 324\"><path d=\"M257 93c-88.918 0-161 67.157-161 150 0 47.205 23.412 89.311 60 116.807V417l54.819-30.273C225.449 390.801 240.948 393 257 393c88.918 0 161-67.157 161-150S345.918 93 257 93zm16 202l-41-44-80 44 88-94 42 44 79-44-88 94z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t[\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;align-justify&#8221;][vc_column width=&#8221;2\/3&#8243;]\t<div id=\"thb-image-6a076c55f40ea\" class=\"caption-style1 animation bottom-to-top alignleft full  thb_image_link wp-caption \">\n\t\t\t<div class=\"thb-image-inner size_100\">\n\t\t\t<img decoding=\"async\" class=\"thb_image  large-shadow  \" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2019\/08\/800-x-1000-Cyber-Security-Program.jpg\" width=\"800\" height=\"500\" alt=\"Cyber Security Program\" title=\"Cyber Security Program\" loading=\"lazy\" \/>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<style>\n\t\t\t\t#thb-image-6a076c55f40ea,\n\t\t\t\t#thb-image-6a076c55f40ea img {\n\t\t\t\t\tborder-radius: 0px;\n\t\t\t\t}\n\t\t<\/style>\n\t\t<\/div>\n\t[vc_empty_space height=&#8221;40px&#8221;][vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]The Cybersecurity course is designed for IT and non-IT professionals who are interested in transitioning to a career in cybersecurity. The program includes practical training, industry certification and job placement support to help professionals secure a job in the cybersecurity industry.[\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1571968063176{margin-top: 55px !important;margin-bottom: 55px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 10px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #0020ff !important;border-left-style: solid !important;border-right-color: #0020ff !important;border-right-style: solid !important;border-top-color: #0020ff !important;border-top-style: solid !important;border-bottom-color: #0020ff !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a076c560087b\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Overview<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a076c560087b .thb-slidetype-entry {\n\t\t\t\tcolor: #0020ff;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221;]The Cybersecurity course is delivered in a 24-week part-time or 12-week full-time format and is designed for career-driven professionals to transition into the cybersecurity industry.<\/p>\n<p>&nbsp;<\/p>\n<p>Our program includes pre-work, intensive practical training, industry certification and a job outcomes program in collaboration with university partners. The course content has been tailored to give you the skills that are demanded by businesses in today\u2019s rapidly evolving job market.<\/p>\n<p>&nbsp;<\/p>\n<p>Remote learning is available for this program. The interactive remote format enabled by video conferencing technology is a rich and connected experience featuring virtual break-out rooms, shared screens, digital whiteboards, peer-to-peer collaboration and instructor support.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1573518951818{margin-right: -35px !important;margin-left: -35px !important;}&#8221; el_id=&#8221;outline&#8221;][vc_column_inner css=&#8221;.vc_custom_1573085319162{margin-top: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 15px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;2px&#8221;][vc_column_text css=&#8221;.vc_custom_1573522055029{margin-top: -25px !important;}&#8221;]<div class='_form_20'><\/div><script type='text\/javascript' src='https:\/\/blackcatdata.activehosted.com\/f\/embed.php?static=0&id=20&6A076C5600916&nostyles=1&preview=0'><\/script>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;20px&#8221; height=&#8221;&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1571981852249{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1573087132920{margin-top: 5px !important;margin-bottom: 30px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 5px !important;padding-right: 30px !important;padding-bottom: 10px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Ready to Enrol?&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Click to view upcoming course dates and enrol in this course.[\/vc_column_text]\t<a id=\"thb-button-6a076c560097e\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"enrolcyber-security-part-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>ViewPartTimeDatesEnrol<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space mobile_height=&#8221;10px&#8221; height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a076c5600a33\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"enrolcyber-security-full-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>ViewFullTimeDatesEnrol<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;50px&#8221; height=&#8221;&#8221;]\t<div id=\"thb-slidetype-6a076c5600a9d\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Practical Cybersecurity Training at the Institute<\/span><\/span>\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]Learn in-demand skills to protect and secure businesses and government with education from the best cyber industry trainers.<\/p>\n<p>&nbsp;<\/p>\n<p>The Cybersecurity Program is a structured training program designed to help you develop the practical skills you will need, allowing you to progress into roles such as a Cybersecurity Analyst, Penetration Tester or SOC (Security Operations Consultant). After completing your Cyber Security Program, you will receive the recognition as a Certified Cyber Security Professional (CCSP)\u2122\ufe0f from the Institute of Data\u00ae.<\/p>\n<p>&nbsp;<\/p>\n<p>Hundreds of professionals choose the Institute of Data every year to prepare them for their future careers after careful consideration of their desired career progression and to attain maximum return on investment for their education. Leading the future of the profession, the Institute of Data offers a collaborative and successful program driven to ensure you have the best start to your career.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;]\t<div id=\"thb-slidetype-6a076c5600ace\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">What is Practical Cybersecurity Training?<\/span><\/span>\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]Practical cybersecurity training is an essential requirement to practice as a cybersecurity professional. Learn from industry experts on how to defend from cyber-attacks and develop business solutions for businesses and government organizations, including consulting techniques and simulating commercial projects. This means you will be ready to work as a cybersecurity professional.[\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1571976183466{margin-top: 55px !important;margin-bottom: 5vh !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 25px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #44d9e6 !important;border-left-style: solid !important;border-right-color: #44d9e6 !important;border-right-style: solid !important;border-top-color: #44d9e6 !important;border-top-style: solid !important;border-bottom-color: #44d9e6 !