{"id":87914,"date":"2024-11-13T13:48:27","date_gmt":"2024-11-13T02:48:27","guid":{"rendered":"https:\/\/www.institutedata.com\/?post_type=portfolio&#038;p=87914"},"modified":"2024-12-05T08:01:10","modified_gmt":"2024-12-04T21:01:10","slug":"cybersecurity-course-online","status":"publish","type":"portfolio","link":"https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-course-online\/","title":{"rendered":"Cybersecurity Course Online"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row css=&#8221;.vc_custom_1648796564794{margin-top: -30px !important;margin-bottom: 30px !important;}&#8221;][vc_column][vc_column_text]\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1571968629318{padding-bottom: 3vh !important;}&#8221;]\t<div id=\"thb-slidetype-6a0971969fc1f\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\"><\/p>\n<h1>Cybersecurity Course Online<\/h1>\n<p><\/span><\/span>\t\t\t<\/div>\n\n\t[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;Share This Course&#8221; font_container=&#8221;tag:h6|text_align:right|color:0020ff&#8221; use_theme_fonts=&#8221;yes&#8221;]\t<div class=\"thb-share-icons thb-right style1\">\n\t\t\t\t<ul>\n\t\t\t\t\t\t<li><a href=\"http:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fwww.institutedata.com%2Fus%2Fcourses%2Fcybersecurity-course-online%2F\" class=\"social boxed-icon facebook\"><i class=\"fa fa-facebook\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t<li><a href=\"https:\/\/twitter.com\/intent\/tweet?text=Cybersecurity%20Course%20Online&url=https%3A%2F%2Fwww.institutedata.com%2Fus%2Fcourses%2Fcybersecurity-course-online%2F&via=Institute%20of%20Data\" class=\"social boxed-icon twitter\"><i class=\"fa fa-twitter\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"https:\/\/www.linkedin.com\/cws\/share?url=https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-course-online\/\" class=\"social boxed-icon linkedin\"><i class=\"fa fa-linkedin\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t<li><a href=\"https:\/\/wa.me\/?text=Cybersecurity%20Course%20Online%20https%3A%2F%2Fwww.institutedata.com%2Fus%2Fcourses%2Fcybersecurity-course-online%2F\" class=\"social boxed-icon whatsapp\" data-href=\"https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-course-online\/\" data-action=\"share\/whatsapp\/share\"><i class=\"fa fa-whatsapp\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"fb-messenger:\/\/share\/?link=https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-course-online\/&app_id=\" class=\"social boxed-icon facebook-messenger\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"14\" height=\"14\" viewBox=\"96 93 322 324\"><path d=\"M257 93c-88.918 0-161 67.157-161 150 0 47.205 23.412 89.311 60 116.807V417l54.819-30.273C225.449 390.801 240.948 393 257 393c88.918 0 161-67.157 161-150S345.918 93 257 93zm16 202l-41-44-80 44 88-94 42 44 79-44-88 94z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t[\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;align-justify&#8221;][vc_column width=&#8221;2\/3&#8243;]\t<div id=\"thb-image-6a0971969fe42\" class=\"caption-style1 animation bottom-to-top alignleft full  thb_image_link wp-caption \">\n\t\t\t<div class=\"thb-image-inner size_100\">\n\t\t\t<img decoding=\"async\" class=\"thb_image  large-shadow  \" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2019\/08\/800-x-1000-Cyber-Security-Program.jpg\" width=\"800\" height=\"500\" alt=\"Cyber Security Program\" title=\"Cyber Security Program\" loading=\"lazy\" \/>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<style>\n\t\t\t\t#thb-image-6a0971969fe42,\n\t\t\t\t#thb-image-6a0971969fe42 img {\n\t\t\t\t\tborder-radius: 0px;\n\t\t\t\t}\n\t\t<\/style>\n\t\t<\/div>\n\t[vc_empty_space height=&#8221;40px&#8221;][vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]The Cybersecurity course is designed for IT and non-IT professionals who are interested in transitioning to a career in cybersecurity. The program includes practical training, industry certification and job placement support to help professionals secure a job in the cybersecurity industry.[\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1571968063176{margin-top: 55px !important;margin-bottom: 55px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 10px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #0020ff !important;border-left-style: solid !important;border-right-color: #0020ff !important;border-right-style: solid !important;border-top-color: #0020ff !important;border-top-style: solid !important;border-bottom-color: #0020ff !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a097196a0835\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Overview<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a097196a0835 .thb-slidetype-entry {\n\t\t\t\tcolor: #0020ff;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221;]The Cybersecurity course is delivered in a 24-week part-time or 12-week full-time format and is designed for career-driven professionals to transition into the cybersecurity industry.<\/p>\n<p>&nbsp;<\/p>\n<p>Our program includes pre-work, intensive practical training, industry certification and a job outcomes program in collaboration with university partners. The course content has been tailored to give you the skills that are demanded by businesses in today\u2019s rapidly evolving job market.<\/p>\n<p>&nbsp;<\/p>\n<p>Remote learning is available for this program. The interactive remote format enabled by video conferencing technology is a rich and connected experience featuring virtual break-out rooms, shared screens, digital whiteboards, peer-to-peer collaboration and instructor support.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1573518951818{margin-right: -35px !important;margin-left: -35px !important;}&#8221; el_id=&#8221;outline&#8221;][vc_column_inner css=&#8221;.vc_custom_1573085319162{margin-top: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 15px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;2px&#8221;][vc_column_text css=&#8221;.vc_custom_1573522055029{margin-top: -25px !important;}&#8221;]<div class='_form_20'><\/div><script type='text\/javascript' src='https:\/\/blackcatdata.activehosted.com\/f\/embed.php?static=0&id=20&6A097196A08BD&nostyles=1&preview=0'><\/script>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;20px&#8221; height=&#8221;&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1571981852249{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1573087132920{margin-top: 5px !important;margin-bottom: 30px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 5px !important;padding-right: 30px !important;padding-bottom: 10px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Ready to Enrol?&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Click to view upcoming course dates and enrol in this course.[\/vc_column_text]\t<a id=\"thb-button-6a097196a0922\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"enrolcyber-security-part-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>ViewPartTimeDatesEnrol<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space mobile_height=&#8221;10px&#8221; height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a097196a09af\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"enrolcyber-security-full-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>ViewFullTimeDatesEnrol<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;50px&#8221; height=&#8221;&#8221;]\t<div id=\"thb-slidetype-6a097196a0a1f\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Practical Cybersecurity Training at the Institute<\/span><\/span>\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]Learn in-demand skills to protect and secure businesses and government with education from the best cyber industry trainers.