{"id":17504,"date":"2025-05-30T14:14:34","date_gmt":"2025-05-30T12:14:34","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?post_type=mec-events&#038;p=17504"},"modified":"2026-03-04T12:40:31","modified_gmt":"2026-03-04T11:40:31","slug":"ec-council-iot-security-essentials-ise","status":"publish","type":"mec-events","link":"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-iot-security-essentials-ise\/","title":{"rendered":"EC-Council IoT Security Essentials (I|SE)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"17504\" class=\"elementor elementor-17504\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0c232 e-flex e-con-boxed e-con e-child\" data-id=\"6c0c232\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-42f62ef3 e-flex e-con-boxed e-con e-child\" data-id=\"42f62ef3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b4fad91 elementor-widget elementor-widget-image\" data-id=\"1b4fad91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"793\" height=\"181\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview.png\" class=\"attachment-large size-large wp-image-12501\" alt=\"EC-Council Certified Acg CyberAcademy\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview.png 793w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview-300x68.png 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview-768x175.png 768w\" sizes=\"(max-width: 793px) 100vw, 793px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f789f2a elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"f789f2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"400\" height=\"258\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ISE.png\" class=\"attachment-large size-large wp-image-17517\" alt=\"EC-Council IoT Security Essentials (I|SE)\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ISE.png 400w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ISE-300x194.png 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ISE-18x12.png 18w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25867c6 elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"25867c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b68c9 elementor-widget elementor-widget-heading\" data-id=\"4d4b68c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Description <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b0eb856 e-flex e-con-boxed e-con e-child\" data-id=\"5b0eb856\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57a3c7d5 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"57a3c7d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>EC-Council\u2019s <b>IoT Security Essentials<\/b> Series provides comprehensive coverage of essential topics in securing Internet of Things (IoT) systems. From understanding the fundamental concepts of IoT to addressing advanced security threats, students will gain the knowledge and skills necessary to design, deploy, and maintain secure IoT solutions. Through a combination of theoretical learning and hands-on exercises, participants will explore IoT fundamentals, <br \/>networking and communication protocols, cloud integration, threat intelligence, incident response, and security engineering principles. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role.\u00a0<\/p><p>Ultimately, students will be equipped with the expertise needed to effectively identify, assess, and mitigate security risks in IoT environments, ensuring the integrity, confidentiality, and availability of IoT systems and data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdbcfe6 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"fdbcfe6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Target group<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25da03fa elementor-widget elementor-widget-text-editor\" data-id=\"25da03fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>School students, graduates, professionals, career starters and changers, IT\/Technology\/Cybersecurity teams with little or no work experience.<\/li><li>Individuals who want to start a career in cybersecurity and are interested in IoT Security.<\/li><li>Anyone interested in gaining in-depth knowledge on safeguarding their smart devices or those within their organization.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9471f9 elementor-widget elementor-widget-spacer\" data-id=\"f9471f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f00b1e3 elementor-widget elementor-widget-heading\" data-id=\"f00b1e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training Program\n\n\n\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e58010 elementor-widget elementor-widget-n-accordion\" data-id=\"3e58010\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6530\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-6530\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 01 : IoT Fundamentals <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6530\" class=\"elementor-element elementor-element-4933f56 e-con-full e-flex e-con e-child\" data-id=\"4933f56\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6530\" class=\"elementor-element elementor-element-fdaf313 e-flex e-con-boxed e-con e-child\" data-id=\"fdaf313\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2abd6a5 elementor-widget elementor-widget-text-editor\" data-id=\"2abd6a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Definitions<\/li><li>IoT<\/li><li>IoT Beginnings<\/li><li>The IoT Paradigm<\/li><li>IoT Characteristics<\/li><li>What&rsquo;s Smart?