{"id":87918,"date":"2024-11-13T13:19:19","date_gmt":"2024-11-13T02:19:19","guid":{"rendered":"https:\/\/www.institutedata.com\/?post_type=portfolio&#038;p=87918"},"modified":"2024-12-05T07:47:49","modified_gmt":"2024-12-04T20:47:49","slug":"cybersecurity-online-certification","status":"publish","type":"portfolio","link":"https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-online-certification\/","title":{"rendered":"Cybersecurity Online Certification"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row css=&#8221;.vc_custom_1648796564794{margin-top: -30px !important;margin-bottom: 30px !important;}&#8221;][vc_column][vc_column_text]\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1571968629318{padding-bottom: 3vh !important;}&#8221;]\t<div id=\"thb-slidetype-6a0b76166ea98\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h1><span class=\"thb-slidetype-entry\"><span class=\"lines\">Cybersecurity Online Certification<\/span><\/span><\/h1>\n<p>*\t\t\t<\/div>\n\n\t[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;Share This Course&#8221; font_container=&#8221;tag:h6|text_align:right|color:0020ff&#8221; use_theme_fonts=&#8221;yes&#8221;]\t<div class=\"thb-share-icons thb-right style1\">\n\t\t\t\t<ul>\n\t\t\t\t\t\t<li><a href=\"http:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fwww.institutedata.com%2Fus%2Fcourses%2Fcybersecurity-online-certification%2F\" class=\"social boxed-icon facebook\"><i class=\"fa fa-facebook\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t<li><a href=\"https:\/\/twitter.com\/intent\/tweet?text=Cybersecurity%20Online%20Certification&url=https%3A%2F%2Fwww.institutedata.com%2Fus%2Fcourses%2Fcybersecurity-online-certification%2F&via=Institute%20of%20Data\" class=\"social boxed-icon twitter\"><i class=\"fa fa-twitter\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"https:\/\/www.linkedin.com\/cws\/share?url=https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-online-certification\/\" class=\"social boxed-icon linkedin\"><i class=\"fa fa-linkedin\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t<li><a href=\"https:\/\/wa.me\/?text=Cybersecurity%20Online%20Certification%20https%3A%2F%2Fwww.institutedata.com%2Fus%2Fcourses%2Fcybersecurity-online-certification%2F\" class=\"social boxed-icon whatsapp\" data-href=\"https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-online-certification\/\" data-action=\"share\/whatsapp\/share\"><i class=\"fa fa-whatsapp\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"fb-messenger:\/\/share\/?link=https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-online-certification\/&app_id=\" class=\"social boxed-icon facebook-messenger\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"14\" height=\"14\" viewBox=\"96 93 322 324\"><path d=\"M257 93c-88.918 0-161 67.157-161 150 0 47.205 23.412 89.311 60 116.807V417l54.819-30.273C225.449 390.801 240.948 393 257 393c88.918 0 161-67.157 161-150S345.918 93 257 93zm16 202l-41-44-80 44 88-94 42 44 79-44-88 94z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t[\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;align-justify&#8221;][vc_column width=&#8221;2\/3&#8243;]\t<div id=\"thb-image-6a0b76166eeca\" class=\"caption-style1 animation bottom-to-top alignleft full  thb_image_link wp-caption \">\n\t\t\t<div class=\"thb-image-inner size_100\">\n\t\t\t<img decoding=\"async\" class=\"thb_image  large-shadow  \" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2019\/08\/800-x-1000-Cyber-Security-Program.jpg\" width=\"800\" height=\"500\" alt=\"Cyber Security Program\" title=\"Cyber Security Program\" loading=\"lazy\" \/>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<style>\n\t\t\t\t#thb-image-6a0b76166eeca,\n\t\t\t\t#thb-image-6a0b76166eeca img {\n\t\t\t\t\tborder-radius: 0px;\n\t\t\t\t}\n\t\t<\/style>\n\t\t<\/div>\n\t[vc_empty_space height=&#8221;40px&#8221;][vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]The Cybersecurity course is designed for IT and non-IT professionals who are interested in transitioning to a career in cybersecurity. The program includes practical training, industry certification and job placement support to help professionals secure a job in the cybersecurity industry.[\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1571968063176{margin-top: 55px !important;margin-bottom: 55px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 10px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #0020ff !important;border-left-style: solid !important;border-right-color: #0020ff !important;border-right-style: solid !important;border-top-color: #0020ff !important;border-top-style: solid !important;border-bottom-color: #0020ff !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a0b76166fb71\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Overview<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a0b76166fb71 .thb-slidetype-entry {\n\t\t\t\tcolor: #0020ff;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221;]The Cybersecurity course is delivered in a 24-week part-time or 12-week full-time format and is designed for career-driven professionals to transition into the cybersecurity industry.<\/p>\n<p>&nbsp;<\/p>\n<p>Our program includes pre-work, intensive practical training, industry certification and a job outcomes program in collaboration with university partners. The course content has been tailored to give you the skills that are demanded by businesses in today\u2019s rapidly evolving job market.<\/p>\n<p>&nbsp;<\/p>\n<p>Remote learning is available for this program. The interactive remote format enabled by video conferencing technology is a rich and connected experience featuring virtual break-out rooms, shared screens, digital whiteboards, peer-to-peer collaboration and instructor support.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1573518951818{margin-right: -35px !important;margin-left: -35px !important;}&#8221; el_id=&#8221;outline&#8221;][vc_column_inner css=&#8221;.vc_custom_1573085319162{margin-top: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 15px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;2px&#8221;][vc_column_text css=&#8221;.vc_custom_1573522055029{margin-top: -25px !important;}&#8221;]<div class='_form_20'><\/div><script type='text\/javascript' src='https:\/\/blackcatdata.activehosted.com\/f\/embed.php?static=0&id=20&6A0B76166FC21&nostyles=1&preview=0'><\/script>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;20px&#8221; height=&#8221;&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1571981852249{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1573087132920{margin-top: 5px !important;margin-bottom: 30px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 5px !important;padding-right: 30px !important;padding-bottom: 10px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Ready to Enrol?&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Click to view upcoming course dates and enrol in this course.