{"id":46397,"date":"2024-07-04T13:16:34","date_gmt":"2024-07-04T13:16:34","guid":{"rendered":"https:\/\/ecstatic-roentgen.46-32-231-150.plesk.page\/?page_id=46397"},"modified":"2024-07-05T12:36:21","modified_gmt":"2024-07-05T12:36:21","slug":"cybersecurity-bootcamp","status":"publish","type":"page","link":"https:\/\/fiithub.co.uk\/index.php\/cybersecurity-bootcamp\/","title":{"rendered":"Cybersecurity Bootcamp"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;15&#8243; content_placement=&#8221;middle&#8221; bg_type=&#8221;bg_color&#8221; ult_hide_row=&#8221;ult_hide_row_value&#8221; ult_hide_row_mobile=&#8221;mobile&#8221; ult_hide_row_mobile_large=&#8221;xl_mobile&#8221; css=&#8221;.vc_custom_1707930827821{margin-top: -70px !important;padding-top: 125px !important;padding-bottom: 100px !important;background-image: url(https:\/\/rhics.io\/wp-content\/uploads\/2023\/07\/Group-1000001003.png?id=44676) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1694216037163{margin-top: -50px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1694188349964{padding-top: 15px !important;padding-right: 15px !important;padding-left: 15px !important;}&#8221;]<div id=\"ultimate-heading-245469d023160ce31\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-245469d023160ce31 uvc-6101 \" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-245469d023160ce31 h1'  data-responsive-json-new='{\"font-size\":\"desktop:60px;mobile_landscape:40px;mobile:40px;\",\"line-height\":\"\"}' ><h1 style=\"font-family:&#039;Syne&#039;;font-weight:700;\">Women In Tech:Cybersecurity Bootcamp<\/h1><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-245469d023160ce31 .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-family:&#039;Montserrat&#039;;font-weight:normal;\"><\/p>\n<h5 style=\"text-align: center;\">An entry-level training for Cyber Security Analysts, Consultants, and Risk Managers<\/h5>\n<p><\/div><\/div>[vc_empty_space height=&#8221;70px&#8221;]<div class=\" vc_custom_1719409291843 ubtn-ctn-center \"><a class=\"ubtn-link ult-adjust-bottom-margin ubtn-center ubtn-mini \" href=\"#register\" ><button type=\"button\" id=\"ubtn-2008\"  class=\"ubtn ult-adjust-bottom-margin ult-responsive ubtn-mini ubtn-top-bg  none  ubtn-center   tooltip-69d023160ceb6\"  data-hover=\"#ffffff\" data-border-color=\"\" data-bg=\"#f43838\" data-hover-bg=\"#f28837\" data-border-hover=\"\" data-shadow-hover=\"\" data-shadow-click=\"none\" data-shadow=\"\" data-shd-shadow=\"\"  data-ultimate-target='#ubtn-2008'  data-responsive-json-new='{\"font-size\":\"desktop:26px;\",\"line-height\":\"\"}'  style=\"font-family:&#039;Syne&#039;;font-weight:700;border:none;background: #f43838;color: #ffffff;\"><span class=\"ubtn-hover\" style=\"background-color:#f28837\"><\/span><span class=\"ubtn-data ubtn-text \" >3 Weeks \u2013 Fully Online<\/span><\/button><\/a><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;15&#8243; content_placement=&#8221;middle&#8221; bg_type=&#8221;bg_color&#8221; ult_hide_row=&#8221;ult_hide_row_value&#8221; ult_hide_row_large_screen=&#8221;large_screen&#8221; ult_hide_row_desktop=&#8221;desktop&#8221; ult_hide_row_tablet=&#8221;tablet&#8221; ult_hide_row_tablet_small=&#8221;xs_tablet&#8221; css=&#8221;.vc_custom_1707930875214{margin-top: -70px !important;padding-top: 125px !important;padding-bottom: 100px !important;background-image: url(https:\/\/rhics.io\/wp-content\/uploads\/2023\/07\/Group-1000001003.png?id=44676) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1694216037163{margin-top: -50px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1694188349964{padding-top: 15px !important;padding-right: 15px !important;padding-left: 15px !important;}&#8221;]<div id=\"ultimate-heading-380469d023160cfab\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-380469d023160cfab uvc-1260 \" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-380469d023160cfab h1'  data-responsive-json-new='{\"font-size\":\"desktop:60px;mobile_landscape:40px;mobile:40px;\",\"line-height\":\"\"}' ><h1 style=\"font-family:&#039;Syne&#039;;font-weight:700;\">Women In Tech:<br \/>\nCybersecurity Bootcamp<\/h1><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-380469d023160cfab .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-family:&#039;Montserrat&#039;;font-weight:normal;\"><\/p>\n<p>An entry-level training for Cyber Security Analysts, Consultants, and Risk Managers<\/p>\n<p><\/div><\/div>[vc_empty_space height=&#8221;50px&#8221;]<div class=\" vc_custom_1719409307759 ubtn-ctn-center \"><a class=\"ubtn-link ult-adjust-bottom-margin ubtn-center ubtn-mini \" href=\"#register\" ><button type=\"button\" id=\"ubtn-3703\"  class=\"ubtn ult-adjust-bottom-margin ult-responsive ubtn-mini ubtn-top-bg  none  ubtn-center   tooltip-69d023160d00c\"  data-hover=\"#ffffff\" data-border-color=\"\" data-bg=\"#f43838\" data-hover-bg=\"#f28837\" data-border-hover=\"\" data-shadow-hover=\"\" data-shadow-click=\"none\" data-shadow=\"\" data-shd-shadow=\"\"  data-ultimate-target='#ubtn-3703'  data-responsive-json-new='{\"font-size\":\"desktop:26px;\",\"line-height\":\"\"}'  style=\"font-family:&#039;Syne&#039;;font-weight:700;border:none;background: #f43838;color: #ffffff;\"><span class=\"ubtn-hover\" style=\"background-color:#f28837\"><\/span><span class=\"ubtn-data ubtn-text \" >3 Weeks \u2013 Fully Online<\/span><\/button><\/a><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row gap=&#8221;20&#8243; bg_type=&#8221;bg_color&#8221; ult_hide_row=&#8221;ult_hide_row_value&#8221; ult_hide_row_mobile=&#8221;mobile&#8221; ult_hide_row_mobile_large=&#8221;xl_mobile&#8221; css=&#8221;.vc_custom_1694199535426{margin-top: 15px !important;padding-bottom: 30px !important;}&#8221; el_id=&#8221;Introduction&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1719409415932{margin-right: 40% !important;padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 25px !important;background-color: rgba(33,209,209,0.23) !important;*background-color: rgb(33,209,209) !important;}&#8221;]<\/p>\n<h6><span style=\"color: #249e9e;\"><strong>Programme Overview<\/strong><\/span><\/h6>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1719493787518{margin-top: 20px !important;}&#8221;]<span style=\"font-weight: 400;\">This comprehensive 3-week online course is specifically designed to empower women by equipping them with the essential skills to pursue careers as cybersecurity analysts, consultants, or risk managers. The programme covers a wide range of topics necessary for understanding, managing, and mitigating cybersecurity risks in today&#8217;s digital landscape. Through a combination of theoretical knowledge, practical exercises, case studies, and hands-on work experience, participants will develop the expertise needed to excel in the field of cybersecurity.<\/span>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1719411020311{margin-right: 10% !important;padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 25px !important;background-color: rgba(0,173,173,0.24) !important;*background-color: rgb(0,173,173) !important;}&#8221;]<\/p>\n<h6><span style=\"color: #800000;\"><strong>Female Empowerment through Technology<\/strong><\/span><\/h6>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1719409764141{margin-top: 20px !important;}&#8221;]<span style=\"font-weight: 400;\">The Women in Tech: Cybersecurity Bootcamp is dedicated to bridging the gender gap in the tech industry. By providing women with the tools and knowledge needed to succeed in cybersecurity, this programme aims to foster gender equality, create new streams of income, and enhance personal online safety. Participants will also contribute to social, economic, and environmental value creation by supporting sustainable and secure digital ecosystems.