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a076c5600b03\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Why The<\/span><\/span><span class=\"thb-slidetype-entry\"><span class=\"lines\">Institute Of Data?<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a076c5600b03 .thb-slidetype-entry {\n\t\t\t\tcolor: #44d9e6;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t\t<div id=\"thb-slidetype-6a076c5600b67\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Students Will:<\/span><\/span>\t\t\t<\/div>\n\n\t[vc_empty_space mobile_height=&#8221;30px&#8221; height=&#8221;30px&#8221;]\t<div id=\"thb-iconbox-6a076c5600bdf\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Be ready to practice cyber security<\/h5>\t\t\t<p>The Institute of Data\u2019s courses are designed to prepare students for real commercial work in the area of cyber security. It is focused on practical in-class training, labs and real-life projects.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600bdf.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600bdf.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c5600bdf.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c5600bdf.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c5600bdf.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600bdf.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c5600bdf.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600bdf.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c5600bdf.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c5600bdf.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c5600bdf.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c5600bdf.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c5600bdf.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a076c5600cc7\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Receive the best training and the latest curriculum<\/h5>\t\t\t<p>The Institute of Data trainers are actively working in the industry and will teach students how to practice cyber security in the real world. The curriculum is developed by the Institute of Data Academic Board with decades of experience working in cyber security.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600cc7.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600cc7.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c5600cc7.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c5600cc7.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c5600cc7.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600cc7.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c5600cc7.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600cc7.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c5600cc7.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c5600cc7.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c5600cc7.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c5600cc7.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c5600cc7.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a076c5600dc7\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Be more attractive to employers<\/h5>\t\t\t<p>The Institute of Data\u2019s Cyber Security Program results in the Certified Cyber Security Professional (CCSP)\u2122\ufe0f Industry Certification which signals to employers that you are ready to join the industry. Your resume and profile will be reviewed by your Job Outcomes team to give you the best possible chance of success.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600dc7.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600dc7.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c5600dc7.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c5600dc7.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c5600dc7.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600dc7.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c5600dc7.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600dc7.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c5600dc7.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c5600dc7.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c5600dc7.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c5600dc7.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c5600dc7.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a076c5600e72\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Get more support and guidance<\/h5>\t\t\t<p>The member network offers support and guidance from mentors and direct connections to the industry.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600e72.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600e72.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c5600e72.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c5600e72.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c5600e72.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600e72.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c5600e72.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600e72.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c5600e72.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c5600e72.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c5600e72.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c5600e72.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c5600e72.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a076c5600f1e\" class=\"thb-iconbox top type3  has-img  text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t\t\t\t\t<div class=\"iconbox-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"505\" height=\"505\" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2019\/04\/iod_seal_tp_black_c.svg\" class=\"thb_image  attachment-full\" alt=\"\" title=\"iod_seal_tp_black_c\" \/>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Meet great people and become a member of the Institute<\/h5>\t\t\t<p>Beyond a healthy discipline of practical education and learning, students meet great friends in your virtual or real classroom and become a member of the Institute of Data. Many students continue to keep in touch with their fellow students and the community becomes a strong network as students enter the industry.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600f1e.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600f1e.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c5600f1e.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c5600f1e.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c5600f1e.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600f1e.thb-iconbox .iconbox-image img {\n\t\t\t\t\twidth: 84px;\n\t\t\t\t\theight: auto;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600f1e.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c5600f1e.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5600f1e.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c5600f1e.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c5600f1e.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c5600f1e.