[\/vc_column_text]\t<a id=\"thb-button-6a0b76166fc9f\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"enrolcyber-security-part-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>ViewPartTimeDatesEnrol<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space mobile_height=&#8221;10px&#8221; height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a0b76166fd4e\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"enrolcyber-security-full-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>ViewFullTimeDatesEnrol<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;50px&#8221; height=&#8221;&#8221;]\t<div id=\"thb-slidetype-6a0b76166feb9\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Practical Cybersecurity Training at the Institute<\/span><\/span>\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]Learn in-demand skills to protect and secure businesses and government with education from the best cyber industry trainers.<\/p>\n<p>&nbsp;<\/p>\n<p>The Cybersecurity Program is a structured training program designed to help you develop the practical skills you will need, allowing you to progress into roles such as a Cybersecurity Analyst, Penetration Tester or SOC (Security Operations Consultant). After completing your Cyber Security Program, you will receive the recognition as a Certified Cyber Security Professional (CCSP)\u2122\ufe0f from the Institute of Data\u00ae.<\/p>\n<p>&nbsp;<\/p>\n<p>Hundreds of professionals choose the Institute of Data every year to prepare them for their future careers after careful consideration of their desired career progression and to attain maximum return on investment for their education. Leading the future of the profession, the Institute of Data offers a collaborative and successful program driven to ensure you have the best start to your career.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;]\t<div id=\"thb-slidetype-6a0b76166ff05\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">What is Practical Cybersecurity Training?<\/span><\/span>\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]Practical cybersecurity training is an essential requirement to practice as a cybersecurity professional. Learn from industry experts on how to defend from cyber-attacks and develop business solutions for businesses and government organizations, including consulting techniques and simulating commercial projects. This means you will be ready to work as a cybersecurity professional.[\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1571976183466{margin-top: 55px !important;margin-bottom: 5vh !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 25px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #44d9e6 !important;border-left-style: solid !important;border-right-color: #44d9e6 !important;border-right-style: solid !important;border-top-color: #44d9e6 !important;border-top-style: solid !important;border-bottom-color: #44d9e6 !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a0b76166ff3c\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Why The<\/span><\/span><span class=\"thb-slidetype-entry\"><span class=\"lines\">Institute Of Data?<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a0b76166ff3c .thb-slidetype-entry {\n\t\t\t\tcolor: #44d9e6;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t\t<div id=\"thb-slidetype-6a0b76166ff70\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Students Will:<\/span><\/span>\t\t\t<\/div>\n\n\t[vc_empty_space mobile_height=&#8221;30px&#8221; height=&#8221;30px&#8221;]\t<div id=\"thb-iconbox-6a0b76166ffce\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Be ready to practice cyber security<\/h5>\t\t\t<p>The Institute of Data\u2019s courses are designed to prepare students for real commercial work in the area of cyber security. It is focused on practical in-class training, labs and real-life projects.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76166ffce.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76166ffce.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a0b76166ffce.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a0b76166ffce.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a0b76166ffce.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76166ffce.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a0b76166ffce.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76166ffce.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a0b76166ffce.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a0b76166ffce.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a0b76166ffce.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a0b76166ffce.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a0b76166ffce.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a0b761670127\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Receive the best training and the latest curriculum<\/h5>\t\t\t<p>The Institute of Data trainers are actively working in the industry and will teach students how to practice cyber security in the real world. The curriculum is developed by the Institute of Data Academic Board with decades of experience working in cyber security.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761670127.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761670127.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a0b761670127.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a0b761670127.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a0b761670127.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761670127.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a0b761670127.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761670127.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a0b761670127.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a0b761670127.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a0b761670127.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a0b761670127.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a0b761670127.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a0b7616701d8\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Be more attractive to employers<\/h5>\t\t\t<p>The Institute of Data\u2019s Cyber Security Program results in the Certified Cyber Security Professional (CCSP)\u2122\ufe0f Industry Certification which signals to employers that you are ready to join the industry. Your resume and profile will be reviewed by your Job Outcomes team to give you the best possible chance of success.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616701d8.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616701d8.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a0b7616701d8.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a0b7616701d8.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a0b7616701d8.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616701d8.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a0b7616701d8.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616701d8.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a0b7616701d8.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a0b7616701d8.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a0b7616701d8.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a0b7616701d8.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a0b7616701d8.