<\/p>\n<p>&nbsp;<\/p>\n<p>The Cybersecurity Program is a structured training program designed to help you develop the practical skills you will need, allowing you to progress into roles such as a Cybersecurity Analyst, Penetration Tester or SOC (Security Operations Consultant). After completing your Cyber Security Program, you will receive the recognition as a Certified Cyber Security Professional (CCSP)\u2122\ufe0f from the Institute of Data\u00ae.<\/p>\n<p>&nbsp;<\/p>\n<p>Hundreds of professionals choose the Institute of Data every year to prepare them for their future careers after careful consideration of their desired career progression and to attain maximum return on investment for their education. Leading the future of the profession, the Institute of Data offers a collaborative and successful program driven to ensure you have the best start to your career.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;]\t<div id=\"thb-slidetype-6a097196a0a4b\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">What is Practical Cybersecurity Training?<\/span><\/span>\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]Practical cybersecurity training is an essential requirement to practice as a cybersecurity professional. Learn from industry experts on how to defend from cyber-attacks and develop business solutions for businesses and government organizations, including consulting techniques and simulating commercial projects. This means you will be ready to work as a cybersecurity professional.[\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1571976183466{margin-top: 55px !important;margin-bottom: 5vh !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 25px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #44d9e6 !important;border-left-style: solid !important;border-right-color: #44d9e6 !important;border-right-style: solid !important;border-top-color: #44d9e6 !important;border-top-style: solid !important;border-bottom-color: #44d9e6 !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a097196a0a72\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Why The<\/span><\/span><span class=\"thb-slidetype-entry\"><span class=\"lines\">Institute Of Data?<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a097196a0a72 .thb-slidetype-entry {\n\t\t\t\tcolor: #44d9e6;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t\t<div id=\"thb-slidetype-6a097196a0a9a\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Students Will:<\/span><\/span>\t\t\t<\/div>\n\n\t[vc_empty_space mobile_height=&#8221;30px&#8221; height=&#8221;30px&#8221;]\t<div id=\"thb-iconbox-6a097196a0adb\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Be ready to practice cyber security<\/h5>\t\t\t<p>The Institute of Data\u2019s courses are designed to prepare students for real commercial work in the area of cyber security. It is focused on practical in-class training, labs and real-life projects.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0adb.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0adb.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a097196a0adb.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a097196a0adb.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a097196a0adb.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0adb.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a097196a0adb.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0adb.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a097196a0adb.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a097196a0adb.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a097196a0adb.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a097196a0adb.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a097196a0adb.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a097196a0bba\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Receive the best training and the latest curriculum<\/h5>\t\t\t<p>The Institute of Data trainers are actively working in the industry and will teach students how to practice cyber security in the real world. The curriculum is developed by the Institute of Data Academic Board with decades of experience working in cyber security.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0bba.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0bba.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a097196a0bba.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a097196a0bba.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a097196a0bba.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0bba.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a097196a0bba.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0bba.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a097196a0bba.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a097196a0bba.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a097196a0bba.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a097196a0bba.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a097196a0bba.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a097196a0c5e\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Be more attractive to employers<\/h5>\t\t\t<p>The Institute of Data\u2019s Cyber Security Program results in the Certified Cyber Security Professional (CCSP)\u2122\ufe0f Industry Certification which signals to employers that you are ready to join the industry. Your resume and profile will be reviewed by your Job Outcomes team to give you the best possible chance of success.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0c5e.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0c5e.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a097196a0c5e.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a097196a0c5e.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a097196a0c5e.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0c5e.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a097196a0c5e.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0c5e.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a097196a0c5e.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a097196a0c5e.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a097196a0c5e.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a097196a0c5e.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a097196a0c5e.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a097196a0cec\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Get more support and guidance<\/h5>\t\t\t<p>The member network offers support and guidance from mentors and direct connections to the industry.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0cec.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0cec.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a097196a0cec.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a097196a0cec.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a097196a0cec.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0cec.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a097196a0cec.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0cec.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a097196a0cec.