{"id":2767,"date":"2025-09-18T09:51:50","date_gmt":"2025-09-18T09:51:50","guid":{"rendered":"https:\/\/set.edu.pk\/?page_id=2767"},"modified":"2025-09-25T04:01:22","modified_gmt":"2025-09-25T04:01:22","slug":"cyber-security-2","status":"publish","type":"page","link":"https:\/\/set.edu.pk\/?page_id=2767","title":{"rendered":"Cyber Security"},"content":{"rendered":"\n<!doctype html>\n<html lang=\"en\">\n<head>\n  <meta charset=\"utf-8\" \/>\n  <meta name=\"viewport\" content=\"width=device-width,initial-scale=1\" \/>\n  <title>Cyber Security Course \u2014 SET<\/title>\n<\/head>\n<body>\n<div style=\"max-width:1200px;margin:0 auto;font-family:Arial, sans-serif;line-height:1.6;color:#333;\">\n\n  <div style=\"display:flex;flex-wrap:wrap;gap:30px;\">\n\n    <!-- LEFT COLUMN -->\n    <div style=\"flex:1 1 55%;min-width:320px;\">\n      <!-- Image instead of Video -->\n      <div style=\"margin-bottom:20px;\">\n        <img decoding=\"async\" src=\"https:\/\/set.edu.pk\/wp-content\/uploads\/2025\/09\/Cyber-Security.jpeg\" \n             alt=\"Cyber Security Course\" \n             style=\"width:100%;height:auto;border-radius:8px;\">\n      <\/div>\n\n      <!-- About -->\n      <div style=\"margin-bottom:30px;\">\n        <h2 style=\"color:#222;\">\u2139\ufe0f About<\/h2>\n        <p>\n          This Cyber Security course is designed to provide trainees with the knowledge and skills needed to protect \n          systems, networks, and data from digital threats. From understanding the fundamentals of cybersecurity to \n          advanced techniques for ethical hacking, penetration testing, and securing cloud applications, this course \n          builds a strong foundation for a career in information security.\n        <\/p>\n        <p>\n          Whether you are a student, IT professional, freelancer, or business owner, this course will help you \n          understand how cyberattacks happen, how to defend against them, and how to ensure the integrity of data \n          and systems in today\u2019s digital world.\n        <\/p>\n      <\/div>\n\n      <!-- Trainer -->\n      <div>\n        <h3 style=\"color:#222;\">\ud83d\udc68\u200d\ud83c\udfeb Meet The Trainer<\/h3>\n        <div style=\"display:flex;align-items:flex-start;gap:15px;margin:15px 0;\">\n          <img decoding=\"async\" src=\"https:\/\/via.placeholder.com\/120x120\" alt=\"Cyber Security Trainer\" style=\"border-radius:8px;max-width:120px;\">\n          <div>\n            <h4 style=\"margin:0;\">Trainer Name Here<\/h4>\n            <p style=\"margin:5px 0 0;\">\n              Trainer details will be added here.\n            <\/p>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n\n    <!-- RIGHT COLUMN -->\n    <div style=\"flex:1 1 40%;min-width:320px;\">\n      <!-- Course Details -->\n      <h3 style=\"color:#222;\">\ud83d\udccb Course Details<\/h3>\n      <ul style=\"list-style:none;padding:0;margin:20px 0;border:1px solid #ddd;border-radius:8px;overflow:hidden;\">\n        <li style=\"padding:10px;border-bottom:1px solid #ddd;\">\ud83d\udcc5 Batch Duration: <strong>08 Weeks<\/strong><\/li>\n        <li style=\"padding:10px;border-bottom:1px solid #ddd;\">\u23f1 Videos Duration: <strong>32 Hours<\/strong><\/li>\n        <li style=\"padding:10px;border-bottom:1px solid #ddd;\">\ud83d\ude80 Start Date: <strong>04 August 2025<\/strong><\/li>\n        <li style=\"padding:10px;border-bottom:1px solid #ddd;\">\ud83d\udcb0 Fee: <strong>10,000\/-<\/strong><\/li>\n        <li style=\"padding:10px;border-bottom:1px solid #ddd;\">\ud83d\udc65 Who Can Join: <strong>Students, IT Professionals, Freelancers<\/strong><\/li>\n        <li style=\"padding:10px;border-bottom:1px solid #ddd;\">\ud83d\udcca Enrolled Trainees: <strong>2500+<\/strong><\/li>\n        <li style=\"padding:10px;\">\ud83c\udfa5 Medium of Instruction: <strong>Urdu &#038; English<\/strong><\/li>\n      <\/ul>\n\n      <!-- Join Now -->\n      <div style=\"text-align:center;margin:25px 0;\">\n        <a href=\"https:\/\/wa.link\/clyq2c\" style=\"background:#f26a21;color:#fff;padding:12px 30px;text-decoration:none;font-weight:bold;border-radius:6px;display:inline-block;\">\ud83d\ude80 Join Now<\/a>\n      <\/div>\n\n      <!-- What You Will Learn -->\n      <h3 style=\"color:#222;\">\ud83c\udfaf What you will learn<\/h3>\n      <p>After completing this course, a trainee will be able to:<\/p>\n      <ul style=\"padding-left:20px;\">\n        <li>\u2705 Understand the fundamentals of Cyber Security<\/li>\n        <li>\u2705 Identify common cyber threats, attacks, and vulnerabilities<\/li>\n        <li>\u2705 Perform ethical hacking and penetration testing<\/li>\n        <li>\u2705 Secure operating systems, networks, and applications<\/li>\n        <li>\u2705 Implement data security and encryption techniques<\/li>\n        <li>\u2705 Understand Cyber Security in Cloud Computing<\/li>\n        <li>\u2705 Learn about Social Engineering and prevention methods<\/li>\n        <li>\u2705 Prepare for careers in Cyber Security and Ethical Hacking<\/li>\n      <\/ul>\n\n      <!-- Why Join This Course -->\n      <h3 style=\"color:#222;\">\ud83d\ude80 Why Join This Course?<\/h3>\n      <ul style=\"padding-left:20px;\">\n        <li>\u2714 High-demand skill with global job opportunities<\/li>\n        <li>\u2714 Learn practical skills for system and network security<\/li>\n        <li>\u2714 Hands-on projects, labs, and real-world case studies<\/li>\n        <li>\u2714 Step-by-step guidance from basics to advanced level<\/li>\n        <li>\u2714 A direct pathway to careers in Ethical Hacking &#038; Cyber Security<\/li>\n      <\/ul>\n    <\/div>\n  <\/div>\n<\/div>\n<\/body>\n<\/html>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security Course \u2014 SET \u2139\ufe0f About This Cyber Security course is designed to provide trainees with the knowledge and skills needed to protect systems, networks, and data from digital threats. From understanding the fundamentals of cybersecurity to advanced techniques for ethical hacking, penetration testing, and securing cloud applications, this course builds a strong foundation [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-2767","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/set.edu.pk\/index.php?rest_route=\/wp\/v2\/pages\/2767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/set.edu.pk\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/set.edu.pk\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/set.edu.pk\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/set.edu.pk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2767"}],"version-history":[{"count":2,"href":"https:\/\/set.edu.pk\/index.php?rest_route=\/wp\/v2\/pages\/2767\/revisions"}],"predecessor-version":[{"id":2913,"href":"https:\/\/set.edu.pk\/index.php?rest_route=\/wp\/v2\/pages\/2767\/revisions\/2913"}],"wp:attachment":[{"href":"https:\/\/set.edu.pk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}