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a0b7616702e3\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Get more support and guidance<\/h5>\t\t\t<p>The member network offers support and guidance from mentors and direct connections to the industry.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616702e3.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616702e3.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a0b7616702e3.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a0b7616702e3.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a0b7616702e3.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616702e3.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a0b7616702e3.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616702e3.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a0b7616702e3.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a0b7616702e3.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a0b7616702e3.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a0b7616702e3.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a0b7616702e3.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a0b7616703c3\" class=\"thb-iconbox top type3  has-img  text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t\t\t\t\t<div class=\"iconbox-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"505\" height=\"505\" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2019\/04\/iod_seal_tp_black_c.svg\" class=\"thb_image  attachment-full\" alt=\"\" title=\"iod_seal_tp_black_c\" \/>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Meet great people and become a member of the Institute<\/h5>\t\t\t<p>Beyond a healthy discipline of practical education and learning, students meet great friends in your virtual or real classroom and become a member of the Institute of Data. Many students continue to keep in touch with their fellow students and the community becomes a strong network as students enter the industry.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616703c3.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616703c3.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a0b7616703c3.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a0b7616703c3.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a0b7616703c3.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616703c3.thb-iconbox .iconbox-image img {\n\t\t\t\t\twidth: 84px;\n\t\t\t\t\theight: auto;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616703c3.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a0b7616703c3.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616703c3.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a0b7616703c3.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a0b7616703c3.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a0b7616703c3.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a0b7616703c3.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a0b7616703c3.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-testimonials-6a0b761670adb\" class=\"thb-testimonials thb-testimonial-style2 thb-carousel style2   \" data-columns=\"1\" data-pagination=\"\" data-navigation=\"false\"\n\t\t\t\t\t\t data-autoplay=\"\" data-autoplay-speed=\"4000\" data-fade=\"true\" data-adaptive=\"false\">\n\t\t\t<div class=\"small-12  columns\">\n\t\t\t\t\t\t\t<div class=\"thb-testimonial has-avatar\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<blockquote><p>\u201cI gained an idea of what companies need and how we need to use our skills. This made it pretty easy for me to get my first job.\u201d<\/p>\n<\/blockquote>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"author_image \" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2019\/04\/katya-140x140.jpg\" width=\"140\" height=\"140\" alt=\"katya\" title=\"katya\" loading=\"lazy\" \/>\t\t\t\t\t\t\t<div class=\"testimonial-author\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<cite>Katya<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"title\">Institute of Data Certified Professional<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t<\/div>\n\t[\/vc_column][vc_column fixed=&#8221;thb-fixed&#8221; width=&#8221;1\/3&#8243;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796352796{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571981187779{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: -25px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;2px&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJfZm9ybV84MCUyMiUzRSUzQyUyRmRpdiUzRSUzQ3NjcmlwdCUyMHNyYyUzRCUyMmh0dHBzJTNBJTJGJTJGYmxhY2tjYXRkYXRhLmFjdGl2ZWhvc3RlZC5jb20lMkZmJTJGZW1iZWQucGhwJTNGaWQlM0Q4MCUyMiUyMHR5cGUlM0QlMjJ0ZXh0JTJGamF2YXNjcmlwdCUyMiUyMGNoYXJzZXQlM0QlMjJ1dGYtOCUyMiUzRSUzQyUyRnNjcmlwdCUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796317949{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571967184695{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 25px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Ready to Enroll?&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Click to view upcoming part time cyber security program course dates.[\/vc_column_text]\t<a id=\"thb-button-6a0b761671bfa\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"https:\/\/www.institutedata.com\/us\/enroll\/cyber-security-part-time-program\" target=\"_blank\" role=\"button\">\n\t\t<span>View Part Time Dates Enroll<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a0b761671ca6\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"https:\/\/www.institutedata.com\/us\/enroll\/cyber-security-full-time-program\" target=\"_blank\" role=\"button\">\n\t\t<span>View Full Time Dates Enroll<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1571979879714{margin-top: 8vh !important;margin-bottom: 10vh !important;border-top-width: 2px !important;border-bottom-width: 2px !important;padding-top: 9vh !important;padding-bottom: 8vh !important;background-color: #f7f7f7 !important;border-top-color: #ff4600 !important;border-top-style: solid !important;border-bottom-color: #ff4600 !important;border-bottom-style: solid !important;}&#8221;][vc_column animation=&#8221;animation bottom-to-top&#8221;][vc_row_inner css=&#8221;.vc_custom_1571968515353{padding-bottom: 50px !important;}&#8221;][vc_column_inner]\t<div id=\"thb-slidetype-6a0b761671d57\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Program Structure<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a0b761671d57 .thb-slidetype-entry {\n\t\t\t\tcolor: #ff4600;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243; animation=&#8221;animation bottom-to-top&#8221; css=&#8221;.vc_custom_1571199244193{padding-right: 20% !important;}&#8221;]\t<div id=\"thb-iconbox-6a0b761671da5\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path d=\"m1 1h46v62h-46z\"\/><path d=\"m9 63v-61\"\/><path d=\"m14 15h28\"\/><path d=\"m14 21h28\"\/><path d=\"m63 3v50l-4 8-4-8v-50z\"\/><path d=\"m55 7h-4v10\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Pre-Work<\/h5>\t\t\t<p>Students complete curated pre-work as an interactive online learning experience designed to prepare every student with the required skills and knowledge to complete all coursework and training.