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c5600f1e.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c5600f1e.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-testimonials-6a076c5601578\" class=\"thb-testimonials thb-testimonial-style2 thb-carousel style2   \" data-columns=\"1\" data-pagination=\"\" data-navigation=\"false\"\n\t\t\t\t\t\t data-autoplay=\"\" data-autoplay-speed=\"4000\" data-fade=\"true\" data-adaptive=\"false\">\n\t\t\t<div class=\"small-12  columns\">\n\t\t\t\t\t\t\t<div class=\"thb-testimonial has-avatar\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<blockquote><p>\u201cI gained an idea of what companies need and how we need to use our skills. This made it pretty easy for me to get my first job.\u201d<\/p>\n<\/blockquote>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"author_image \" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2019\/04\/katya-140x140.jpg\" width=\"140\" height=\"140\" alt=\"katya\" title=\"katya\" loading=\"lazy\" \/>\t\t\t\t\t\t\t<div class=\"testimonial-author\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<cite>Katya<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"title\">Institute of Data Certified Professional<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t<\/div>\n\t[\/vc_column][vc_column fixed=&#8221;thb-fixed&#8221; width=&#8221;1\/3&#8243;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796352796{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571981187779{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: -25px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;2px&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJfZm9ybV84MCUyMiUzRSUzQyUyRmRpdiUzRSUzQ3NjcmlwdCUyMHNyYyUzRCUyMmh0dHBzJTNBJTJGJTJGYmxhY2tjYXRkYXRhLmFjdGl2ZWhvc3RlZC5jb20lMkZmJTJGZW1iZWQucGhwJTNGaWQlM0Q4MCUyMiUyMHR5cGUlM0QlMjJ0ZXh0JTJGamF2YXNjcmlwdCUyMiUyMGNoYXJzZXQlM0QlMjJ1dGYtOCUyMiUzRSUzQyUyRnNjcmlwdCUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796317949{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571967184695{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 25px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Ready to Enroll?&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Click to view upcoming part time cyber security program course dates.[\/vc_column_text]\t<a id=\"thb-button-6a076c5601f3d\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"httpswww.institutedata.comusenrollcyber-security-part-time-program\" target=\"_blank\" role=\"button\">\n\t\t<span>ViewPartTimeDatesEnroll<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a076c5601fbc\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"httpswww.institutedata.comusenrollcyber-security-full-time-program\" target=\"_blank\" role=\"button\">\n\t\t<span>ViewFullTimeDatesEnroll<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1571979879714{margin-top: 8vh !important;margin-bottom: 10vh !important;border-top-width: 2px !important;border-bottom-width: 2px !important;padding-top: 9vh !important;padding-bottom: 8vh !important;background-color: #f7f7f7 !important;border-top-color: #ff4600 !important;border-top-style: solid !important;border-bottom-color: #ff4600 !important;border-bottom-style: solid !important;}&#8221;][vc_column animation=&#8221;animation bottom-to-top&#8221;][vc_row_inner css=&#8221;.vc_custom_1571968515353{padding-bottom: 50px !important;}&#8221;][vc_column_inner]\t<div id=\"thb-slidetype-6a076c5602018\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Program Structure<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a076c5602018 .thb-slidetype-entry {\n\t\t\t\tcolor: #ff4600;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243; animation=&#8221;animation bottom-to-top&#8221; css=&#8221;.vc_custom_1571199244193{padding-right: 20% !important;}&#8221;]\t<div id=\"thb-iconbox-6a076c560205c\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path d=\"m1 1h46v62h-46z\"\/><path d=\"m9 63v-61\"\/><path d=\"m14 15h28\"\/><path d=\"m14 21h28\"\/><path d=\"m63 3v50l-4 8-4-8v-50z\"\/><path d=\"m55 7h-4v10\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Pre-Work<\/h5>\t\t\t<p>Students complete curated pre-work as an interactive online learning experience designed to prepare every student with the required skills and knowledge to complete all coursework and training.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560205c.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560205c.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c560205c.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c560205c.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c560205c.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560205c.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c560205c.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560205c.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c560205c.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c560205c.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c560205c.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c560205c.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c560205c.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner thb_color=&#8221;thb-light-column&#8221; width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1556240953838{padding-right: 20% !important;}&#8221;]\t<div id=\"thb-iconbox-6a076c560217f\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m23 36l7 7 13-13\"\/><path d=\"m46 10h-28\"\/><path d=\"m12 10h-11v48h62v-48h-11\"\/><path d=\"m12 6h6v8h-6z\"\/><path d=\"m46 6h6v8h-6z\"\/><path d=\"m1 18h62\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Remote and In Class Training<\/h5>\t\t\t<p>Students undertake a professional in-classroom course from a team of expert industry trainers from leading consultancies and enterprises to acquire the most sought-after practical training in the country.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560217f.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560217f.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c560217f.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c560217f.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c560217f.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560217f.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c560217f.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560217f.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c560217f.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c560217f.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c560217f.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c560217f.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c560217f.