{"id":46,"date":"2025-12-19T08:48:03","date_gmt":"2025-12-19T08:48:03","guid":{"rendered":"https:\/\/hellogrowing.com\/ranchi\/cyber-security-course\/"},"modified":"2026-05-05T07:38:56","modified_gmt":"2026-05-05T07:38:56","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/hellogrowing.com\/ranchi\/cybersecurity\/","title":{"rendered":"CYBER SECURITY"},"content":{"rendered":"\n<div class=\"wp-block-uagb-image uagb-block-1d0a1309 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-5-2026-01_04_31-PM.png ,https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-5-2026-01_04_31-PM.png 780w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-5-2026-01_04_31-PM.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-5-2026-01_04_31-PM.png\" alt=\"\" class=\"uag-image-1892\" width=\"1654\" height=\"951\" title=\"ChatGPT Image May 5, 2026, 01_04_31 PM\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-d2c04538 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:30%\"><\/div>\n\n\n\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background:linear-gradient(174deg,rgb(138,68,113) 0%,rgb(63,11,44) 50%);padding-right:var(--wp--preset--spacing--xx-small);padding-left:var(--wp--preset--spacing--xx-small);flex-basis:50%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-89fde3e1 wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--x-small);padding-bottom:var(--wp--preset--spacing--x-small)\">\n<div class=\"wp-block-column is-vertically-aligned-top has-small-font-size is-layout-flow wp-container-core-column-is-layout-3d91582b wp-block-column-is-layout-flow\" style=\"padding-top:0;padding-right:0;padding-left:0;flex-basis:90%\">\n<h2 class=\"wp-block-heading has-accent-text-color has-text-color has-link-color has-heading-font-family has-medium-font-size wp-elements-c6755bf10991bcad40669b2ac4549d1e\" style=\"margin-top:var(--wp--preset--spacing--xx-small);margin-left:var(--wp--preset--spacing--xx-small)\">Turn Your Passion Into a Career In Cyber Security<\/h2>\n\n\n\n<div class=\"wp-block-group is-content-justification-left is-nowrap is-layout-flex wp-container-core-group-is-layout-b502528a wp-block-group-is-layout-flex\" style=\"padding-right:0;padding-left:0\">\n<p class=\"has-accent-color has-text-color has-link-color has-large-font-size wp-elements-13f7724abefde5bc53cde22cf05c70f2\" style=\"margin-top:0;margin-left:var(--wp--preset--spacing--xx-small)\"><strong><a href=\"https:\/\/hellogrowing.com\/ranchi\/admission\/\" data-type=\"page\" data-id=\"41\">Apply Now \u2192<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:30%\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-fc237e5a wp-block-columns-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--medium);padding-right:var(--wp--preset--spacing--x-small);padding-bottom:var(--wp--preset--spacing--medium);padding-left:var(--wp--preset--spacing--x-small)\">\n<div class=\"wp-block-column has-accent-text-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-style-default is-layout-flex wp-container-core-columns-is-layout-0bc7c636 wp-block-columns-is-layout-flex\" style=\"border-style:none;border-width:0px;border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-left-radius:0px;border-bottom-right-radius:0px;margin-top:0;margin-bottom:0;padding-right:var(--wp--preset--spacing--x-small);padding-left:var(--wp--preset--spacing--x-small)\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-text-align-left has-small-font-size\">Cyber security has become one of the fastest-growing fields as organizations increasingly depend on digital systems and online infrastructure. Businesses, governments, and technology companies require skilled professionals who can protect networks, systems, and sensitive information from cyber threats.