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a097196a0cec.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a097196a0cec.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a097196a0cec.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a097196a0cec.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a097196a0d74\" class=\"thb-iconbox top type3  has-img  text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t\t\t\t\t<div class=\"iconbox-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"505\" height=\"505\" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2019\/04\/iod_seal_tp_black_c.svg\" class=\"thb_image  attachment-full\" alt=\"\" title=\"iod_seal_tp_black_c\" \/>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Meet great people and become a member of the Institute<\/h5>\t\t\t<p>Beyond a healthy discipline of practical education and learning, students meet great friends in your virtual or real classroom and become a member of the Institute of Data. Many students continue to keep in touch with their fellow students and the community becomes a strong network as students enter the industry.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0d74.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0d74.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a097196a0d74.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a097196a0d74.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a097196a0d74.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0d74.thb-iconbox .iconbox-image img {\n\t\t\t\t\twidth: 84px;\n\t\t\t\t\theight: auto;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0d74.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a097196a0d74.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a0d74.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a097196a0d74.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a097196a0d74.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a097196a0d74.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a097196a0d74.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a097196a0d74.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-testimonials-6a097196a2970\" class=\"thb-testimonials thb-testimonial-style2 thb-carousel style2   \" data-columns=\"1\" data-pagination=\"\" data-navigation=\"false\"\n\t\t\t\t\t\t data-autoplay=\"\" data-autoplay-speed=\"4000\" data-fade=\"true\" data-adaptive=\"false\">\n\t\t\t<div class=\"small-12  columns\">\n\t\t\t\t\t\t\t<div class=\"thb-testimonial has-avatar\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<blockquote><p>\u201cI gained an idea of what companies need and how we need to use our skills. This made it pretty easy for me to get my first job.\u201d<\/p>\n<\/blockquote>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"author_image \" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2019\/04\/katya-140x140.jpg\" width=\"140\" height=\"140\" alt=\"katya\" title=\"katya\" loading=\"lazy\" \/>\t\t\t\t\t\t\t<div class=\"testimonial-author\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<cite>Katya<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"title\">Institute of Data Certified Professional<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t<\/div>\n\t[\/vc_column][vc_column fixed=&#8221;thb-fixed&#8221; width=&#8221;1\/3&#8243;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796352796{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571981187779{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: -25px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;2px&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJfZm9ybV84MCUyMiUzRSUzQyUyRmRpdiUzRSUzQ3NjcmlwdCUyMHNyYyUzRCUyMmh0dHBzJTNBJTJGJTJGYmxhY2tjYXRkYXRhLmFjdGl2ZWhvc3RlZC5jb20lMkZmJTJGZW1iZWQucGhwJTNGaWQlM0Q4MCUyMiUyMHR5cGUlM0QlMjJ0ZXh0JTJGamF2YXNjcmlwdCUyMiUyMGNoYXJzZXQlM0QlMjJ1dGYtOCUyMiUzRSUzQyUyRnNjcmlwdCUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796317949{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571967184695{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 25px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Ready to Enroll?&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Click to view upcoming part time cyber security program course dates.[\/vc_column_text]\t<a id=\"thb-button-6a097196a3704\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"httpswww.institutedata.comusenrollcyber-security-part-time-program\" target=\"_blank\" role=\"button\">\n\t\t<span>ViewPartTimeDatesEnroll<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a097196a378d\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"httpswww.institutedata.comusenrollcyber-security-full-time-program\" target=\"_blank\" role=\"button\">\n\t\t<span>ViewFullTimeDatesEnroll<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1571979879714{margin-top: 8vh !important;margin-bottom: 10vh !important;border-top-width: 2px !important;border-bottom-width: 2px !important;padding-top: 9vh !important;padding-bottom: 8vh !important;background-color: #f7f7f7 !important;border-top-color: #ff4600 !important;border-top-style: solid !important;border-bottom-color: #ff4600 !important;border-bottom-style: solid !important;}&#8221;][vc_column animation=&#8221;animation bottom-to-top&#8221;][vc_row_inner css=&#8221;.vc_custom_1571968515353{padding-bottom: 50px !important;}&#8221;][vc_column_inner]\t<div id=\"thb-slidetype-6a097196a37e9\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Program Structure<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a097196a37e9 .thb-slidetype-entry {\n\t\t\t\tcolor: #ff4600;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243; animation=&#8221;animation bottom-to-top&#8221; css=&#8221;.vc_custom_1571199244193{padding-right: 20% !important;}&#8221;]\t<div id=\"thb-iconbox-6a097196a382c\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path d=\"m1 1h46v62h-46z\"\/><path d=\"m9 63v-61\"\/><path d=\"m14 15h28\"\/><path d=\"m14 21h28\"\/><path d=\"m63 3v50l-4 8-4-8v-50z\"\/><path d=\"m55 7h-4v10\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Pre-Work<\/h5>\t\t\t<p>Students complete curated pre-work as an interactive online learning experience designed to prepare every student with the required skills and knowledge to complete all coursework and training.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a382c.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a382c.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a097196a382c.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a097196a382c.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a097196a382c.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a382c.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a097196a382c.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a382c.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a097196a382c.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a097196a382c.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a097196a382c.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a097196a382c.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a097196a382c.