{"id":87920,"date":"2024-11-13T13:10:34","date_gmt":"2024-11-13T02:10:34","guid":{"rendered":"https:\/\/www.institutedata.com\/?post_type=portfolio&#038;p=87920"},"modified":"2024-12-05T07:44:43","modified_gmt":"2024-12-04T20:44:43","slug":"cybersecurity-workshop","status":"publish","type":"portfolio","link":"https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-workshop\/","title":{"rendered":"Cybersecurity Workshop"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row css=&#8221;.vc_custom_1648796564794{margin-top: -30px !important;margin-bottom: 30px !important;}&#8221;][vc_column][vc_column_text]\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1571968629318{padding-bottom: 3vh !important;}&#8221;]\t<div id=\"thb-slidetype-6a076c6108011\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t\n<h1><span class=\"thb-slidetype-entry\"><span class=\"lines\">Cybersecurity Workshop<\/h1>\n<p><\/span><\/span>\t\t\t<\/div>\n\n\t[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;Share This Course&#8221; font_container=&#8221;tag:h6|text_align:right|color:0020ff&#8221; use_theme_fonts=&#8221;yes&#8221;]\t<div class=\"thb-share-icons thb-right style1\">\n\t\t\t\t<ul>\n\t\t\t\t\t\t<li><a href=\"http:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fwww.institutedata.com%2Fus%2Fcourses%2Fcybersecurity-workshop%2F\" class=\"social boxed-icon facebook\"><i class=\"fa fa-facebook\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t<li><a href=\"https:\/\/twitter.com\/intent\/tweet?text=Cybersecurity%20Workshop&url=https%3A%2F%2Fwww.institutedata.com%2Fus%2Fcourses%2Fcybersecurity-workshop%2F&via=Institute%20of%20Data\" class=\"social boxed-icon twitter\"><i class=\"fa fa-twitter\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"https:\/\/www.linkedin.com\/cws\/share?url=https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-workshop\/\" class=\"social boxed-icon linkedin\"><i class=\"fa fa-linkedin\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t<li><a href=\"https:\/\/wa.me\/?text=Cybersecurity%20Workshop%20https%3A%2F%2Fwww.institutedata.com%2Fus%2Fcourses%2Fcybersecurity-workshop%2F\" class=\"social boxed-icon whatsapp\" data-href=\"https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-workshop\/\" data-action=\"share\/whatsapp\/share\"><i class=\"fa fa-whatsapp\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"fb-messenger:\/\/share\/?link=https:\/\/www.institutedata.com\/us\/courses\/cybersecurity-workshop\/&app_id=\" class=\"social boxed-icon facebook-messenger\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"14\" height=\"14\" viewBox=\"96 93 322 324\"><path d=\"M257 93c-88.918 0-161 67.157-161 150 0 47.205 23.412 89.311 60 116.807V417l54.819-30.273C225.449 390.801 240.948 393 257 393c88.918 0 161-67.157 161-150S345.918 93 257 93zm16 202l-41-44-80 44 88-94 42 44 79-44-88 94z\" \/><\/svg><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t[\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;align-justify&#8221;][vc_column width=&#8221;2\/3&#8243;]\t<div id=\"thb-image-6a076c6108213\" class=\"caption-style1 animation bottom-to-top alignleft full  thb_image_link wp-caption \">\n\t\t\t<div class=\"thb-image-inner size_100\">\n\t\t\t<img decoding=\"async\" class=\"thb_image  large-shadow  \" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2019\/08\/800-x-1000-Cyber-Security-Program.jpg\" width=\"800\" height=\"500\" alt=\"Cyber Security Program\" title=\"Cyber Security Program\" loading=\"lazy\" \/>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<style>\n\t\t\t\t#thb-image-6a076c6108213,\n\t\t\t\t#thb-image-6a076c6108213 img {\n\t\t\t\t\tborder-radius: 0px;\n\t\t\t\t}\n\t\t<\/style>\n\t\t<\/div>\n\t[vc_empty_space height=&#8221;40px&#8221;][vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]The Cybersecurity course is designed for IT and non-IT professionals who are interested in transitioning to a career in cybersecurity. The program includes practical training, industry certification and job placement support to help professionals secure a job in the cybersecurity industry.[\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1571968063176{margin-top: 55px !important;margin-bottom: 55px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 10px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #0020ff !important;border-left-style: solid !important;border-right-color: #0020ff !important;border-right-style: solid !important;border-top-color: #0020ff !important;border-top-style: solid !important;border-bottom-color: #0020ff !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a076c61084bc\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Overview<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a076c61084bc .thb-slidetype-entry {\n\t\t\t\tcolor: #0020ff;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221;]The Cybersecurity course is delivered in a 24-week part-time or 12-week full-time format and is designed for career-driven professionals to transition into the cybersecurity industry.<\/p>\n<p>&nbsp;<\/p>\n<p>Our program includes pre-work, intensive practical training, industry certification and a job outcomes program in collaboration with university partners. The course content has been tailored to give you the skills that are demanded by businesses in today\u2019s rapidly evolving job market.<\/p>\n<p>&nbsp;<\/p>\n<p>Remote learning is available for this program. The interactive remote format enabled by video conferencing technology is a rich and connected experience featuring virtual break-out rooms, shared screens, digital whiteboards, peer-to-peer collaboration and instructor support.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1573518951818{margin-right: -35px !important;margin-left: -35px !important;}&#8221; el_id=&#8221;outline&#8221;][vc_column_inner css=&#8221;.vc_custom_1573085319162{margin-top: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 15px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;2px&#8221;][vc_column_text css=&#8221;.vc_custom_1573522055029{margin-top: -25px !important;}&#8221;]<div class='_form_20'><\/div><script type='text\/javascript' src='https:\/\/blackcatdata.activehosted.com\/f\/embed.php?static=0&id=20&6A076C6108529&nostyles=1&preview=0'><\/script>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;20px&#8221; height=&#8221;&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1571981852249{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1573087132920{margin-top: 5px !important;margin-bottom: 30px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 5px !important;padding-right: 30px !important;padding-bottom: 10px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Ready to Enrol?&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Click to view upcoming course dates and enrol in this course.[\/vc_column_text]\t<a id=\"thb-button-6a076c610859f\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"enrolcyber-security-part-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>ViewPartTimeDatesEnrol<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space mobile_height=&#8221;10px&#8221; height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a076c6108630\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"enrolcyber-security-full-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>ViewFullTimeDatesEnrol<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;50px&#8221; height=&#8221;&#8221;]\t<div id=\"thb-slidetype-6a076c610868b\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Practical Cybersecurity Training at the Institute<\/span><\/span>\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]Learn in-demand skills to protect and secure businesses and government with education from the best cyber industry trainers.