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner thb_color=&#8221;thb-light-column&#8221; width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1571199248343{padding-right: 20% !important;}&#8221;]\t<div id=\"thb-iconbox-6a076c560222e\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path d=\"m5 41l6-40h42l6 40\"\/><path d=\"M21,41c0,6.075,4.925,11,11,11s11-4.925,11-11h16v22\n\tH5V41H21z\"\/><circle cx=\"29\" cy=\"21\" r=\"6\"\/><path d=\"m33 25l8 8\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Job Outcomes<\/h5>\t\t\t<p>Students will undergo a Job Outcomes Program through the Institute of Data which will help position students for the best chance of a new job opportunity and\/or internal promotion. Land a job in one of the most sought after fields in tech with the guidance of Professional Career Coaches.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560222e.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560222e.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c560222e.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c560222e.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c560222e.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560222e.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c560222e.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560222e.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c560222e.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c560222e.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c560222e.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c560222e.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c560222e.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1571204006887{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#dddddd&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;]\t<div id=\"thb-iconbox-6a076c56022be\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>How Will Students Be Assessed?<\/h5>\t\t\t<p>The Institute of Data \u2013 Cyber Security Program is assessed through completion of labs and a final capstone project. There is no formal exam. The capstone project is a real-life project and is assessed against the Institute of Data Certification Standards set by the Academic Board and Examination Board.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56022be.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56022be.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c56022be.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c56022be.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c56022be.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56022be.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c56022be.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56022be.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c56022be.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c56022be.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c56022be.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c56022be.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c56022be.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1571705355222{padding-top: 25px !important;padding-bottom: 30px !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#dddddd&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;]\t<div id=\"thb-iconbox-6a076c560231c\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Post Course<\/h5>\t\t\t<p>We'll help you transition into the big data and cyber security industry. We have a 93% job outcome success rate within 180 days of graduation for active job seekers.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560231c.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560231c.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c560231c.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c560231c.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c560231c.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560231c.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c560231c.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560231c.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c560231c.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c560231c.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c560231c.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c560231c.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c560231c.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner el_class=&#8221;text-right&#8221; width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-xs&#8221;]\t<div class=\"thb-counter counter-style1 thb-side left\" id=\"thb-counter-6a076c560240b\" data-separator=\"\" data-format=\"(,ddd).dd\">\n\t\t\t\t\t<div class=\"counter-container\">\n\t\t\t\t\t\t\t\t<div class=\"h1\" data-count=\"1000\" data-speed=\"4000\">0<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"h1 counter-text counter\">+<\/div>\t\t\t<\/div>\n\t\t\t<h6>Industry Partners &amp; Contacts<\/h6>\n\t\t\t\t\t\t\t\t\t\t<style>\n\t\t\t#thb-counter-6a076c560240b .odometer.odometer-auto-theme.odometer-animating-up .odometer-ribbon-inner,\n\t\t\t#thb-counter-6a076c560240b .odometer.odometer-theme-minimal.odometer-animating-up .odometer-ribbon-inner {\n\t\t\t\ttransition: transform 4s;\n\t\t\t}\n\t\t\t\t\t\t\t#thb-counter-6a076c560240b.thb-counter .h1,\n\t\t\t\t#thb-counter-6a076c560240b.thb-counter .counter {\n\t\t\t\t\tcolor: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-counter-6a076c560240b.thb-counter h6,\n\t\t\t\t#thb-counter-6a076c560240b.thb-counter .thb-title {\n\t\t\t\t\tcolor: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-counter-6a076c560240b.thb-counter figure svg path,\n\t\t\t\t#thb-counter-6a076c560240b.thb-counter figure svg circle,\n\t\t\t\t#thb-counter-6a076c560240b.thb-counter figure svg rect,\n\t\t\t\t#thb-counter-6a076c560240b.thb-counter figure svg ellipse {\n\t\t\t\t\tstroke: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row content_placement=&#8221;top&#8221; el_class=&#8221;align-justify&#8221; css=&#8221;.vc_custom_1621556855638{margin-top: 6vh !important;margin-bottom: 8vh !important;}&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_row_inner css=&#8221;.vc_custom_1572411820192{margin-bottom: 55px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 20px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #000000 !important;border-left-style: solid !important;border-right-color: #000000 !important;border-right-style: solid !important;border-top-color: #000000 !important;border-top-style: solid !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a076c56024c0\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Syllabus Breakdown<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a076c56024c0 .