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner thb_color=&#8221;thb-light-column&#8221; width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1556240953838{padding-right: 20% !important;}&#8221;]\t<div id=\"thb-iconbox-6a097196a38e1\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m23 36l7 7 13-13\"\/><path d=\"m46 10h-28\"\/><path d=\"m12 10h-11v48h62v-48h-11\"\/><path d=\"m12 6h6v8h-6z\"\/><path d=\"m46 6h6v8h-6z\"\/><path d=\"m1 18h62\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Remote and In Class Training<\/h5>\t\t\t<p>Students undertake a professional in-classroom course from a team of expert industry trainers from leading consultancies and enterprises to acquire the most sought-after practical training in the country.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a38e1.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a38e1.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a097196a38e1.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a097196a38e1.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a097196a38e1.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a38e1.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a097196a38e1.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a38e1.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a097196a38e1.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a097196a38e1.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a097196a38e1.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a097196a38e1.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a097196a38e1.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner thb_color=&#8221;thb-light-column&#8221; width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1571199248343{padding-right: 20% !important;}&#8221;]\t<div id=\"thb-iconbox-6a097196a398b\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path d=\"m5 41l6-40h42l6 40\"\/><path d=\"M21,41c0,6.075,4.925,11,11,11s11-4.925,11-11h16v22\n\tH5V41H21z\"\/><circle cx=\"29\" cy=\"21\" r=\"6\"\/><path d=\"m33 25l8 8\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Job Outcomes<\/h5>\t\t\t<p>Students will undergo a Job Outcomes Program through the Institute of Data which will help position students for the best chance of a new job opportunity and\/or internal promotion. Land a job in one of the most sought after fields in tech with the guidance of Professional Career Coaches.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a398b.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a398b.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a097196a398b.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a097196a398b.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a097196a398b.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a398b.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a097196a398b.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a398b.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a097196a398b.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a097196a398b.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a097196a398b.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a097196a398b.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a097196a398b.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1571204006887{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#dddddd&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;]\t<div id=\"thb-iconbox-6a097196a3a31\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>How Will Students Be Assessed?<\/h5>\t\t\t<p>The Institute of Data \u2013 Cyber Security Program is assessed through completion of labs and a final capstone project. There is no formal exam. The capstone project is a real-life project and is assessed against the Institute of Data Certification Standards set by the Academic Board and Examination Board.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3a31.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3a31.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a097196a3a31.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a097196a3a31.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a097196a3a31.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3a31.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a097196a3a31.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3a31.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a097196a3a31.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a097196a3a31.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a097196a3a31.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a097196a3a31.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a097196a3a31.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1571705355222{padding-top: 25px !important;padding-bottom: 30px !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#dddddd&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;]\t<div id=\"thb-iconbox-6a097196a3a93\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Post Course<\/h5>\t\t\t<p>We'll help you transition into the big data and cyber security industry. We have a 93% job outcome success rate within 180 days of graduation for active job seekers.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3a93.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3a93.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a097196a3a93.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a097196a3a93.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a097196a3a93.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3a93.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a097196a3a93.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3a93.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a097196a3a93.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a097196a3a93.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a097196a3a93.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a097196a3a93.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a097196a3a93.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner el_class=&#8221;text-right&#8221; width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-xs&#8221;]\t<div class=\"thb-counter counter-style1 thb-side left\" id=\"thb-counter-6a097196a3af0\" data-separator=\"\" data-format=\"(,ddd).dd\">\n\t\t\t\t\t<div class=\"counter-container\">\n\t\t\t\t\t\t\t\t<div class=\"h1\" data-count=\"1000\" data-speed=\"4000\">0<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"h1 counter-text counter\">+<\/div>\t\t\t<\/div>\n\t\t\t<h6>Industry Partners &amp; Contacts<\/h6>\n\t\t\t\t\t\t\t\t\t\t<style>\n\t\t\t#thb-counter-6a097196a3af0 .odometer.odometer-auto-theme.odometer-animating-up .odometer-ribbon-inner,\n\t\t\t#thb-counter-6a097196a3af0 .odometer.odometer-theme-minimal.odometer-animating-up .odometer-ribbon-inner {\n\t\t\t\ttransition: transform 4s;\n\t\t\t}\n\t\t\t\t\t\t\t#thb-counter-6a097196a3af0.thb-counter .h1,\n\t\t\t\t#thb-counter-6a097196a3af0.thb-counter .counter {\n\t\t\t\t\tcolor: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-counter-6a097196a3af0.thb-counter h6,\n\t\t\t\t#thb-counter-6a097196a3af0.thb-counter .thb-title {\n\t\t\t\t\tcolor: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-counter-6a097196a3af0.thb-counter figure svg path,\n\t\t\t\t#thb-counter-6a097196a3af0.thb-counter figure svg circle,\n\t\t\t\t#thb-counter-6a097196a3af0.thb-counter figure svg rect,\n\t\t\t\t#thb-counter-6a097196a3af0.thb-counter figure svg ellipse {\n\t\t\t\t\tstroke: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row content_placement=&#8221;top&#8221; el_class=&#8221;align-justify&#8221; css=&#8221;.vc_custom_1621556855638{margin-top: 6vh !important;margin-bottom: 8vh !important;}&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_row_inner css=&#8221;.vc_custom_1572411820192{margin-bottom: 55px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 20px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #000000 !important;border-left-style: solid !important;border-right-color: #000000 !important;border-right-style: solid !important;border-top-color: #000000 !important;border-top-style: solid !