<\/p>\n<p>&nbsp;<\/p>\n<p>The Cybersecurity Program is a structured training program designed to help you develop the practical skills you will need, allowing you to progress into roles such as a Cybersecurity Analyst, Penetration Tester or SOC (Security Operations Consultant). After completing your Cyber Security Program, you will receive the recognition as a Certified Cyber Security Professional (CCSP)\u2122\ufe0f from the Institute of Data\u00ae.<\/p>\n<p>&nbsp;<\/p>\n<p>Hundreds of professionals choose the Institute of Data every year to prepare them for their future careers after careful consideration of their desired career progression and to attain maximum return on investment for their education. Leading the future of the profession, the Institute of Data offers a collaborative and successful program driven to ensure you have the best start to your career.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;]\t<div id=\"thb-slidetype-6a076c61086cd\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">What is Practical Cybersecurity Training?<\/span><\/span>\t\t\t<\/div>\n\n\t[vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]Practical cybersecurity training is an essential requirement to practice as a cybersecurity professional. Learn from industry experts on how to defend from cyber-attacks and develop business solutions for businesses and government organizations, including consulting techniques and simulating commercial projects. This means you will be ready to work as a cybersecurity professional.[\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1571976183466{margin-top: 55px !important;margin-bottom: 5vh !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 25px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #44d9e6 !important;border-left-style: solid !important;border-right-color: #44d9e6 !important;border-right-style: solid !important;border-top-color: #44d9e6 !important;border-top-style: solid !important;border-bottom-color: #44d9e6 !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a076c61086f7\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Why The<\/span><\/span><span class=\"thb-slidetype-entry\"><span class=\"lines\">Institute Of Data?<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a076c61086f7 .thb-slidetype-entry {\n\t\t\t\tcolor: #44d9e6;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t\t<div id=\"thb-slidetype-6a076c6108720\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Students Will:<\/span><\/span>\t\t\t<\/div>\n\n\t[vc_empty_space mobile_height=&#8221;30px&#8221; height=&#8221;30px&#8221;]\t<div id=\"thb-iconbox-6a076c6108761\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Be ready to practice cyber security<\/h5>\t\t\t<p>The Institute of Data\u2019s courses are designed to prepare students for real commercial work in the area of cyber security. It is focused on practical in-class training, labs and real-life projects.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6108761.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6108761.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c6108761.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c6108761.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c6108761.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6108761.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c6108761.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6108761.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c6108761.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c6108761.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c6108761.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c6108761.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c6108761.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a076c610882b\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Receive the best training and the latest curriculum<\/h5>\t\t\t<p>The Institute of Data trainers are actively working in the industry and will teach students how to practice cyber security in the real world. The curriculum is developed by the Institute of Data Academic Board with decades of experience working in cyber security.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610882b.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610882b.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c610882b.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c610882b.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c610882b.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610882b.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c610882b.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610882b.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c610882b.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c610882b.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c610882b.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c610882b.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c610882b.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a076c61088c4\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Be more attractive to employers<\/h5>\t\t\t<p>The Institute of Data\u2019s Cyber Security Program results in the Certified Cyber Security Professional (CCSP)\u2122\ufe0f Industry Certification which signals to employers that you are ready to join the industry. Your resume and profile will be reviewed by your Job Outcomes team to give you the best possible chance of success.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61088c4.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61088c4.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c61088c4.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c61088c4.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c61088c4.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61088c4.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c61088c4.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61088c4.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c61088c4.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c61088c4.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c61088c4.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c61088c4.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c61088c4.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a076c610894e\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m13 33l12 12 24-24\"\/><circle cx=\"32\" cy=\"32\" r=\"30.999\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Get more support and guidance<\/h5>\t\t\t<p>The member network offers support and guidance from mentors and direct connections to the industry.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610894e.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610894e.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c610894e.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c610894e.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c610894e.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610894e.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c610894e.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610894e.