{"id":5428,"date":"2023-12-21T01:42:06","date_gmt":"2023-12-21T01:42:06","guid":{"rendered":"http:\/\/demo.thimpress.com\/eduma\/?post_type=lpr_course&#038;p=3138"},"modified":"2024-07-11T19:38:53","modified_gmt":"2024-07-11T19:38:53","slug":"infosec-cybersecurity-training","status":"publish","type":"lp_course","link":"https:\/\/www.zeronedatasolutions.com\/trainings\/courses\/infosec-cybersecurity-training\/","title":{"rendered":"InfoSec Cybersecurity Training"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5428\" class=\"elementor elementor-5428\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1a94bab elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1a94bab\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5c325bd\" data-id=\"5c325bd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44de2ac elementor-widget elementor-widget-text-editor\" data-id=\"44de2ac\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity is the fastest growing career in the IT industry. Between January and September 2019, there were over 7.9 billion data records exposed \u2014 a 33% increase from the same time in 2018!<br \/>In the first quarter of 2020, exposed records were pacing at an increase of 273% over last year.<br \/>Companies are scrambling to fill their Cybersecurity positions and There are not enough professionalS to fill these positions.<\/p><p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-21772 aligncenter\" src=\"https:\/\/www.zeronedatasolutions.com\/trainings\/wp-content\/uploads\/2023\/12\/CompTIA_Sec.webp\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.zeronedatasolutions.com\/trainings\/wp-content\/uploads\/2023\/12\/CompTIA_Sec.webp 300w, https:\/\/www.zeronedatasolutions.com\/trainings\/wp-content\/uploads\/2023\/12\/CompTIA_Sec-150x150.webp 150w, https:\/\/www.zeronedatasolutions.com\/trainings\/wp-content\/uploads\/2023\/12\/CompTIA_Sec-100x100.webp 100w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09de14a elementor-widget thim-ekits-heading elementor-widget-thim-heading\" data-id=\"09de14a\" data-element_type=\"widget\" data-widget_type=\"thim-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"sc_heading \"><h4 class=\"title\">What you'll learn<\/h4><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e20028b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e20028b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-64ba78c\" data-id=\"64ba78c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3529ed6 elementor-widget elementor-widget-thim-ekits-header-info\" data-id=\"3529ed6\" data-element_type=\"widget\" data-widget_type=\"thim-ekits-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"header-info-swapper\">\n\t\t\t<ul class=\"thim-header-info\">\n\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"39.3878701px\" height=\"39.0749985px\" viewBox=\"0 0 39.3878701 39.0749985\"><g stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><path d=\"M38.399995,17.0749985 L37.199995,15.9749985 C36.799995,15.4749985 36.5,14.4749985 36.699995,13.7749985 L37.099995,12.1749985 C37.299995,11.2749985 37.199995,10.3749985 36.799995,9.6749985 C36.299995,8.8749985 35.599995,8.3749985 34.799995,8.0749985 