<\/span>[\/vc_column_text]<div class=\" vc_custom_1719412339260 ubtn-ctn-left \"><a class=\"ubtn-link ult-adjust-bottom-margin ubtn-left ubtn-mini \" href=\"#register\" ><button type=\"button\" id=\"ubtn-5566\"  class=\"ubtn ult-adjust-bottom-margin ult-responsive ubtn-mini ubtn-top-bg  none  ubtn-left   tooltip-69d023160d07c\"  data-hover=\"#ffffff\" data-border-color=\"\" data-bg=\"#f43838\" data-hover-bg=\"#f28837\" data-border-hover=\"\" data-shadow-hover=\"\" data-shadow-click=\"none\" data-shadow=\"\" data-shd-shadow=\"\"  data-ultimate-target='#ubtn-5566'  data-responsive-json-new='{\"font-size\":\"desktop:26px;\",\"line-height\":\"\"}'  style=\"font-family:&#039;Syne&#039;;font-weight:700;border:none;background: #f43838;color: #ffffff;\"><span class=\"ubtn-hover\" style=\"background-color:#f28837\"><\/span><span class=\"ubtn-data ubtn-text \" >REGISTER TODAY<\/span><\/button><\/a><\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_empty_space][vc_single_image image=&#8221;46401&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row gap=&#8221;5&#8243; bg_type=&#8221;bg_color&#8221; ult_hide_row=&#8221;ult_hide_row_value&#8221; ult_hide_row_mobile=&#8221;mobile&#8221; ult_hide_row_mobile_large=&#8221;xl_mobile&#8221; css=&#8221;.vc_custom_1694199613448{padding-bottom: 40px !important;}&#8221; el_id=&#8221;Objectives&#8221; bg_color_value=&#8221;#ffffff&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;46402&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1707921448859{margin-right: 50% !important;padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 25px !important;background-color: rgba(247,165,111,0.3) !important;*background-color: rgb(247,165,111) !important;}&#8221;]<\/p>\n<h6><span style=\"color: #ff6600;\"><strong><b>Course Objectives<\/b><\/strong><\/span><\/h6>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1719409812741{margin-top: 20px !important;}&#8221;]<\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Equip participants with a thorough understanding of cybersecurity principles, concepts, and best practices.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provide practical skills in identifying, analyzing, and mitigating cyber threats and vulnerabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Develop proficiency in implementing cybersecurity measures to protect organizational assets and data.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Familiarize participants with industry-standard tools, techniques, and frameworks used in cybersecurity analysis and risk management.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prepare participants for professional roles as cybersecurity analysts, consultants, or risk managers in various sectors.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Empower women to lead in the tech industry, creating additional streams of income and enhancing economic independence.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Promote personal online safety and awareness.<\/span><\/li>\n<\/ol>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1707922139611{margin-right: 30% !important;padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 25px !important;background-color: rgba(0,173,173,0.24) !important;*background-color: rgb(0,173,173) !important;}&#8221;]<\/p>\n<h6><span style=\"color: #035959;\"><strong>Why Attend<\/strong><\/span><\/h6>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1719410284502{margin-top: 20px !important;}&#8221;]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Career Advancement<\/b><span style=\"font-weight: 400;\">: Gain the knowledge and skills needed to pursue lucrative career opportunities in the fast-growing field of cybersecurity.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Industry Relevance<\/b><span style=\"font-weight: 400;\">: Stay updated with the latest cybersecurity trends, technologies, and best practices, ensuring your skills remain relevant and in-demand.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Professional Growth<\/b><span style=\"font-weight: 400;\">: Enhance your professional profile and credibility with a comprehensive cybersecurity training programme tailored for women.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Networking Opportunities<\/b><span style=\"font-weight: 400;\">: Connect with industry professionals, experts, and peers, expanding your professional network and potential career prospects.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Empowerment<\/b>: Be part of a supportive community that fosters female empowerment and leadership in tech.<\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\" vc_custom_1719412313059 ubtn-ctn-left \"><a class=\"ubtn-link ult-adjust-bottom-margin ubtn-left ubtn-mini \" href=\"#register\" ><button type=\"button\" id=\"ubtn-4050\"  class=\"ubtn ult-adjust-bottom-margin ult-responsive ubtn-mini ubtn-top-bg  none  ubtn-left   tooltip-69d023160d0ef\"  data-hover=\"#ffffff\" data-border-color=\"\" data-bg=\"#f43838\" data-hover-bg=\"#f28837\" data-border-hover=\"\" data-shadow-hover=\"\" data-shadow-click=\"none\" data-shadow=\"\" data-shd-shadow=\"\"  data-ultimate-target='#ubtn-4050'  data-responsive-json-new='{\"font-size\":\"desktop:26px;\",\"line-height\":\"\"}'  style=\"font-family:&#039;Syne&#039;;font-weight:700;border:none;background: #f43838;color: #ffffff;\"><span class=\"ubtn-hover\" style=\"background-color:#f28837\"><\/span><span class=\"ubtn-data ubtn-text \" >REGISTER TODAY<\/span><\/button><\/a><\/div>[\/vc_column][\/vc_row][vc_row gap=&#8221;20&#8243; bg_type=&#8221;bg_color&#8221; ult_hide_row=&#8221;ult_hide_row_value&#8221; ult_hide_row_large_screen=&#8221;large_screen&#8221; ult_hide_row_desktop=&#8221;desktop&#8221; ult_hide_row_tablet=&#8221;tablet&#8221; ult_hide_row_tablet_small=&#8221;xs_tablet&#8221; css=&#8221;.vc_custom_1707929371897{margin-top: 15px !important;}&#8221; el_id=&#8221;Introduction_mobile&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;46401&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][vc_column_text css=&#8221;.vc_custom_1719409439600{margin-right: 40% !important;padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 25px !important;background-color: rgba(33,209,209,0.23) !important;*background-color: rgb(33,209,209) !important;}&#8221;]<\/p>\n<h6><span style=\"color: #249e9e;\"><strong><b>Programme Overview<\/b><\/strong><\/span><\/h6>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1719549291898{margin-top: 20px !important;}&#8221;]<span style=\"font-weight: 400;\">This comprehensive 3-week online course is specifically designed to empower women by equipping them with the essential skills to pursue careers as cybersecurity analysts, consultants, or risk managers. The programme covers a wide range of topics necessary for understanding, managing, and mitigating cybersecurity risks in today&#8217;s digital landscape. Through a combination of theoretical knowledge, practical exercises, case studies, and hands-on work experience, participants will develop the expertise needed to excel in the field of cybersecurity.<\/span>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1719412234855{padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 25px !important;background-color: rgba(0,173,173,0.24) !important;*background-color: rgb(0,173,173) !important;}&#8221;]<\/p>\n<h6><span style=\"color: #800000;\"><strong>Female Empowerment through Technology<\/strong><\/span><\/h6>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1719409764141{margin-top: 20px !important;}&#8221;]<span style=\"font-weight: 400;\">The Women in Tech: Cybersecurity Bootcamp is dedicated to bridging the gender gap in the tech industry. By providing women with the tools and knowledge needed to succeed in cybersecurity, this programme aims to foster gender equality, create new streams of income, and enhance personal online safety. Participants will also contribute to social, economic, and environmental value creation by supporting sustainable and secure digital ecosystems.