<\/li><li>Smart Technology<\/li><li>IoT in Power Grids and Home<\/li><li>Internet of Military Things<\/li><li>Industrial IoT basics<\/li><li>SCADA<\/li><li>NIST 800-82 \u2013 SCADA<\/li><li>DCS<\/li><li>Smart City<\/li><li>Health IoT<\/li><li>IoT Platforms<\/li><li>Nodes and Applications in Wireless Sensor Networks<\/li><li>The Future of IoT<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6531\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6531\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 02 : IoT Networking and Communication <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6531\" class=\"elementor-element elementor-element-c1b1116 e-con-full e-flex e-con e-child\" data-id=\"c1b1116\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6531\" class=\"elementor-element elementor-element-fd10cb6 e-flex e-con-boxed e-con e-child\" data-id=\"fd10cb6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6251d38 elementor-widget elementor-widget-text-editor\" data-id=\"6251d38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Basic Concepts \u2013 MAC Address<\/li><li>EUI-64<\/li><li>Network Concepts\u2013 IP Addresses (IPV4)<\/li><li>Private Vs. Public<\/li><li>Private IP Address<\/li><li>OSI Model &#8211; Open Systems Interconnect<\/li><li>TCP Model<\/li><li>IP Addresses and Subnet Masks<\/li><li>IPv4 Subnetting Techniques<\/li><li>Custom IP Addresses<\/li><li>CIDR<\/li><li>IP Address Services<\/li><li>APIPA<\/li><li>IPv6<\/li><li>Network Concepts &#8211; Wi-Fi<\/li><li>Narrowband, Broadband, and Spread Spectrum Signals<\/li><li>Frequency Hopping Vs. Direct Sequence<\/li><li>Spread Spectrum Details<\/li><li>802.11 Broadcast Methods<\/li><li>802.11 Channels<\/li><li>IoT Protocols<\/li><li>Bluetooth<\/li><li>ANT+<\/li><li>IPv6 Over Low Power Wireless Personal Area Networks (6LowPAN)<\/li><li>6LowPAN<\/li><li>NFC<\/li><li>RFID<\/li><li>ZigBee<\/li><li>IEEE 802.15.4 Physical Layer<\/li><li>Operating Frequency Bands<\/li><li>PHY Frame Structure<\/li><li>IEEE 802.15.4 MAC Layer<\/li><li>IEEE ZigBee Network Topologies MAC Layer<\/li><li>Z Wave<\/li><li>LoRa<\/li><li>RuBee<\/li><li>WirelessHART<\/li><li>MiWi<\/li><li>MQTT<\/li><li>TR-069<\/li><li>OMA-DM<\/li><li>XMPP<\/li><li>DDS<\/li><li>Constrained Application Protocol (CoAP)<\/li><li>Cellular Networks<\/li><li>5G<\/li><li>Windows IoT<\/li><li>Power System Communication Technologies<\/li><li>Power Line Carrier Communication (PLCC)<\/li><li>Tele-Control Protocols<\/li><li>IEC\u201360870\u20135-101<\/li><li>ICCP Protocol<\/li><li>IEEE Standards<\/li><li>Distributed Network Protocol 3 (DNP3)<\/li><li>IEEE IoT Standards List<\/li><li>Building Information Model<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6532\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6532\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 03 : IoT Processors and Operating Systems <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6532\" class=\"elementor-element elementor-element-11f4753 e-con-full e-flex e-con e-child\" data-id=\"11f4753\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6532\" class=\"elementor-element elementor-element-db127c7 e-flex e-con-boxed e-con e-child\" data-id=\"db127c7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-28853ee elementor-widget elementor-widget-text-editor\" data-id=\"28853ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>PCB<\/li><li>NAND<\/li><li>UART<\/li><li>JTAG<\/li><li>CPU Internal Structure<\/li><li>Interrupts<\/li><li>Operating Systems<\/li><li>Features of the OS in Embedded Systems<\/li><li>Operating System Kernel<\/li><li>Kernel Types<\/li><li>Firmware<\/li><li>Real-Time Operating System (RTOS)<\/li><li>Type of Real-Time Systems<\/li><li>Performance Evaluation<\/li><li>Four Main Tasks of an OS<\/li><li>RTOS \u2013 VxWorks<\/li><li>What is VxWorks?