L33.199995,7.6749985 C32.599995,7.4749985 31.799995,6.7749985 31.599995,6.0749985 L31.199995,4.4749985 C30.699995,2.7749985 28.799995,1.6749985 27.099995,2.0749985 L25.5,2.4749985 C24.799995,2.7749985 23.699995,2.4749985 23.199995,2.0749985 L22,0.9749985 C20.699995,-0.3249995 18.5,-0.3249995 17.199995,0.9749985 L16,2.0749985 C15.699995,2.4749985 14.599995,2.7749985 14,2.6749985 L12.399995,2.2749985 C10.599995,1.7749985 8.699995,2.8749985 8.299995,4.5749985 L7.899995,6.1749985 C7.699995,6.7749985 6.899995,7.5749985 6.299995,7.6749985 L4.699995,8.1749985 C3.799995,8.3749985 3.099995,8.9749985 2.699995,9.7749985 C2.199995,10.5749985 2.099995,11.4749985 2.399995,12.2749985 L2.699995,13.7749985 C2.899995,14.4749985 2.599995,15.4749985 2.099995,15.9749985 L1,17.0749985 C0.4,17.6749985 0,18.5749985 0,19.4749985 C0,20.3749985 0.3,21.1749985 1,21.8749985 L2.099995,22.9749985 C2.599995,23.4749985 2.899995,24.4749985 2.699995,25.0749985 L2.299995,26.6749985 C2.099995,27.5749985 2.199995,28.4749985 2.599995,29.1749985 C3.099995,29.9749985 3.799995,30.4749985 4.599995,30.7749985 L6.199995,31.1749985 C6.799995,31.3749985 7.600005,32.0749985 7.799995,32.7749985 L8.199995,34.3749985 C8.699995,36.0749985 10.599995,37.1749985 12.299995,36.7749985 L13.899995,36.3749985 C14.5,36.1749985 15.599995,36.4749985 16.099995,36.9749985 L17.299995,38.0749985 C17.899995,38.6749985 18.799995,39.0749985 19.699995,39.0749985 C20.599995,39.0749985 21.5,38.7749985 22.099995,38.0749985 L23.299995,36.9749985 C23.799995,36.5749985 24.899995,36.2749985 25.5,36.3749985 L27.099995,36.7749985 C27.399995,36.8749985 27.699995,36.8749985 28,36.8749985 C29.5,36.8749985 30.899995,35.8749985 31.299995,34.3749985 L31.699995,32.7749985 C31.899995,32.1749985 32.699995,31.3749985 33.299995,31.1749985 L34.899995,30.7749985 C36.699995,30.2749985 37.799995,28.4749985 37.299995,26.6749985 L36.699995,25.0749985 C36.5,24.4749985 36.799995,23.3749985 37.299995,22.8749985 L38.5,21.7749985 C39.699995,20.4749985 39.699995,18.3749985 38.399995,17.0749985 Z\" fill=\"#356DF1\"><\/path><path class=\"nochange\" d=\"M28.499895,15.1749985 L17.999895,25.5749985 C17.699895,25.8749985 17.399895,25.9749985 17.099895,25.9749985 C16.799895,25.9749985 16.399895,25.8749985 16.199895,25.5749985 L10.899895,20.3749985 C10.399895,19.8749985 10.399895,19.0749985 10.899895,18.5749985 C11.399895,18.0749985 12.199895,18.0749985 12.799895,18.5749985 L17.099895,22.8749985 L26.699895,13.3749985 C27.199895,12.8749985 27.999895,12.8749985 28.599895,13.3749985 C29.199895,13.8749985 28.999895,14.6749985 28.499895,15.1749985 Z\" fill=\"#FFFFFF\"><\/path><\/g><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tIn this class, you will learn to manage all aspects of information security engineering and the daily operations of enterprise cybersecurity systems. Ability to detect and defend against cyberattacks targeting any organization\u2019s network infrastructure.