<\/p>\n\n\n\n<p class=\"has-small-font-size\">At HelloGrowing, our Cyber Security course in Ranchi is designed to provide practical training in ethical hacking, network security, threat detection, and security operations. Through hands-on labs, real-world simulations, and industry tools, students gain the skills needed to start a successful career in cyber security.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-353c4f5a wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-accent-text-background-color has-background is-layout-flow wp-container-core-column-is-layout-14803bfb wp-block-column-is-layout-flow\" style=\"padding-top:var(--wp--preset--spacing--xx-small);padding-right:var(--wp--preset--spacing--x-small);padding-bottom:var(--wp--preset--spacing--xx-small);padding-left:var(--wp--preset--spacing--x-small)\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-center has-accent-color has-text-color has-link-color has-space-grotesk-font-family wp-elements-988b91f96b084d676e0625ebf449382e\" style=\"margin-bottom:var(--wp--preset--spacing--x-small);font-style:normal;font-weight:500\"><strong>Why Choose HelloGrowing For Cyber Security?<\/strong><\/h3>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-small-font-size\">Choosing the right cyber security training program is important for developing practical skills and understanding real-world security challenges. Our course focuses on hands-on learning and industry-ready knowledge.<\/p>\n\n\n\n<p class=\"has-large-font-size\">Here\u2019s what makes our CyberSecurity training stand out :<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h6 class=\"wp-block-heading has-text-color has-link-color wp-elements-74c3ee1fca8d37e6f67539836cb11bd3\" style=\"color:#350628\"><strong>Industry-Oriented Curriculum<\/strong><\/h6>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-small-font-size\">Our curriculum is aligned with modern cyber security practices, covering ethical hacking, network security, penetration testing, vulnerability assessment, and security monitoring used by professionals in real organizations.<\/p>\n\n\n\n<h6 class=\"wp-block-heading has-text-color has-link-color wp-elements-61e780ddad57470a896ec1967141da91\" style=\"color:#350628\"><strong>Hands-On Lab Training<\/strong><\/h6>\n\n\n\n<p class=\"has-small-font-size\">Students practice cyber security techniques through simulated attack environments and security labs where they learn to identify vulnerabilities, analyze threats, and protect systems.<\/p>\n\n\n\n<h6 class=\"wp-block-heading has-text-color has-link-color wp-elements-0cbfae76e9d7dc7de12ac123f32f0a20\" style=\"color:#350628\"><strong>Expert Mentorship<\/strong><\/h6>\n\n\n\n<p class=\"has-small-font-size\">Learn from mentors with practical industry experience who understand real cyber security threats, security frameworks, and how organizations implement defense strategies.<\/p>\n\n\n\n<h6 class=\"wp-block-heading has-text-color has-link-color wp-elements-f412026708e680dfcfa162b76b4c3604\" style=\"color:#350628\"><strong>Offline Classroom Learning<\/strong><\/h6>\n\n\n\n<p class=\"has-small-font-size\">Benefit from direct instructor interaction, structured learning sessions, and collaborative lab exercises in a focused classroom environment.