{"version":"1.0","provider_name":"Unigrant","provider_url":"https:\/\/unigrant.com\/fr\/","author_name":"Federation University Australia","author_url":"https:\/\/unigrant.com\/fr\/author\/federation-university-australia-2\/","title":"Master of Applied Cyber Security - Unigrant","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"NprJvQaJOy\"><a href=\"https:\/\/unigrant.com\/fr\/course\/federation-university-australia-2\/master-of-applied-cyber-security\/\">Master of Applied Cyber Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/unigrant.com\/fr\/course\/federation-university-australia-2\/master-of-applied-cyber-security\/embed\/#?secret=NprJvQaJOy\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Master of Applied Cyber Security\u00a0\u00bb &#8212; Unigrant\" data-secret=\"NprJvQaJOy\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"This program will provide you with the opportunity to gain a deeper understanding of relevant topics and technology pertaining to threats detection, risk analytics, data security, incident response, privacy protection, security audit and compliance, using innovative technologies from leading vendors like Amazon Web Services (AWS) and IBM. Core and elective &hellip;"}