{"id":363,"date":"2023-03-04T18:13:52","date_gmt":"2023-03-04T18:13:52","guid":{"rendered":"https:\/\/societyofcomputerscience.in\/?page_id=363"},"modified":"2023-05-04T22:30:13","modified_gmt":"2023-05-04T22:30:13","slug":"ethical-hacking","status":"publish","type":"page","link":"https:\/\/societyofcomputerscience.in\/?page_id=363","title":{"rendered":"Ethical Hacking"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"363\" class=\"elementor elementor-363\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-31fbcf82 elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"31fbcf82\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-26fce3ba\" data-id=\"26fce3ba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-40256867 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"40256867\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3bc210f7\" data-id=\"3bc210f7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2986fc94 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"2986fc94\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-medium\">About\nEthical Hacking\nTraining<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13f710e7 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"13f710e7\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"padding-left: 40px;\">The\u00a0<b>Ethical Hacking<\/b>\u00a0program is the pinnacle and one of the most desired\u00a0<b>information security training programs\u00a0<\/b>for any\u00a0<b>information security professional<\/b>\u00a0will ever want to be in. To master the\u00a0<b>hacking technologies<\/b>, you will need to become one.<\/p><p>\u00a0<\/p><p style=\"padding-left: 40px;\">The accredited course provides the\u00a0<b>advanced hacking tools<\/b>\u00a0and techniques used by\u00a0<b>hackers<\/b>\u00a0and\u00a0<b>information security professionals<\/b>\u00a0alike to break into an organization. As we put it,\u00a0\u201cTo catch a hacker, you need to think like a hacker\u201d. This course will immerse you into the\u00a0<b>Hacker<\/b>\u00a0Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.<\/p><p>\u00a0<\/p><p style=\"padding-left: 40px;\">Society Of Computer Science Provides <strong>Certification Course OR Training Only<\/strong>\u00a0as per the requirement of Candidate.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0eef9a6 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"0eef9a6\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"https:\/\/societyofcomputerscience.in\/?page_id=1093\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-circle-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Register Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6bf636c2\" data-id=\"6bf636c2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a2bf8ec elementor-widget elementor-widget-spacer\" data-id=\"4a2bf8ec\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-966d89d elementor-widget elementor-widget-image\" data-id=\"966d89d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"490\" height=\"503\" src=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/hacking-01.png\" class=\"attachment-full size-full wp-image-1299\" alt=\"\" srcset=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/hacking-01.png 490w, https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/hacking-01-292x300.png 292w\" sizes=\"(max-width: 490px) 100vw, 490px\" style=\"width:100%;height:102.65%;max-width:490px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2bc6f30c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2bc6f30c\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1a21b8c2\" data-id=\"1a21b8c2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3da8a5f1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3da8a5f1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-523b4478\" data-id=\"523b4478\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-14dbe790 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"14dbe790\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Course Curriculum<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-40e79b95\" data-id=\"40e79b95\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-932bf32 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"932bf32\" data-element_type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-824b094\" data-id=\"824b094\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d85a97e elementor-drop-cap-yes elementor-drop-cap-view-default elementor-widget elementor-widget-text-editor\" data-id=\"d85a97e\" data-element_type=\"widget\" data-settings=\"{&quot;drop_cap&quot;:&quot;yes&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Introduction to Basics of Ethical Hacking<\/li><li>Foot-printing Active (Tool Based Practical)<\/li><li>Foot-printing Passive (Passive Approach)<\/li><li>In-depth Network Scanning<\/li><li>Decision trees \u2013 Clustering<\/li><li>Enumeration User Identification<\/li><li>System Hacking Password Cracking &amp; Bypassing<\/li><li>Viruses and Worms<\/li><li>Trojan and Back Door<\/li><li>Bots and Botnets<\/li><li>Sniffers MITM with Kali<\/li><li>Sniffers MITM with Windows<\/li><li>Social Engineering Techniques Theoritical Approach<\/li><li>Social Engineering Practical Based Approach<\/li><li>Denial of Service DOS &amp; DDOS Attacks<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-d3f2887\" data-id=\"d3f2887\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30e4fec elementor-widget elementor-widget-image\" data-id=\"30e4fec\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"750\" height=\"901\" src=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/ai-illustrations-06.png\" class=\"attachment-large size-large wp-image-1346\" alt=\"\" srcset=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/ai-illustrations-06.png 819w, https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/ai-illustrations-06-250x300.png 250w, https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/ai-illustrations-06-768x923.png 768w\" sizes=\"(max-width: 750px) 100vw, 750px\" style=\"width:100%;height:120.15%;max-width:819px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f63ff60\" data-id=\"f63ff60\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c0dc562 elementor-widget elementor-widget-text-editor\" data-id=\"c0dc562\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Web Session Hijacking<\/li><li>SQL Injection Manual Testing<\/li><li>SQL Injection Automated Tool Based Testing<\/li><li>Basics of Web App Security<\/li><li>Hacking Web servers Server Rooting<\/li><li>Hacking Wireless Networks Manual CLI Based<\/li><li>Hacking Wireless Network<\/li><li>Evading IDS, Firewall<\/li><li>Honey