<\/span>[\/vc_column_text]<div class=\" vc_custom_1719412298126 ubtn-ctn-left \"><a class=\"ubtn-link ult-adjust-bottom-margin ubtn-left ubtn-mini \" href=\"#register\" ><button type=\"button\" id=\"ubtn-8630\"  class=\"ubtn ult-adjust-bottom-margin ult-responsive ubtn-mini ubtn-top-bg  none  ubtn-left   tooltip-69d023160d155\"  data-hover=\"#ffffff\" data-border-color=\"\" data-bg=\"#f43838\" data-hover-bg=\"#f28837\" data-border-hover=\"\" data-shadow-hover=\"\" data-shadow-click=\"none\" data-shadow=\"\" data-shd-shadow=\"\"  data-ultimate-target='#ubtn-8630'  data-responsive-json-new='{\"font-size\":\"desktop:26px;\",\"line-height\":\"\"}'  style=\"font-family:&#039;Syne&#039;;font-weight:700;border:none;background: #f43838;color: #ffffff;\"><span class=\"ubtn-hover\" style=\"background-color:#f28837\"><\/span><span class=\"ubtn-data ubtn-text \" >REGISTER TODAY<\/span><\/button><\/a><\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][\/vc_row][vc_row gap=&#8221;20&#8243; bg_type=&#8221;bg_color&#8221; ult_hide_row=&#8221;ult_hide_row_value&#8221; ult_hide_row_large_screen=&#8221;large_screen&#8221; ult_hide_row_desktop=&#8221;desktop&#8221; ult_hide_row_tablet=&#8221;tablet&#8221; ult_hide_row_tablet_small=&#8221;xs_tablet&#8221; bg_color_value=&#8221;#ffffff&#8221; el_id=&#8221;Objectives_mobile&#8221; css=&#8221;.vc_custom_1707929624225{margin-top: -20px !important;}&#8221;][vc_column][vc_single_image image=&#8221;46402&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][vc_column_text css=&#8221;.vc_custom_1707921448859{margin-right: 50% !important;padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 25px !important;background-color: rgba(247,165,111,0.3) !important;*background-color: rgb(247,165,111) !important;}&#8221;]<\/p>\n<h6><span style=\"color: #ff6600;\"><strong><b>Course Objectives<\/b><\/strong><\/span><\/h6>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1719409812741{margin-top: 20px !important;}&#8221;]<\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Equip participants with a thorough understanding of cybersecurity principles, concepts, and best practices.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provide practical skills in identifying, analyzing, and mitigating cyber threats and vulnerabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Develop proficiency in implementing cybersecurity measures to protect organizational assets and data.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Familiarize participants with industry-standard tools, techniques, and frameworks used in cybersecurity analysis and risk management.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prepare participants for professional roles as cybersecurity analysts, consultants, or risk managers in various sectors.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Empower women to lead in the tech industry, creating additional streams of income and enhancing economic independence.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Promote personal online safety and awareness.<\/span><\/li>\n<\/ol>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1707922139611{margin-right: 30% !important;padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 25px !important;background-color: rgba(0,173,173,0.24) !important;*background-color: rgb(0,173,173) !important;}&#8221;]<\/p>\n<h6><span style=\"color: #035959;\"><strong>Why Attend<\/strong><\/span><\/h6>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1719410284502{margin-top: 20px !important;}&#8221;]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Career Advancement<\/b><span style=\"font-weight: 400;\">: Gain the knowledge and skills needed to pursue lucrative career opportunities in the fast-growing field of cybersecurity.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Industry Relevance<\/b><span style=\"font-weight: 400;\">: Stay updated with the latest cybersecurity trends, technologies, and best practices, ensuring your skills remain relevant and in-demand.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Professional Growth<\/b><span style=\"font-weight: 400;\">: Enhance your professional profile and credibility with a comprehensive cybersecurity training programme tailored for women.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Networking Opportunities<\/b><span style=\"font-weight: 400;\">: Connect with industry professionals, experts, and peers, expanding your professional network and potential career prospects.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Empowerment<\/b>: Be part of a supportive community that fosters female empowerment and leadership in tech.<\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\" vc_custom_1708022222892 ubtn-ctn-center \"><a class=\"ubtn-link ult-adjust-bottom-margin ubtn-center ubtn-mini \" href=\"#register\" ><button type=\"button\" id=\"ubtn-9871\"  class=\"ubtn ult-adjust-bottom-margin ult-responsive ubtn-mini ubtn-top-bg  none  ubtn-center   tooltip-69d023160d1b6\"  data-hover=\"#ffffff\" data-border-color=\"\" data-bg=\"#f43838\" data-hover-bg=\"#f28837\" data-border-hover=\"\" data-shadow-hover=\"\" data-shadow-click=\"none\" data-shadow=\"\" data-shd-shadow=\"\"  data-ultimate-target='#ubtn-9871'  data-responsive-json-new='{\"font-size\":\"desktop:26px;\",\"line-height\":\"\"}'  style=\"font-family:&#039;Syne&#039;;font-weight:700;border:none;background: #f43838;color: #ffffff;\"><span class=\"ubtn-hover\" style=\"background-color:#f28837\"><\/span><span class=\"ubtn-data ubtn-text \" >REGISTER TODAY<\/span><\/button><\/a><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; ult_hide_row=&#8221;ult_hide_row_value&#8221; ult_hide_row_large_screen=&#8221;large_screen&#8221; ult_hide_row_desktop=&#8221;desktop&#8221; ult_hide_row_tablet=&#8221;tablet&#8221; ult_hide_row_tablet_small=&#8221;xs_tablet&#8221; css=&#8221;.vc_custom_1707930307598{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_column_text]<\/p>\n<h1 class=\"white-text\" style=\"text-align: center;\"><strong><span style=\"color: #000000;\">Return on Investment<\/span><\/strong><\/h1>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;20&#8243; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1694189604648{background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1694191645154{padding: 20px !important;background-color: rgba(0,95,191,0.1) !important;*background-color: rgb(0,95,191) !important;border: 1px initial !important;border-radius: 15px !important;}&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-user-plus&#8221; background_style=&#8221;rounded-less&#8221; background_color=&#8221;white&#8221; size=&#8221;sm&#8221;][vc_column_text]<\/p>\n<h5><strong><b>Increased Employability:<\/b><\/strong><\/h5>\n<p><span style=\"font-weight: 400;\">Acquire specialized skills and certifications that are highly valued by employers, leading to better job prospects and higher earning potential.<\/span>[\/vc_column_text][vc_empty_space][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1694201018042{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: rgba(255,58,124,0.1) !important;*background-color: rgb(255,58,124) !important;border-radius: 15px !important;}&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-shield-alt&#8221; color=&#8221;pink&#8221; background_style=&#8221;rounded-less&#8221; background_color=&#8221;white&#8221; size=&#8221;sm&#8221;][vc_column_text]<\/p>\n<h5><strong>Risk Mitigation:<\/strong><\/h5>\n<p><span style=\"font-weight: 400;\">Equip yourself with the knowledge and expertise to identify, assess, and mitigate cybersecurity risks, helping organizations safeguard their assets and reputation.<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;20&#8243; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1694189613626{background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1694200387783{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;background-color: rgba(130,36,227,0.1) !important;*background-color: rgb(130,36,227) !important;border-radius: 15px !important;}&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-piggy-bank&#8221; color=&#8221;violet&#8221; background_style=&#8221;rounded-less&#8221; background_color=&#8221;white&#8221; size=&#8221;sm&#8221;][vc_column_text]<\/p>\n<h5><b>Cost Savings:<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">By preventing and mitigating cyber threats, organizations can avoid costly data breaches, regulatory fines, and reputational damage, resulting in significant cost savings in the long run.