{"id":4476,"date":"2023-12-07T09:10:24","date_gmt":"2023-12-07T09:10:24","guid":{"rendered":"https:\/\/stjosephstechnology.ac.in\/home\/?page_id=4476"},"modified":"2023-12-18T05:52:43","modified_gmt":"2023-12-18T05:52:43","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/stjosephstechnology.ac.in\/home\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4476\" class=\"elementor elementor-4476\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3895aaf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3895aaf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1f3c1ed\" data-id=\"1f3c1ed\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0e7d4a2 elementor-widget elementor-widget-elementskit-tab\" data-id=\"0e7d4a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-tab.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <div class=\"elementkit-tab-wraper vertical  elementskit-fitcontent-tab \">\n            <ul class=\"nav nav-tabs elementkit-tab-nav  elementskit_pregress_style elementskit_pregress_style\">\n                                    <li class=\"elementkit-nav-item elementor-repeater-item-3edfbb6\">\n                        <a class=\"elementkit-nav-link  active right-pos \" id=\"content-3edfbb669f53acac4a1e-tab\" data-ekit-handler-id=\"introduction-\" data-ekit-toggle=\"tab\" data-target=\"#content-3edfbb669f53acac4a1e\" data-ekit-toggle-trigger=\"click\" aria-describedby=\"content-3edfbb669f53acac4a1e\" href=\"#content-3edfbb669f53acac4a1e\">\n                                                        <div class=\"ekit-tab-title-group\">\n                                                                <span class=\"elementskit-tab-title\">Introduction <\/span>\n                            <\/div>\n                        <\/a>\n                    <\/li>\n                                        <li class=\"elementkit-nav-item elementor-repeater-item-7703910\">\n                        <a class=\"elementkit-nav-link  right-pos \" id=\"content-770391069f53acac4a1e-tab\" data-ekit-handler-id=\"highlights\" data-ekit-toggle=\"tab\" data-target=\"#content-770391069f53acac4a1e\" data-ekit-toggle-trigger=\"click\" aria-describedby=\"content-770391069f53acac4a1e\" href=\"#content-770391069f53acac4a1e\">\n                                                        <div class=\"ekit-tab-title-group\">\n                                                                <span class=\"elementskit-tab-title\">Highlights<\/span>\n                            <\/div>\n                        <\/a>\n                    <\/li>\n                                        <li class=\"elementkit-nav-item elementor-repeater-item-8ca4f17\">\n                        <a class=\"elementkit-nav-link  right-pos \" id=\"content-8ca4f1769f53acac4a1e-tab\" data-ekit-handler-id=\"events\" data-ekit-toggle=\"tab\" data-target=\"#content-8ca4f1769f53acac4a1e\" data-ekit-toggle-trigger=\"click\" aria-describedby=\"content-8ca4f1769f53acac4a1e\" href=\"#content-8ca4f1769f53acac4a1e\">\n                                                        <div class=\"ekit-tab-title-group\">\n                                                                <span class=\"elementskit-tab-title\">Events<\/span>\n                            <\/div>\n                        <\/a>\n                    <\/li>\n                                <\/ul>\n\n\t\t\t<div class=\"tab-content elementkit-tab-content\">\n\t\t\t\t\t\t\t\t\t<div class=\"tab-pane elementkit-tab-pane elementor-repeater-item-3edfbb6  active show \" id=\"content-3edfbb669f53acac4a1e\" role=\"tabpanel\" aria-labelledby=\"content-3edfbb669f53acac4a1e-tab\">\n\t\t\t\t\t\t<div class=\"animated fadeIn\">\n\t\t\t\t\t\t\t\n\t\t<div class=\"widgetarea_warper widgetarea_warper_editable\" data-elementskit-widgetarea-key=\"0e7d4a2\"  data-elementskit-widgetarea-index=\"3edfbb6\">\n\t\t\t<div class=\"widgetarea_warper_edit\" data-elementskit-widgetarea-key=\"0e7d4a2\" data-elementskit-widgetarea-index=\"3edfbb6\">\n\t\t\t\t<i class=\"eicon-edit\" aria-hidden=\"true\"><\/i>\n\t\t\t\t<span>Edit Content<\/span>\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t<div class=\"ekit-widget-area-container\">\n\t\t\t\t\t\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4478\" class=\"elementor elementor-4478\" data-elementor-post-type=\"elementskit_content\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-05e0e65 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"05e0e65\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f6acd0c\" data-id=\"f6acd0c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a14d84 elementor-widget elementor-widget-text-editor\" data-id=\"3a14d84\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u201cStep into the World of Cybersecurity: Arm Yourself with Knowledge and Defend the Digital World!\u201d<\/strong><\/p><p>Are you ready to embark on a journey into the world of cybersecurity, where every click you make is a step toward a brighter, more secure future? Look no further! PEP Cybersecurity Training Program is your gateway to a rewarding career as a <strong>Blue team<\/strong>, <strong>Red Team<\/strong> and <strong>Purple Team<\/strong> professional.