<\/li><li>Differences Between Traditional UNIX and VxWorks<\/li><li>VxWorks Architecture<\/li><li>VXWorks Networking Support<\/li><li>RTPS QNX<\/li><li>RTOS \u2013 LINUX<\/li><li>Contiki<\/li><li>The Contiki OS<\/li><li>Contiki Protothreads and Dynamic Linking<\/li><li>RIOT<\/li><li>TinyOS<\/li><li>MagnetOS<\/li><li>FreeRTOS<\/li><li>Apache Mynewt<\/li><li>BeRTOS<\/li><li>Zephyr<\/li><li>Linux &amp; Android<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6533\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6533\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 04 : Cloud and IoT <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6533\" class=\"elementor-element elementor-element-c0a1227 e-flex e-con-boxed e-con e-child\" data-id=\"c0a1227\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6533\" class=\"elementor-element elementor-element-dfa95c5 e-con-full e-flex e-con e-child\" data-id=\"dfa95c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c8d3459 elementor-widget elementor-widget-text-editor\" data-id=\"c8d3459\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>What is Cloud Computing?<\/li><li>NIST<\/li><li>Cloud Characteristics<\/li><li>Types of Cloud Computing Services<\/li><li>Cloud Deployment<\/li><li>Basic Cloud Concepts<\/li><li>Cloud Computing<\/li><li>Cloud Types<\/li><li>Multi-cloud<\/li><li>HPC Cloud<\/li><li>Virtualization<\/li><li>Virtual Systems<\/li><li>IaaS<\/li><li>PaaS<\/li><li>SaaS<\/li><li>Variations<\/li><li>Characteristics of Virtualization<\/li><li>Virtual Components<\/li><li>Distributed Systems Issues<\/li><li>Terms<\/li><li>Uses of Cloud Computing<\/li><li>IoT Cloud Commercial Solutions<\/li><li>AWS IoT<\/li><li>AWS IoT Components<\/li><li>Oracle Cloud<\/li><li>Grid Computing<\/li><li>Fog Computing<\/li><li>Future Trends<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6534\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6534\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 05 : IoT Advanced Topics <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6534\" class=\"elementor-element elementor-element-04a6bd9 e-flex e-con-boxed e-con e-child\" data-id=\"04a6bd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6534\" class=\"elementor-element elementor-element-671c6e8 e-con-full e-flex e-con e-child\" data-id=\"671c6e8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0733571 elementor-widget elementor-widget-text-editor\" data-id=\"0733571\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>IoT Software<\/li><li>Web Applications<\/li><li>Hybrid Model<\/li><li>Embedded Device Web App<\/li><li>Web Communications<\/li><li>Mobile Applications<\/li><li>Hybrid<\/li><li>Native Applications<\/li><li>IoT Identity Management<\/li><li>IoT Protocols<\/li><li>What is Machine Learning?<\/li><li>IoT and Machine Learning<\/li><li>Types of Learning<\/li><li>Supervised vs. Unsupervised Learning<\/li><li>Classification<\/li><li>Neural Networks<\/li><li>Terminology<\/li><li>Hebb\u2019s Rule<\/li><li>ANNs \u2013 The Basics<\/li><li>Topologies of Neural Networks<\/li><li>Multi-Layers<\/li><li>Recurrent Networks<\/li><li>Elman Nets<\/li><li>Neural Network Function<\/li><li>K-Nearest Neighbor<\/li><li>Echo State Network<\/li><li>Naive Bayes<\/li><li>Block Chain IoT<\/li><li>What is a Block?<\/li><li>What is a Transaction?<\/li><li>Block Chain IoT<\/li><li>How to Achieve Convergence?<\/li><li>Structure of a Block Chain<\/li><li>Consensus Algorithms<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6535\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6535\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 06 : IoT Threats <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6535\" class=\"elementor-element elementor-element-89e510f e-flex e-con-boxed e-con e-child\" data-id=\"89e510f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6535\" class=\"elementor-element elementor-element-0ab6969 e-con-full e-flex e-con e-child\" data-id=\"0ab6969\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-01fd449 elementor-widget elementor-widget-text-editor\" data-id=\"01fd449\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>List of Common IoT Attacks<\/li><li>IoT Vulnerable<\/li><li>How Bad is the Problem?<\/li><li>Mirai<\/li><li>BrikerBot<\/li><li>Other Notable IoT Attacks<\/li><li>Definition of Sybil Attack<\/li><li>Sybil Attack<\/li><li>Sinkhole Attack<\/li><li>TinyOS Beaconing<\/li><li>Geographical Attacks and Attackers<\/li><li>Spoofed, Altered, or Replayed Routing Info<\/li><li>Wormhole Attack<\/li><li>Blackhole Attack<\/li><li>Rushing Attacks<\/li><li>HELLO Flood Attack<\/li><li>Smart Heating Shutdown<\/li><li>Access Internal State<\/li><li>Modify Internal State<\/li><li>Clone TAP<\/li><li>IoT Expands Security Needs<\/li><li>OWASP IoT Top 10<\/li><li>Dark Reading Top 8 Attacks<\/li><li>IoT Attack Surface<\/li><li>IoT Goat<\/li><li>DHCP Starvation<\/li><li>Amplification<\/li><li>Other DoS Attacks<\/li><li>Bluetooth Attacks<\/li><li>Wireless Attacks<\/li><li>IoT Hacking<\/li><li>IoT Attacks<\/li><li>IoT Privacy Issues<\/li><li>Malware<\/li><li>Virus Types<\/li><li>Hiding Techniques<\/li><li>Ransomware<\/li><li>Smart Thermostat Ransomware<\/li><li>Other New Attacks<\/li><li>Hacking Medical Devices<\/li><li>Hacking Cars<\/li><li>Hacking Homes<\/li><li>IoT Hacking<\/li><li>Metasploit and IoT<\/li><li>SCADA &#8211; Poor Authentication and Authorization<\/li><li>SCADA Unpatched Systems<\/li><li>E-passport Threats<\/li><li>Security Threats of RFID-Enabled Supply Chain<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6536\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6536\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 07 :  Basic Security <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6536\" class=\"elementor-element elementor-element-2d5402f e-flex e-con-boxed e-con e-child\" data-id=\"2d5402f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6536\" class=\"elementor-element elementor-element-71f82a9 e-con-full e-flex e-con e-child\" data-id=\"71f82a9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a34385d elementor-widget elementor-widget-text-editor\" data-id=\"a34385d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>The CIA Triangle<\/li><li>Other Security Concepts\/Terms<\/li><li>Best Practices for Protecting Embedded OSs<\/li><li>WLAN Security Goals<\/li><li>Basic WLAN Security Mechanisms<\/li><li>Open System Authentication<\/li><li>Shared Key Authentication<\/li><li>WEP<\/li><li>WPA<\/li><li>WPA2<\/li><li>WPA3<\/li><li>MAC Address Filtering<\/li><li>Disabling SSID Broadcast<\/li><li>Changing the Default Login<\/li><li>Bluetooth Security Modes<\/li><li>Authentication Summary<\/li><li>Zigbee Security<\/li><li>RuBee Security<\/li><li>IoT Checklist<\/li><li>IoT Security Measures<\/li><li>IoT Security Tools<\/li><li>Firmware Security Testing Methodology<\/li><li>ByteSweep<\/li><li>Stanford Secure IoT project<\/li><li>System Hardening<\/li><li>Symmetric Block Cipher Algorithms<\/li><li>Symmetric Encryption<\/li><li>DES &amp; AES<\/li><li>Blowfish<\/li><li>Asymmetric Encryption<\/li><li>How Does Public\/Private Key Encryption Work?<\/li><li>RSA &amp; Diffie-Helman<\/li><li>Digital Signature Basics<\/li><li>Hashes<\/li><li>What is a Collision?<\/li><li>History of SSL<\/li><li>TLS v 1.3<\/li><li>Remote Access Security &#8211; TLS<\/li><li>SSL\/TLS Handshake<\/li><li>Certificate Store<\/li><li>Basics of Defending SCADA\/ICS<\/li><li>SCADA Security Basics<\/li><li>SCADA Security Standards<\/li><li>RTU Security &#8211; Serial Port<\/li><li>Current Grid Environment<\/li><li>Threats to the Grid<\/li><li>NISTIR 7628<\/li><li>Medical Device Standards<\/li><li>EMC Terminology<\/li><li>IoT Privacy<\/li><li>IoT Security Compliance Framework 1.1<\/li><li>Industrial IoT Security Framework<\/li><li>IETF<\/li><li>NIST<\/li><li>NISTIR 8228<\/li><li>IEEE Standards<\/li><li>Security in the SDLC<\/li><li>Legal, Regulatory, and Rights Issues<\/li><li>Aircrack<\/li><li>Wireless tools<\/li><li>Other Wifi tools<\/li><li>Bluetooth tools<\/li><li>Security Protocols For Wireless Sensor Networks<\/li><li>SNEP: Sensor Network Encryption Protocol<\/li><li>TINYSEC<\/li><li>MINISisEC<\/li><li>LEAP: Localized Encryption And Authentication Protocol<\/li><li>ZigBee Security<\/li><li>ZigBee Security Trust Center<\/li><li>ZIGBEE<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6537\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"8\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6537\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 08 : Cloud Security <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6537\" class=\"elementor-element elementor-element-126be66 e-flex e-con-boxed e-con e-child\" data-id=\"126be66\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6537\" class=\"elementor-element elementor-element-9645400 e-con-full e-flex e-con e-child\" data-id=\"9645400\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2b7b60 elementor-widget elementor-widget-text-editor\" data-id=\"a2b7b60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>State of Cloud Security<\/li><li>Cloud Threats On the Rise<\/li><li>Cloud Vulnerabilities<\/li><li>Issues<\/li><li>Critical Security Areas in Cloud Computing (CSA)<\/li><li>Top 10 Customer Issues Eroding Cloud Confidence (from CSA)<\/li><li>Privileged Access<\/li><li>Data Segregation<\/li><li>Cloud Security Alliance &#8211; Guidance<\/li><li>CloudAudit &amp; the A6 Deliverable<\/li><li>ISO 27017<\/li><li>ISO 27018<\/li><li>NSA Guidance<\/li><li>Cloud Computing Attacks<\/li><li>Man in the Cloud<\/li><li>Cloudbleed<\/li><li>Secure Cloud Computing<\/li><li>Infrastructure Security<\/li><li>Compliance<\/li><li>Cloud Computing Also Relies on the Security of Virtualization<\/li><li>Sample Hypervisor Security Issues<\/li><li>Security Issues<\/li><li>Virtualization Security Guidance<\/li><li>Cloud Provider Employees<\/li><li>Mobile Cloud<\/li><li>IRM<\/li><li>Privacy &amp; Personal Information<\/li><li>U.S. Privacy Law<\/li><li>GDPR<\/li><li>Cloud Security Policies<\/li><li>Procedures, Standards, and Guidelines<\/li><li>Policy Types<\/li><li>Investigative Support<\/li><li>Forensic