Pots<\/li><li>Buffer Overflow Attacks<\/li><li>Cryptography<\/li><li>Penetration Testing: Basics<\/li><li>Mobile Hacking<\/li><li>Internet of Things (IoT) Hacking<\/li><li>Cloud Security and many more<br \/><br \/><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7eaf58b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7eaf58b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-24a1ddc\" data-id=\"24a1ddc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b17937 elementor-mobile-align-center elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1b17937\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"https:\/\/societyofcomputerscience.in\/?page_id=1093\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-circle-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Register Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a370e75\" data-id=\"a370e75\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51b4482 elementor-mobile-align-center elementor-align-center elementor-widget elementor-widget-button\" data-id=\"51b4482\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/Ethical_Hacking_Society_of_computer_Science_By_Abhishek_Bharti-1.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-circle-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Syllabus in PDF<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b3581cf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b3581cf\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-251c4441\" data-id=\"251c4441\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-68521618 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"68521618\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-7b873639\" data-id=\"7b873639\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-478dc94 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"478dc94\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why Society of Computer Science?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31544991 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"31544991\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our Training is based on 70% of practical and Hands on Session and 30% of theory.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b397153 elementor-tablet-align-left elementor-mobile-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-invisible elementor-widget elementor-widget-icon-list\" data-id=\"7b397153\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Practical Sessions<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Limited Batch Size<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Trainers from Industry<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a3f8c2 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"4a3f8c2\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"https:\/\/societyofcomputerscience.in\/?page_id=1093\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-circle-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Register Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-2e8d98f7\" data-id=\"2e8d98f7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8cf5f95 elementor-widget elementor-widget-image\" data-id=\"8cf5f95\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/online-learning-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1420\" alt=\"\" srcset=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/online-learning-150x150.png 150w, https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/online-learning-300x300.png 300w, https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/online-learning.png 512w\" sizes=\"(max-width: 150px) 100vw, 150px\" style=\"width:100%;height:100%;max-width:512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de29c26 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"de29c26\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Online Batches<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e36e97e elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"e36e97e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We offer online batches for the students who cannot come to or training centers. This allow candidates to attend training from their location<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-0e475ff\" data-id=\"0e475ff\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-83f78dd elementor-widget elementor-widget-image\" data-id=\"83f78dd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/certificate-1-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1481\" alt=\"\" srcset=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/certificate-1-150x150.png 150w, https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/certificate-1-300x300.png 300w, https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/certificate-1.png 512w\" sizes=\"(max-width: 150px) 100vw, 150px\" style=\"width:100%;height:100%;max-width:512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a94d624 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"a94d624\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Renowned Certifications<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5edf72e elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"5edf72e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We offer online exam on specially designed smart Exam Portals, that assesses the candidates for knowledge and skills, and then we certify<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-f4c7abc\" data-id=\"f4c7abc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-307d5c2 elementor-widget elementor-widget-image\" data-id=\"307d5c2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/search-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1485\" alt=\"\" srcset=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/search-150x150.png 150w, https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/search-300x300.png 300w, https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/search.png 512w\" sizes=\"(max-width: 150px) 100vw, 150px\" style=\"width:100%;height:100%;max-width:512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a964c8d animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"a964c8d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Guaranteed Placement<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9571321 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"9571321\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We have 100% Placement Record, we train candidates with such a skill, that they are Industry ready for Information Security<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-14c15c55 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"14c15c55\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3306018a\" data-id=\"3306018a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-357baad7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"357baad7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-47e12ebf\" data-id=\"47e12ebf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed47be animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"ed47be\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What will a Candidate get?