<\/span>[\/vc_column_text][vc_empty_space][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1694200914703{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;background-color: rgba(96,38,0,0.12) !important;*background-color: rgb(96,38,0) !important;border-radius: 15px !important;}&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-hand-point-up&#8221; color=&#8221;chino&#8221; background_style=&#8221;rounded-less&#8221; background_color=&#8221;white&#8221; size=&#8221;sm&#8221;][vc_column_text]<\/p>\n<h5><b>Career Growth:<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Position yourself as a trusted cybersecurity professional, opening up opportunities for career advancement, leadership roles, and higher salaries within the industry.<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;20&#8243; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1694189613626{background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1719412761864{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;background-color: rgba(238,238,34,0.15) !important;*background-color: rgb(238,238,34) !important;border-radius: 15px !important;}&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-radiation&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded-less&#8221; background_color=&#8221;white&#8221; size=&#8221;sm&#8221; css=&#8221;&#8221; custom_color=&#8221;#eeee22&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h5><strong>Economic Independence:<\/strong><\/h5>\n<p><span style=\"font-weight: 400;\">Create additional streams of income through freelance opportunities and consulting roles.<\/span>[\/vc_column_text][vc_empty_space][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1719413203665{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;background-color: rgba(129,215,66,0.25) !important;*background-color: rgb(129,215,66) !important;border-radius: 15px !important;}&#8221;][vc_icon icon_fontawesome=&#8221;fas fa-users&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded-less&#8221; background_color=&#8221;white&#8221; size=&#8221;sm&#8221; css=&#8221;&#8221; custom_color=&#8221;#81d742&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h5><strong>Social Impact:<\/strong><\/h5>\n<p><span style=\"font-weight: 400;\">Contribute to creating a safer online environment for all, promoting digital literacy and security awareness.<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; type=&#8221;3&#8243; margin_top=&#8221;15&#8243; padding_top=&#8221;50px&#8221; padding_bottom=&#8221;20px&#8221; bg_color=&#8221;#dbe5b5&#8243; css=&#8221;.vc_custom_1707926863911{margin-top: 20px !important;border-bottom-width: 20px !important;padding-top: 50px !important;padding-bottom: 50px !important;background-color: #fafafa !important;}&#8221; el_id=&#8221;Learning_Outcomes&#8221;][vc_column][vc_column_text]<\/p>\n<h2 style=\"text-align: center;\"><b>Learning Outcomes<\/b><\/h2>\n<div class=\"gap\" style=\"line-height: 30px; height: 30px;\"><\/div>[\/vc_column_text][vc_row_inner equal_height=&#8221;yes&#8221; gap=&#8221;20&#8243;][vc_column_inner el_class=&#8221;drop-shadow&#8221; width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text]<span style=\"font-weight: 400;\">By the end of this course, participants will:<\/span>[\/vc_column_text]<div class=\"standard-number-list list-divider bullet-top\"><ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Understand the fundamentals of cybersecurity: Gain a solid foundation in cybersecurity principles, concepts, and terminology.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identify and analyze cyber threats: Develop the skills to recognize and assess various cyber threats and attack vectors.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implement cybersecurity measures: Learn practical techniques and strategies to protect organizational assets and data from cyber threats.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Manage cybersecurity risks: Acquire risk management skills to assess, prioritize, and mitigate cybersecurity risks effectively.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Respond to cybersecurity incidents: Learn incident response protocols and procedures to detect, investigate, and respond to cybersecurity incidents promptly.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Apply industry best practices: Familiarize yourself with industry-standard tools, techniques, and frameworks used in cybersecurity analysis and risk management.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Communicate effectively: Develop communication skills to convey cybersecurity risks, strategies, and recommendations to stakeholders effectively.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enhance personal online safety: Understand the importance of personal cybersecurity measures and how to implement them.<\/span><\/li>\n<\/ul>\n<\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner]<div class=\" vc_custom_1708022246019 ubtn-ctn-center \"><a class=\"ubtn-link ult-adjust-bottom-margin ubtn-center ubtn-mini \" href=\"#register\" ><button type=\"button\" id=\"ubtn-7833\"  class=\"ubtn ult-adjust-bottom-margin ult-responsive ubtn-mini ubtn-top-bg  none  ubtn-center   tooltip-69d023160d2c3\"  data-hover=\"#ffffff\" data-border-color=\"\" data-bg=\"#f43838\" data-hover-bg=\"#f28837\" data-border-hover=\"\" data-shadow-hover=\"\" data-shadow-click=\"none\" data-shadow=\"\" data-shd-shadow=\"\"  data-ultimate-target='#ubtn-7833'  data-responsive-json-new='{\"font-size\":\"desktop:26px;\",\"line-height\":\"\"}'  style=\"font-family:&#039;Syne&#039;;font-weight:700;border:none;background: #f43838;color: #ffffff;\"><span class=\"ubtn-hover\" style=\"background-color:#f28837\"><\/span><span class=\"ubtn-data ubtn-text \" >REGISTER TODAY<\/span><\/button><\/a><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; ult_hide_row=&#8221;ult_hide_row_value&#8221; ult_hide_row_mobile=&#8221;mobile&#8221; ult_hide_row_mobile_large=&#8221;xl_mobile&#8221; css=&#8221;.vc_custom_1707924192629{padding-bottom: 60px !important;background-color: rgba(255,119,119,0.11) !important;*background-color: rgb(255,119,119) !important;}&#8221; el_id=&#8221;Outline&#8221;][vc_column][vc_empty_space height=&#8221;52px&#8221;][vc_custom_heading text=&#8221;Course Structure&#8221; font_container=&#8221;tag:h2|text_align:center&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_empty_space height=&#8221;52px&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1707924303882{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4><b>Introduction to Cybersecurity<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Understanding cybersecurity fundamentals<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Overview of cyber threats and attack vectors<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Introduction to cybersecurity laws, regulations, and compliance standards<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mobile Connection and Hyperconnectivity:<\/b>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Understanding the security challenges associated with mobile devices and hyperconnectivity.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The Internet, Cyber Security &amp; Crime (Part 1 &amp; 2):<\/b>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Exploring the relationship between the internet, cybersecurity, and cybercrime.