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671da5.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671da5.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a0b761671da5.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a0b761671da5.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a0b761671da5.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671da5.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a0b761671da5.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671da5.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a0b761671da5.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a0b761671da5.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a0b761671da5.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a0b761671da5.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a0b761671da5.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner thb_color=&#8221;thb-light-column&#8221; width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1556240953838{padding-right: 20% !important;}&#8221;]\t<div id=\"thb-iconbox-6a0b761671e6a\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m23 36l7 7 13-13\"\/><path d=\"m46 10h-28\"\/><path d=\"m12 10h-11v48h62v-48h-11\"\/><path d=\"m12 6h6v8h-6z\"\/><path d=\"m46 6h6v8h-6z\"\/><path d=\"m1 18h62\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Remote and In Class Training<\/h5>\t\t\t<p>Students undertake a professional in-classroom course from a team of expert industry trainers from leading consultancies and enterprises to acquire the most sought-after practical training in the country.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671e6a.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671e6a.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a0b761671e6a.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a0b761671e6a.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a0b761671e6a.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671e6a.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a0b761671e6a.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671e6a.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a0b761671e6a.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a0b761671e6a.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a0b761671e6a.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a0b761671e6a.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a0b761671e6a.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner thb_color=&#8221;thb-light-column&#8221; width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1571199248343{padding-right: 20% !important;}&#8221;]\t<div id=\"thb-iconbox-6a0b761671f0b\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path d=\"m5 41l6-40h42l6 40\"\/><path d=\"M21,41c0,6.075,4.925,11,11,11s11-4.925,11-11h16v22\n\tH5V41H21z\"\/><circle cx=\"29\" cy=\"21\" r=\"6\"\/><path d=\"m33 25l8 8\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Job Outcomes<\/h5>\t\t\t<p>Students will undergo a Job Outcomes Program through the Institute of Data which will help position students for the best chance of a new job opportunity and\/or internal promotion. Land a job in one of the most sought after fields in tech with the guidance of Professional Career Coaches.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671f0b.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671f0b.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a0b761671f0b.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a0b761671f0b.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a0b761671f0b.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671f0b.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a0b761671f0b.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671f0b.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a0b761671f0b.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a0b761671f0b.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a0b761671f0b.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a0b761671f0b.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a0b761671f0b.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1571204006887{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#dddddd&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;]\t<div id=\"thb-iconbox-6a0b761671fa3\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>How Will Students Be Assessed?<\/h5>\t\t\t<p>The Institute of Data \u2013 Cyber Security Program is assessed through completion of labs and a final capstone project. There is no formal exam. The capstone project is a real-life project and is assessed against the Institute of Data Certification Standards set by the Academic Board and Examination Board.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671fa3.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671fa3.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a0b761671fa3.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a0b761671fa3.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a0b761671fa3.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671fa3.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a0b761671fa3.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761671fa3.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a0b761671fa3.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a0b761671fa3.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a0b761671fa3.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a0b761671fa3.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a0b761671fa3.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1571705355222{padding-top: 25px !important;padding-bottom: 30px !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#dddddd&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;]\t<div id=\"thb-iconbox-6a0b761672091\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Post Course<\/h5>\t\t\t<p>We'll help you transition into the big data and cyber security industry. We have a 93% job outcome success rate within 180 days of graduation for active job seekers.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761672091.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761672091.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a0b761672091.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a0b761672091.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a0b761672091.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761672091.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a0b761672091.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761672091.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a0b761672091.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a0b761672091.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a0b761672091.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a0b761672091.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a0b761672091.