<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Unigrant</provider_name><provider_url>https://unigrant.com/es/</provider_url><author_name>The University of Melbourne</author_name><author_url>https://unigrant.com/es/author/the-university-of-melbourne/</author_url><title>Cybersecurity in Organisations - Unigrant</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="pUet7aER9y"&gt;&lt;a href="https://unigrant.com/es/course/the-university-of-melbourne/cybersecurity-in-organisations/"&gt;Cybersecurity in Organisations&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://unigrant.com/es/course/the-university-of-melbourne/cybersecurity-in-organisations/embed/#?secret=pUet7aER9y" width="600" height="338" title="&#xAB;Cybersecurity in Organisations&#xBB; &#x2014; Unigrant" data-secret="pUet7aER9y" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><description>As cybersecurity threats become increasingly frequent and sophisticated, organisations of all stripes require the expertise to remain secure. This course is ideal for all cybersecurity managers wanting to better understand the cyber-threat landscape and how to protect organisations. Developed with the Academic Centre of Cybersecurity Excellence (ACCSE), this course is &hellip;</description></oembed>