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4>\n<div class=\"hr-thin\"><\/div>\n<\/h4>\n<h4><div class=\"gap\" style=\"line-height: 20px; height: 20px;\"><\/div><\/h4>\n<h4><b>Network Security<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Basics of network security architecture and protocols<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Intrusion detection and prevention systems (IDPS)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Network traffic analysis and monitoring<\/span><\/li>\n<\/ul>\n<div class=\"hr-thin\"><\/div>\n<h4><div class=\"gap\" style=\"line-height: 20px; height: 20px;\"><\/div><\/h4>\n<h4><b>Cyber Threat Intelligence<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Gathering and analyzing cyber threat intelligence<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Threat intelligence platforms and tools<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Threat hunting methodologies<\/span><\/li>\n<\/ul>\n<div class=\"hr-thin\"><\/div>\n<h4><div class=\"gap\" style=\"line-height: 20px; height: 20px;\"><\/div><\/h4>\n<h4><b>Risk Management and Compliance<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Risk assessment methodologies and frameworks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compliance requirements (e.g., GDPR, HIPAA, PCI DSS)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Developing risk management strategies and policies<\/span><\/li>\n<\/ul>\n<div class=\"hr-thin\"><\/div>\n<h4><div class=\"gap\" style=\"line-height: 20px; height: 20px;\"><\/div><\/h4>\n<h4><b>Security Operations and Incident Response<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Security operations center (SOC) operations<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Incident response planning and execution<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Forensic analysis and evidence collection<\/span><\/li>\n<\/ul>\n<div class=\"hr-thin\"><\/div>\n<h4><div class=\"gap\" style=\"line-height: 20px; height: 20px;\"><\/div><\/h4>\n<h4><b>Advanced Topics in Cybersecurity<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cloud security fundamentals<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Application security principles and practices<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Emerging trends and technologies in cybersecurity<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner]<div class=\" vc_custom_1708022258210 ubtn-ctn-center \"><a class=\"ubtn-link ult-adjust-bottom-margin ubtn-center ubtn-mini \" href=\"#register\" ><button type=\"button\" id=\"ubtn-5803\"  class=\"ubtn ult-adjust-bottom-margin ult-responsive ubtn-mini ubtn-top-bg  none  ubtn-center   tooltip-69d023160d357\"  data-hover=\"#ffffff\" data-border-color=\"\" data-bg=\"#f43838\" data-hover-bg=\"#f28837\" data-border-hover=\"\" data-shadow-hover=\"\" data-shadow-click=\"none\" data-shadow=\"\" data-shd-shadow=\"\"  data-ultimate-target='#ubtn-5803'  data-responsive-json-new='{\"font-size\":\"desktop:26px;\",\"line-height\":\"\"}'  style=\"font-family:&#039;Syne&#039;;font-weight:700;border:none;background: #f43838;color: #ffffff;\"><span class=\"ubtn-hover\" style=\"background-color:#f28837\"><\/span><span class=\"ubtn-data ubtn-text \" >REGISTER TODAY<\/span><\/button><\/a><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;20&#8243; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1707925998598{margin-top: 50px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1707926331764{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;background-color: #ffffff !important;border-left-color: #7c19aa !important;border-left-style: solid !important;border-right-color: #7c19aa !important;border-right-style: solid !important;border-top-color: #7c19aa !important;border-top-style: solid !important;border-bottom-color: #7c19aa !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221;][vc_custom_heading text=&#8221;Prerequisites&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\"><span style=\"font-weight: 400;\">No prior IT skill is required to join this programme, however participants with a background in IT, or related fields will benefit the most. Basic knowledge of networking, operating systems, and IT concepts is recommended but not required.<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1707926471002{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;background-color: #ffffff !important;border-left-color: #dd3333 !important;border-left-style: solid !important;border-right-color: #dd3333 !important;border-right-style: solid !important;border-top-color: #dd3333 !important;border-top-style: solid !important;border-bottom-color: #dd3333 !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221;][vc_custom_heading text=&#8221;Certification&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\"><span style=\"font-weight: 400;\">Participants who successfully complete the course and pass the final assessment will receive<strong>\u00a0the globally recognised\u00a0ISC2 Certification in Cybersecurity (after exams)<\/strong>\u00a0as well as a certificate of completion in Cybersecurity Training for Cyber Security Analysts, Consultants, and Risk Managers.<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1707926634137{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-color: #1e73be !important;border-left-style: solid !important;border-right-color: #1e73be !important;border-right-style: solid !important;border-top-color: #1e73be !important;border-top-style: solid !important;border-bottom-color: #1e73be !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221;][vc_custom_heading text=&#8221;Work Experience&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_column_text]As part of the programme, participants will be exposed to real-world businesses to gain practical work experience for 3 months. Enrol now to embark on a rewarding journey towards a career in cybersecurity. Gain the knowledge, skills, and confidence to excel in the dynamic and rapidly evolving field of cybersecurity.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;20&#8243; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1719413989832{margin-top: 20px !important;margin-bottom: 50px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/6&#8243; css=&#8221;.vc_custom_1707926084616{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1707926127710{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;background-color: #ffffff !important;border-left-color: #81d742 !important;border-left-style: solid !important;border-right-color: #81d742 !important;border-right-style: solid !important;border-top-color: #81d742 !important;border-top-style: solid !important;border-bottom-color: #81d742 !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221;][vc_custom_heading text=&#8221;Assessment Methods&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Quizzes and exams<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Practical assignments and lab reports<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Group projects and presentations<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Final capstone project<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1707926165543{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;border-left-color: #15a0a5 !important;border-left-style: solid !important;border-right-color: #15a0a5 !important;border-right-style: solid !important;border-top-color: #15a0a5 !important;border-top-style: solid !important;border-bottom-color: #15a0a5 !important;border-bottom-style: solid !important;border-radius: 15px !important;}&#8221;][vc_custom_heading text=&#8221;Course Delivery&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Instructor-led lectures and discussions<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hands-on lab exercises and simulations<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Case studies and real-world scenarios<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Guest lectures from industry experts<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Group projects and presentations.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; bg_type=&#8221;bg_color&#8221; css=&#8221;.vc_custom_1694263298060{background-color: #f4f4f4 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; bg_color_value=&#8221;rgba(38,165,239,0.27)&#8221; el_id=&#8221;Testimonial&#8221;][vc_column css=&#8221;.vc_custom_1694217196205{margin-top: 60px !important;}&#8221;][vc_custom_heading text=&#8221;Reviews from Participants&#8221; font_container=&#8221;tag:h2|text_align:center&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221;][vc_empty_space height=&#8221;40&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\">Having traversed the intricate maze of digital risk, numerous business leaders have emerged empowered and enlightened from our Digital Risk Management Programme. Their transformative experiences and overwhelmingly positive feedback are a testament to the program&#8217;s unmatched value.