{"id":48,"date":"2025-05-19T09:29:41","date_gmt":"2025-05-19T09:29:41","guid":{"rendered":"https:\/\/akemi.edu.in\/cyberanddigitalscience\/?page_id=48"},"modified":"2025-06-02T05:49:24","modified_gmt":"2025-06-02T05:49:24","slug":"courses","status":"publish","type":"page","link":"https:\/\/akemi.edu.in\/cyberanddigitalscience\/courses\/","title":{"rendered":"Courses"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"48\" class=\"elementor elementor-48\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb1ee5f e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ee5f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5e7f57e e-con-full e-flex e-con e-child\" data-id=\"5e7f57e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-109b910 elementor-widget elementor-widget-heading\" data-id=\"109b910\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Courses<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-108954f e-flex e-con-boxed e-con e-parent\" data-id=\"108954f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ee302e elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"2ee302e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cometdigitalindia.in\/akemibusinessschool\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Home<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Courses<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1dc8f41 e-flex e-con-boxed e-con e-parent\" data-id=\"1dc8f41\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6413b88 e-flex e-con-boxed e-con e-child\" data-id=\"6413b88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a60a95b e-con-full e-flex e-con e-child\" data-id=\"a60a95b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c3a444 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7c3a444\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInRight&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Specialization Courses <span style=\"color: #0188AE\">B.Sc. Cyber &amp; Digital Science\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0808b11 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"0808b11\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>B.Sc. Cyber &amp; Digital Science offers students the opportunity to specialize in various domains within the field of cybersecurity, enabling them to focus on specific areas of interest and expertise. These specializations equip students with specialized knowledge and skills, making them more competitive and sought after in the job market. Here are some of the prominent specializations available in the B.Sc. Cyber &amp; Digital Science course:<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1c88ad e-flex e-con-boxed e-con e-child\" data-id=\"f1c88ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4d0297f e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"4d0297f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;zoomIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c52bb2 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"2c52bb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-center simple-card\" >\n\n                \n                <div class=\"elementskit-box-header image-box-img-center\">\n\n                    <img fetchpriority=\"high\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Network-Security.webp\" class=\"attachment-full size-full wp-image-501\" alt=\"\" srcset=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Network-Security.webp 750w, https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Network-Security-300x200.webp 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\n                <\/div>\n                \n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                        Network Security\n                        \n                    <\/h3>\n                                                            <div class=\"elementskit-box-style-content\">\n                        Focuses on protecting computer networks from unauthorized access, cyber-attacks, and data breaches.\n                    <\/div>\n                                    <\/div>\n\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b5673c6 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"b5673c6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;zoomIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63c0533 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"63c0533\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;_animation_delay&quot;:250}\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-center simple-card\" >\n\n                \n                <div class=\"elementskit-box-header image-box-img-center\">\n\n                    <img decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Digital-Forensics.webp\" class=\"attachment-full size-full wp-image-504\" alt=\"\" srcset=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Digital-Forensics.webp 750w, https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Digital-Forensics-300x200.webp 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\n                <\/div>\n                \n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                        Digital Forensics\n                        \n                    <\/h3>\n                                                            <div class=\"elementskit-box-style-content\">\n                        Involves the investigation and analysis of digital evidence to uncover cybercrimes and provide legal support.\n                    <\/div>\n                                    <\/div>\n\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-82057ca e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"82057ca\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;zoomIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d8d37a7 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"d8d37a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-center simple-card\" >\n\n                \n                <div class=\"elementskit-box-header image-box-img-center\">\n\n                    <img decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Ethical-Hacking.webp\" class=\"attachment-full size-full wp-image-503\" alt=\"\" srcset=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Ethical-Hacking.webp 750w, https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Ethical-Hacking-300x200.webp 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\n                <\/div>\n                \n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                        Ethical Hacking\n                        \n                    <\/h3>\n                                                            <div class=\"elementskit-box-style-content\">\n                        Teaches students the techniques and tools used by ethical hackers to identify vulnerabilities and strengthen security measures.\n                    <\/div>\n                                    <\/div>\n\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb6b192 e-con-full e-flex e-con e-child\" data-id=\"eb6b192\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ebba9a7 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"ebba9a7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;zoomIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c0de8f8 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"c0de8f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;_animation_delay&quot;:250}\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-center simple-card\" >\n\n                <a href=\"#\">\n                <div class=\"elementskit-box-header image-box-img-center\">\n\n                    <img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Cybersecurity-Management.webp\" class=\"attachment-full size-full wp-image-505\" alt=\"\" srcset=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Cybersecurity-Management.webp 750w, https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Cybersecurity-Management-300x200.webp 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\n                <\/div>\n                <\/a>\n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                        Cybersecurity Management\n                        \n                    <\/h3>\n                                                            <div class=\"elementskit-box-style-content\">\n                        Provides insights into the strategic aspects of cybersecurity, including risk assessment, policy development, and incident response.\n                    <\/div>\n                                    <\/div>\n\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58f19ee e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"58f19ee\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;zoomIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ae5250 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"1ae5250\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-center simple-card\" >\n\n                \n                <div class=\"elementskit-box-header image-box-img-center\">\n\n                    <img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Cloud-Security.webp\" class=\"attachment-full size-full wp-image-506\" alt=\"\" srcset=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Cloud-Security.webp 750w, https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Cloud-Security-300x200.webp 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\n                <\/div>\n                \n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                        Cloud Security\n                        \n                    <\/h3>\n                                                            <div class=\"elementskit-box-style-content\">\n                        Focuses on securing cloud-based infrastructure and data storage solutions.