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"39.3878701px\" height=\"39.0749985px\" viewBox=\"0 0 39.3878701 39.0749985\"><g stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><path d=\"M38.399995,17.0749985 L37.199995,15.9749985 C36.799995,15.4749985 36.5,14.4749985 36.699995,13.7749985 L37.099995,12.1749985 C37.299995,11.2749985 37.199995,10.3749985 36.799995,9.6749985 C36.299995,8.8749985 35.599995,8.3749985 34.799995,8.0749985 L33.199995,7.6749985 C32.599995,7.4749985 31.799995,6.7749985 31.599995,6.0749985 L31.199995,4.4749985 C30.699995,2.7749985 28.799995,1.6749985 27.099995,2.0749985 L25.5,2.4749985 C24.799995,2.7749985 23.699995,2.4749985 23.199995,2.0749985 L22,0.9749985 C20.699995,-0.3249995 18.5,-0.3249995 17.199995,0.9749985 L16,2.0749985 C15.699995,2.4749985 14.599995,2.7749985 14,2.6749985 L12.399995,2.2749985 C10.599995,1.7749985 8.699995,2.8749985 8.299995,4.5749985 L7.899995,6.1749985 C7.699995,6.7749985 6.899995,7.5749985 6.299995,7.6749985 L4.699995,8.1749985 C3.799995,8.3749985 3.099995,8.9749985 2.699995,9.7749985 C2.199995,10.5749985 2.099995,11.4749985 2.399995,12.2749985 L2.699995,13.7749985 C2.899995,14.4749985 2.599995,15.4749985 2.099995,15.9749985 L1,17.0749985 C0.4,17.6749985 0,18.5749985 0,19.4749985 C0,20.3749985 0.3,21.1749985 1,21.8749985 L2.099995,22.9749985 C2.599995,23.4749985 2.899995,24.4749985 2.699995,25.0749985 L2.299995,26.6749985 C2.099995,27.5749985 2.199995,28.4749985 2.599995,29.1749985 C3.099995,29.9749985 3.799995,30.4749985 4.599995,30.7749985 L6.199995,31.1749985 C6.799995,31.3749985 7.600005,32.0749985 7.799995,32.7749985 L8.199995,34.3749985 C8.699995,36.0749985 10.599995,37.1749985 12.299995,36.7749985 L13.899995,36.3749985 C14.5,36.1749985 15.599995,36.4749985 16.099995,36.9749985 L17.299995,38.0749985 C17.899995,38.6749985 18.799995,39.0749985 19.699995,39.0749985 C20.599995,39.0749985 21.5,38.7749985 22.099995,38.0749985 L23.299995,36.9749985 C23.799995,36.5749985 24.899995,36.2749985 25.5,36.3749985 L27.099995,36.7749985 C27.399995,36.8749985 27.699995,36.8749985 28,36.8749985 C29.5,36.8749985 30.899995,35.8749985 31.299995,34.3749985 L31.699995,32.7749985 C31.899995,32.1749985 32.699995,31.3749985 33.299995,31.1749985 L34.899995,30.7749985 C36.699995,30.2749985 37.799995,28.4749985 37.299995,26.6749985 L36.699995,25.0749985 C36.5,24.4749985 36.799995,23.3749985 37.299995,22.8749985 L38.5,21.7749985 C39.699995,20.4749985 39.699995,18.3749985 38.399995,17.0749985 Z\" fill=\"#356DF1\"><\/path><path class=\"nochange\" d=\"M28.499895,15.1749985 L17.999895,25.5749985 C17.699895,25.8749985 17.399895,25.9749985 17.099895,25.9749985 C16.799895,25.9749985 16.399895,25.8749985 16.199895,25.5749985 L10.899895,20.3749985 C10.399895,19.8749985 10.399895,19.0749985 10.899895,18.5749985 C11.399895,18.0749985 12.199895,18.0749985 12.799895,18.5749985 L17.099895,22.8749985 L26.699895,13.3749985 C27.199895,12.8749985 27.999895,12.8749985 28.599895,13.3749985 C29.199895,13.8749985 28.999895,14.6749985 28.499895,15.1749985 Z\" fill=\"#FFFFFF\"><\/path><\/g><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tResponsibilities will also include assessing and managing the cybersecurity risk posture of small, medium, and enterprise networks.