<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner gap=&#8221;5&#8243;][vc_column_inner width=&#8221;2\/3&#8243;][vc_video link=&#8221;https:\/\/www.youtube.com\/watch?v=cWXaIWLxgeI&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_video link=&#8221;https:\/\/www.youtube.com\/watch?v=4eMaQ_rsYDk&#8221;][vc_video link=&#8221;https:\/\/www.youtube.com\/watch?v=WsgGZtsbTKs&#8221; css=&#8221;.vc_custom_1633252481171{margin-top: -15px !important;}&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.owl-carousel .owl-nav a {\n  width: 36px;\n  height: 36px;\n  border-radius: 500px;\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.owl-carousel .owl-nav a:before,\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.owl-carousel .owl-nav a:after {\n  border-width: 0px;\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.owl-carousel .owl-nav a.owl-prev {\n  top: 50%;\n  transform: translateY(calc(-50% + 0px));\n  left: -43px;\n}\n@media all and (-ms-high-contrast: none) {\n  .testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.owl-carousel .owl-nav a.owl-prev {\n    transform: translateY(-50%);\n    margin-top: 0px;\n  }\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.owl-carousel .owl-nav a.owl-prev i {\n  padding: 0px 0px 0px 0px;\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.owl-carousel .owl-nav a.owl-next {\n  top: 50%;\n  transform: translateY(calc(-50% + 0px));\n  right: -43px;\n}\n@media all and (-ms-high-contrast: none) {\n  .testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.owl-carousel .owl-nav a.owl-next {\n    transform: translateY(-50%);\n    margin-top: 0px;\n  }\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.owl-carousel .owl-nav a.owl-next i {\n  padding: 0px 0px 0px 0px;\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.owl-carousel .owl-nav i {\n  font-size: 18px;\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.owl-carousel .owl-nav a:not(:hover) i,\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.owl-carousel .owl-nav a:not(:hover) i:before {\n  color: #14467f;\n  background: none;\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.owl-carousel .owl-nav a:hover i,\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.owl-carousel .owl-nav a:hover i:before {\n  color: rgba(255,255,255,0.75);\n  background: none;\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39 .owl-dots {\n  top: calc(100% + 20px);\n  left: 50%;\n  transform: translateX(calc(-50% + 0px));\n}\n@media all and (-ms-high-contrast: none) {\n  .testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39 .owl-dots {\n    transform: translateX(-50%);\n    margin-left: 0px;\n  }\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39 .owl-dot {\n  width: 10px;\n  height: 10px;\n  margin: 0 8px;\n}\n@media screen and (max-width: 778px) {\n  .testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.hide-arrows.owl-carousel .owl-nav a {\n    display: none;\n  }\n}\n@media screen and (max-width: 778px) {\n  .testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.reposition-arrows.owl-carousel .owl-nav .owl-prev {\n    top: 50%;\n    transform: translateY(calc(-50% + 0px));\n    left: -18px;\n  }\n  .testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.reposition-arrows.owl-carousel .owl-nav .owl-next {\n    top: 50%;\n    transform: translateY(calc(-50% + 0px));\n    right: -18px;\n  }\n}\n@media screen and (max-width: 778px) and all and (-ms-high-contrast: none) {\n  .testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.reposition-arrows.owl-carousel .owl-nav .owl-prev {\n    transform: translateY(-50%);\n    margin-top: 0px;\n  }\n}\n@media screen and (max-width: 778px) and all and (-ms-high-contrast: none) {\n  .testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.reposition-arrows.owl-carousel .owl-nav .owl-next {\n    transform: translateY(-50%);\n    margin-top: 0px;\n  }\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.content-bg-on .testimonial-item {\n  background: #ffffff;\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39 .testimonial-item {\n  padding: 30px 30px 20px 30px;\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39 .testimonial-name,\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39 .testimonial-name a,\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39 .testimonial-name span {\n  margin-bottom: 0px;\n  font-weight: bold;\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39 .testimonial-position {\n  margin-bottom: 20px;\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39 .testimonial-position,\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39 .testimonial-position span {\n  font-weight: bold;\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39  .testimonial-avatar {\n  padding: 0px 20px 20px 0px;\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39 .dt-css-grid .testimonial-avatar img,\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39 .dt-css-grid .testimonial-avatar svg {\n  max-width: 100%;\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.layout-5:not(.hide-testimonial-avatar) .content-wrap,\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39.layout-6:not(.hide-testimonial-avatar) .content-wrap {\n  width: calc(100% -  - 20px - 0px);\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39 .testimonial-content {\n  margin-bottom: 2px;\n  font-size: 20px;\n}\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39  .testimonial-avatar,\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39  .testimonial-avatar a.rollover,\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39  .testimonial-avatar a.rollover *,\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39  .testimonial-avatar img,\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39  .testimonial-avatar .no-avatar,\n.testimonials-carousel-shortcode.testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39  .testim-no-avatar {\n  border-radius: 500px;\n}\n<\/style><div class=\"owl-carousel testimonials-carousel-shortcode dt-testimonials-shortcode dt-owl-carousel-call testimonials-carousel-shortcode-id-11fb46d6431274c23f8997d095f24e39 content-align-left layout-4 content-bg-on bullets-small-dot-stroke reposition-arrows arrows-bg-off disable-arrows-hover-bg arrows-hover-bg-off  \" data-scroll-mode=\"page\" data-col-num=\"3\" data-wide-col-num=\"3\" data-laptop-col=\"3\" data-h-tablet-columns-num=\"1\" data-v-tablet-columns-num=\"1\" data-phone-columns-num=\"1\" data-auto-height=\"true\" data-col-gap=\"30\" data-stage-padding=\"0\" data-speed=\"600\" data-autoplay=\"true\" data-autoplay_speed=\"6000\" data-arrows=\"true\" data-bullet=\"false\" data-next-icon=\"icon-ar-021-r\" data-prev-icon=\"icon-ar-021-l\"><\/div>[vc_empty_space height=&#8221;50&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; bg_type=&#8221;bg_color&#8221; ult_hide_row=&#8221;ult_hide_row_value&#8221; ult_hide_row_mobile=&#8221;mobile&#8221; ult_hide_row_mobile_large=&#8221;xl_mobile&#8221; type=&#8221;vc_default&#8221; margin_top=&#8221;15&#8243; css=&#8221;.vc_custom_1719425446359{padding-top: 50px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;background-color: #ffffff !important;}&#8221; el_id=&#8221;Details&#8221;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h2 class=\"white-text\" style=\"text-align: center;\"><strong><span style=\"color: #000000;\">Programme Details<\/span><\/strong><\/h2>\n<p>[\/vc_column_text][vc_column_text css_animation=&#8221;fadeIn&#8221; css=&#8221;.vc_custom_1719421598984{border-top-width: 10px !important;border-right-width: 10px !important;border-bottom-width: 10px !important;border-left-width: 10px !important;padding-top: 15px !important;padding-right: 15px !important;padding-bottom: 15px !important;padding-left: 15px !important;border-left-style: solid !important;border-right-style: solid !important;border-top-style: solid !important;border-bottom-style: solid !important;border-color: #000000 !important;}&#8221;]<\/p>\n<h1 class=\"white-text\" style=\"text-align: center;\"><div class=\"gap\" style=\"line-height: 10px; height: 10px;\"><\/div><\/h1>\n<p