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner el_class=&#8221;text-right&#8221; width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-xs&#8221;]\t<div class=\"thb-counter counter-style1 thb-side left\" id=\"thb-counter-6a0b761672113\" data-separator=\"\" data-format=\"(,ddd).dd\">\n\t\t\t\t\t<div class=\"counter-container\">\n\t\t\t\t\t\t\t\t<div class=\"h1\" data-count=\"1000\" data-speed=\"4000\">0<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"h1 counter-text counter\">+<\/div>\t\t\t<\/div>\n\t\t\t<h6>Industry Partners &amp; Contacts<\/h6>\n\t\t\t\t\t\t\t\t\t\t<style>\n\t\t\t#thb-counter-6a0b761672113 .odometer.odometer-auto-theme.odometer-animating-up .odometer-ribbon-inner,\n\t\t\t#thb-counter-6a0b761672113 .odometer.odometer-theme-minimal.odometer-animating-up .odometer-ribbon-inner {\n\t\t\t\ttransition: transform 4s;\n\t\t\t}\n\t\t\t\t\t\t\t#thb-counter-6a0b761672113.thb-counter .h1,\n\t\t\t\t#thb-counter-6a0b761672113.thb-counter .counter {\n\t\t\t\t\tcolor: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-counter-6a0b761672113.thb-counter h6,\n\t\t\t\t#thb-counter-6a0b761672113.thb-counter .thb-title {\n\t\t\t\t\tcolor: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-counter-6a0b761672113.thb-counter figure svg path,\n\t\t\t\t#thb-counter-6a0b761672113.thb-counter figure svg circle,\n\t\t\t\t#thb-counter-6a0b761672113.thb-counter figure svg rect,\n\t\t\t\t#thb-counter-6a0b761672113.thb-counter figure svg ellipse {\n\t\t\t\t\tstroke: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row content_placement=&#8221;top&#8221; el_class=&#8221;align-justify&#8221; css=&#8221;.vc_custom_1621556855638{margin-top: 6vh !important;margin-bottom: 8vh !important;}&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_row_inner css=&#8221;.vc_custom_1572411820192{margin-bottom: 55px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 20px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #000000 !important;border-left-style: solid !important;border-right-color: #000000 !important;border-right-style: solid !important;border-top-color: #000000 !important;border-top-style: solid !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a0b76167215e\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Syllabus Breakdown<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a0b76167215e .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t\t<div id=\"thb-accordion-6a0b761672185\" class=\"thb-accordion style1 has-accordion\" data-scroll=\"\" data-index=\"0\">\n\t\t[vc_tta_section title=&#8221;Introduction to Cyber Security&#8221; tab_id=&#8221;1572411205441-0bd5ab61-aba40c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>A game of defense and attack, ruled on both sides by economics<br \/>\nCompliance vs Security<br \/>\nDefinitions and Language<br \/>\nEncryption<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Top Risks Businesses Face Today&#8221; tab_id=&#8221;1572411322036-b01789c9-dab20c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Business Email Compromise<br \/>\nIntellectual Property Theft<br \/>\nRansomware<br \/>\nResource Theft<br \/>\nOther notable Case Studies<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Foundational Networking&#8221; tab_id=&#8221;1572411438174-63ec584e-38b60c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Networks and Network protocols<br \/>\nAuthentication<br \/>\nSystems<br \/>\nEncryption<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Consulting and Interpersonal Skills&#8221; tab_id=&#8221;1572411462444-c510f9d7-659a0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Questioning technique<br \/>\nCritical thinking<br \/>\nDocumentation<br \/>\nPresentation skills<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;The Attacker\u2019s View&#8221; tab_id=&#8221;1572411481055-aa0e8f44-83460c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>The Attacker\u2019s Mindset<br \/>\nTechnical Attacks<br \/>\nAttack Software and Tooling<br \/>\nOWASP<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;The Defensive Mindset&#8221; tab_id=&#8221;1572411499794-30830090-09850c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Economics of Defense<br \/>\nDefensive Architecture<br \/>\nAssets and Perimeters<br \/>\nLogs and Monitoring<br \/>\nThreat Intelligence<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Incident Response&#8221; tab_id=&#8221;1572411584028-69dfd619-46470c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Security vs ITIL<br \/>\nIncident Playbooks<br \/>\nIncident Management<br \/>\nCrisis Communication<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Risk Management&#8221; tab_id=&#8221;1572411607499-67011be8-75db0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Threat Risk Assessment<br \/>\nDetermining the likelihood<br \/>\nEconomic Measurement<br \/>\nEffectiveness of controls<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Security and Compliance Frameworks&#8221; tab_id=&#8221;1572411635261-7ea3c582-a4bb0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Compliance Frameworks Introduction<br \/>\nCommon Frameworks: Overview &amp; Scope<br \/>\nPitfalls and Common Mistakes<br \/>\nBalancing Security Outcomes and Compliance Requirements<br \/>\nCyber Security Practice (ongoing)<br \/>\nCapstone Project (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Higher Order Impacts of Realized Cyber Risk&#8221; tab_id=&#8221;1572411655577-68b420ac-c02f0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Trust and Confidence<br \/>\nAdministrative Functions<br \/>\nSupply Chain<br \/>\nControl Systems and Operational Technology: Introduction<br \/>\nCapstone Project (ongoing)<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Ongoing Modules&#8221; tab_id=&#8221;1572411685849-49b2a6cb-70510c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Additional Topics: determined by students and Lead Trainer<br \/>\nJob Outcomes Program<br \/>\nConsultation and Presentation training<br \/>\nCyber Security Practice<br \/>\nCapstone Project<\/p>\n[\/vc_column_text][\/vc_tta_section]\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1648797419272{margin-bottom: 55px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 10px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #000000 !important;border-left-style: solid !important;border-right-color: #000000 !important;border-right-style: solid !important;border-top-color: #000000 !important;border-top-style: solid !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a0b7616721d3\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">When Can I Start?<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a0b7616721d3 .