{"version":"1.0","provider_name":"Unigrant","provider_url":"https:\/\/unigrant.com\/fr\/","author_name":"The University of Melbourne","author_url":"https:\/\/unigrant.com\/fr\/author\/the-university-of-melbourne\/","title":"Cybersecurity Management Practices - Unigrant","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"5ucTtq7ikY\"><a href=\"https:\/\/unigrant.com\/fr\/course\/the-university-of-melbourne\/cybersecurity-management-practices\/\">Cybersecurity Management Practices<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/unigrant.com\/fr\/course\/the-university-of-melbourne\/cybersecurity-management-practices\/embed\/#?secret=5ucTtq7ikY\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Cybersecurity Management Practices\u00a0\u00bb &#8212; Unigrant\" data-secret=\"5ucTtq7ikY\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"As cybersecurity threats become increasingly frequent and sophisticated, organisations of all stripes require the expertise to remain secure. This course is ideal for cybersecurity managers wanting to gain the skills to better understand risk and policy to ensure their organisations are protected from cyber threat. Developed with the Academic Centre &hellip;"}