{"id":55,"date":"2012-12-21T15:43:13","date_gmt":"2012-12-21T10:13:13","guid":{"rendered":"http:\/\/www.cyberlawcollege.com\/wp\/?page_id=55"},"modified":"2023-02-08T06:47:09","modified_gmt":"2023-02-08T01:17:09","slug":"courses-2","status":"publish","type":"page","link":"http:\/\/www.cyberlawcollege.com\/wp\/?page_id=55","title":{"rendered":"Courses"},"content":{"rendered":"<div class=\"pf-content\"><p align=\"justify\">After starting its activities in 2000 as the first educational venture in virtual mode in India way back in 2000 , Cyber Law College was conducting both online and offline courses in Cyber Laws.<\/p>\n<p align=\"justify\">Since last 3 years, the focus has been mainly on the Data Protection courses.<\/p>\n<p align=\"justify\">Cyber Law College is also a training partner for Foundation of Data Protection Professionals in India (FDPPI) and conducts Certification programs for Indian Data Protection Laws (Module I), on Global Data Protection laws (Module G) and Certified PDP-CMS auditor\/consultant.<\/p>\n<p align=\"justify\">All the programs are available online.<\/p>\n<p align=\"justify\">With the new version of Data Protection Act in the form of draft DPDPB 2022 having been released by the Government, the current versions of the course on Indian Data Protection Law as well as the course on PDP-CMS auditor\/consultant are suitably modified.<\/p>\n<p align=\"justify\">Currently the program on Indian Data Protection law is available in the following link.<\/p>\n<p style=\"text-align: center;\" align=\"justify\"><a href=\"http:\/\/vijayashankarna2268.ongraphy.com\" target=\"_blank\" rel=\"noopener\"><strong>Data Protection Law of India<\/strong><\/a><\/p>\n<p align=\"justify\"><span style=\"color: #000000;\">Since\u00a0 7th November 2014, Cyber Law College had been conducting several training programs on the platform of apnacourse.com. However since the platform has stopped its activities, these programs are not available at present.<\/span><\/p>\n<p align=\"justify\">Consequent to the many changes that have been made in the Information Technology Act 2000, a new version of the course on Cyber Laws has also been launched now. This program will continue from the\u00a0 videos recorded about an year back and supplement it with the recent changes. Further, faculty interaction is provided from periodical mentor sessions to ensure that any doubts are clarified.<\/p>\n<p align=\"justify\">To register for these courses, one can <a href=\"http:\/\/www.cyberlawcollege.in\" target=\"_blank\" rel=\"noopener\"><strong>visit here<\/strong><\/a><\/p>\n<div align=\"center\"><\/div>\n<p align=\"center\"><b>For Clarifications if any Contact Naavi through e-mail\u00a0<\/b><\/p>\n<hr width=\"100%\" \/>\n<p><center><span style=\"font-family: 'Comic Sans MS';\">Be in the forefront of Knowledge. Enroll Today<\/span><\/center><\/p>\n<hr width=\"100%\" \/>\n<p>.<\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_toolbar\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"http:\/\/static.hupso.com\/share\/buttons\/share-medium.png\" style=\"border:0px; padding-top:5px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_t=new Array(\"Twitter\",\"Facebook\",\"Google Plus\",\"Pinterest\",\"Linkedin\");var hupso_background_t=\"#EAF4FF\";var hupso_border_t=\"#66CCFF\";var hupso_toolbar_size_t=\"medium\";var hupso_twitter_via = \"naavi\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"naavi\";var hupso_url_t=\"\";var hupso_title_t=\"Courses\";<\/script><script type=\"text\/javascript\" src=\"http:\/\/static.hupso.com\/share\/js\/share_toolbar.js\"><\/script><!-- Hupso Share Buttons --><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>After starting its activities in 2000 as the first educational venture in virtual mode in India way back in 2000 , Cyber Law College was conducting both online and offline courses in Cyber Laws. Since last 3 years, the focus &hellip; <a href=\"http:\/\/www.cyberlawcollege.com\/wp\/?page_id=55\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_toolbar\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"http:\/\/static.hupso.com\/share\/buttons\/share-medium.png\" style=\"border:0px; padding-top:5px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_t=new Array(\"Twitter\",\"Facebook\",\"Google Plus\",\"Pinterest\",\"Linkedin\");var hupso_background_t=\"#EAF4FF\";var hupso_border_t=\"#66CCFF\";var hupso_toolbar_size_t=\"medium\";var hupso_twitter_via = \"naavi\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"naavi\";var hupso_url_t=\"\";var hupso_title_t=\"Courses\";<\/script><script type=\"text\/javascript\" src=\"http:\/\/static.hupso.com\/share\/js\/share_toolbar.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_themeisle_gutenberg_block_has_review":false,"spay_email":""},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P3NjGu-T","_links":{"self":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/pages\/55"}],"collection":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=55"}],"version-history":[{"count":33,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/pages\/55\/revisions"}],"predecessor-version":[{"id":494,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/pages\/55\/revisions\/494"}],"wp:attachment":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=55"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}