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t\t<div id=\"thb-accordion-6a076c56024f1\" class=\"thb-accordion style1 has-accordion\" data-scroll=\"\" data-index=\"0\">\n\t\t[vc_tta_section title=&#8221;Introduction to Cyber Security&#8221; tab_id=&#8221;1572411205441-0bd5ab61-aba40c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>A game of defense and attack, ruled on both sides by economics<br \/>\nCompliance vs Security<br \/>\nDefinitions and Language<br \/>\nEncryption<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Top Risks Businesses Face Today&#8221; tab_id=&#8221;1572411322036-b01789c9-dab20c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Business Email Compromise<br \/>\nIntellectual Property Theft<br \/>\nRansomware<br \/>\nResource Theft<br \/>\nOther notable Case Studies<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Foundational Networking&#8221; tab_id=&#8221;1572411438174-63ec584e-38b60c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Networks and Network protocols<br \/>\nAuthentication<br \/>\nSystems<br \/>\nEncryption<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Consulting and Interpersonal Skills&#8221; tab_id=&#8221;1572411462444-c510f9d7-659a0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Questioning technique<br \/>\nCritical thinking<br \/>\nDocumentation<br \/>\nPresentation skills<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;The Attacker\u2019s View&#8221; tab_id=&#8221;1572411481055-aa0e8f44-83460c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>The Attacker\u2019s Mindset<br \/>\nTechnical Attacks<br \/>\nAttack Software and Tooling<br \/>\nOWASP<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;The Defensive Mindset&#8221; tab_id=&#8221;1572411499794-30830090-09850c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Economics of Defense<br \/>\nDefensive Architecture<br \/>\nAssets and Perimeters<br \/>\nLogs and Monitoring<br \/>\nThreat Intelligence<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Incident Response&#8221; tab_id=&#8221;1572411584028-69dfd619-46470c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Security vs ITIL<br \/>\nIncident Playbooks<br \/>\nIncident Management<br \/>\nCrisis Communication<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Risk Management&#8221; tab_id=&#8221;1572411607499-67011be8-75db0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Threat Risk Assessment<br \/>\nDetermining the likelihood<br \/>\nEconomic Measurement<br \/>\nEffectiveness of controls<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Security and Compliance Frameworks&#8221; tab_id=&#8221;1572411635261-7ea3c582-a4bb0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Compliance Frameworks Introduction<br \/>\nCommon Frameworks: Overview &amp; Scope<br \/>\nPitfalls and Common Mistakes<br \/>\nBalancing Security Outcomes and Compliance Requirements<br \/>\nCyber Security Practice (ongoing)<br \/>\nCapstone Project (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Higher Order Impacts of Realized Cyber Risk&#8221; tab_id=&#8221;1572411655577-68b420ac-c02f0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Trust and Confidence<br \/>\nAdministrative Functions<br \/>\nSupply Chain<br \/>\nControl Systems and Operational Technology: Introduction<br \/>\nCapstone Project (ongoing)<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Ongoing Modules&#8221; tab_id=&#8221;1572411685849-49b2a6cb-70510c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Additional Topics: determined by students and Lead Trainer<br \/>\nJob Outcomes Program<br \/>\nConsultation and Presentation training<br \/>\nCyber Security Practice<br \/>\nCapstone Project<\/p>\n[\/vc_column_text][\/vc_tta_section]\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1648797419272{margin-bottom: 55px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 10px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #000000 !important;border-left-style: solid !important;border-right-color: #000000 !important;border-right-style: solid !important;border-top-color: #000000 !important;border-top-style: solid !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a076c560254b\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">When Can I Start?<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a076c560254b .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_empty_space height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a076c5602590\" class=\"btn style1 large full gradient no-radius    arrow-enabled\" href=\"httpswww.institutedata.comusenrollcyber-security-part-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>ViewPartTimeDates<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t\t<style>\n\n\t\t\t\t\t\t\t\t\/* Style1 *\/\n\t\t\t\t#thb-button-6a076c5602590.style1 {\n\t\t\t\t\tbackground:#ff4600;background:linear-gradient( -135deg,#ff4600,#ff4600 );\t\t\t\t}\n\t\t\t\t#thb-button-6a076c5602590.style1:after {\n\t\t\t\t\tbackground: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t\t[vc_empty_space height=&#8221;55px&#8221;]\t<a id=\"thb-button-6a076c5602703\" class=\"btn style1 large full gradient no-radius    arrow-enabled\" href=\"httpswww.institutedata.comusenrollcyber-security-full-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>ViewFullTimeDates<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t\t<style>\n\n\t\t\t\t\t\t\t\t\/* Style1 *\/\n\t\t\t\t#thb-button-6a076c5602703.style1 {\n\t\t\t\t\tbackground:#ff4600;background:linear-gradient( -135deg,#ff4600,#ff4600 );\t\t\t\t}\n\t\t\t\t#thb-button-6a076c5602703.style1:after {\n\t\t\t\t\tbackground: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t\t[vc_empty_space height=&#8221;55px&#8221;]\t<div id=\"thb-iconbox-6a076c56027be\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Fees &amp; Payment<\/h5>\t\t\t<p>Pre-payment deposit of $300 is required to enroll. Current fees are USD $12,500 for the full time and part time program. Flexible payment plans available.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56027be.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56027be.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c56027be.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c56027be.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c56027be.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #0020ff;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56027be.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c56027be.thb-iconbox figure h5 {\n\t\t\t\tcolor: #0020ff;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56027be.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c56027be.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #0020ff;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c56027be.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c56027be.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #0020ff;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c56027be.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c56027be.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #0020ff;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space height=&#8221;10px&#8221;][vc_separator color=&#8221;custom&#8221; border_width=&#8221;2&#8243; css_animation=&#8221;bottom-to-top&#8221; accent_color=&#8221;#0020ff&#8221;][vc_empty_space height=&#8221;20px&#8221;]\t<div id=\"thb-iconbox-6a076c5602840\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Course Entry Requirements<\/h5>\t\t\t<p>Completion of a bachelor degree in any field of studies<\/p>\n<p>Completion of any previous qualification undertaken in English<\/p>\n<p>Completion of assigned online pre-work provided to you when you enroll<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5602840.