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c610894e.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c610894e.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c610894e.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c610894e.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c610894e.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-iconbox-6a076c61089e1\" class=\"thb-iconbox top type3  has-img  text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t\t\t\t\t<div class=\"iconbox-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"505\" height=\"505\" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2019\/04\/iod_seal_tp_black_c.svg\" class=\"thb_image  attachment-full\" alt=\"\" title=\"iod_seal_tp_black_c\" \/>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Meet great people and become a member of the Institute<\/h5>\t\t\t<p>Beyond a healthy discipline of practical education and learning, students meet great friends in your virtual or real classroom and become a member of the Institute of Data. Many students continue to keep in touch with their fellow students and the community becomes a strong network as students enter the industry.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61089e1.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61089e1.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c61089e1.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c61089e1.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c61089e1.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61089e1.thb-iconbox .iconbox-image img {\n\t\t\t\t\twidth: 84px;\n\t\t\t\t\theight: auto;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61089e1.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c61089e1.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61089e1.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c61089e1.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c61089e1.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c61089e1.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c61089e1.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c61089e1.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;15px&#8221; height=&#8221;15px&#8221;]\t<div id=\"thb-testimonials-6a076c6108eb3\" class=\"thb-testimonials thb-testimonial-style2 thb-carousel style2   \" data-columns=\"1\" data-pagination=\"\" data-navigation=\"false\"\n\t\t\t\t\t\t data-autoplay=\"\" data-autoplay-speed=\"4000\" data-fade=\"true\" data-adaptive=\"false\">\n\t\t\t<div class=\"small-12  columns\">\n\t\t\t\t\t\t\t<div class=\"thb-testimonial has-avatar\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<blockquote><p>\u201cI gained an idea of what companies need and how we need to use our skills. This made it pretty easy for me to get my first job.\u201d<\/p>\n<\/blockquote>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"author_image \" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2019\/04\/katya-140x140.jpg\" width=\"140\" height=\"140\" alt=\"katya\" title=\"katya\" loading=\"lazy\" \/>\t\t\t\t\t\t\t<div class=\"testimonial-author\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<cite>Katya<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"title\">Institute of Data Certified Professional<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t<\/div>\n\t[\/vc_column][vc_column fixed=&#8221;thb-fixed&#8221; width=&#8221;1\/3&#8243;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796352796{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571981187779{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: -25px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;2px&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJfZm9ybV84MCUyMiUzRSUzQyUyRmRpdiUzRSUzQ3NjcmlwdCUyMHNyYyUzRCUyMmh0dHBzJTNBJTJGJTJGYmxhY2tjYXRkYXRhLmFjdGl2ZWhvc3RlZC5jb20lMkZmJTJGZW1iZWQucGhwJTNGaWQlM0Q4MCUyMiUyMHR5cGUlM0QlMjJ0ZXh0JTJGamF2YXNjcmlwdCUyMiUyMGNoYXJzZXQlM0QlMjJ1dGYtOCUyMiUzRSUzQyUyRnNjcmlwdCUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796317949{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571967184695{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 25px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Ready to Enroll?&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Click to view upcoming part time cyber security program course dates.[\/vc_column_text]\t<a id=\"thb-button-6a076c610912a\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"httpswww.institutedata.comusenrollcyber-security-part-time-program\" target=\"_blank\" role=\"button\">\n\t\t<span>ViewPartTimeDatesEnroll<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a076c61091a4\" class=\"btn style1 medium full black small-radius    arrow-enabled\" href=\"httpswww.institutedata.comusenrollcyber-security-full-time-program\" target=\"_blank\" role=\"button\">\n\t\t<span>ViewFullTimeDatesEnroll<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1571979879714{margin-top: 8vh !important;margin-bottom: 10vh !important;border-top-width: 2px !important;border-bottom-width: 2px !important;padding-top: 9vh !important;padding-bottom: 8vh !important;background-color: #f7f7f7 !important;border-top-color: #ff4600 !important;border-top-style: solid !important;border-bottom-color: #ff4600 !important;border-bottom-style: solid !important;}&#8221;][vc_column animation=&#8221;animation bottom-to-top&#8221;][vc_row_inner css=&#8221;.vc_custom_1571968515353{padding-bottom: 50px !important;}&#8221;][vc_column_inner]\t<div id=\"thb-slidetype-6a076c61091fa\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Program Structure<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a076c61091fa .thb-slidetype-entry {\n\t\t\t\tcolor: #ff4600;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243; animation=&#8221;animation bottom-to-top&#8221; css=&#8221;.vc_custom_1571199244193{padding-right: 20% !important;}&#8221;]\t<div id=\"thb-iconbox-6a076c610923a\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path d=\"m1 1h46v62h-46z\"\/><path d=\"m9 63v-61\"\/><path d=\"m14 15h28\"\/><path d=\"m14 21h28\"\/><path d=\"m63 3v50l-4 8-4-8v-50z\"\/><path d=\"m55 7h-4v10\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Pre-Work<\/h5>\t\t\t<p>Students complete curated pre-work as an interactive online learning experience designed to prepare every student with the required skills and knowledge to complete all coursework and training.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610923a.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610923a.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c610923a.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c610923a.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c610923a.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610923a.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c610923a.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610923a.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c610923a.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c610923a.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c610923a.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c610923a.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c610923a.