class=\"white-text\" style=\"text-align: center;\"><span style=\"color: #000000;\">Dates &amp; Times:<\/span><\/p>\n<h3 style=\"text-align: center;\"><strong>8th &#8211; 22nd July, 2024 <\/strong><\/h3>\n<h3 style=\"text-align: center;\"><strong>8pm &#8211; 9:30pm D<\/strong><strong>aily <\/strong><strong>(UK Time)<\/strong><\/h3>\n<h3 style=\"text-align: center;\"><\/h3>\n<h1 class=\"white-text\" style=\"text-align: center;\"><div class=\"gap\" style=\"line-height: 20px; height: 20px;\"><\/div><\/h1>\n<h3 class=\"white-text\" style=\"text-align: center;\"><span style=\"color: #000000;\">Programme Fees:<\/span><\/h3>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Price: <\/span><\/p>\n<h3 style=\"text-align: center;\"><del><strong>\u00a31500<\/strong><\/del><\/h3>\n<h1 class=\"white-text\" style=\"text-align: center;\"><div class=\"gap\" style=\"line-height: 10px; height: 10px;\"><\/div><\/h1>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Discounted to: <\/span><\/p>\n<h3 style=\"text-align: center;\"><strong>\u00a3150<\/strong><\/h3>\n<p style=\"text-align: center;\">90% Sponsorship for the first 20 registrants<\/p>\n<h3 style=\"text-align: center;\"><\/h3>\n<h1><\/h1>\n<h1 class=\"white-text\" style=\"text-align: center;\"><div class=\"gap\" style=\"line-height: 20px; height: 20px;\"><\/div><\/h1>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; bg_type=&#8221;bg_color&#8221; ult_hide_row=&#8221;ult_hide_row_value&#8221; ult_hide_row_large_screen=&#8221;large_screen&#8221; ult_hide_row_desktop=&#8221;desktop&#8221; ult_hide_row_tablet=&#8221;tablet&#8221; ult_hide_row_tablet_small=&#8221;xs_tablet&#8221; type=&#8221;vc_default&#8221; margin_top=&#8221;15&#8243; css=&#8221;.vc_custom_1719425545608{padding-top: 50px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;background-color: #ffffff !important;}&#8221; el_id=&#8221;Mobile_Details&#8221;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h2 class=\"white-text\" style=\"text-align: center;\"><strong><span style=\"color: #000000;\">Programme Details<\/span><\/strong><\/h2>\n<p>[\/vc_column_text][vc_column_text css_animation=&#8221;fadeIn&#8221; css=&#8221;.vc_custom_1719425734920{border-top-width: 10px !important;border-right-width: 10px !important;border-bottom-width: 10px !important;border-left-width: 10px !important;padding-top: 15px !important;padding-right: 15px !important;padding-bottom: 15px !important;padding-left: 15px !important;border-left-style: solid !important;border-right-style: solid !important;border-top-style: solid !important;border-bottom-style: solid !important;border-color: #000000 !important;}&#8221;]<\/p>\n<h1 class=\"white-text\" style=\"text-align: center;\"><div class=\"gap\" style=\"line-height: 10px; height: 10px;\"><\/div><\/h1>\n<p class=\"white-text\" style=\"text-align: center;\"><span style=\"color: #000000;\">Dates &amp; Times:<\/span><\/p>\n<h5 style=\"text-align: center;\"><strong>8th &#8211; 22nd July, 2024 <\/strong><\/h5>\n<h5 style=\"text-align: center;\"><strong>8pm &#8211; 9:30pm D<\/strong><strong>aily <\/strong><strong>(UK Time)<\/strong><\/h5>\n<h3 style=\"text-align: center;\"><\/h3>\n<h1 class=\"white-text\" style=\"text-align: center;\"><div class=\"gap\" style=\"line-height: 20px; height: 20px;\"><\/div><\/h1>\n<h5 class=\"white-text\" style=\"text-align: center;\"><span style=\"color: #000000;\">Programme Fees:<\/span><\/h5>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Price: <\/span><\/p>\n<h5 style=\"text-align: center;\"><del><strong>\u00a31500<\/strong><\/del><\/h5>\n<h1 class=\"white-text\" style=\"text-align: center;\"><div class=\"gap\" style=\"line-height: 10px; height: 10px;\"><\/div><\/h1>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Discounted to: <\/span><\/p>\n<h5 style=\"text-align: center;\"><strong>\u00a3150<\/strong><\/h5>\n<p style=\"text-align: center;\">90% Sponsorship for the first 20 registrants<\/p>\n<h3 style=\"text-align: center;\"><\/h3>\n<h1><\/h1>\n<h1 class=\"white-text\" style=\"text-align: center;\"><div class=\"gap\" style=\"line-height: 20px; height: 20px;\"><\/div><\/h1>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;20&#8243; css=&#8221;.vc_custom_1694191026692{margin-bottom: 50px !important;padding-top: 50px !important;padding-bottom: 50px !important;background-color: #ff753a !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_id=&#8221;register&#8221;][vc_column width=&#8221;1\/6&#8243; css=&#8221;.vc_custom_1688599649613{margin-right: -300px !important;}&#8221;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h1 class=\"white-text\" style=\"text-align: center;\"><span style=\"color: #ffffff;\">REGISTER<\/span><\/h1>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;25&#8243;][vc_column_text css=&#8221;.vc_custom_1719423436932{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #ffffff !important;}&#8221;]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f6-o1\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php\/wp-json\/wp\/v2\/pages\/46397#wpcf7-f6-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"6\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.9.6\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f6-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/div>\n<p><label> Your name<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"80\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" autocomplete=\"name\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n<\/p>\n<p><label> Your email<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"80\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" autocomplete=\"email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n<\/p>\n<p><label> Subject<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-subject\"><input size=\"40\" maxlength=\"80\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-subject\" \/><\/span> <\/label>\n<\/p>\n<p><label> Your message (optional)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" name=\"your-message\"><\/textarea><\/span> <\/label>\n<\/p>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Submit\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;Host&#8221; css=&#8221;.vc_custom_1708022404712{padding-top: 10px !important;}&#8221;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h2 style=\"text-align: center;\"><strong>Facilitators<\/strong><\/h2>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h2 style=\"text-align: center;\">Mr. Christian Junior<\/h2>\n<div>\n<p style=\"text-align: center;\">Christian is a certified Cybersecurity RIsk Manager. With over 20 years of extensive experience in the tech industry, Christian possesses a profound understanding of IT. His exceptional leadership has been instrumental in spearheading over 300 successful projects spanning diverse domains, including digital strategy, cybersecurity risk management, marketing, and software engineering.<\/p>\n<p style=\"text-align: center;\">His expertise extends beyond traditional boundaries, encompassing digital transformation and financial technology, underscored by double certifications from Oxford University. Recognised for his outstanding contributions, Christian has earned a coveted place on the Financial Times&#8217; prestigious list of the UK&#8217;s top 100 influential BAME tech leaders.<\/p>\n<\/div>\n<div>\n<p style=\"text-align: center;\">Christian&#8217;s collaborative approach has seen him partner with government agencies, industry giants, and multinationals on transformative IT initiatives.<\/p>\n<\/div>\n<p>[\/vc_column_text][vc_empty_space][vc_separator][vc_empty_space][vc_column_text]<\/p>\n<h2 style=\"text-align: center;\">Mr. Obi Ebikam CISSP<\/h2>\n<div style=\"text-align: center;\"><strong>Certified Information Systems Security Professional (CISSP),\u00a0AWS Certified Security Specialty,\u00a0CompTIA Advanced Security Practitioner (CASP+),\u00a0CompTIA Cybersecurity Analyst (CySA+),\u00a0CompTIA Security+<\/strong> \u00a0 Obinna Ebikam is a distinguished cybersecurity professional renowned for his expertise in cybersecurity consulting, cloud infrastructure security, incident response, and cloud engineering. Serving as the Chief Security Officer (CSO) at Rhics, Obinna is committed to delivering unparalleled consulting services to clients across diverse industries.