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a097196a3bd8\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Syllabus Breakdown<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a097196a3bd8 .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t\t<div id=\"thb-accordion-6a097196a3c08\" class=\"thb-accordion style1 has-accordion\" data-scroll=\"\" data-index=\"0\">\n\t\t[vc_tta_section title=&#8221;Introduction to Cyber Security&#8221; tab_id=&#8221;1572411205441-0bd5ab61-aba40c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>A game of defense and attack, ruled on both sides by economics<br \/>\nCompliance vs Security<br \/>\nDefinitions and Language<br \/>\nEncryption<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Top Risks Businesses Face Today&#8221; tab_id=&#8221;1572411322036-b01789c9-dab20c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Business Email Compromise<br \/>\nIntellectual Property Theft<br \/>\nRansomware<br \/>\nResource Theft<br \/>\nOther notable Case Studies<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Foundational Networking&#8221; tab_id=&#8221;1572411438174-63ec584e-38b60c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Networks and Network protocols<br \/>\nAuthentication<br \/>\nSystems<br \/>\nEncryption<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Consulting and Interpersonal Skills&#8221; tab_id=&#8221;1572411462444-c510f9d7-659a0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Questioning technique<br \/>\nCritical thinking<br \/>\nDocumentation<br \/>\nPresentation skills<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;The Attacker\u2019s View&#8221; tab_id=&#8221;1572411481055-aa0e8f44-83460c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>The Attacker\u2019s Mindset<br \/>\nTechnical Attacks<br \/>\nAttack Software and Tooling<br \/>\nOWASP<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;The Defensive Mindset&#8221; tab_id=&#8221;1572411499794-30830090-09850c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Economics of Defense<br \/>\nDefensive Architecture<br \/>\nAssets and Perimeters<br \/>\nLogs and Monitoring<br \/>\nThreat Intelligence<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Incident Response&#8221; tab_id=&#8221;1572411584028-69dfd619-46470c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Security vs ITIL<br \/>\nIncident Playbooks<br \/>\nIncident Management<br \/>\nCrisis Communication<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Risk Management&#8221; tab_id=&#8221;1572411607499-67011be8-75db0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Threat Risk Assessment<br \/>\nDetermining the likelihood<br \/>\nEconomic Measurement<br \/>\nEffectiveness of controls<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Security and Compliance Frameworks&#8221; tab_id=&#8221;1572411635261-7ea3c582-a4bb0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Compliance Frameworks Introduction<br \/>\nCommon Frameworks: Overview &amp; Scope<br \/>\nPitfalls and Common Mistakes<br \/>\nBalancing Security Outcomes and Compliance Requirements<br \/>\nCyber Security Practice (ongoing)<br \/>\nCapstone Project (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Higher Order Impacts of Realized Cyber Risk&#8221; tab_id=&#8221;1572411655577-68b420ac-c02f0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Trust and Confidence<br \/>\nAdministrative Functions<br \/>\nSupply Chain<br \/>\nControl Systems and Operational Technology: Introduction<br \/>\nCapstone Project (ongoing)<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Ongoing Modules&#8221; tab_id=&#8221;1572411685849-49b2a6cb-70510c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Additional Topics: determined by students and Lead Trainer<br \/>\nJob Outcomes Program<br \/>\nConsultation and Presentation training<br \/>\nCyber Security Practice<br \/>\nCapstone Project<\/p>\n[\/vc_column_text][\/vc_tta_section]\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1648797419272{margin-bottom: 55px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 10px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #000000 !important;border-left-style: solid !important;border-right-color: #000000 !important;border-right-style: solid !important;border-top-color: #000000 !important;border-top-style: solid !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a097196a3c4a\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">When Can I Start?<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a097196a3c4a .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_empty_space height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a097196a3c7d\" class=\"btn style1 large full gradient no-radius    arrow-enabled\" href=\"httpswww.institutedata.comusenrollcyber-security-part-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>ViewPartTimeDates<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t\t<style>\n\n\t\t\t\t\t\t\t\t\/* Style1 *\/\n\t\t\t\t#thb-button-6a097196a3c7d.style1 {\n\t\t\t\t\tbackground:#ff4600;background:linear-gradient( -135deg,#ff4600,#ff4600 );\t\t\t\t}\n\t\t\t\t#thb-button-6a097196a3c7d.style1:after {\n\t\t\t\t\tbackground: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t\t[vc_empty_space height=&#8221;55px&#8221;]\t<a id=\"thb-button-6a097196a3cf0\" class=\"btn style1 large full gradient no-radius    arrow-enabled\" href=\"httpswww.institutedata.comusenrollcyber-security-full-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>ViewFullTimeDates<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t\t<style>\n\n\t\t\t\t\t\t\t\t\/* Style1 *\/\n\t\t\t\t#thb-button-6a097196a3cf0.style1 {\n\t\t\t\t\tbackground:#ff4600;background:linear-gradient( -135deg,#ff4600,#ff4600 );\t\t\t\t}\n\t\t\t\t#thb-button-6a097196a3cf0.style1:after {\n\t\t\t\t\tbackground: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t\t[vc_empty_space height=&#8221;55px&#8221;]\t<div id=\"thb-iconbox-6a097196a3d57\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Fees &amp; Payment<\/h5>\t\t\t<p>Pre-payment deposit of $300 is required to enroll. Current fees are USD $12,500 for the full time and part time program. Flexible payment plans available.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3d57.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3d57.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a097196a3d57.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a097196a3d57.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a097196a3d57.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #0020ff;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3d57.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a097196a3d57.thb-iconbox figure h5 {\n\t\t\t\tcolor: #0020ff;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3d57.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a097196a3d57.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #0020ff;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a097196a3d57.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a097196a3d57.