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner thb_color=&#8221;thb-light-column&#8221; width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1556240953838{padding-right: 20% !important;}&#8221;]\t<div id=\"thb-iconbox-6a076c61092f5\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path stroke-linejoin=\"bevel\" d=\"m23 36l7 7 13-13\"\/><path d=\"m46 10h-28\"\/><path d=\"m12 10h-11v48h62v-48h-11\"\/><path d=\"m12 6h6v8h-6z\"\/><path d=\"m46 6h6v8h-6z\"\/><path d=\"m1 18h62\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Remote and In Class Training<\/h5>\t\t\t<p>Students undertake a professional in-classroom course from a team of expert industry trainers from leading consultancies and enterprises to acquire the most sought-after practical training in the country.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61092f5.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61092f5.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c61092f5.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c61092f5.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c61092f5.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61092f5.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c61092f5.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61092f5.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c61092f5.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c61092f5.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c61092f5.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c61092f5.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c61092f5.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner thb_color=&#8221;thb-light-column&#8221; width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1571199248343{padding-right: 20% !important;}&#8221;]\t<div id=\"thb-iconbox-6a076c6109388\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<figure>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 64\" enable-background=\"new 0 0 64 64\"><g fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-miterlimit=\"10\"><path d=\"m5 41l6-40h42l6 40\"\/><path d=\"M21,41c0,6.075,4.925,11,11,11s11-4.925,11-11h16v22\n\tH5V41H21z\"\/><circle cx=\"29\" cy=\"21\" r=\"6\"\/><path d=\"m33 25l8 8\"\/><\/g><\/svg>\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Job Outcomes<\/h5>\t\t\t<p>Students will undergo a Job Outcomes Program through the Institute of Data which will help position students for the best chance of a new job opportunity and\/or internal promotion. Land a job in one of the most sought after fields in tech with the guidance of Professional Career Coaches.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109388.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109388.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c6109388.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c6109388.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c6109388.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109388.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c6109388.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109388.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c6109388.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c6109388.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c6109388.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c6109388.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c6109388.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1571204006887{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#dddddd&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;]\t<div id=\"thb-iconbox-6a076c6109411\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>How Will Students Be Assessed?<\/h5>\t\t\t<p>The Institute of Data \u2013 Cyber Security Program is assessed through completion of labs and a final capstone project. There is no formal exam. The capstone project is a real-life project and is assessed against the Institute of Data Certification Standards set by the Academic Board and Examination Board.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109411.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109411.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c6109411.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c6109411.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c6109411.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109411.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c6109411.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109411.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c6109411.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c6109411.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c6109411.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c6109411.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c6109411.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1571705355222{padding-top: 25px !important;padding-bottom: 30px !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;][vc_separator color=&#8221;custom&#8221; accent_color=&#8221;#dddddd&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;]\t<div id=\"thb-iconbox-6a076c6109474\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Post Course<\/h5>\t\t\t<p>We'll help you transition into the big data and cyber security industry. We have a 93% job outcome success rate within 180 days of graduation for active job seekers.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109474.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109474.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c6109474.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c6109474.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c6109474.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #ff4600;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109474.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c6109474.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109474.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c6109474.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c6109474.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c6109474.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c6109474.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c6109474.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][vc_column_inner el_class=&#8221;text-right&#8221; width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-xs&#8221;]\t<div class=\"thb-counter counter-style1 thb-side left\" id=\"thb-counter-6a076c61094d2\" data-separator=\"\" data-format=\"(,ddd).dd\">\n\t\t\t\t\t<div class=\"counter-container\">\n\t\t\t\t\t\t\t\t<div class=\"h1\" data-count=\"1000\" data-speed=\"4000\">0<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"h1 counter-text counter\">+<\/div>\t\t\t<\/div>\n\t\t\t<h6>Industry Partners &amp; Contacts<\/h6>\n\t\t\t\t\t\t\t\t\t\t<style>\n\t\t\t#thb-counter-6a076c61094d2 .odometer.odometer-auto-theme.odometer-animating-up .odometer-ribbon-inner,\n\t\t\t#thb-counter-6a076c61094d2 .odometer.odometer-theme-minimal.odometer-animating-up .odometer-ribbon-inner {\n\t\t\t\ttransition: transform 4s;\n\t\t\t}\n\t\t\t\t\t\t\t#thb-counter-6a076c61094d2.thb-counter .h1,\n\t\t\t\t#thb-counter-6a076c61094d2.thb-counter .counter {\n\t\t\t\t\tcolor: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-counter-6a076c61094d2.thb-counter h6,\n\t\t\t\t#thb-counter-6a076c61094d2.thb-counter .thb-title {\n\t\t\t\t\tcolor: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-counter-6a076c61094d2.thb-counter figure svg path,\n\t\t\t\t#thb-counter-6a076c61094d2.thb-counter figure svg circle,\n\t\t\t\t#thb-counter-6a076c61094d2.thb-counter figure svg rect,\n\t\t\t\t#thb-counter-6a076c61094d2.thb-counter figure svg ellipse {\n\t\t\t\t\tstroke: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row content_placement=&#8221;top&#8221; el_class=&#8221;align-justify&#8221; css=&#8221;.vc_custom_1621556855638{margin-top: 6vh !important;margin-bottom: 8vh !important;}&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_row_inner css=&#8221;.vc_custom_1572411820192{margin-bottom: 55px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 20px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #000000 !important;border-left-style: solid !important;border-right-color: #000000 !important;border-right-style: solid !important;border-top-color: #000000 !important;border-top-style: solid !