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_empty_space height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a0b761672247\" class=\"btn style1 large full gradient no-radius    arrow-enabled\" href=\"https:\/\/www.institutedata.com\/us\/enroll\/cyber-security-part-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>View Part Time Dates<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t\t<style>\n\n\t\t\t\t\t\t\t\t\/* Style1 *\/\n\t\t\t\t#thb-button-6a0b761672247.style1 {\n\t\t\t\t\tbackground:#ff4600;background:linear-gradient( -135deg,#ff4600,#ff4600 );\t\t\t\t}\n\t\t\t\t#thb-button-6a0b761672247.style1:after {\n\t\t\t\t\tbackground: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t\t[vc_empty_space height=&#8221;55px&#8221;]\t<a id=\"thb-button-6a0b7616722c0\" class=\"btn style1 large full gradient no-radius    arrow-enabled\" href=\"https:\/\/www.institutedata.com\/us\/enroll\/cyber-security-full-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>View Full Time Dates<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t\t<style>\n\n\t\t\t\t\t\t\t\t\/* Style1 *\/\n\t\t\t\t#thb-button-6a0b7616722c0.style1 {\n\t\t\t\t\tbackground:#ff4600;background:linear-gradient( -135deg,#ff4600,#ff4600 );\t\t\t\t}\n\t\t\t\t#thb-button-6a0b7616722c0.style1:after {\n\t\t\t\t\tbackground: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t\t[vc_empty_space height=&#8221;55px&#8221;]\t<div id=\"thb-iconbox-6a0b76167232d\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Fees &amp; Payment<\/h5>\t\t\t<p>Pre-payment deposit of $300 is required to enroll. Current fees are USD $12,500 for the full time and part time program. Flexible payment plans available.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76167232d.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76167232d.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a0b76167232d.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a0b76167232d.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a0b76167232d.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #0020ff;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76167232d.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a0b76167232d.thb-iconbox figure h5 {\n\t\t\t\tcolor: #0020ff;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76167232d.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a0b76167232d.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #0020ff;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a0b76167232d.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a0b76167232d.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #0020ff;\n\t\t\t}\n\t\t\t#thb-iconbox-6a0b76167232d.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a0b76167232d.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #0020ff;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space height=&#8221;10px&#8221;][vc_separator color=&#8221;custom&#8221; border_width=&#8221;2&#8243; css_animation=&#8221;bottom-to-top&#8221; accent_color=&#8221;#0020ff&#8221;][vc_empty_space height=&#8221;20px&#8221;]\t<div id=\"thb-iconbox-6a0b76167239d\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Course Entry Requirements<\/h5>\t\t\t<p>Completion of a bachelor degree in any field of studies<\/p>\n<p>Completion of any previous qualification undertaken in English<\/p>\n<p>Completion of assigned online pre-work provided to you when you enroll<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76167239d.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76167239d.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a0b76167239d.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a0b76167239d.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a0b76167239d.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76167239d.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a0b76167239d.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76167239d.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a0b76167239d.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a0b76167239d.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a0b76167239d.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a0b76167239d.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a0b76167239d.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t\t<div id=\"thb-iconbox-6a0b761672406\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Time Commitment: Part Time Program<\/h5>\t\t\t<p>24 weeks intensive remote or in-class training | 2 night classes per week + 1 Saturday class every other week<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761672406.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761672406.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a0b761672406.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a0b761672406.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a0b761672406.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761672406.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a0b761672406.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b761672406.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a0b761672406.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a0b761672406.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a0b761672406.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a0b761672406.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a0b761672406.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t\t<div id=\"thb-iconbox-6a0b76167245e\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Time Commitment: Full Time Program<\/h5>\t\t\t<p>12 weeks intensive remote or in-class training | Monday-Friday<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76167245e.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76167245e.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a0b76167245e.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a0b76167245e.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a0b76167245e.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76167245e.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a0b76167245e.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b76167245e.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a0b76167245e.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a0b76167245e.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a0b76167245e.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a0b76167245e.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a0b76167245e.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t\t<div id=\"thb-iconbox-6a0b7616724b3\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Location<\/h5>\t\t\t<p>United States (Remote or In-person)<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616724b3.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616724b3.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a0b7616724b3.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a0b7616724b3.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a0b7616724b3.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616724b3.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a0b7616724b3.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a0b7616724b3.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a0b7616724b3.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a0b7616724b3.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a0b7616724b3.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a0b7616724b3.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a0b7616724b3.