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"39.3878701px\" height=\"39.0749985px\" viewBox=\"0 0 39.3878701 39.0749985\"><g stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><path d=\"M38.399995,17.0749985 L37.199995,15.9749985 C36.799995,15.4749985 36.5,14.4749985 36.699995,13.7749985 L37.099995,12.1749985 C37.299995,11.2749985 37.199995,10.3749985 36.799995,9.6749985 C36.299995,8.8749985 35.599995,8.3749985 34.799995,8.0749985 L33.199995,7.6749985 C32.599995,7.4749985 31.799995,6.7749985 31.599995,6.0749985 L31.199995,4.4749985 C30.699995,2.7749985 28.799995,1.6749985 27.099995,2.0749985 L25.5,2.4749985 C24.799995,2.7749985 23.699995,2.4749985 23.199995,2.0749985 L22,0.9749985 C20.699995,-0.3249995 18.5,-0.3249995 17.199995,0.9749985 L16,2.0749985 C15.699995,2.4749985 14.599995,2.7749985 14,2.6749985 L12.399995,2.2749985 C10.599995,1.7749985 8.699995,2.8749985 8.299995,4.5749985 L7.899995,6.1749985 C7.699995,6.7749985 6.899995,7.5749985 6.299995,7.6749985 L4.699995,8.1749985 C3.799995,8.3749985 3.099995,8.9749985 2.699995,9.7749985 C2.199995,10.5749985 2.099995,11.4749985 2.399995,12.2749985 L2.699995,13.7749985 C2.899995,14.4749985 2.599995,15.4749985 2.099995,15.9749985 L1,17.0749985 C0.4,17.6749985 0,18.5749985 0,19.4749985 C0,20.3749985 0.3,21.1749985 1,21.8749985 L2.099995,22.9749985 C2.599995,23.4749985 2.899995,24.4749985 2.699995,25.0749985 L2.299995,26.6749985 C2.099995,27.5749985 2.199995,28.4749985 2.599995,29.1749985 C3.099995,29.9749985 3.799995,30.4749985 4.599995,30.7749985 L6.199995,31.1749985 C6.799995,31.3749985 7.600005,32.0749985 7.799995,32.7749985 L8.199995,34.3749985 C8.699995,36.0749985 10.599995,37.1749985 12.299995,36.7749985 L13.899995,36.3749985 C14.5,36.1749985 15.599995,36.4749985 16.099995,36.9749985 L17.299995,38.0749985 C17.899995,38.6749985 18.799995,39.0749985 19.699995,39.0749985 C20.599995,39.0749985 21.5,38.7749985 22.099995,38.0749985 L23.299995,36.9749985 C23.799995,36.5749985 24.899995,36.2749985 25.5,36.3749985 L27.099995,36.7749985 C27.399995,36.8749985 27.699995,36.8749985 28,36.8749985 C29.5,36.8749985 30.899995,35.8749985 31.299995,34.3749985 L31.699995,32.7749985 C31.899995,32.1749985 32.699995,31.3749985 33.299995,31.1749985 L34.899995,30.7749985 C36.699995,30.2749985 37.799995,28.4749985 37.299995,26.6749985 L36.699995,25.0749985 C36.5,24.4749985 36.799995,23.3749985 37.299995,22.8749985 L38.5,21.7749985 C39.699995,20.4749985 39.699995,18.3749985 38.399995,17.0749985 Z\" fill=\"#356DF1\"><\/path><path class=\"nochange\" d=\"M28.499895,15.1749985 L17.999895,25.5749985 C17.699895,25.8749985 17.399895,25.9749985 17.099895,25.9749985 C16.799895,25.9749985 16.399895,25.8749985 16.199895,25.5749985 L10.899895,20.3749985 C10.399895,19.8749985 10.399895,19.0749985 10.899895,18.5749985 C11.399895,18.0749985 12.199895,18.0749985 12.799895,18.5749985 L17.099895,22.8749985 L26.699895,13.3749985 C27.199895,12.8749985 27.999895,12.8749985 28.599895,13.3749985 C29.199895,13.8749985 28.999895,14.6749985 28.499895,15.1749985 Z\" fill=\"#FFFFFF\"><\/path><\/g><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tLearn cybersecurity proactive risk management services, including vulnerability scanning, penetration tests, risk assessments, and security audits.