<\/p>\n\n\n\n<h6 class=\"wp-block-heading has-text-color has-link-color wp-elements-aead0ef9b12e25ee702e8d470b17cc13\" style=\"color:#350628\"><strong>Placement &amp; Career Support<\/strong><\/h6>\n\n\n\n<p class=\"has-small-font-size\">We provide career guidance including resume preparation, interview training, and placement assistance to help students secure cyber security job opportunities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-accent-color has-text-color has-link-color has-space-grotesk-font-family wp-elements-98e6aad48d1209c7d0e7406061e84743\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--small);font-style:normal;font-weight:500\"><strong>What you\u2019ll learn<\/strong><\/h3>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:var(--wp--preset--spacing--x-small);padding-bottom:var(--wp--preset--spacing--small);flex-basis:60%\">\t\t\t\t\t\t<style>\r\n\t\t\t\t<style>\r\n#wpsm_accordion_1573 .wpsm_panel-heading{\r\n\tpadding:0px !important;\r\n}\r\n#wpsm_accordion_1573 .wpsm_panel-title {\r\n\tmargin:0px !important; \r\n\ttext-transform:none !important;\r\n\tline-height: 1 !important;\r\n}\r\n#wpsm_accordion_1573 .wpsm_panel-title a{\r\n\ttext-decoration:none;\r\n\toverflow:hidden;\r\n\tdisplay:block;\r\n\tpadding:0px;\r\n\tfont-size: 18px !important;\r\n\tfont-family: 0 !important;\r\n\tcolor:#490037 !important;\r\n\tborder-bottom:0px !important;\r\n}\r\n\r\n#wpsm_accordion_1573 .wpsm_panel-title a:focus {\r\noutline: 0px !important;\r\n}\r\n\r\n#wpsm_accordion_1573 .wpsm_panel-title a:hover, #wpsm_accordion_1573 .wpsm_panel-title a:focus {\r\n\tcolor:#490037 !important;\r\n}\r\n#wpsm_accordion_1573 .acc-a{\r\n\tcolor: #490037 !important;\r\n\tbackground-color:#ffffff !important;\r\n\tborder-color: #ddd;\r\n}\r\n#wpsm_accordion_1573 .wpsm_panel-default > .wpsm_panel-heading{\r\n\tcolor: #490037 !important;\r\n\tbackground-color: #ffffff !important;\r\n\tborder-color: #ffffff !important;\r\n\tborder-top-left-radius: 0px;\r\n\tborder-top-right-radius: 0px;\r\n}\r\n#wpsm_accordion_1573 .wpsm_panel-default {\r\n\t\tborder:1px solid transparent !important;\r\n\t}\r\n#wpsm_accordion_1573 {\r\n\tmargin-bottom: 20px;\r\n\toverflow: hidden;\r\n\tfloat: none;\r\n\twidth: 100%;\r\n\tdisplay: block;\r\n}\r\n#wpsm_accordion_1573 .ac_title_class{\r\n\tdisplay: block;\r\n\tpadding-top: 12px;\r\n\tpadding-bottom: 12px;\r\n\tpadding-left: 15px;\r\n\tpadding-right: 15px;\r\n}\r\n#wpsm_accordion_1573  .wpsm_panel {\r\n\toverflow:hidden;\r\n\t-webkit-box-shadow: 0 0px 0px rgba(0, 0, 0, .05);\r\n\tbox-shadow: 0 0px 0px rgba(0, 0, 0, .05);\r\n\t\tborder-radius: 4px;\r\n\t}\r\n#wpsm_accordion_1573  .wpsm_panel + .wpsm_panel {\r\n\t\tmargin-top: 5px;\r\n\t}\r\n#wpsm_accordion_1573  .wpsm_panel-body{\r\n\tbackground-color:#ffffff !important;\r\n\tcolor:#282827 !important;\r\n\tborder-top-color: #ffffff !important;\r\n\tfont-size:16px !important;\r\n\tfont-family: 0 !important;\r\n\toverflow: hidden;\r\n\t\tborder: 2px solid transparent !important;\r\n\t}\r\n\r\n#wpsm_accordion_1573 .ac_open_cl_icon{\r\n\tbackground-color:#ffffff !important;\r\n\tcolor: #490037 !important;\r\n\tfloat:right !important;\r\n\tpadding-top: 12px !important;\r\n\tpadding-bottom: 12px !important;\r\n\tline-height: 1.0 !important;\r\n\tpadding-left: 15px !important;\r\n\tpadding-right: 15px !important;\r\n\tdisplay: inline-block !important;\r\n}\r\n\r\n\t\t\t\r\n\t\t\t<\/style>\t\r\n\t\t\t<\/style>\r\n\t\t\t<div class=\"wpsm_panel-group\" id=\"wpsm_accordion_1573\" >\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<!