{"id":290,"date":"2024-07-07T13:25:29","date_gmt":"2024-07-07T13:25:29","guid":{"rendered":"https:\/\/cybersecurityexperts.in\/?page_id=290"},"modified":"2024-07-07T17:06:28","modified_gmt":"2024-07-07T17:06:28","slug":"microsoft-cyber-security-analyst-professional","status":"publish","type":"page","link":"https:\/\/cybersecurityexperts.in\/index.php\/microsoft-cyber-security-analyst-professional\/","title":{"rendered":"Microsoft Cyber Security Analyst Professional"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"290\" class=\"elementor elementor-290\">\n\t\t\t\t<div class=\"elementor-element elementor-element-36caa7d e-con-full e-flex e-con e-parent\" data-id=\"36caa7d\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-611953e e-grid e-con-full e-con e-child\" data-id=\"611953e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-785cfa7 elementor-widget elementor-widget-heading\" data-id=\"785cfa7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\nStep into the World of Cyber Security &amp; Unlock Your Potential\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a954f0e elementor-widget elementor-widget-text-editor\" data-id=\"a954f0e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Flexible Online Classes and Weekend Batches Available!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b5b03f elementor-align-center elementor-widget elementor-widget-button\" data-id=\"7b5b03f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Enroll Now <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3ff42f7 e-flex e-con-boxed e-con e-parent\" data-id=\"3ff42f7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c81e1c elementor-widget elementor-widget-text-editor\" data-id=\"4c81e1c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Microsoft Cyber Security Analyst Professional Certificate<\/strong><\/h2><p>Launch your career as a cybersecurity analyst. Build job-ready skills for an in-demand career in the field of cybersecurity in as little as 6 months. No prior experience required to get started<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4beb316 e-flex e-con-boxed e-con e-parent\" data-id=\"4beb316\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d6ea5f6 elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"d6ea5f6\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38c66f8 e-grid e-con-full e-con e-parent\" data-id=\"38c66f8\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-70f9ff6 elementor-widget elementor-widget-image\" data-id=\"70f9ff6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1536\" height=\"864\" src=\"https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/organized-female-hacker-her-team-stealing-information-from-government-server-using-super-computers-1536x864.jpg\" class=\"attachment-1536x1536 size-1536x1536 wp-image-381\" alt=\"\" srcset=\"https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/organized-female-hacker-her-team-stealing-information-from-government-server-using-super-computers-1536x864.jpg 1536w, https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/organized-female-hacker-her-team-stealing-information-from-government-server-using-super-computers-300x169.jpg 300w, https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/organized-female-hacker-her-team-stealing-information-from-government-server-using-super-computers-1024x576.jpg 1024w, https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/organized-female-hacker-her-team-stealing-information-from-government-server-using-super-computers-768x432.jpg 768w, https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/organized-female-hacker-her-team-stealing-information-from-government-server-using-super-computers-2048x1152.jpg 2048w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-401f3a2 elementor-widget elementor-widget-text-editor\" data-id=\"401f3a2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #ff6600;\"><strong>Why Choose Us?<\/strong><\/span><\/h3><ul><li><strong>Prestigious Certificate<\/strong>: Earn a credential from Microsoft, a global tech leader!<\/li><li><strong>High-Demand Skills<\/strong>: Learn threat management, vulnerability assessment, incident response, and more!<\/li><li><strong>Career Advancement<\/strong>: Open doors to roles like Cybersecurity Analyst, Security Consultant, and more!<\/li><li><strong>Online Classes &amp; Weekend Batches<\/strong>: Flexible learning options to fit your schedule!<\/li><li><strong>Practical Labs and Real-World Scenarios<\/strong> \ud83d\udda5\ufe0f\ud83d\udd12<\/li><li><strong>Latest Tools and Technologies<\/strong> \ud83d\udee0\ufe0f\ud83d\udda7<\/li><li><strong>Flexible Learning Options<\/strong> \ud83d\udd52\ud83e\uddd1\u200d\ud83d\udcbb<\/li><li><strong>Career Support and Job Assistance<\/strong> \ud83d\udcc8\ud83d\udcbc<\/li><li><strong>Live Projects Experience<\/strong> \ud83d\udd04\ud83d\udca1<\/li><li><strong>Placement Assistance<\/strong> \ud83e\udded\ud83c\udf93<\/li><li><strong>Experienced Faculty with International Certifications (CEH, CHFI, CCSE, CPTE)<\/strong> \ud83c\udf93\ud83c\udf0d<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aed49d3 e-flex e-con-boxed e-con e-parent\" data-id=\"aed49d3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6bf94f4 elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"6bf94f4\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-380f3ad e-con-full e-flex e-con e-parent\" data-id=\"380f3ad\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c24b61 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"9c24b61\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What You'll Learn<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1758b79 e-grid e-con-full e-con e-parent\" data-id=\"1758b79\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57d0c91 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"57d0c91\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/game.png\" class=\"attachment-full size-full wp-image-367\" alt=\"\" srcset=\"https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/game.png 512w, https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/game-300x300.png 300w, https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/game-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Cybersecurity Fundamentals<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07800f9 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"07800f9\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/crisis-management.png\" class=\"attachment-full size-full wp-image-366\" alt=\"\" srcset=\"https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/crisis-management.png 512w, https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/crisis-management-300x300.png 300w, https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/crisis-management-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Threat Management<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-749adbf elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"749adbf\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/test.png\" class=\"attachment-full size-full wp-image-369\" alt=\"\" srcset=\"https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/test.png 512w, https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/test-300x300.png 300w, https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/test-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Vulnerability Assessment <\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c75b1b0 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"c75b1b0\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/operational-risk.png\" class=\"attachment-full size-full wp-image-368\" alt=\"\" srcset=\"https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/operational-risk.png 512w, https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/operational-risk-300x300.png 300w, https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/operational-risk-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"> Incidents Response<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-115efd1 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"115efd1\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/copyright-guidelines.png\" class=\"attachment-full size-full wp-image-377\" alt=\"\" srcset=\"https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/copyright-guidelines.png 512w, https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/copyright-guidelines-300x300.png 300w, https:\/\/cybersecurityexperts.in\/wp-content\/uploads\/2024\/07\/copyright-guidelines-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Compliance & Governance<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-898fcd3 e-flex e-con-boxed e-con e-parent\" data-id=\"898fcd3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b81f318 elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"b81f318\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ab06e3c e-flex e-con-boxed e-con e-parent\" data-id=\"ab06e3c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d9073e elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"2d9073e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Course Highlights<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-022a198 e-flex e-con-boxed e-con e-parent\" data-id=\"022a198\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-64dd386 e-con-full e-flex e-con e-child\" data-id=\"64dd386\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0b851d5 elementor-widget elementor-widget-text-editor\" data-id=\"0b851d5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #ff6600;\"><strong>Special Offer<\/strong><\/span><\/h3><ul><li><strong>Enroll for the upcoming 15th July batch and get a 10%-20% discount!<\/strong><\/li><li><strong>Last date for admission is 12th July 2024 &#8211; Don&#8217;t miss out!<\/strong><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-990375f e-con-full e-flex e-con e-child\" data-id=\"990375f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ff5193c elementor-widget elementor-widget-text-editor\" data-id=\"ff5193c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #ff6600;\">Course Highlights\u00a0<\/span><\/h3><ul><li><strong>Comprehensive Curriculum<\/strong> by industry experts<\/li><li><strong>Hands-On Labs<\/strong> with real-world scenarios<\/li><li><strong>Flexible Learning<\/strong> at your own pace<\/li><li><strong>Expert Instructors<\/strong> with real-world insights<\/li><li><strong>Community Support<\/strong> to network and collaborate<\/li><li><strong>Placement Support<\/strong> to help you land your dream job!<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e1eba3 e-con-full e-flex e-con e-parent\" data-id=\"7e1eba3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-5881a35 e-flex e-con-boxed e-con e-child\" data-id=\"5881a35\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-029052b elementor-widget elementor-widget-text-editor\" data-id=\"029052b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Empower yourself with the skills to protect and secure the digital world. Start your journey with the Microsoft Cybersecurity Analyst Professional Certificate today!\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0968fca elementor-align-center elementor-widget elementor-widget-button\" data-id=\"0968fca\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-download\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M216 0h80c13.3 0 24 10.7 24 24v168h87.7c17.8 0 26.7 21.5 14.1 34.1L269.7 378.3c-7.5 7.5-19.8 7.5-27.3 0L90.1 226.1c-12.6-12.6-3.7-34.1 14.1-34.1H192V24c0-13.3 10.7-24 24-24zm296 376v112c0 13.3-10.7 24-24 24H24c-13.3 0-24-10.7-24-24V376c0-13.3 10.7-24 24-24h146.7l49 49c20.1 20.1 52.5 20.1 72.6 0l49-49H488c13.3 0 24 10.7 24 24zm-124 88c0-11-9-20-20-20s-20 9-20 20 9 20 20 20 20-9 20-20zm64 0c0-11-9-20-20-20s-20 9-20 20 9 20 20 20 20-9 20-20z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Course Broucher<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0782010 e-flex e-con-boxed e-con e-parent\" data-id=\"0782010\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-308207d elementor-widget__width-initial elementor-widget elementor-widget-html\" data-id=\"308207d\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe src=\"https:\/\/docs.google.com\/forms\/d\/e\/1FAIpQLSdN3Q4NAJPYp3MLebHvhaN8_4Zknn6Owu89cAOOPA2WHuAIZw\/viewform?embedded=true\" width=\"640\" height=\"1000\" frameborder=\"0\" marginheight=\"0\" marginwidth=\"0\">Loading\u2026<\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Step into the World of Cyber Security &#038; Unlock Your Potential Flexible Online Classes and Weekend Batches Available! Enroll Now Microsoft Cyber Security Analyst Professional Certificate Launch your career as a cybersecurity analyst. Build job-ready skills for an in-demand career in the field of cybersecurity in as little as 6 months. No prior experience required [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":288,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_canvas","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/cybersecurityexperts.in\/index.php\/wp-json\/wp\/v2\/pages\/290"}],"collection":[{"href":"https:\/\/cybersecurityexperts.in\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurityexperts.in\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurityexperts.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityexperts.in\/index.php\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":160,"href":"https:\/\/cybersecurityexperts.in\/index.php\/wp-json\/wp\/v2\/pages\/290\/revisions"}],"predecessor-version":[{"id":463,"href":"https:\/\/cybersecurityexperts.in\/index.php\/wp-json\/wp\/v2\/pages\/290\/revisions\/463"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityexperts.in\/index.php\/wp-json\/wp\/v2\/media\/288"}],"wp:attachment":[{"href":"https:\/\/cybersecurityexperts.in\/index.php\/wp-json\/wp\/v2\/media?parent=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}