<\/p><p>Here&#8217;s what awaits the Students:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bbdf38 elementor-widget elementor-widget-text-editor\" data-id=\"4bbdf38\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Industry-Recognized Certifications:<\/strong><\/p><p>In today&#8217;s digital landscape, certifications matter. Our program is designed to equip you with the skills and knowledge needed to earn industry-recognized certifications such as Certified Ethical Hacker (CEH), CompTIA Sec+, Burp Suite Certified Practitioner, and many more. These certifications are your passport to credibility and will open doors to a wide range of cybersecurity roles.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7815b63 elementor-widget elementor-widget-image\" data-id=\"7815b63\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"443\" height=\"85\" src=\"https:\/\/stjosephstechnology.ac.in\/home\/wp-content\/uploads\/2023\/12\/certificate-2.png\" class=\"attachment-large size-large wp-image-4492\" alt=\"\" srcset=\"https:\/\/stjosephstechnology.ac.in\/home\/wp-content\/uploads\/2023\/12\/certificate-2.png 443w, https:\/\/stjosephstechnology.ac.in\/home\/wp-content\/uploads\/2023\/12\/certificate-2-300x58.png 300w\" sizes=\"(max-width: 443px) 100vw, 443px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-697f72f elementor-widget elementor-widget-text-editor\" data-id=\"697f72f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Lucrative Placement Opportunities:<\/strong><\/p>\n<p><\/p>\n<p>The demand for cybersecurity professionals is skyrocketing, and employers are constantly seeking skilled individuals to protect their digital assets. With PEP Cyber Security program, you&#8217;ll gain hands-on experience and real-world problem-solving skills that will make you stand out in the job market.<\/p>\n<p><strong>Competitive Salary Package:<\/strong><\/p>\n<p>Cybersecurity professionals are among the highest-paid in the IT industry, and the salaries continue to rise. When you complete your certifications, you&#8217;ll be well-positioned to negotiate a competitive salary package.<\/p>\n<p><strong>Future-Ready Career:<\/strong><\/p>\n<p>The world of technology is ever-evolving, and so is the threat landscape. Our training program not only equips you with the fundamentals but also keeps you updated with the latest trends and threats in cybersecurity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"tab-pane elementkit-tab-pane elementor-repeater-item-7703910  \" id=\"content-770391069f53acac4a1e\" role=\"tabpanel\" aria-labelledby=\"content-770391069f53acac4a1e-tab\">\n\t\t\t\t\t\t<div class=\"animated fadeIn\">\n\t\t\t\t\t\t\t\n\t\t<div class=\"widgetarea_warper widgetarea_warper_editable\" data-elementskit-widgetarea-key=\"0e7d4a2\"  data-elementskit-widgetarea-index=\"7703910\">\n\t\t\t<div class=\"widgetarea_warper_edit\" data-elementskit-widgetarea-key=\"0e7d4a2\" data-elementskit-widgetarea-index=\"7703910\">\n\t\t\t\t<i class=\"eicon-edit\" aria-hidden=\"true\"><\/i>\n\t\t\t\t<span>Edit Content<\/span>\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t<div class=\"ekit-widget-area-container\">\n\t\t\t\t\t\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4499\" class=\"elementor elementor-4499\" data-elementor-post-type=\"elementskit_content\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7b6da19 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7b6da19\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-027c798\" data-id=\"027c798\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ac29880 elementor-widget elementor-widget-text-editor\" data-id=\"ac29880\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul style=\"line-height:28px; margin-left:20px;\">\n \t<li><strong><em>4 students<\/em><\/strong> have completed \u201cCertified Ethical Hacker (CEHv12 Master)\u201d certification.<\/li>\n \t<li><strong><em>Jaggajit V <\/em><\/strong>has cleared renowned \u201cOffensive Secuirty Certified Professional(OSCP)\u201d certification.<\/li>\n \t<li><strong><em>Jaggajit V<\/em><\/strong> has delivered a talk on \u201cCloud Security\u201d in the prestigious Null Meet.<\/li>\n \t<li>Our Cyber security program is supported by industry mentors and provides deepened understanding of conecepts in real time with industry-supported use cases from prominent companies like <strong><em>AI, Hebesec Technologies. <\/em><\/strong><\/li>\n \t<li><strong><em>Aditya Dev Anil <\/em><\/strong>has got Research Internship in \u201c<strong>Virtually Testing Foundation<\/strong>\u201d.<\/li>\n \t<li><strong><em>3 students<\/em><\/strong> are undergoing onsite SOC Analyst internship in Ernst &amp; Young.<\/li>\n \t<li><strong><em>15 students<\/em><\/strong> have undergone Virtual internships in various organizations.