<\/div>\n<div style=\"text-align: center;\">Obinna boasts a commendable track record in incident response and remediation, conducting comprehensive security assessments, and ensuring regulatory compliance with standards like ISO 27001, NIST, and HIPAA. He excels in conducting risk assessments and devising risk management strategies to mitigate security threats effectively.<\/div>\n<div style=\"text-align: center;\">With a career spanning over a decade, Obinna&#8217;s proficiency encompasses Unix\/Linux and Windows operating systems, showcasing a robust technical foundation. His adeptness extends to cloud services, notably AWS and Google Admin, where he exhibits a profound understanding of cloud security principles and tools such as AWS Security Hub and Azure Security Center.<\/div>\n<div style=\"text-align: center;\">He has spearheaded teams of cybersecurity analysts in monitoring and responding to security incidents within AWS and Azure cloud environments, enhancing response efficiency and minimising business impact.<\/div>\n<div>\n<p style=\"text-align: center;\">Recognised for his extensive experience, certifications, and achievements, Obinna Ebikam is a sought-after trainer and speaker, offering valuable insights and expertise in cybersecurity, cloud security, and incident response.<\/p>\n<\/div>\n<p>[\/vc_column_text]<div class=\" vc_custom_1708022274668 ubtn-ctn-center \"><a class=\"ubtn-link ult-adjust-bottom-margin ubtn-center ubtn-mini \" href=\"#register\" ><button type=\"button\" id=\"ubtn-8827\"  class=\"ubtn ult-adjust-bottom-margin ult-responsive ubtn-mini ubtn-top-bg  none  ubtn-center   tooltip-69d023160e6d6\"  data-hover=\"#ffffff\" data-border-color=\"\" data-bg=\"#f43838\" data-hover-bg=\"#f28837\" data-border-hover=\"\" data-shadow-hover=\"\" data-shadow-click=\"none\" data-shadow=\"\" data-shd-shadow=\"\"  data-ultimate-target='#ubtn-8827'  data-responsive-json-new='{\"font-size\":\"desktop:26px;\",\"line-height\":\"\"}'  style=\"font-family:&#039;Syne&#039;;font-weight:700;border:none;background: #f43838;color: #ffffff;\"><span class=\"ubtn-hover\" style=\"background-color:#f28837\"><\/span><span class=\"ubtn-data ubtn-text \" >REGISTER TODAY<\/span><\/button><\/a><\/div>[\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; bg_type=&#8221;bg_color&#8221; css=&#8221;.vc_custom_1719421248233{margin-bottom: 40px !important;background-color: #f4f4f4 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; bg_color_value=&#8221;#fafafa&#8221; el_id=&#8221;Rhics&#8221;][vc_column css=&#8221;.vc_custom_1694217196205{margin-top: 60px !important;}&#8221;][vc_custom_heading text=&#8221;Introduction to Rhics&#8221; font_container=&#8221;tag:h2|text_align:center&#8221; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;&#8221;][vc_empty_space height=&#8221;40&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Rhics IT Management Consultancy, headquartered in London, UK, with a formidable global footprint across three continents, stands at the forefront of delivering cutting-edge IT management consultancy services. Our repertoire spans digital strategy, cybersecurity, software engineering, human capital development, and holistic IT consultancy solutions, positioning us as the ideal partner for ambitious projects such as the Belize Cybersecurity Hub Project.<\/span><\/p>\n<div class=\"gap\" style=\"line-height: 40px; height: 40px;\"><\/div>\n<h3 style=\"text-align: center;\"><b>Why Rhics?<\/b><\/h3>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Our competency in managing complex IT projects is underpinned by a robust track record of driving success for multinational corporations. Rhics transcends traditional digital service boundaries, focusing on understanding your unique objectives, crafting tailored strategies, and developing secure, intuitive applications alongside award-winning systems that precisely articulate your vision.<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">The cornerstone of our approach is the synergy of talent, passion, and discipline, ensuring the delivery of superior outcomes. Rhics is distinguished by its commitment to operational excellence and transparency, with a competitive pricing model that guarantees projects are completed within budget and on schedule. This approach ensures a transparent, efficient workflow from initial concept through to successful execution.<\/span><\/p>\n<h2><div class=\"gap\" style=\"line-height: 40px; height: 40px;\"><\/div><\/h2>\n<h3 style=\"text-align: center;\"><b>Competency and Strategic Approach<\/b><\/h3>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Rhics&#8217;s expertise in digital strategy and cybersecurity positions us exceptionally well to manage this programme. Our comprehensive understanding of the global IT landscape, combined with a localised approach to project execution, ensures that the project will not only meet but exceed its stated objectives.<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">By selecting Rhics as the strategic partner for this project, Belize is assured of a collaboratively tailored solution that leverages cutting-edge technologies and methodologies to foster a secure, skilled workforce capable of propelling the nation to the forefront of the global cybersecurity sector.<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Together with Rhics, the Belize Cybersecurity Hub Project will not only realize its vision of becoming a regional leader in cybersecurity education and services but will also significantly contribute to the socio-economic development of Belize and the wider Central American region.<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;15&#8243; content_placement=&#8221;middle&#8221; bg_type=&#8221;bg_color&#8221; ult_hide_row=&#8221;ult_hide_row_value&#8221; ult_hide_row_mobile=&#8221;mobile&#8221; ult_hide_row_mobile_large=&#8221;xl_mobile&#8221; css=&#8221;.vc_custom_1707930827821{margin-top: -70px !important;padding-top: 125px !important;padding-bottom: 100px !important;background-image: url(https:\/\/rhics.io\/wp-content\/uploads\/2023\/07\/Group-1000001003.png?id=44676) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1694216037163{margin-top: -50px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1694188349964{padding-top: 15px !important;padding-right: 15px !important;padding-left: 15px !important;}&#8221;][vc_empty_space height=&#8221;70px&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;15&#8243; content_placement=&#8221;middle&#8221; bg_type=&#8221;bg_color&#8221; ult_hide_row=&#8221;ult_hide_row_value&#8221; ult_hide_row_large_screen=&#8221;large_screen&#8221; ult_hide_row_desktop=&#8221;desktop&#8221; ult_hide_row_tablet=&#8221;tablet&#8221; ult_hide_row_tablet_small=&#8221;xs_tablet&#8221; css=&#8221;.vc_custom_1707930875214{margin-top: -70px !important;padding-top: 125px !important;padding-bottom: 100px !important;background-image: url(https:\/\/rhics.io\/wp-content\/uploads\/2023\/07\/Group-1000001003.png?id=44676) !important;background-position: center !important;background-repeat: no-repeat&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-46397","page","type-page","status-publish","hentry","description-off"],"_links":{"self":[{"href":"https:\/\/fiithub.co.uk\/index.php\/wp-json\/wp\/v2\/pages\/46397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fiithub.co.uk\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fiithub.co.uk\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fiithub.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fiithub.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=46397"}],"version-history":[{"count":7,"href":"https:\/\/fiithub.co.uk\/index.php\/wp-json\/wp\/v2\/pages\/46397\/revisions"}],"predecessor-version":[{"id":46407,"href":"https:\/\/fiithub.co.uk\/index.php\/wp-json\/wp\/v2\/pages\/46397\/revisions\/46407"}],"wp:attachment":[{"href":"https:\/\/fiithub.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=46397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}