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #0020ff;\n\t\t\t}\n\t\t\t#thb-iconbox-6a097196a3d57.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a097196a3d57.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #0020ff;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space height=&#8221;10px&#8221;][vc_separator color=&#8221;custom&#8221; border_width=&#8221;2&#8243; css_animation=&#8221;bottom-to-top&#8221; accent_color=&#8221;#0020ff&#8221;][vc_empty_space height=&#8221;20px&#8221;]\t<div id=\"thb-iconbox-6a097196a3dc3\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Course Entry Requirements<\/h5>\t\t\t<p>Completion of a bachelor degree in any field of studies<\/p>\n<p>Completion of any previous qualification undertaken in English<\/p>\n<p>Completion of assigned online pre-work provided to you when you enroll<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3dc3.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3dc3.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a097196a3dc3.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a097196a3dc3.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a097196a3dc3.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3dc3.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a097196a3dc3.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3dc3.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a097196a3dc3.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a097196a3dc3.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a097196a3dc3.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a097196a3dc3.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a097196a3dc3.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t\t<div id=\"thb-iconbox-6a097196a3e26\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Time Commitment: Part Time Program<\/h5>\t\t\t<p>24 weeks intensive remote or in-class training | 2 night classes per week + 1 Saturday class every other week<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3e26.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3e26.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a097196a3e26.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a097196a3e26.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a097196a3e26.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3e26.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a097196a3e26.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3e26.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a097196a3e26.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a097196a3e26.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a097196a3e26.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a097196a3e26.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a097196a3e26.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t\t<div id=\"thb-iconbox-6a097196a3e78\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Time Commitment: Full Time Program<\/h5>\t\t\t<p>12 weeks intensive remote or in-class training | Monday-Friday<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3e78.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3e78.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a097196a3e78.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a097196a3e78.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a097196a3e78.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3e78.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a097196a3e78.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3e78.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a097196a3e78.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a097196a3e78.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a097196a3e78.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a097196a3e78.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a097196a3e78.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t\t<div id=\"thb-iconbox-6a097196a3ec7\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Location<\/h5>\t\t\t<p>United States (Remote or In-person)<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3ec7.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3ec7.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a097196a3ec7.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a097196a3ec7.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a097196a3ec7.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3ec7.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a097196a3ec7.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a097196a3ec7.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a097196a3ec7.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a097196a3ec7.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a097196a3ec7.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a097196a3ec7.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a097196a3ec7.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1573518960940{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1573087378964{margin-top: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 20px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]<div class='_form_20'><\/div><script type='text\/javascript' src='https:\/\/blackcatdata.activehosted.com\/f\/embed.php?static=0&id=20&6A097196A3F56&nostyles=1&preview=0'><\/script>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;20px&#8221; height=&#8221;&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1571981852249{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1573087311403{margin-top: 5px !important;margin-bottom: 30px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 25px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Discuss with a Career Consultant&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]You can schedule a call with an Institute of Data Career Consultant to discuss this course.[\/vc_column_text]\t<a id=\"thb-button-6a097196a3f8a\" class=\"btn style1 medium full black small-radius  fancybox-inline  arrow-enabled\" href=\"course-outline\" target=\"_blank\" role=\"button\">\n\t\t<span>ScheduleaCall<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space mobile_height=&#8221;10px&#8221; height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;50px&#8221; height=&#8221;&#8221;]\t<div id=\"thb-slidetype-6a097196a3fe4\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Introducing Institute of Data Consulting Business Skills<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a097196a3fe4 .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_column_text]The Institute of Data Consulting Business Skills is an essential part of every Institute of Data certified professional. The Institute of Data educates and certifies professionals not only with technical skills but also with expertise in business consulting and communication to clients, managers, directors and stakeholders. Many certified professionals choose to work independently or join an existing consultancy.[\/vc_column_text]\t<div id=\"thb-slidetype-6a097196a4006\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Is a cybersecurity course really worth taking?<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a097196a4006 .