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a076c610951e\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">Syllabus Breakdown<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a076c610951e .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t\t<div id=\"thb-accordion-6a076c6109543\" class=\"thb-accordion style1 has-accordion\" data-scroll=\"\" data-index=\"0\">\n\t\t[vc_tta_section title=&#8221;Introduction to Cyber Security&#8221; tab_id=&#8221;1572411205441-0bd5ab61-aba40c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>A game of defense and attack, ruled on both sides by economics<br \/>\nCompliance vs Security<br \/>\nDefinitions and Language<br \/>\nEncryption<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Top Risks Businesses Face Today&#8221; tab_id=&#8221;1572411322036-b01789c9-dab20c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Business Email Compromise<br \/>\nIntellectual Property Theft<br \/>\nRansomware<br \/>\nResource Theft<br \/>\nOther notable Case Studies<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Foundational Networking&#8221; tab_id=&#8221;1572411438174-63ec584e-38b60c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Networks and Network protocols<br \/>\nAuthentication<br \/>\nSystems<br \/>\nEncryption<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Consulting and Interpersonal Skills&#8221; tab_id=&#8221;1572411462444-c510f9d7-659a0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Questioning technique<br \/>\nCritical thinking<br \/>\nDocumentation<br \/>\nPresentation skills<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;The Attacker\u2019s View&#8221; tab_id=&#8221;1572411481055-aa0e8f44-83460c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>The Attacker\u2019s Mindset<br \/>\nTechnical Attacks<br \/>\nAttack Software and Tooling<br \/>\nOWASP<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;The Defensive Mindset&#8221; tab_id=&#8221;1572411499794-30830090-09850c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Economics of Defense<br \/>\nDefensive Architecture<br \/>\nAssets and Perimeters<br \/>\nLogs and Monitoring<br \/>\nThreat Intelligence<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Incident Response&#8221; tab_id=&#8221;1572411584028-69dfd619-46470c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Security vs ITIL<br \/>\nIncident Playbooks<br \/>\nIncident Management<br \/>\nCrisis Communication<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Risk Management&#8221; tab_id=&#8221;1572411607499-67011be8-75db0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Threat Risk Assessment<br \/>\nDetermining the likelihood<br \/>\nEconomic Measurement<br \/>\nEffectiveness of controls<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Security and Compliance Frameworks&#8221; tab_id=&#8221;1572411635261-7ea3c582-a4bb0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Compliance Frameworks Introduction<br \/>\nCommon Frameworks: Overview &amp; Scope<br \/>\nPitfalls and Common Mistakes<br \/>\nBalancing Security Outcomes and Compliance Requirements<br \/>\nCyber Security Practice (ongoing)<br \/>\nCapstone Project (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Higher Order Impacts of Realized Cyber Risk&#8221; tab_id=&#8221;1572411655577-68b420ac-c02f0c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Trust and Confidence<br \/>\nAdministrative Functions<br \/>\nSupply Chain<br \/>\nControl Systems and Operational Technology: Introduction<br \/>\nCapstone Project (ongoing)<br \/>\nCyber Security Practice (ongoing)<\/p>\n[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Ongoing Modules&#8221; tab_id=&#8221;1572411685849-49b2a6cb-70510c49-8b26ef59-35b7&#8243;][vc_column_text]\n<p>Additional Topics: determined by students and Lead Trainer<br \/>\nJob Outcomes Program<br \/>\nConsultation and Presentation training<br \/>\nCyber Security Practice<br \/>\nCapstone Project<\/p>\n[\/vc_column_text][\/vc_tta_section]\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1648797419272{margin-bottom: 55px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 40px !important;padding-right: 30px !important;padding-bottom: 10px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #000000 !important;border-left-style: solid !important;border-right-color: #000000 !important;border-right-style: solid !important;border-top-color: #000000 !important;border-top-style: solid !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}&#8221;][vc_column_inner animation=&#8221;animation bottom-to-top&#8221;]\t<div id=\"thb-slidetype-6a076c610957f\" class=\"thb-slidetype \" data-style=\"style1\">\n\t\t<span class=\"thb-slidetype-entry\"><span class=\"lines\">When Can I Start?<\/span><\/span>\t\t\t\t<style>\n\t\t\t#thb-slidetype-6a076c610957f .thb-slidetype-entry {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[vc_empty_space height=&#8221;30px&#8221;]\t<a id=\"thb-button-6a076c61095ae\" class=\"btn style1 large full gradient no-radius    arrow-enabled\" href=\"httpswww.institutedata.comusenrollcyber-security-part-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>ViewPartTimeDates<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t\t<style>\n\n\t\t\t\t\t\t\t\t\/* Style1 *\/\n\t\t\t\t#thb-button-6a076c61095ae.style1 {\n\t\t\t\t\tbackground:#ff4600;background:linear-gradient( -135deg,#ff4600,#ff4600 );\t\t\t\t}\n\t\t\t\t#thb-button-6a076c61095ae.style1:after {\n\t\t\t\t\tbackground: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t\t[vc_empty_space height=&#8221;55px&#8221;]\t<a id=\"thb-button-6a076c6109612\" class=\"btn style1 large full gradient no-radius    arrow-enabled\" href=\"httpswww.institutedata.comusenrollcyber-security-full-time-program\" target=\"_self\" role=\"button\">\n\t\t<span>ViewFullTimeDates<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t\t<style>\n\n\t\t\t\t\t\t\t\t\/* Style1 *\/\n\t\t\t\t#thb-button-6a076c6109612.style1 {\n\t\t\t\t\tbackground:#ff4600;background:linear-gradient( -135deg,#ff4600,#ff4600 );\t\t\t\t}\n\t\t\t\t#thb-button-6a076c6109612.style1:after {\n\t\t\t\t\tbackground: #ff4600;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t\t[vc_empty_space height=&#8221;55px&#8221;]\t<div id=\"thb-iconbox-6a076c61096b1\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Fees &amp; Payment<\/h5>\t\t\t<p>Pre-payment deposit of $300 is required to enroll. Current fees are USD $12,500 for the full time and part time program. Flexible payment plans available.<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61096b1.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61096b1.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c61096b1.