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"39.3878701px\" height=\"39.0749985px\" viewBox=\"0 0 39.3878701 39.0749985\"><g stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><path d=\"M38.399995,17.0749985 L37.199995,15.9749985 C36.799995,15.4749985 36.5,14.4749985 36.699995,13.7749985 L37.099995,12.1749985 C37.299995,11.2749985 37.199995,10.3749985 36.799995,9.6749985 C36.299995,8.8749985 35.599995,8.3749985 34.799995,8.0749985 L33.199995,7.6749985 C32.599995,7.4749985 31.799995,6.7749985 31.599995,6.0749985 L31.199995,4.4749985 C30.699995,2.7749985 28.799995,1.6749985 27.099995,2.0749985 L25.5,2.4749985 C24.799995,2.7749985 23.699995,2.4749985 23.199995,2.0749985 L22,0.9749985 C20.699995,-0.3249995 18.5,-0.3249995 17.199995,0.9749985 L16,2.0749985 C15.699995,2.4749985 14.599995,2.7749985 14,2.6749985 L12.399995,2.2749985 C10.599995,1.7749985 8.699995,2.8749985 8.299995,4.5749985 L7.899995,6.1749985 C7.699995,6.7749985 6.899995,7.5749985 6.299995,7.6749985 L4.699995,8.1749985 C3.799995,8.3749985 3.099995,8.9749985 2.699995,9.7749985 C2.199995,10.5749985 2.099995,11.4749985 2.399995,12.2749985 L2.699995,13.7749985 C2.899995,14.4749985 2.599995,15.4749985 2.099995,15.9749985 L1,17.0749985 C0.4,17.6749985 0,18.5749985 0,19.4749985 C0,20.3749985 0.3,21.1749985 1,21.8749985 L2.099995,22.9749985 C2.599995,23.4749985 2.899995,24.4749985 2.699995,25.0749985 L2.299995,26.6749985 C2.099995,27.5749985 2.199995,28.4749985 2.599995,29.1749985 C3.099995,29.9749985 3.799995,30.4749985 4.599995,30.7749985 L6.199995,31.1749985 C6.799995,31.3749985 7.600005,32.0749985 7.799995,32.7749985 L8.199995,34.3749985 C8.699995,36.0749985 10.599995,37.1749985 12.299995,36.7749985 L13.899995,36.3749985 C14.5,36.1749985 15.599995,36.4749985 16.099995,36.9749985 L17.299995,38.0749985 C17.899995,38.6749985 18.799995,39.0749985 19.699995,39.0749985 C20.599995,39.0749985 21.5,38.7749985 22.099995,38.0749985 L23.299995,36.9749985 C23.799995,36.5749985 24.899995,36.2749985 25.5,36.3749985 L27.099995,36.7749985 C27.399995,36.8749985 27.699995,36.8749985 28,36.8749985 C29.5,36.8749985 30.899995,35.8749985 31.299995,34.3749985 L31.699995,32.7749985 C31.899995,32.1749985 32.699995,31.3749985 33.299995,31.1749985 L34.899995,30.7749985 C36.699995,30.2749985 37.799995,28.4749985 37.299995,26.6749985 L36.699995,25.0749985 C36.5,24.4749985 36.799995,23.3749985 37.299995,22.8749985 L38.5,21.7749985 C39.699995,20.4749985 39.699995,18.3749985 38.399995,17.0749985 Z\" fill=\"#356DF1\"><\/path><path class=\"nochange\" d=\"M28.499895,15.1749985 L17.999895,25.5749985 C17.699895,25.8749985 17.399895,25.9749985 17.099895,25.9749985 C16.799895,25.9749985 16.399895,25.8749985 16.199895,25.5749985 L10.899895,20.3749985 C10.399895,19.8749985 10.399895,19.0749985 10.899895,18.5749985 C11.399895,18.0749985 12.199895,18.0749985 12.799895,18.5749985 L17.099895,22.8749985 L26.699895,13.3749985 C27.199895,12.8749985 27.999895,12.8749985 28.599895,13.3749985 C29.199895,13.8749985 28.999895,14.6749985 28.499895,15.1749985 Z\" fill=\"#FFFFFF\"><\/path><\/g><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tThe ability to develop and maintain Information Security Policies and Standards that establish the required behaviors and controls intended to protect business information technology resources, secure personal information, and safeguard the privacy of individuals.