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1573518960940{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1573087378964{margin-top: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 20px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]<div class='_form_20'><\/div><script type='text\/javascript' src='https:\/\/blackcatdata.activehosted.com\/f\/embed.php?static=0&id=20&6A0B761672535&nostyles=1&preview=0'><\/script>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;20px&#8221; height=&#8221;&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1571981852249{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1573087311403{margin-top: 5px !important;margin-bottom: 30px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 25px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Discuss with a Career Consultant&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]You can schedule a call with an Institute of Data Career Consultant to discuss this course.[\/vc_column_text]\t<a id=\"thb-button-6a0b76167256c\" class=\"btn style1 medium full black small-radius  fancybox-inline  arrow-enabled\" href=\"course-outline\" target=\"_blank\" role=\"button\">\n\t\t<span>ScheduleaCall<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space mobile_height=&#8221;10px&#8221; height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;50px&#8221; height=&#8221;&#8221;][vc_column_text css=&#8221;&#8221;]\n<h2><span style=\"font-weight: 400;\">3 Great Benefits Of A Cybersecurity Online Certification Course\u00a0<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">A cybersecurity online certification is more than just a credential; it\u2019s your ticket to a future-proof career in a digital-first era. As cyber threats grow more sophisticated, organizations are in dire need of skilled professionals to guard their data and networks. This high demand not only creates abundant job opportunities but also secures your place in an essential, ever-evolving field.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">When you choose to enroll in the Institute of Data\u2019s <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\"><span style=\"font-weight: 400;\">Cybersecurity course<\/span><\/a><span style=\"font-weight: 400;\">, you\u2019re investing in a program designed to transform your career trajectory. Our partnership with universities and industry experts ensures you benefit from top-tier education, focused on equipping you with the technical expertise needed today.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Let us provide you with training in cybersecurity and step confidently into your dream career. Read on to learn more about the cybersecurity online certification benefits that await you.\u00a0<\/span><\/p>\n<h3><\/h3>\n<h3><span style=\"font-weight: 400;\">#1: The certification provides enhanced career opportunities.<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">A cybersecurity online certification can significantly improve career prospects because cybersecurity professionals are needed in many industries, from finance to healthcare.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In the increasingly digital landscape, cybersecurity is more important than ever. The demand for professionals who have adequate network security training and risk management training spans various sectors such as finance, healthcare and more. Such industries deal heavily with sensitive data, meaning they need an expert who holds cybersecurity or data protection certification.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">With a cybersecurity online certification, you stand out to employers looking for qualified candidates to protect their networks and data.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">With that in mind, the Institute of Data stands out with our unique approach to providing real-time remote professional industry-aligned training and certifications designed to prepare students for the demands of the digital workforce. Our online security courses include practical training, industry certification and job outcome support to help you get started in the industry.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">#2: You gain flexible learning and upskilling options.<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity online certification courses with flexible study options allow students to learn at their own pace, especially when it comes to part-time study schedules.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Programs designed with flexibility in mind let you manage your own learning schedule, aligning with your personal and professional commitments. This becomes particularly beneficial for those managing a demanding work schedule or other responsibilities. Engaging with information security courses and security awareness programs like these means you can study from anywhere with internet access.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">For many, the traditional classroom setting is not feasible, especially for working professionals who are balancing a full-time job with career advancement. Unlike traditional university degrees, which often span several years, the Institute of Data\u2019s intensive industry training programs allow you to gain industry-relevant skills and knowledge in a fraction of the time.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The Institute of Data\u2019s Cybersecurity Program offers 3-month full-time and 6-month part-time options, designed to help career-driven professionals transition into the cybersecurity industry. Tailored to meet the evolving demands of businesses, cybersecurity certification programs like ours are available remotely, providing an interactive learning experience all with full instructor support.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">#3: The course equips you with industry-relevant skills and knowledge.<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In today\u2019s ever-evolving digital space, staying updated on the latest cybersecurity threats is non-negotiable. Cybersecurity online certification programs are designed with a focus on current industry challenges, ensuring that learners are well-versed in both traditional and emerging threats.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity or IT security certification programs typically encompass a wide range of modules that cover the latest technologies, tactics and techniques used in cybersecurity.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The Institute of Data\u2019s Cybersecurity Program covers a comprehensive range of topics to prepare students for real-world challenges. The syllabus includes foundational modules focusing on topics like networking and authentication, while also diving deep into advanced areas like encryption, incident response and risk management.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Not only that but our programs\u2014including our <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/data-science-artificial-intelligence-program\/\"><span style=\"font-weight: 400;\">Data Science &amp; AI course<\/span><\/a><span style=\"font-weight: 400;\">\u2014are led by industry experts. Classes are conducted live by an experienced expert trainer, providing students with the opportunity to ask questions and benefit from real-world experience.