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-522ec71f\" data-id=\"522ec71f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e681e84 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e681e84\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-a1104b6\" data-id=\"a1104b6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-347c522 elementor-widget elementor-widget-image\" data-id=\"347c522\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/ai-illustrations-02-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-859\" alt=\"\" style=\"width:100%;height:81.03%;max-width:738px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ad0341 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"9ad0341\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">CERTIFICATION<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fdd106 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"9fdd106\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Candidates clearing exam with more than 70% marks will be awarded with EC-Council Certified Ethical Hacker from EC-Council.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-a72e405\" data-id=\"a72e405\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bb6f8b0 elementor-widget elementor-widget-image\" data-id=\"bb6f8b0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/ai-illustrations-04-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1525\" alt=\"\" srcset=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/ai-illustrations-04-150x150.png 150w, https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/ai-illustrations-04-300x300.png 300w, https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/ai-illustrations-04.png 622w\" sizes=\"(max-width: 150px) 100vw, 150px\" style=\"width:100%;height:100.32%;max-width:622px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0336cc3 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"0336cc3\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Toolkit<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c56ab0f elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"c56ab0f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Each candidate will get access to online portal for toolkit containing tools used during the training and other supporting software.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-82db7e1\" data-id=\"82db7e1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a26eca elementor-widget elementor-widget-image\" data-id=\"7a26eca\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/ai-illustrations-03-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1532\" alt=\"\" srcset=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/ai-illustrations-03-150x150.png 150w, https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/ai-illustrations-03-300x300.png 300w, https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/ai-illustrations-03.png 678w\" sizes=\"(max-width: 150px) 100vw, 150px\" style=\"width:100%;height:99.85%;max-width:678px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fd7958 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"3fd7958\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">E-Books<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16b57ea elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"16b57ea\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Candidates will be provided with a Information Security E-Books on portal containing tutorials of the contents of the training.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-0a731e9\" data-id=\"0a731e9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-06c2b1c elementor-widget elementor-widget-image\" data-id=\"06c2b1c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/societyofcomputerscience.in\/wp-content\/uploads\/2023\/05\/ai-illustrations-05-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1537\" alt=\"\" style=\"width:100%;height:133.75%;max-width:483px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-254f7a5 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"254f7a5\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">INTERNSHIP<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25ff6e0 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"25ff6e0\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In Cyber Security society of computer science provides real-world impact and work experience to candidates through internship programs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>About Ethical Hacking Training The\u00a0Ethical Hacking\u00a0program is the pinnacle and one of the most desired\u00a0information security training programs\u00a0for any\u00a0information security professional\u00a0will ever want to be in. To master the\u00a0hacking technologies, you will need to become one. \u00a0 The accredited course provides the\u00a0advanced hacking tools\u00a0and techniques used by\u00a0hackers\u00a0and\u00a0information security professionals\u00a0alike to break into an organization. As&hellip; <a class=\"more-link\" href=\"https:\/\/societyofcomputerscience.in\/?page_id=363\">Continue reading <span class=\"screen-reader-text\">Ethical Hacking<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-363","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/societyofcomputerscience.in\/index.php?rest_route=\/wp\/v2\/pages\/363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/societyofcomputerscience.in\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/societyofcomputerscience.in\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/societyofcomputerscience.in\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/societyofcomputerscience.in\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=363"}],"version-history":[{"count":235,"href":"https:\/\/societyofcomputerscience.in\/index.php?rest_route=\/wp\/v2\/pages\/363\/revisions"}],"predecessor-version":[{"id":1540,"href":"https:\/\/societyofcomputerscience.in\/index.php?rest_route=\/wp\/v2\/pages\/363\/revisions\/1540"}],"wp:attachment":[{"href":"https:\/\/societyofcomputerscience.in\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}