Issues<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6538\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"9\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6538\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 09 : Threat Intelligence <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6538\" class=\"elementor-element elementor-element-8b7c23a e-flex e-con-boxed e-con e-child\" data-id=\"8b7c23a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6538\" class=\"elementor-element elementor-element-b7bd692 e-con-full e-flex e-con e-child\" data-id=\"b7bd692\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-034ce86 elementor-widget elementor-widget-text-editor\" data-id=\"034ce86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>National Vulnerability Database<\/li><li>US Cert<\/li><li>Shodan<\/li><li>IoT Sploit<\/li><li>Alien Vault<\/li><li>Threat Crowd<\/li><li>Phishtank<\/li><li>STRIDE<\/li><li>DREAD<\/li><li>PASTA<\/li><li>CVSS<\/li><li>Common Vulnerability Exposure (CVE)<\/li><li>Risk Determinations<\/li><li>Risk Assessment Standards<\/li><li>Addressing Risk<\/li><li>Residual Risk<\/li><li>Find Web Cams<\/li><li>Web Cams Default passwords<\/li><li>NIST 800-115<\/li><li>NIST 800-53 A<\/li><li>National Security Agency (NSA) Information Assessment Methodology (IAM)<\/li><li>NSA-IAM Overview<\/li><li>IAM<\/li><li>PCI Penetration Testing standard<\/li><li>PCI Highlights<\/li><li>PTES<\/li><li>Cyber Kill Chain<\/li><li>CEH Lifecycle<\/li><li>Vulnerability<\/li><li>TCPdump<\/li><li>FLAGS<\/li><li>Packet Flags<\/li><li>Nmap<\/li><li>\u00a0NMAP Flags<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-6539\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"10\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-6539\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 10 : IoT Incident Response <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6539\" class=\"elementor-element elementor-element-e040134 e-flex e-con-boxed e-con e-child\" data-id=\"e040134\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-6539\" class=\"elementor-element elementor-element-aadc261 e-con-full e-flex e-con e-child\" data-id=\"aadc261\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2da51d elementor-widget elementor-widget-text-editor\" data-id=\"e2da51d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Standards<\/li><li>Processes<\/li><li>Procedures<\/li><li>Impact<\/li><li>IoT and the Cloud<\/li><li>Indicators of Compromise<\/li><li>Tools<\/li><li>Forensic Tools<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-65310\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"11\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-65310\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 11 : IoT Security Engineering <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-65310\" class=\"elementor-element elementor-element-f2a2a02 e-flex e-con-boxed e-con e-child\" data-id=\"f2a2a02\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-65310\" class=\"elementor-element elementor-element-0f1c3e6 e-con-full e-flex e-con e-child\" data-id=\"0f1c3e6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a97de6d elementor-widget elementor-widget-text-editor\" data-id=\"a97de6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Methodologies<\/li><li>12 Practices<\/li><li>Threat Modeling<\/li><li>Dread<\/li><li>Stride<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3add2827 e-flex e-con-boxed e-con e-child\" data-id=\"3add2827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-796b392b e-flex e-con-boxed e-con e-child\" data-id=\"796b392b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39dfad0 elementor-widget elementor-widget-heading\" data-id=\"39dfad0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Goal<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a33cab7 elementor-widget elementor-widget-text-editor\" data-id=\"2a33cab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_column vc_column_container vc_col-sm-6\"><article class=\"text-token-text-primary w-full\" dir=\"auto\" data-testid=\"conversation-turn-2\" data-scroll-anchor=\"true\"><div class=\"text-base my-auto mx-auto py-5 [--thread-content-margin:--spacing(4)] @[37rem]:[--thread-content-margin:--spacing(6)] @[72rem]:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:32rem] @[34rem]:[--thread-content-max-width:40rem] @[64rem]:[--thread-content-max-width:48rem] mx-auto flex max-w-(--thread-content-max-width) flex-1 text-base gap-4 md:gap-5 lg:gap-6 group\/turn-messages focus-visible:outline-hidden\" tabindex=\"-1\"><div class=\"group\/conversation-turn relative flex w-full min-w-0 flex-col agent-turn\"><div class=\"relative flex-col gap-1 md:gap-3\"><div class=\"flex max-w-full flex-col grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"4989737d-9414-4711-9e3f-f2ba7c436d47\" data-message-model-slug=\"gpt-4-1-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose dark:prose-invert w-full break-words light\"><p data-start=\"0\" data-end=\"140\" data-is-last-node=\"\" data-is-only-node=\"\">The IoT Security Essentials (I|SE) course provides foundational knowledge and skills to secure Internet of Things (IoT) devices and networks.