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Additionally, our Assistant Trainers, who are successful graduates of the program, provide students with further guidance and help answer their course-related questions.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><a href=\"https:\/\/www.institutedata.com\/us\/faq\/\"><span style=\"font-weight: 400;\">Frequently Asked Questions (FAQ)<\/span><\/a><\/h2>\n<h2><\/h2>\n<h2><span style=\"font-weight: 400;\">What should I consider before enrolling in an online certification program?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">When considering a cybersecurity online certification program, it\u2019s important to evaluate its content and flexibility.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Check to see if the program\u2019s curriculum covers the essential skills aligned with your cybersecurity career advancement goals and stays updated with current industry standards. Additionally, look for programs offering flexible scheduling to accommodate your work or personal commitments; this can be especially beneficial if you are juggling a full-time job or other obligations.\u00a0<\/span><\/p>\n<h2><\/h2>\n<h2><span style=\"font-weight: 400;\">What are the different types of cybersecurity certifications available?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Online learning certification courses for cybersecurity vary greatly, covering areas like network security, ethical hacking and risk management.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Each cybersecurity online certification can serve a different purpose, allowing you to tailor your learning to your career goals. For instance, certifications focused on network security help individuals protect and manage communications within networks, whereas ethical hacking certifications teach you to identify and fix vulnerabilities from a hacker\u2019s viewpoint.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">How can I verify if an online certification provider is legitimate?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Determining the legitimacy of an online certification provider involves checking their accreditations.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Accreditations should be from recognized industry organizations or government bodies, highlighting that the provider meets established standards. Furthermore, researching the provider\u2019s association with industry experts or partnerships with reputable institutions can reassure you of their standing within the field.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Fast-track into the tech industry with our Cybersecurity Program<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In an era where data is a new asset, cybersecurity skills are indispensable. When you enroll in our cybersecurity online certification program, we\u2019ll equip you with the practical expertise needed to protect systems and data, aligning with the fast-paced demands of today\u2019s job market. Flexible study options cater to your busy schedule, allowing you to balance work and learning effectively.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re looking to enhance your skill set in a different field, our <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/software-engineering-program\/\"><span style=\"font-weight: 400;\">Software Engineering course<\/span><\/a><span style=\"font-weight: 400;\"> can also empower you with the confidence and skills needed to transition into an industry-ready.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">To learn more about our Cybersecurity course and other programs, download a course outline today. <\/span>[\/vc_column_text][\/vc_column][vc_column fixed=&#8221;thb-fixed&#8221; width=&#8221;1\/3&#8243;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796352796{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571981187779{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: -25px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;2px&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJfZm9ybV84MCUyMiUzRSUzQyUyRmRpdiUzRSUzQ3NjcmlwdCUyMHNyYyUzRCUyMmh0dHBzJTNBJTJGJTJGYmxhY2tjYXRkYXRhLmFjdGl2ZWhvc3RlZC5jb20lMkZmJTJGZW1iZWQucGhwJTNGaWQlM0Q4MCUyMiUyMHR5cGUlM0QlMjJ0ZXh0JTJGamF2YXNjcmlwdCUyMiUyMGNoYXJzZXQlM0QlMjJ1dGYtOCUyMiUzRSUzQyUyRnNjcmlwdCUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796317949{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571967184695{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 25px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Discuss with a Career Consultant&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]You can schedule a call with an Institute of Data Career Consultant to discuss this course.[\/vc_column_text]\t<a id=\"thb-button-6a0b761672681\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"https:\/\/www.institutedata.com\/us\/consultation\" target=\"_blank\" role=\"button\">\n\t\t<span>Schedule a Call<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;mobile-footer-fixed&#8221; css=&#8221;.vc_custom_1572216358905{margin-bottom: -19px !important;padding-top: 15px !important;background-color: #000000 !important;}&#8221;][vc_column thb_color=&#8221;thb-light-column&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221; el_class=&#8221;text-center&#8221;][vc_column_text]\nDownload Course Outline<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1648796564794{margin-top: -30px !important;margin-bottom: 30px !important;}&#8221;][vc_column][vc_column_text] [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1571968629318{padding-bottom: 3vh !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;Share This Course&#8221; font_container=&#8221;tag:h6|text_align:right|color:0020ff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;align-justify&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;40px&#8221;][vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]The Cybersecurity course is designed for IT and non-IT professionals who are interested in transitioning to a career in cybersecurity. The program includes practical training, industry certification and job placement support to&hellip;<\/p>\n","protected":false},"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","tags":[3437],"class_list":["post-87918","portfolio","type-portfolio","status-publish","hentry","tag-seo_manual"],"_links":{"self":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio\/87918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio"}],"about":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/types\/portfolio"}],"replies":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/comments?post=87918"}],"version-history":[{"count":8,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio\/87918\/revisions"}],"predecessor-version":[{"id":88277,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio\/87918\/revisions\/88277"}],"wp:attachment":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media?parent=87918"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/tags?post=87918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}