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c61096b1.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c61096b1.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #0020ff;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61096b1.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c61096b1.thb-iconbox figure h5 {\n\t\t\t\tcolor: #0020ff;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61096b1.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c61096b1.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #0020ff;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c61096b1.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c61096b1.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #0020ff;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c61096b1.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c61096b1.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #0020ff;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[vc_empty_space height=&#8221;10px&#8221;][vc_separator color=&#8221;custom&#8221; border_width=&#8221;2&#8243; css_animation=&#8221;bottom-to-top&#8221; accent_color=&#8221;#0020ff&#8221;][vc_empty_space height=&#8221;20px&#8221;]\t<div id=\"thb-iconbox-6a076c610971a\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Course Entry Requirements<\/h5>\t\t\t<p>Completion of a bachelor degree in any field of studies<\/p>\n<p>Completion of any previous qualification undertaken in English<\/p>\n<p>Completion of assigned online pre-work provided to you when you enroll<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610971a.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610971a.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c610971a.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c610971a.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c610971a.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610971a.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c610971a.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c610971a.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c610971a.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c610971a.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c610971a.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c610971a.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c610971a.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t\t<div id=\"thb-iconbox-6a076c6109779\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Time Commitment: Part Time Program<\/h5>\t\t\t<p>24 weeks intensive remote or in-class training | 2 night classes per week + 1 Saturday class every other week<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109779.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109779.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c6109779.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c6109779.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c6109779.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109779.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c6109779.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109779.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c6109779.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c6109779.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c6109779.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c6109779.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c6109779.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t\t<div id=\"thb-iconbox-6a076c61097c8\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Time Commitment: Full Time Program<\/h5>\t\t\t<p>12 weeks intensive remote or in-class training | Monday-Friday<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61097c8.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61097c8.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c61097c8.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c61097c8.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c61097c8.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61097c8.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c61097c8.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c61097c8.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c61097c8.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c61097c8.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c61097c8.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c61097c8.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c61097c8.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t\t<div id=\"thb-iconbox-6a076c6109818\" class=\"thb-iconbox top type3    text-left animation-true\" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Location<\/h5>\t\t\t<p>United States (Remote or In-person)<\/p>\n\t\t\t\t\t<\/div>\n\t\t<style>\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109818.thb-iconbox p {\n\t\t\t\tfont-size: 16px;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109818.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-6a076c6109818.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-6a076c6109818.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-6a076c6109818.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109818.thb-iconbox .iconbox-content h5,\n\t\t\t#thb-iconbox-6a076c6109818.thb-iconbox figure h5 {\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t#thb-iconbox-6a076c6109818.thb-iconbox .iconbox-content p,\n\t\t\t#thb-iconbox-6a076c6109818.thb-iconbox .iconbox-content span {\n\t\t\t\tcolor: #535353;\n\t\t\t}\n\n\t\t\t#thb-iconbox-6a076c6109818.thb-iconbox .iconbox-content svg,\n\t\t\t#thb-iconbox-6a076c6109818.thb-iconbox .iconbox-content svg .bar {\n\t\t\t\tfill: #535353;\n\t\t\t}\n\t\t\t#thb-iconbox-6a076c6109818.thb-iconbox .btn-text.style2:before,\n\t\t\t#thb-iconbox-6a076c6109818.thb-iconbox .btn-text.style2:after {\n\t\t\t\tbackground: #535353;\n\t\t\t}\n\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t<\/style>\n\t<\/div>\n\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1573518960940{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1573087378964{margin-top: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 20px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]<div class='_form_20'><\/div><script type='text\/javascript' src='https:\/\/blackcatdata.activehosted.com\/f\/embed.php?static=0&id=20&6A076C6109886&nostyles=1&preview=0'><\/script>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;20px&#8221; height=&#8221;&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1571981852249{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1573087311403{margin-top: 5px !important;margin-bottom: 30px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 25px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_custom_heading text=&#8221;Discuss with a Career Consultant&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]You can schedule a call with an Institute of Data Career Consultant to discuss this course.[\/vc_column_text]\t<a id=\"thb-button-6a076c61098b6\" class=\"btn style1 medium full black small-radius  fancybox-inline  arrow-enabled\" href=\"course-outline\" target=\"_blank\" role=\"button\">\n\t\t<span>ScheduleaCall<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space mobile_height=&#8221;10px&#8221; height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space mobile_height=&#8221;50px&#8221; height=&#8221;&#8221;][vc_column_text css=&#8221;&#8221;]\n<h2><span style=\"font-weight: 400;\">How To Get The Most Out Of A Cybersecurity Workshop<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">When it comes to honing cutting-edge skills, attending a cybersecurity workshop could be a game-changer. Imagine developing real-world expertise in data security and network security to protect sensitive data and infrastructure from escalating threats.