{"id":369,"date":"2020-05-17T12:56:10","date_gmt":"2020-05-17T07:26:10","guid":{"rendered":"http:\/\/www.cyberlawcollege.com\/wp\/?p=369"},"modified":"2020-05-17T12:56:10","modified_gmt":"2020-05-17T07:26:10","slug":"courses-on-ita-2000-would-be-back","status":"publish","type":"post","link":"http:\/\/www.cyberlawcollege.com\/wp\/?p=369","title":{"rendered":"Courses on ITA 2000 would be back"},"content":{"rendered":"<div class=\"pf-content\"><p>It is intended\u00a0 that two programs on ITA 2000 would be conducted by Cyber Law College during the next few weeks.<\/p>\n<p>First program may be exclusive for a group of IT and IS professionals. The second would be open for public.<\/p>\n<p>Watch out for details.<\/p>\n<p>Naavi<\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_toolbar\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"http:\/\/static.hupso.com\/share\/buttons\/share-medium.png\" style=\"border:0px; padding-top:5px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_t=new Array(\"Twitter\",\"Facebook\",\"Google Plus\",\"Pinterest\",\"Linkedin\");var hupso_background_t=\"#EAF4FF\";var hupso_border_t=\"#66CCFF\";var hupso_toolbar_size_t=\"medium\";var hupso_twitter_via = \"naavi\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"naavi\";var hupso_url_t=\"\";var hupso_title_t=\"Courses on ITA 2000 would be back\";<\/script><script type=\"text\/javascript\" src=\"http:\/\/static.hupso.com\/share\/js\/share_toolbar.js\"><\/script><!-- Hupso Share Buttons --><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>It is intended\u00a0 that two programs on ITA 2000 would be conducted by Cyber Law College during the next few weeks. First program may be exclusive for a group of IT and IS professionals. The second would be open for &hellip; <a href=\"http:\/\/www.cyberlawcollege.com\/wp\/?p=369\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_toolbar\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"http:\/\/static.hupso.com\/share\/buttons\/share-medium.png\" style=\"border:0px; padding-top:5px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_t=new Array(\"Twitter\",\"Facebook\",\"Google Plus\",\"Pinterest\",\"Linkedin\");var hupso_background_t=\"#EAF4FF\";var hupso_border_t=\"#66CCFF\";var hupso_toolbar_size_t=\"medium\";var hupso_twitter_via = \"naavi\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"naavi\";var hupso_url_t=\"\";var hupso_title_t=\"Courses on ITA 2000 would be back\";<\/script><script type=\"text\/javascript\" src=\"http:\/\/static.hupso.com\/share\/js\/share_toolbar.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_themeisle_gutenberg_block_has_review":false,"spay_email":"","jetpack_publicize_message":""},"categories":[1],"tags":[],"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3NjGu-5X","_links":{"self":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/369"}],"collection":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=369"}],"version-history":[{"count":1,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/369\/revisions"}],"predecessor-version":[{"id":370,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/369\/revisions\/370"}],"wp:attachment":[{"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=369"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.cyberlawcollege.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}