{"version":"1.0","provider_name":"GLOBIS Unlimited","provider_url":"https:\/\/globisunlimited.com\/jp","author_name":"GLOBIS Unlimited","author_url":"https:\/\/globisunlimited.com\/jp","title":"Cybersecurity - GLOBIS Unlimited","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"wpWKelAjRW\"><a href=\"https:\/\/globisunlimited.com\/jp\/course\/cybersecurity\/\">Cybersecurity<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/globisunlimited.com\/jp\/course\/cybersecurity\/embed\/#?secret=wpWKelAjRW\" width=\"600\" height=\"338\" title=\"&#8220;Cybersecurity&#8221; &#8212; GLOBIS Unlimited\" data-secret=\"wpWKelAjRW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/globisunlimited.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>","thumbnail_url":"https:\/\/globisunlimited.com\/wp-content\/uploads\/2022\/12\/Globis.jpg","thumbnail_width":1910,"thumbnail_height":1000,"description":"In today\u2019s hyper-connected digital world, cybersecurity is not just an IT concern\u2014it\u2019s a fundamental aspect of safeguarding public trust and organizational integrity. Empowering knowledge to protect yourself and your organization from a growing array of cyber threats has never been more crucial. This course will help you acquire the skills and understanding to navigate the complexities of cybersecurity to protect your digital assets effectively. You\u2019ll start by learning common cybersecurity attacks, including malware, phishing, distributed denial-of-service (DDoS) attacks, man-in-the-middle (MitM) attacks as well as insider threats, and their respective effects. You\u2019ll also explore the fundamental principles of cybersecurity\u2014Confidentiality, Integrity, and Availability\u2014known as the CIA triad, and discover how to implement [&hellip;]"}