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/article><div class=\"pointer-events-none h-px w-px\" aria-hidden=\"true\" data-edge=\"true\">\u00a0<\/div><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element\"><div class=\"wpb_wrapper\"><div class=\"su-list\"><ul><li>Gain insights into the emergence of the Internet of Things (IoT).<\/li><li>Learn about the devices that make your home a smart home.+<\/li><li>Dive deep into IoT communication models.<\/li><li>Gain a deep understanding of IoT networking and communication.<\/li><li>Understand cloud computing in depth.<\/li><li>Learn about the different types of threats to IoT.<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f051be3 e-flex e-con-boxed e-con e-child\" data-id=\"4f051be3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b552e6 elementor-widget elementor-widget-heading\" data-id=\"52b552e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Recommended<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cfa19f0 elementor-widget elementor-widget-text-editor\" data-id=\"2cfa19f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words text-start [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"27870c5c-bcd1-46a6-88c7-04a7e41e22aa\" data-message-model-slug=\"gpt-4o\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert light\"><p data-start=\"0\" data-end=\"215\" data-is-last-node=\"\">No prior cybersecurity knowledge or IT work experience required.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0be4f2f e-flex e-con-boxed e-con e-parent\" data-id=\"0be4f2f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-01bf140 e-con-full e-flex e-con e-child\" data-id=\"01bf140\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-20945c5 e-con-full e-flex e-con e-child\" data-id=\"20945c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b6f4a1 elementor-button-info elementor-align-left elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"2b6f4a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ISE-Brochure-1.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">View the brochure for this training<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c36580 e-con-full e-flex e-con e-child\" data-id=\"0c36580\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b2bbef elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5b2bbef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ISEv1-Course-Outline.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Explore the Course Outline<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Description EC-Council\u2019s IoT Security Essentials Series provides comprehensive coverage of essential topics in securing Internet of Things (IoT) systems. From understanding the fundamental concepts of IoT to addressing advanced security threats, students will gain the knowledge and skills necessary to design, deploy, and maintain secure IoT solutions. Through a combination of theoretical learning and hands-on [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":17518,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[87],"duree":[],"examen":[146],"langue":[164],"niveau":[85],"formateur":[176],"cpf":[],"organismes":[],"organisme":[],"mec_category":[78],"class_list":["post-17504","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-oui","examen-oui","langue-anglais","niveau-avance","formateur-ec-council","mec_category-cybersecurite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EC-Council IoT Security Essentials (I|SE) - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Learn to secure IoT systems, mitigate risks, and gain hands-on experience with CTF labs for practical IoT cybersecurity skills\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-iot-security-essentials-ise\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EC-Council IoT Security Essentials (I|SE) - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Learn to secure IoT systems, mitigate risks, and gain hands-on experience with CTF labs for practical IoT cybersecurity skills\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-iot-security-essentials-ise\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-04T11:40:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ISE-Unlimited.