{"version":"1.0","provider_name":"Unigrant","provider_url":"https:\/\/unigrant.com\/fr\/","author_name":"University of Newcastle","author_url":"https:\/\/unigrant.com\/fr\/author\/university-of-newcastle\/","title":"Master of Cyber Security - Unigrant","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"SdMcFxzlTB\"><a href=\"https:\/\/unigrant.com\/fr\/course\/university-of-newcastle\/master-of-cyber-security-10\/\">Master of Cyber Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/unigrant.com\/fr\/course\/university-of-newcastle\/master-of-cyber-security-10\/embed\/#?secret=SdMcFxzlTB\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Master of Cyber Security\u00a0\u00bb &#8212; Unigrant\" data-secret=\"SdMcFxzlTB\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Cyberspace has profoundly transformed the way we live and do business. We are increasingly relying upon networked applications for assessing information and making critical business decisions, so it is critical for individuals, enterprises and governments to be able to secure cyberspace from attacks to allow them to effectively conduct their &hellip;"}