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"39.3878701px\" height=\"39.0749985px\" viewBox=\"0 0 39.3878701 39.0749985\"><g stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><path d=\"M38.399995,17.0749985 L37.199995,15.9749985 C36.799995,15.4749985 36.5,14.4749985 36.699995,13.7749985 L37.099995,12.1749985 C37.299995,11.2749985 37.199995,10.3749985 36.799995,9.6749985 C36.299995,8.8749985 35.599995,8.3749985 34.799995,8.0749985 L33.199995,7.6749985 C32.599995,7.4749985 31.799995,6.7749985 31.599995,6.0749985 L31.199995,4.4749985 C30.699995,2.7749985 28.799995,1.6749985 27.099995,2.0749985 L25.5,2.4749985 C24.799995,2.7749985 23.699995,2.4749985 23.199995,2.0749985 L22,0.9749985 C20.699995,-0.3249995 18.5,-0.3249995 17.199995,0.9749985 L16,2.0749985 C15.699995,2.4749985 14.599995,2.7749985 14,2.6749985 L12.399995,2.2749985 C10.599995,1.7749985 8.699995,2.8749985 8.299995,4.5749985 L7.899995,6.1749985 C7.699995,6.7749985 6.899995,7.5749985 6.299995,7.6749985 L4.699995,8.1749985 C3.799995,8.3749985 3.099995,8.9749985 2.699995,9.7749985 C2.199995,10.5749985 2.099995,11.4749985 2.399995,12.2749985 L2.699995,13.7749985 C2.899995,14.4749985 2.599995,15.4749985 2.099995,15.9749985 L1,17.0749985 C0.4,17.6749985 0,18.5749985 0,19.4749985 C0,20.3749985 0.3,21.1749985 1,21.8749985 L2.099995,22.9749985 C2.599995,23.4749985 2.899995,24.4749985 2.699995,25.0749985 L2.299995,26.6749985 C2.099995,27.5749985 2.199995,28.4749985 2.599995,29.1749985 C3.099995,29.9749985 3.799995,30.4749985 4.599995,30.7749985 L6.199995,31.1749985 C6.799995,31.3749985 7.600005,32.0749985 7.799995,32.7749985 L8.199995,34.3749985 C8.699995,36.0749985 10.599995,37.1749985 12.299995,36.7749985 L13.899995,36.3749985 C14.5,36.1749985 15.599995,36.4749985 16.099995,36.9749985 L17.299995,38.0749985 C17.899995,38.6749985 18.799995,39.0749985 19.699995,39.0749985 C20.599995,39.0749985 21.5,38.7749985 22.099995,38.0749985 L23.299995,36.9749985 C23.799995,36.5749985 24.899995,36.2749985 25.5,36.3749985 L27.099995,36.7749985 C27.399995,36.8749985 27.699995,36.8749985 28,36.8749985 C29.5,36.8749985 30.899995,35.8749985 31.299995,34.3749985 L31.699995,32.7749985 C31.899995,32.1749985 32.699995,31.3749985 33.299995,31.1749985 L34.899995,30.7749985 C36.699995,30.2749985 37.799995,28.4749985 37.299995,26.6749985 L36.699995,25.0749985 C36.5,24.4749985 36.799995,23.3749985 37.299995,22.8749985 L38.5,21.7749985 C39.699995,20.4749985 39.699995,18.3749985 38.399995,17.0749985 Z\" fill=\"#356DF1\"><\/path><path class=\"nochange\" d=\"M28.499895,15.1749985 L17.999895,25.5749985 C17.699895,25.8749985 17.399895,25.9749985 17.099895,25.9749985 C16.799895,25.9749985 16.399895,25.8749985 16.199895,25.5749985 L10.899895,20.3749985 C10.399895,19.8749985 10.399895,19.0749985 10.899895,18.5749985 C11.399895,18.0749985 12.199895,18.0749985 12.799895,18.5749985 L17.099895,22.8749985 L26.699895,13.3749985 C27.199895,12.8749985 27.999895,12.8749985 28.599895,13.3749985 C29.199895,13.8749985 28.999895,14.6749985 28.499895,15.1749985 Z\" fill=\"#FFFFFF\"><\/path><\/g><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tAfter this class, you will be able to fuse technical and non-technical sources to analyze various cyber threat landscapes.