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">At the Institute of Data, we guide you through essential topics like risk management, malware protection, firewall security and incident response, ensuring you\u2019re prepared for industry challenges. Through the projects involved, you\u2019ll apply your skills in realistic scenarios while networking with professionals and accessing career support services to help secure your future in cybersecurity.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">As cyber threats grow, the expertise you\u2019ll gain from our <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\"><span style=\"font-weight: 400;\">Cybersecurity course<\/span><\/a><span style=\"font-weight: 400;\"> becomes more valuable. This knowledge is critical for your professional development and career advancement.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Step #1: Leverage practical pre-work for maximum impact.<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Completing pre-work before starting the cybersecurity workshop equips you with essential knowledge. Understanding key concepts like information security and security risk assessment helps you feel more confident when tackling advanced material later.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Given the background of the pre-work, you will be better equipped to ask insightful questions and fully engage with the material presented. The Institute of Data\u2019s pre-work is designed to ensure you aren\u2019t overwhelmed by complex topics, allowing you to make the most of each session. Given its background, you will be better equipped to ask insightful questions and fully engage with the material presented.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">Apply cybersecurity concepts through case studies.<\/span><\/h4>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Real-life case studies offer practical insights into how cybersecurity is used in both business and government. By examining real-world situations, you can see how professionals apply their knowledge to solve critical issues.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Understanding how cybersecurity works in real-world scenarios helps you convert theoretical knowledge into practical skills. The ability to apply what you\u2019ve learned in actual settings is key to developing actionable expertise that will serve you well throughout your career.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Step #2: Actively participate in class labs and projects.<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">At the Institute of Data, labs are designed to incorporate real-life cybersecurity challenges. By fully engaging, you can practice handling scenarios that professionals deal with, allowing you to develop problem-solving skills in a safe setting. This experience bridges theory and practice, helping you prepare for actual tasks without the risks involved in real situations.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">Embrace collaboration in virtual break-out rooms and group projects.<\/span><\/h4>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Collaboration is important, whether you\u2019re taking up our Cybersecurity course or a <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/data-science-artificial-intelligence-program\/\"><span style=\"font-weight: 400;\">Data Science &amp; AI course<\/span><\/a><span style=\"font-weight: 400;\"> at the Institute of Data. Virtual break-out rooms and group projects let you work with peers, gain different perspectives, and develop teamwork skills like in real-world work environments.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Plus, working with others develops your ability to communicate complex ideas simply and take different approaches to problem-solving situations.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Your instructors in a cybersecurity workshop offer real-world insights that go beyond theory. Their experience helps you understand how to apply cybersecurity concepts in actual situations, giving you valuable advice on industry trends and career development.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Step #3: Apply your new skills in real-world scenarios.<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Immediately putting your cybersecurity training into practice strengthens your skills and confidence. Using the tools and techniques learned in the course, whether at work or on personal projects, ensures your knowledge is reinforced through practical experience. This approach at the Institute of Data turns theory into action, making you more capable of addressing real-world security challenges.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Focusing on high-demand areas like online safety, threat detection and cybersecurity best practices is essential in today\u2019s job market. These skills address key challenges faced by businesses and government agencies. Mastering them through our cybersecurity workshop prepares you for roles that require protecting sensitive data, making you a valuable asset in cybersecurity positions.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Step #4: Take advantage of career support from the Institute of Data.<\/span><\/h3>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">Our Job Outcomes Support helps you refine your professional documents to better align with industry expectations.<\/span><\/h4>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Our career support, whether you are taking our Cybersecurity course, <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/software-engineering-program\/\"><span style=\"font-weight: 400;\">Software Engineering Course<\/span><\/a><span style=\"font-weight: 400;\"> or any of our other offerings, is designed to help you improve your CV and cover letters to align with industry standards.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">By highlighting your skills and experiences effectively, you increase your chances of landing cybersecurity roles. Personalized feedback ensures your application reflects what you offer, making you a stronger candidate.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">Interact with experts during industry networking events.<\/span><\/h4>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">At the Institute of Data, we have dedicated and experienced career coaches who can guide you on how to effectively connect with employers through targeted industry engagement, job applications and participation in industry networking events.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">These connections offer insights, potential job opportunities and valuable guidance for your career. Networking can also open doors to collaborations and references that enhance your job search.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><a href=\"https:\/\/www.institutedata.com\/us\/faq\/\"><span style=\"font-weight: 400;\">Frequently Asked Questions (FAQ)<\/span><\/a><\/h2>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">What is the purpose of a cybersecurity workshop?