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5602840.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c5602840.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c5602840.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c5602840.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5602840.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c5602840.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c5602840.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c5602840.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c5602840.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c5602840.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c5602840.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c5602840.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t\t<div id=\"thb-iconbox-6a076c56028a9\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Time Commitment: Part Time Program<\/h5>\t\t\t<p>24 weeks intensive remote or in-class training | 2 night classes per week + 1 Saturday class every other week<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56028a9.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56028a9.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c56028a9.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c56028a9.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c56028a9.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56028a9.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c56028a9.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56028a9.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c56028a9.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c56028a9.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c56028a9.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c56028a9.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c56028a9.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t\t<div id=\"thb-iconbox-6a076c560298a\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Time Commitment: Full Time Program<\/h5>\t\t\t<p>12 weeks intensive remote or in-class training | Monday-Friday<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560298a.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560298a.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c560298a.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c560298a.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c560298a.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560298a.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c560298a.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c560298a.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c560298a.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c560298a.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c560298a.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c560298a.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c560298a.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t\t<div id=\"thb-iconbox-6a076c56029f2\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Location<\/h5>\t\t\t<p>United States (Remote or In-person)<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56029f2.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56029f2.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c56029f2.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c56029f2.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c56029f2.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56029f2.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c56029f2.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c56029f2.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c56029f2.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c56029f2.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c56029f2.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c56029f2.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c56029f2.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1573518960940{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1573087378964{margin-top: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 20px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]<div class='_form_20'><\/div><script type='text\/javascript' src='https:\/\/blackcatdata.activehosted.com\/f\/embed.php?static=0&id=20&6A076C5602AD3&nostyles=1&preview=0'><\/script>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;20px&#8221; height=&#8221;&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1571981852249{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1573087311403{margin-top: 5px !important;margin-bottom: 30px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 25px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Discuss with a Career Consultant&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]You can schedule a call with an Institute of Data Career Consultant to discuss this course.[\/vc_column_text]\t<a id=\"thb-button-6a076c5602c82\" class=\"btn style1 medium full black small-radius  fancybox-inline  arrow-enabled\" href=\"course-outline\" target=\"_blank\" role=\"button\">\n\t\t<span>ScheduleaCall<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space mobile_height=&#8221;10px&#8221; height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;50px&#8221; height=&#8221;&#8221;]\t<div id=\"thb-slidetype-6a076c5602d90\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Introducing Institute of Data Consulting Business Skills<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a076c5602d90 .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_column_text]The Institute of Data Consulting Business Skills is an essential part of every Institute of Data certified professional. The Institute of Data educates and certifies professionals not only with technical skills but also with expertise in business consulting and communication to clients, managers, directors and stakeholders. Many certified professionals choose to work independently or join an existing consultancy.[\/vc_column_text]\t<div id=\"thb-slidetype-6a076c5602dc4\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Is a cybersecurity course really worth taking?<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a076c5602dc4 .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221;]\n<h2><span style=\"font-weight: 400;\">3 reasons you should take C<\/span><span style=\"font-weight: 400;\">ybersecurity training<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity training is critical for professionals who want to stay competitive in a rapidly evolving digital world.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">As cyber threats become more advanced, businesses and governments need experts who can safeguard sensitive data and prevent costly breaches. Proper training equips you with the practical skills to anticipate and counter these threats, helping organizations maintain secure systems.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">At the Institute of Data, our industry-aligned Cybersecurity Program focuses on real-world applications. With flexible learning options and expert-led courses, we prepare you to succeed in high-demand cybersecurity roles.