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221;]\n<h2><span style=\"font-weight: 400;\">How To Choose The Right <\/span><span style=\"font-weight: 400;\">Cybersecurity Course Online<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The search for a \u201c<\/span><span style=\"font-weight: 400;\">cybersecurity course online<\/span><span style=\"font-weight: 400;\">\u201d often points to the pressing need for professionals to upskill in this rapidly evolving digital arena. Flexibility, convenience and the promise of high-demand jobs make online courses an attractive option.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">With that in mind, cybersecurity classes offered by online learning platforms provide practical, real-world knowledge paired with critical support for cybersecurity roles. Moreover, these courses offer professionals the opportunity to collaborate with peers and experts around the world, creating an immersive learning experience.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Choosing the right cybersecurity course is crucial to ensuring long-term career success and growth in the field. The Institute of Data offers a direct pathway to achieve this with industry-aligned programs and partnerships with leading universities.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Step #1: Find out what a <\/span><span style=\"font-weight: 400;\">cybersecurity course online<\/span><span style=\"font-weight: 400;\"> can offer.<\/span><\/h3>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">It\u2019s ideal to find out more about what an online cybersecurity course can offer you.<\/span><\/h4>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">One of the main advantages of online cybersecurity courses is their flexibility. Unlike traditional classroom settings, online courses allow you to tailor your educational schedule to suit your schedule or commitments. Rather than keeping up with a schedule that might not suit you, this flexibility allows you to learn at your own pace.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">An online cybersecurity course can also provide an interactive experience.<\/span><\/h4>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Online courses have become incredibly interactive thanks to video conferencing technology, as seen with our <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/data-science-artificial-intelligence-program\/\"><span style=\"font-weight: 400;\">Data Science &amp; AI course<\/span><\/a><span style=\"font-weight: 400;\">. Features such as virtual break-out rooms, shared screens and digital whiteboards simulate a real classroom environment, where you can work collaboratively with your peers. With these features, you can apply what you learn in real-time.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Step #2: Select the ideal cybersecurity course for your career path.<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Not every <\/span><span style=\"font-weight: 400;\">cybersecurity course online<\/span><span style=\"font-weight: 400;\"> is designed the same way as other courses, so it\u2019s practical to look into which course will be most useful to your career. That being said, there are cybersecurity courses designed to accommodate a wide range of learners, including both IT and non-IT professionals.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Many programs, like the Institute of Data\u2019s <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/software-engineering-program\/\"><span style=\"font-weight: 400;\">Software Engineering course<\/span><\/a><span style=\"font-weight: 400;\">, are open to anyone interested in learning more about the field regardless of their background. That said, certain skills can enhance your learning experience and future success. An understanding of digital concepts, problem-solving skills, attention to detail and a strong interest in technology can give you an advantage.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">Prioritizing your career goals is equally important when choosing a cybersecurity program.<\/span><\/h4>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">If your objective is to move into a technical role known for its high demand and job security, there is substantial growth potential in this field. The skills gained through a <\/span><span style=\"font-weight: 400;\">cybersecurity course online<\/span><span style=\"font-weight: 400;\"> can position you as a vital asset to any company.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">\u00a0Step #3: Research into the course content and certifications offered.<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">When looking at a cybersecurity course, check the specific topics it covers. A good program should teach the foundational ideas and also focus on important areas like network security, data cyber protection and information risk management.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s also smart to pick courses that provide recognized certifications. These certifications show you have the skills needed in cybersecurity and meet industry standards. With the help of industry expert instructors at the Institute of Data, you\u2019ll gain a perspective that goes beyond textbooks, helping you understand cybersecurity threats and defense strategies.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">This approach ensures that you are actively training your learned skills for future practical application.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Step #4: Assess the long-term value of the cybersecurity course.<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How do you identify a cybersecurity certification course\u2019s long-term value? An industry-aligned cybersecurity program or even an information security course should offer up-to-date, practical skills tailored to real-world needs.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">A structured <\/span><span style=\"font-weight: 400;\">cybersecurity course online, like the one offered by <\/span><span style=\"font-weight: 400;\">the Institute of Data, will typically include practical projects and career support services like mentorship and job placement assistance. All of these features are designed to enhance learning and improve job prospects.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">As cybersecurity demand grows with increasing digital threats, completing a recognized course can lead to career advancement and higher earning potential, making it a worthwhile investment. The long-term benefits of a cybersecurity online training program are not only job readiness but also ongoing professional development and career resilience in this expanding field.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><a href=\"https:\/\/www.institutedata.com\/us\/faq\/\"><span style=\"font-weight: 400;\">Frequently Asked Questions (FAQ)<\/span><\/a><\/h2>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">What skills can I learn in an online cybersecurity course?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">You can gain a comprehensive set of skills when you take the Institute of Data\u2019s <\/span><span style=\"font-weight: 400;\">Cybersecurity course online<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Foundational cybersecurity skills provide the bedrock knowledge required to understand nuanced cybersecurity risks and terminologies. They also ensure learners are equipped to grasp more complex topics as they progress. These necessary skills are often taught through practical training, allowing learners to apply what they have learned to real-life situations.