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26c0708 elementor-widget elementor-widget-text-editor\" data-id=\"26c0708\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"wp-image-21804 aligncenter\" src=\"https:\/\/www.zeronedatasolutions.com\/trainings\/wp-content\/uploads\/2024\/02\/ZellePayment-Cybersecurity.webp\" alt=\"\" width=\"480\" height=\"480\" srcset=\"https:\/\/www.zeronedatasolutions.com\/trainings\/wp-content\/uploads\/2024\/02\/ZellePayment-Cybersecurity.webp 781w, https:\/\/www.zeronedatasolutions.com\/trainings\/wp-content\/uploads\/2024\/02\/ZellePayment-Cybersecurity-300x300.webp 300w, https:\/\/www.zeronedatasolutions.com\/trainings\/wp-content\/uploads\/2024\/02\/ZellePayment-Cybersecurity-150x150.webp 150w, https:\/\/www.zeronedatasolutions.com\/trainings\/wp-content\/uploads\/2024\/02\/ZellePayment-Cybersecurity-768x768.webp 768w, https:\/\/www.zeronedatasolutions.com\/trainings\/wp-content\/uploads\/2024\/02\/ZellePayment-Cybersecurity-600x600.webp 600w, https:\/\/www.zeronedatasolutions.com\/trainings\/wp-content\/uploads\/2024\/02\/ZellePayment-Cybersecurity-100x100.webp 100w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is the fastest growing career in the IT industry. Between January and September 2019, there were over 7.9 billion data records exposed \u2014 a 33% increase from the same time in 2018! In the first quarter of 2020, exposed records were pacing at an increase of 273% over last year.<\/p>\n","protected":false},"featured_media":21770,"comment_status":"open","ping_status":"closed","template":"","course_category":[27,56,46],"course_tag":[],"class_list":["post-5428","lp_course","type-lp_course","status-publish","has-post-thumbnail","hentry","course_category-coaching","course_category-cybersecurity","course_category-technology","course"],"_links":{"self":[{"href":"https:\/\/www.zeronedatasolutions.com\/trainings\/wp-json\/wp\/v2\/lp_course\/5428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.zeronedatasolutions.com\/trainings\/wp-json\/wp\/v2\/lp_course"}],"about":[{"href":"https:\/\/www.zeronedatasolutions.com\/trainings\/wp-json\/wp\/v2\/types\/lp_course"}],"replies":[{"embeddable":true,"href":"https:\/\/www.zeronedatasolutions.com\/trainings\/wp-json\/wp\/v2\/comments?post=5428"}],"version-history":[{"count":19,"href":"https:\/\/www.zeronedatasolutions.com\/trainings\/wp-json\/wp\/v2\/lp_course\/5428\/revisions"}],"predecessor-version":[{"id":21937,"href":"https:\/\/www.zeronedatasolutions.com\/trainings\/wp-json\/wp\/v2\/lp_course\/5428\/revisions\/21937"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.zeronedatasolutions.com\/trainings\/wp-json\/wp\/v2\/media\/21770"}],"wp:attachment":[{"href":"https:\/\/www.zeronedatasolutions.com\/trainings\/wp-json\/wp\/v2\/media?parent=5428"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/www.zeronedatasolutions.com\/trainings\/wp-json\/wp\/v2\/course_category?post=5428"},{"taxonomy":"course_tag","embeddable":true,"href":"https:\/\/www.zeronedatasolutions.com\/trainings\/wp-json\/wp\/v2\/course_tag?post=5428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}