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">#1: <\/span><span style=\"font-weight: 400;\">Cybersecurity training<\/span><span style=\"font-weight: 400;\"> prepares students for a future career in a challenging and ever-changing industry.<\/span><\/h3>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">Professionals need to evolve as quickly as cybersecurity threats do.<\/span><\/h4>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The digital landscape is constantly evolving, and cybersecurity threats are no exception.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">With hackers using increasingly sophisticated methods, cybersecurity professionals need to stay ahead of potential threats.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Human error still accounts for a significant number of data breaches, which highlights the importance of appropriate training for professionals.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Businesses and government agencies rely heavily on cybersecurity experts to protect sensitive information and maintain compliance. They need to be equipped with the necessary skills to recognize and mitigate security incidents and reduce organizational risks and potential financial losses.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">At the Institute of Data, we take measures to ensure our curriculum is up to date.<\/span><\/h4>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Just as our <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/software-engineering-program\/\"><span style=\"font-weight: 400;\">Software Engineering Course<\/span><\/a><span style=\"font-weight: 400;\"> equips you with the skills to design robust systems, our <\/span><span style=\"font-weight: 400;\">cybersecurity training<\/span><span style=\"font-weight: 400;\"> empowers you to protect those systems from evolving threats.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Our curriculum is crafted by the Institute of Data Academic Board, who bring decades of experience in cybersecurity to the table. We work closely with top universities and leading tech companies to ensure our coursework reflects the latest in cybersecurity trends and technologies.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">This collaboration allows for the creation of a flexible curriculum that accurately responds to the dynamic needs of the industry. Staying relevant in an industry as fluid as cybersecurity requires a commitment to continuous learning and innovation.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">#2: <\/span><span style=\"font-weight: 400;\">Cybersecurity training<\/span><span style=\"font-weight: 400;\"> allows students to learn from actively-working industry experts.<\/span><\/h3>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">The Institute of Data focuses on outcomes-based practical training.<\/span><\/h4>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s crucial for students to be equipped with techniques that extend beyond theory into practical, actionable solutions. At the Institute of Data, trainers are not just instructors\u2014they are industry professionals actively working in the field.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Students can receive training that is both practical and grounded in the realities of the current cybersecurity landscape. Acquire the skills necessary to succeed in the growing cybersecurity sector by engaging in intensive in-class training, labs and real-world projects.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">The availability of remote real-time learning allows students to balance learning with professional and personal commitments.<\/span><\/h4>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Flexibility without compromising quality is an essential aspect of the program.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">One of the benefits of online training in real-time is that students engage in an interactive and immersive experience that leverages modern video conferencing tools. This setup is particularly beneficial for those balancing professional and personal commitments.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Learners can join virtual break-out rooms, participate in screen sharing and utilize digital whiteboards. The collaborative environments fostered in these settings allow for peer-to-peer interaction and real-time instructor support, providing a richly engaging educational experience.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">#3: <\/span><span style=\"font-weight: 400;\">Cybersecurity training<\/span><span style=\"font-weight: 400;\"> helps you become more attractive to employers.<\/span><\/h3>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">Cybersecurity gives students credibility and confidence.<\/span><\/h4>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">As cybersecurity threats continue to evolve, employers are increasingly seeking professionals with specialized skills and credentials. Proper cybersecurity certification not only affirms your expertise but also positions you as a valuable asset capable of protecting vital digital resources.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Moreover, the right online security training program can increase your earning potential and accelerate career advancement, providing tangible benefits for your professional journey. Confidence gained through rigorous training empowers professionals to proactively identify risks and devise effective data security strategies.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">The Institute of Data provides students with the support they need.<\/span><\/h4>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The Institute of Data offers a comprehensive support framework that includes dedicated staff, career coaching and a collaborative learning environment, helping students stay motivated and maintain their focus.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Our specialized Job Outcomes Program is tailored to maximize the chances of students landing new job opportunities or achieving promotions within their current roles. Students receive personalized assistance with crafting resumes, enhancing interview skills and more, all aimed at unlocking their professional potential.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><a href=\"https:\/\/www.institutedata.com\/us\/faq\/\"><span style=\"font-weight: 400;\">Frequently Asked Questions (FAQ)<\/span><\/a><\/h2>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">What is <\/span><span style=\"font-weight: 400;\">cybersecurity training<\/span><span style=\"font-weight: 400;\">?