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Additionally, certain soft skills are part of the curriculum. Cybersecurity specialists must hone skills such as critical thinking to assess and respond to threats effectively. The ability to ask questions and document processes is another important skill for analyzing data breaches or weaknesses.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Ultimately, a well-rounded <\/span><span style=\"font-weight: 400;\">cybersecurity course online<\/span><span style=\"font-weight: 400;\"> should equip you with the technical prowess necessary for the field. If you want to learn more about the Institute of Data\u2019s <\/span><span style=\"font-weight: 400;\">Cybersecurity Program, just s<\/span><span style=\"font-weight: 400;\">chedule a <\/span><a href=\"https:\/\/www.institutedata.com\/us\/consultation\/\"><span style=\"font-weight: 400;\">career consultation<\/span><\/a><span style=\"font-weight: 400;\"> with us today, and we\u2019ll answer all of your questions.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Are online cybersecurity courses recognized by employers?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Yes, recognized certifications from reputable institutions can prove invaluable when transitioning to a new role or advancing in your current career.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Programs like those offered by the Institute of Data, which collaborate with leading tech companies and top universities, are especially valued for their credibility and industry alignment. Such partnerships ensure the course stays relevant and adheres to current industry standards, reflecting a robust understanding of what the sector demands.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">What job roles are available after completing a cybersecurity course?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Completing a <\/span><span style=\"font-weight: 400;\">cybersecurity course online<\/span><span style=\"font-weight: 400;\"> can open doors to several promising career paths.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">One such role is as a Cybersecurity Analyst, whose role involves an organization\u2019s data protection for sensitive data and system threats. This position involves monitoring networks, identifying vulnerabilities and implementing necessary security measures for information security.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Another role is a Penetration Tester, where you simulate attacks to test a system\u2019s defenses, identifying potential weaknesses before malicious actors can exploit them. A Security Operations Consultant is also a viable position; it involves the constant analysis of security alerts and the development of strategies to mitigate risks.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Secure your future in a data-driven economy<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Harness the power of data to advance your career with the Institute of Data.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">We understand that the rapid evolution of technology demands adaptation and lifelong learning for professionals. By offering tailored training programs in cybersecurity, big data and artificial intelligence, we equip you with the skills required to thrive in the industries of the future.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">We offer courses that are industry-aligned and designed to fit around your busy schedule with 24-week part-time and 12-week full-time formats. Our approach enables you to balance your career advancement with your current responsibilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Embrace the opportunity to future-proof your career and stay competitive with targeted practical education. Download a course outline to learn more about our <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\"><span style=\"font-weight: 400;\">Cybersecurity course<\/span><\/a><span style=\"font-weight: 400;\">.<\/span>[\/vc_column_text][\/vc_column][vc_column fixed=&#8221;thb-fixed&#8221; width=&#8221;1\/3&#8243;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796352796{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571981187779{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: -25px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;2px&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJfZm9ybV84MCUyMiUzRSUzQyUyRmRpdiUzRSUzQ3NjcmlwdCUyMHNyYyUzRCUyMmh0dHBzJTNBJTJGJTJGYmxhY2tjYXRkYXRhLmFjdGl2ZWhvc3RlZC5jb20lMkZmJTJGZW1iZWQucGhwJTNGaWQlM0Q4MCUyMiUyMHR5cGUlM0QlMjJ0ZXh0JTJGamF2YXNjcmlwdCUyMiUyMGNoYXJzZXQlM0QlMjJ1dGYtOCUyMiUzRSUzQyUyRnNjcmlwdCUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796317949{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571967184695{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 25px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Discuss with a Career Consultant&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]You can schedule a call with an Institute of Data Career Consultant to discuss this course.[\/vc_column_text]\t<a id=\"thb-button-6a097196a402c\" class=\"btn style1 medium full black small-radius  fancybox-inline  arrow-enabled\" href=\"httpswww.institutedata.comusconsultation\" target=\"_blank\" role=\"button\">\n\t\t<span>ScheduleaCall<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;mobile-footer-fixed&#8221; css=&#8221;.vc_custom_1572216358905{margin-bottom: -19px !important;padding-top: 15px !important;background-color: #000000 !important;}&#8221;][vc_column thb_color=&#8221;thb-light-column&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221; el_class=&#8221;text-center&#8221;][vc_column_text]\nDownload Course Outline<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1648796564794{margin-top: -30px !important;margin-bottom: 30px !important;}&#8221;][vc_column][vc_column_text] [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1571968629318{padding-bottom: 3vh !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;Share This Course&#8221; font_container=&#8221;tag:h6|text_align:right|color:0020ff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;align-justify&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;40px&#8221;][vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]The Cybersecurity course is designed for IT and non-IT professionals who are interested in transitioning to a career in cybersecurity. The program includes practical training, industry certification and job placement support to&hellip;<\/p>\n","protected":false},"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","tags":[3437],"class_list":["post-87914","portfolio","type-portfolio","status-publish","hentry","tag-seo_manual"],"_links":{"self":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio\/87914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio"}],"about":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/types\/portfolio"}],"replies":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/comments?post=87914"}],"version-history":[{"count":5,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio\/87914\/revisions"}],"predecessor-version":[{"id":88278,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio\/87914\/revisions\/88278"}],"wp:attachment":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media?parent=87914"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/tags?post=87914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}