\n                    <\/div>\n                                    <\/div>\n\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d02ae32 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"d02ae32\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;zoomIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d373a23 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"d373a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;_animation_delay&quot;:250}\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-center simple-card\" >\n\n                \n                <div class=\"elementskit-box-header image-box-img-center\">\n\n                    <img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Cryptography.webp\" class=\"attachment-full size-full wp-image-507\" alt=\"\" srcset=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Cryptography.webp 750w, https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Cryptography-300x200.webp 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\n                <\/div>\n                \n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                         Cryptography\n                        \n                    <\/h3>\n                                                            <div class=\"elementskit-box-style-content\">\n                        Deals with the techniques of encoding and decoding information to ensure secure communication.\n                    <\/div>\n                                    <\/div>\n\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-580ccda e-con-full e-flex e-con e-child\" data-id=\"580ccda\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2a7e2ef e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"2a7e2ef\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;zoomIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4714266 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"4714266\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-center simple-card\" >\n\n                \n                <div class=\"elementskit-box-header image-box-img-center\">\n\n                    <img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Cyber-Law-and-Policy.webp\" class=\"attachment-full size-full wp-image-509\" alt=\"\" srcset=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Cyber-Law-and-Policy.webp 750w, https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Cyber-Law-and-Policy-300x200.webp 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\n                <\/div>\n                \n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                        Cyber Law and Policy\n                        \n                    <\/h3>\n                                                            <div class=\"elementskit-box-style-content\">\n                        Explores the legal and regulatory aspects of cybersecurity, including cybercrime laws and data protection policies.\n                    <\/div>\n                                    <\/div>\n\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-84ce63d e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"84ce63d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;zoomIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-854f548 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"854f548\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;_animation_delay&quot;:250}\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-center simple-card\" >\n\n                \n                <div class=\"elementskit-box-header image-box-img-center\">\n\n                    <img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Internet-of-Things-IoT-Security.webp\" class=\"attachment-full size-full wp-image-511\" alt=\"\" srcset=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Internet-of-Things-IoT-Security.webp 750w, https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Internet-of-Things-IoT-Security-300x200.webp 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\n                <\/div>\n                \n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                        Internet of Things Security\n                        \n                    <\/h3>\n                                                            <div class=\"elementskit-box-style-content\">\n                        Specializes in securing connected devices and IoT ecosystems from cyber threats.\n                    <\/div>\n                                    <\/div>\n\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ed715fd e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"ed715fd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;zoomIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73bd503 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"73bd503\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-center simple-card\" >\n\n                \n                <div class=\"elementskit-box-header image-box-img-center\">\n\n                    <img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Mobile-Security.webp\" class=\"attachment-full size-full wp-image-508\" alt=\"\" srcset=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Mobile-Security.webp 750w, https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Mobile-Security-300x200.webp 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\n                <\/div>\n                \n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                        Mobile Security\n                        \n                    <\/h3>\n                                                            <div class=\"elementskit-box-style-content\">\n                        Focuses on protecting mobile devices and applications from cyber-attacks.\n                    <\/div>\n                                    <\/div>\n\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2f7ec03 e-con-full e-flex e-con e-child\" data-id=\"2f7ec03\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-74ff198 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"74ff198\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;zoomIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15f1ba9 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-image-box\" data-id=\"15f1ba9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;_animation_delay&quot;:250}\" data-widget_type=\"elementskit-image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n            <div class=\"elementskit-info-image-box ekit-image-box text-center simple-card\" >\n\n                \n                <div class=\"elementskit-box-header image-box-img-center\">\n\n                    <img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Data-Analytics-for-Cybersecurity.webp\" class=\"attachment-full size-full wp-image-510\" alt=\"\" srcset=\"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Data-Analytics-for-Cybersecurity.webp 750w, https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-content\/uploads\/2025\/05\/Data-Analytics-for-Cybersecurity-300x200.webp 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/>\n                <\/div>\n                \n                <div class=\"elementskit-box-body ekit-image-box-body\">\n                    <div class=\"elementskit-box-content ekit-image-box-body-inner\">\n                                                <h3 class=\"elementskit-info-box-title\">\n\n                        Data Analytics for Cybersecurity\n                        \n                    <\/h3>\n                                                            <div class=\"elementskit-box-style-content\">\n                        Involves using data analytics and machine learning techniques to detect and respond to cyber threats.\n                    <\/div>\n                                    <\/div>\n\n                            <\/div>\n            <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28f44a9 e-con-full e-flex e-con e-child\" data-id=\"28f44a9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8e0a22e e-con-full e-flex e-con e-child\" data-id=\"8e0a22e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Courses Home Courses Specialization Courses B.Sc. Cyber &#038; Digital Science B.Sc. Cyber &amp; Digital Science offers students the opportunity to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-48","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-json\/wp\/v2\/pages\/48","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-json\/wp\/v2\/comments?post=48"}],"version-history":[{"count":124,"href":"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-json\/wp\/v2\/pages\/48\/revisions"}],"predecessor-version":[{"id":1008,"href":"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-json\/wp\/v2\/pages\/48\/revisions\/1008"}],"wp:attachment":[{"href":"https:\/\/akemi.edu.in\/cyberanddigitalscience\/wp-json\/wp\/v2\/media?parent=48"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}