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"428\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-iot-security-essentials-ise\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-iot-security-essentials-ise\\\/\",\"name\":\"EC-Council IoT Security Essentials (I|SE) - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-iot-security-essentials-ise\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-iot-security-essentials-ise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ISE-Unlimited.jpg\",\"datePublished\":\"2025-05-30T12:14:34+00:00\",\"dateModified\":\"2026-03-04T11:40:31+00:00\",\"description\":\"Learn to secure IoT systems, mitigate risks, and gain hands-on experience with CTF labs for practical IoT cybersecurity skills\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-iot-security-essentials-ise\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-iot-security-essentials-ise\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-iot-security-essentials-ise\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ISE-Unlimited.jpg\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ISE-Unlimited.jpg\",\"width\":500,\"height\":428,\"caption\":\"Learn to secure IoT systems, mitigate risks, and gain hands-on experience with CTF labs for practical IoT cybersecurity skills\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-iot-security-essentials-ise\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"EC-Council IoT Security Essentials (I|SE)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EC-Council IoT Security Essentials (I|SE) - ACG CyberAcademy","description":"Learn to secure IoT systems, mitigate risks, and gain hands-on experience with CTF labs for practical IoT cybersecurity skills","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-iot-security-essentials-ise\/","og_locale":"en_GB","og_type":"article","og_title":"EC-Council IoT Security Essentials (I|SE) - ACG CyberAcademy","og_description":"Learn to secure IoT systems, mitigate risks, and gain hands-on experience with CTF labs for practical IoT cybersecurity skills","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-iot-security-essentials-ise\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2026-03-04T11:40:31+00:00","og_image":[{"width":500,"height":428,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ISE-Unlimited.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-iot-security-essentials-ise\/","url":"https:\/\/acgcyberacademy.fr\/events\/ec-council-iot-security-essentials-ise\/","name":"EC-Council IoT Security Essentials (I|SE) - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-iot-security-essentials-ise\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-iot-security-essentials-ise\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ISE-Unlimited.jpg","datePublished":"2025-05-30T12:14:34+00:00","dateModified":"2026-03-04T11:40:31+00:00","description":"Learn to secure IoT systems, mitigate risks, and gain hands-on experience with CTF labs for practical IoT cybersecurity skills","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-iot-security-essentials-ise\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/ec-council-iot-security-essentials-ise\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-iot-security-essentials-ise\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ISE-Unlimited.jpg","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ISE-Unlimited.jpg","width":500,"height":428,"caption":"Learn to secure IoT systems, mitigate risks, and gain hands-on experience with CTF labs for practical IoT cybersecurity skills"},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-iot-security-essentials-ise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"EC-Council IoT Security Essentials (I|SE)"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=17504"}],"version-history":[{"count":32,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17504\/revisions"}],"predecessor-version":[{"id":21855,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17504\/revisions\/21855"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/17518"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=17504"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=17504"},{"taxonomy":"accesibilite","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=17504"},{"taxonomy":"certification","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=17504"},{"taxonomy":"duree","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=17504"},{"taxonomy":"examen","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=17504"},{"taxonomy":"langue","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=17504"},{"taxonomy":"niveau","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=17504"},{"taxonomy":"formateur","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=17504"},{"taxonomy":"cpf","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/cpf?post=17504"},{"taxonomy":"organismes","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organismes?post=17504"},{"taxonomy":"organisme","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organisme?post=17504"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=17504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}