<\/li>\n<\/ul>\n<strong><em>\u00a0<\/em><\/strong>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"tab-pane elementkit-tab-pane elementor-repeater-item-8ca4f17  \" id=\"content-8ca4f1769f53acac4a1e\" role=\"tabpanel\" aria-labelledby=\"content-8ca4f1769f53acac4a1e-tab\">\n\t\t\t\t\t\t<div class=\"animated fadeIn\">\n\t\t\t\t\t\t\t\n\t\t<div class=\"widgetarea_warper widgetarea_warper_editable\" data-elementskit-widgetarea-key=\"0e7d4a2\"  data-elementskit-widgetarea-index=\"8ca4f17\">\n\t\t\t<div class=\"widgetarea_warper_edit\" data-elementskit-widgetarea-key=\"0e7d4a2\" data-elementskit-widgetarea-index=\"8ca4f17\">\n\t\t\t\t<i class=\"eicon-edit\" aria-hidden=\"true\"><\/i>\n\t\t\t\t<span>Edit Content<\/span>\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t<div class=\"ekit-widget-area-container\">\n\t\t\t\t\t\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4509\" class=\"elementor elementor-4509\" data-elementor-post-type=\"elementskit_content\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f5cfc85 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f5cfc85\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bc9a2af\" data-id=\"bc9a2af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-89cb32b elementor-widget elementor-widget-text-editor\" data-id=\"89cb32b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<table class=\"table table-bordered table-responsive\" border=\"\" width=\"671\" cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td valign=\"top\" width=\"36\"><p>S.No<\/p><\/td><td valign=\"top\" width=\"76\"><p>Date<\/p><\/td><td valign=\"top\" width=\"141\"><p>Event Type (Workshop\/Guest Lecture\u2026.)<\/p><\/td><td valign=\"top\" width=\"207\"><p>Event Title<\/p><\/td><td valign=\"top\" width=\"211\"><p>Resource Person\/Company<\/p><\/td><\/tr><tr><td valign=\"top\" width=\"36\"><p>1<\/p><\/td><td valign=\"top\" width=\"76\"><p>June 5th 2023<\/p><\/td><td valign=\"top\" width=\"141\"><p>Industry Tech Talk<\/p><\/td><td valign=\"top\" width=\"207\"><p>Unlocking the Power of Certifications: Computer Networks &amp; Cybersecurity<\/p><\/td><td valign=\"top\" width=\"211\"><p>Mr. Karthikeyan K<br \/>OWASP Chapter Lead<br \/>Head of Security<br \/>Logitech PWS and Gaming<\/p><\/td><\/tr><tr><td valign=\"top\" width=\"36\"><p>2<\/p><\/td><td valign=\"top\" width=\"76\"><p>June 21st 2023<\/p><\/td><td valign=\"top\" width=\"141\"><p>Industry Tech Talk<\/p><\/td><td valign=\"top\" width=\"207\"><p>Networking Fundamentals<\/p><\/td><td valign=\"top\" width=\"211\"><p>StrongBox IT<\/p><\/td><\/tr><tr><td valign=\"top\" width=\"36\"><p>3<\/p><\/td><td valign=\"top\" width=\"76\"><p>July 7th 2023<\/p><\/td><td valign=\"top\" width=\"141\"><p>Industry Tech Talk<\/p><\/td><td valign=\"top\" width=\"207\"><p>Cybersecurity careers and its future prospects<\/p><\/td><td valign=\"top\" width=\"211\"><p>Mr. Ram Sundar<br \/>CEO<br \/>Hebesec Technologies<\/p><\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e500736 elementor-widget elementor-widget-text-editor\" data-id=\"e500736\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Academic Partnerships:<\/strong>\n<ul style=\"margin-left:20px;\">\n \t<li>CompTIA<\/li>\n \t<li>EC- Council<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2289e30 elementor-widget elementor-widget-image\" data-id=\"2289e30\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"443\" height=\"85\" src=\"https:\/\/stjosephstechnology.ac.in\/home\/wp-content\/uploads\/2023\/12\/partnership.png\" class=\"attachment-large size-large wp-image-4511\" alt=\"\" srcset=\"https:\/\/stjosephstechnology.ac.in\/home\/wp-content\/uploads\/2023\/12\/partnership.png 443w, https:\/\/stjosephstechnology.ac.in\/home\/wp-content\/uploads\/2023\/12\/partnership-300x58.png 300w\" sizes=\"(max-width: 443px) 100vw, 443px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Introduction Highlights Events Edit Content \u201cStep into the World of Cybersecurity: Arm Yourself with Knowledge and Defend the Digital World!\u201d Are you ready to embark on a journey into the world of cybersecurity, where every click you make is a step toward a brighter, more secure future? Look no further! PEP Cybersecurity Training Program is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-4476","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/stjosephstechnology.ac.in\/home\/wp-json\/wp\/v2\/pages\/4476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stjosephstechnology.ac.in\/home\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/stjosephstechnology.ac.in\/home\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/stjosephstechnology.ac.in\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stjosephstechnology.ac.in\/home\/wp-json\/wp\/v2\/comments?post=4476"}],"version-history":[{"count":25,"href":"https:\/\/stjosephstechnology.ac.in\/home\/wp-json\/wp\/v2\/pages\/4476\/revisions"}],"predecessor-version":[{"id":4529,"href":"https:\/\/stjosephstechnology.ac.in\/home\/wp-json\/wp\/v2\/pages\/4476\/revisions\/4529"}],"wp:attachment":[{"href":"https:\/\/stjosephstechnology.ac.in\/home\/wp-json\/wp\/v2\/media?parent=4476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}