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">A cybersecurity workshop provides essential knowledge and practical skills. It equips professionals to handle real-world cybersecurity challenges by teaching key concepts like risk management, threat detection and incident response.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The Institute of Data\u2019s Cybersecurity Course focuses on building practical skills for roles such as Cybersecurity Analyst, Penetration Tester or Security Operations Consultant. We put an emphasis on applying what you learn directly in professional settings, enhancing your ability to solve real cybersecurity problems.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Can I attend a workshop if I have no prior experience in IT?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Yes, our cybersecurity workshops are open to both IT and non-IT professionals. Even if you\u2019re new to IT, the Institute of Data provides comprehensive pre-work to build your foundational knowledge. This preparation helps you engage confidently with advanced content and succeed in labs and projects.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Will there be opportunities for networking during the workshop?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Networking is an essential part of our cybersecurity workshop. At the Institute of Data, we include opportunities that allow participants to connect with peers looking to transition to or advance their careers in cybersecurity. You\u2019ll also engage with instructors and industry professionals who provide valuable insights, enhancing your learning and career prospects.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Future-proof your career with industry-aligned training.<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In today\u2019s data-driven world, the Institute of Data equips professionals and organizations with specialized training in cybersecurity, big data and artificial intelligence. Our courses focus on practical skills that match current job market demands.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Whether you want to upskill or switch careers, our flexible courses allow you to balance work and study, keeping you competitive. Download a course outline today and elevate your career with the Institute of Data, keeping you ahead in a growing industry.<\/span>[\/vc_column_text][\/vc_column][vc_column fixed=&#8221;thb-fixed&#8221; width=&#8221;1\/3&#8243;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796352796{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571981187779{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 30px !important;padding-right: 30px !important;padding-bottom: -25px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Download Course Outline&#8221; font_container=&#8221;tag:h3|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;2px&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJfZm9ybV84MCUyMiUzRSUzQyUyRmRpdiUzRSUzQ3NjcmlwdCUyMHNyYyUzRCUyMmh0dHBzJTNBJTJGJTJGYmxhY2tjYXRkYXRhLmFjdGl2ZWhvc3RlZC5jb20lMkZmJTJGZW1iZWQucGhwJTNGaWQlM0Q4MCUyMiUyMHR5cGUlM0QlMjJ0ZXh0JTJGamF2YXNjcmlwdCUyMiUyMGNoYXJzZXQlM0QlMjJ1dGYtOCUyMiUzRSUzQyUyRnNjcmlwdCUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner thb_column_padding=&#8221;true&#8221; css=&#8221;.vc_custom_1648796317949{margin-right: -35px !important;margin-left: -35px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1571967184695{margin-top: 5px !important;margin-bottom: 5px !important;border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;padding-top: 25px !important;padding-right: 30px !important;padding-left: 30px !important;background-color: #f7f7f7 !important;border-left-color: #e6e6e6 !important;border-left-style: solid !important;border-right-color: #e6e6e6 !important;border-right-style: solid !important;border-top-color: #e6e6e6 !important;border-top-style: solid !important;border-bottom-color: #e6e6e6 !important;border-bottom-style: solid !important;border-radius: 1px !important;}&#8221;][vc_custom_heading text=&#8221;Discuss with a Career Consultant&#8221; font_container=&#8221;tag:h4|text_align:left|color:000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]You can schedule a call with an Institute of Data Career Consultant to discuss this course.[\/vc_column_text]\t<a id=\"thb-button-6a076c610991d\" class=\"btn style1 medium full black small-radius  fancybox-inline  arrow-enabled\" href=\"httpswww.institutedata.comusconsultation\" target=\"_blank\" role=\"button\">\n\t\t<span>ScheduleaCall<\/span>\n\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\r\n\t width=\"30px\" height=\"18px\" viewBox=\"0 0 30 18\" enable-background=\"new 0 0 30 18\" xml:space=\"preserve\">\r\n<path class=\"handle\" d=\"M20.305,16.212c-0.407,0.409-0.407,1.071,0,1.479s1.068,0.408,1.476,0l7.914-7.952c0.408-0.409,0.408-1.071,0-1.481\r\n\tl-7.914-7.952c-0.407-0.409-1.068-0.409-1.476,0s-0.407,1.071,0,1.48l7.185,7.221L20.305,16.212z\"\/>\r\n<path class=\"bar\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1,8h28.001c0.551,0,1,0.448,1,1c0,0.553-0.449,1-1,1H1c-0.553,0-1-0.447-1-1\r\n\tC0,8.448,0.447,8,1,8z\"\/>\r\n<\/svg>\r\n\t\t<\/a>\n\t\t[vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;mobile-footer-fixed&#8221; css=&#8221;.vc_custom_1572216358905{margin-bottom: -19px !important;padding-top: 15px !important;background-color: #000000 !important;}&#8221;][vc_column thb_color=&#8221;thb-light-column&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221; el_class=&#8221;text-center&#8221;][vc_column_text]\nDownload Course Outline<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1648796564794{margin-top: -30px !important;margin-bottom: 30px !important;}&#8221;][vc_column][vc_column_text] [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1571968629318{padding-bottom: 3vh !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;Share This Course&#8221; font_container=&#8221;tag:h6|text_align:right|color:0020ff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; el_class=&#8221;align-justify&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;40px&#8221;][vc_column_text css=&#8221;&#8221; animation=&#8221;animation fade-in&#8221;]The Cybersecurity course is designed for IT and non-IT professionals who are interested in transitioning to a career in cybersecurity. The program includes practical training, industry certification and job placement support to&hellip;<\/p>\n","protected":false},"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","tags":[3437],"class_list":["post-87920","portfolio","type-portfolio","status-publish","hentry","tag-seo_manual"],"_links":{"self":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio\/87920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio"}],"about":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/types\/portfolio"}],"replies":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/comments?post=87920"}],"version-history":[{"count":6,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio\/87920\/revisions"}],"predecessor-version":[{"id":88274,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/portfolio\/87920\/revisions\/88274"}],"wp:attachment":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media?parent=87920"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/tags?post=87920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}