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">While a <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/data-science-artificial-intelligence-program\/\"><span style=\"font-weight: 400;\">Data Science &amp; AI Course<\/span><\/a><span style=\"font-weight: 400;\"> provides insights into data-driven decision-making, <\/span><span style=\"font-weight: 400;\">cybersecurity training<\/span><span style=\"font-weight: 400;\"> provides individuals with the skills to secure digital infrastructures.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">At the Institute of Data, the Cybersecurity Program is offered in two formats: a 24-week part-time course or a 12-week full-time course. Designed for those aiming to start or transition into the cybersecurity field, this program emphasizes practical training.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Participants gain insights into prevalent risks such as intellectual property theft, ransomware and resource theft. Furthermore, they are equipped with knowledge of risk management as well as security and compliance frameworks.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">What are the different types of <\/span><span style=\"font-weight: 400;\">cybersecurity training<\/span><span style=\"font-weight: 400;\"> available?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">From foundational e-learning courses to role-based and industry-specific training, there\u2019s a wide range available to suit varying career goals.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">At the Institute of Data, the emphasis is on helping those looking to pivot their careers towards cybersecurity. Through the guidance of industry experts, students become adept at defending against cyber-attacks and devising business solutions, incorporating consulting techniques and project simulations.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Is <\/span><span style=\"font-weight: 400;\">cybersecurity training<\/span><span style=\"font-weight: 400;\"> a one-time effort or an ongoing process?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity training<\/span><span style=\"font-weight: 400;\"> is inherently an ongoing effort. Staying current with IT security awareness requires consistent engagement with the latest threats, vulnerabilities and best practices.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Ongoing training prevents complacency and helps professionals stay equipped to handle emerging information security threats. That\u2019s why the Institute of Data collaborates with universities and top tech companies to keep our <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\"><span style=\"font-weight: 400;\">Cybersecurity Course<\/span><\/a><span style=\"font-weight: 400;\"> curriculum up-to-date with these advancements in cybersecurity in an ever-changing digital environment.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Harness data today for tomorrow\u2019s careers<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Data is driving the transformation of industries, demanding evolving skill sets for success. The Institute of Data specializes in equipping professionals with the expertise needed for high-demand fields such as cybersecurity, big data and artificial intelligence.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Through partnerships with universities and industry leaders, we provide practical, accelerated training programs tailored to today\u2019s digital economy. Our focus is on bridging capability gaps and ensuring readiness for current job market shifts and future demands.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Seize the opportunity to advance your career with innovative training designed for immediate impact. Download a course outline today. <\/span>[\/vc_column_text][\/vc_column][vc_column fixed=&#8221;thb-fixed&#8221; width=&#8221;1\/3&#8243;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796352796{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571981187779{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: -25px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;2px&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJfZm9ybV84MCUyMiUzRSUzQyUyRmRpdiUzRSUzQ3NjcmlwdCUyMHNyYyUzRCUyMmh0dHBzJTNBJTJGJTJGYmxhY2tjYXRkYXRhLmFjdGl2ZWhvc3RlZC5jb20lMkZmJTJGZW1iZWQucGhwJTNGaWQlM0Q4MCUyMiUyMHR5cGUlM0QlMjJ0ZXh0JTJGamF2YXNjcmlwdCUyMiUyMGNoYXJzZXQlM0QlMjJ1dGYtOCUyMiUzRSUzQyUyRnNjcmlwdCUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796317949{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571967184695{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 25px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Discuss with a Career Consultant&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]You can schedule a call with an Institute of Data Career Consultant to discuss this course.[\/vc_column_text]\t<a id=\"thb-button-6a076c5602df3\" class=\"btn style1 medium full black small-radius  fancybox-inline  arrow-enabled\" href=\"httpswww.institutedata.comusconsultation\" target=\"_blank\" role=\"button\">\n\t\t<span>ScheduleaCall<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;mobile-footer-fixed&#8221; css=&#8221;.vc_custom_1572216358905{margin-bottom: -19px !important;padding-top: 15px !important;background-color: #000000 !important;}&#8221;][vc_column thb_color=&#8221;thb-light-column&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221; el_class=&#8221;text-center&#8221;][vc_column_text]\nDownload Course Outline<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1648796564794{margin-top: -30px !important;margin-bottom: 30px !important;}&#8221;][vc_column][vc_column_text] [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1571968629318{padding-bottom: 3vh !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;Share This Course&#8221; font_container=&#8221;tag:h6|text_align:right|color:0020ff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;align-justify&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;40px&#8221;][vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]The Cybersecurity course is designed for IT and non-IT professionals who are interested in transitioning to a career in cybersecurity. The program includes practical training, industry certification and job placement support to&hellip;<\/p>\n","protected":false},"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","tags":[3437],"class_list":["post-87912","portfolio","type-portfolio","status-publish","hentry","tag-seo_manual"],"_links":{"self":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio\/87912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio"}],"about":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/types\/portfolio"}],"replies":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/comments?post=87912"}],"version-history":[{"count":6,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio\/87912\/revisions"}],"predecessor-version":[{"id":88275,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio\/87912\/revisions\/88275"}],"wp:attachment":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media?parent=87912"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/tags?post=87912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}