-- Inner panel Start -->\r\n\t\t\t\t\t<div class=\"wpsm_panel wpsm_panel-default\">\r\n\t\t\t\t\t\t<div class=\"wpsm_panel-heading\" role=\"tab\" >\r\n\t\t\t\t\t\t  <h4 class=\"wpsm_panel-title\">\r\n\t\t\t\t\t\t\t<a  class=\"\"  data-toggle=\"collapse\" data-parent=\"#wpsm_accordion_1573 \" href=\"javascript:void(0)\" data-target=\"#ac_1573_collapse1\" onclick=\"do_resize()\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"ac_open_cl_icon fa fa-minus\"><\/span>\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t \r\n\t\t\t\t\t\t\t\t<span class=\"ac_title_class\">\r\n\t\t\t\t\t\t\t\t\t1. Introduction to Cyber Security\t\t\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t  <\/h4>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"ac_1573_collapse1\" class=\"wpsm_panel-collapse collapse in\"  >\r\n\t\t\t\t\t\t  <div class=\"wpsm_panel-body\">\r\n\t\t\t\t\t\t\tUnderstand the fundamentals of cyber security, security principles, types of cyber attacks, and how organizations protect their digital infrastructure.\t\t\t\t\t\t  <\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<!-- Inner panel End -->\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<!-- Inner panel Start -->\r\n\t\t\t\t\t<div class=\"wpsm_panel wpsm_panel-default\">\r\n\t\t\t\t\t\t<div class=\"wpsm_panel-heading\" role=\"tab\" >\r\n\t\t\t\t\t\t  <h4 class=\"wpsm_panel-title\">\r\n\t\t\t\t\t\t\t<a  class=\"collapsed\"  data-toggle=\"collapse\" data-parent=\"#wpsm_accordion_1573 \" href=\"javascript:void(0)\" data-target=\"#ac_1573_collapse2\" onclick=\"do_resize()\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"ac_open_cl_icon fa fa-plus\"><\/span>\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t \r\n\t\t\t\t\t\t\t\t<span class=\"ac_title_class\">\r\n\t\t\t\t\t\t\t\t\t2. Networking Fundamentals\t\t\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t  <\/h4>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"ac_1573_collapse2\" class=\"wpsm_panel-collapse collapse \"  >\r\n\t\t\t\t\t\t  <div class=\"wpsm_panel-body\">\r\n\t\t\t\t\t\t\tLearn how computer networks work, including protocols, IP addressing, firewalls, and network communication required for security analysis.\t\t\t\t\t\t  <\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<!-- Inner panel End -->\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<!-- Inner panel Start -->\r\n\t\t\t\t\t<div class=\"wpsm_panel wpsm_panel-default\">\r\n\t\t\t\t\t\t<div class=\"wpsm_panel-heading\" role=\"tab\" >\r\n\t\t\t\t\t\t  <h4 class=\"wpsm_panel-title\">\r\n\t\t\t\t\t\t\t<a  class=\"collapsed\"  data-toggle=\"collapse\" data-parent=\"#wpsm_accordion_1573 \" href=\"javascript:void(0)\" data-target=\"#ac_1573_collapse3\" onclick=\"do_resize()\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"ac_open_cl_icon fa fa-plus\"><\/span>\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t \r\n\t\t\t\t\t\t\t\t<span class=\"ac_title_class\">\r\n\t\t\t\t\t\t\t\t\t3. Ethical Hacking Basics\t\t\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t  <\/h4>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"ac_1573_collapse3\" class=\"wpsm_panel-collapse collapse \"  >\r\n\t\t\t\t\t\t  <div class=\"wpsm_panel-body\">\r\n\t\t\t\t\t\t\tUnderstand ethical hacking techniques used to identify system vulnerabilities and strengthen security defenses.\t\t\t\t\t\t  <\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<!-- Inner panel End -->\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<!-- Inner panel Start -->\r\n\t\t\t\t\t<div class=\"wpsm_panel wpsm_panel-default\">\r\n\t\t\t\t\t\t<div class=\"wpsm_panel-heading\" role=\"tab\" >\r\n\t\t\t\t\t\t  <h4 class=\"wpsm_panel-title\">\r\n\t\t\t\t\t\t\t<a  class=\"collapsed\"  data-toggle=\"collapse\" data-parent=\"#wpsm_accordion_1573 \" href=\"javascript:void(0)\" data-target=\"#ac_1573_collapse4\" onclick=\"do_resize()\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"ac_open_cl_icon fa fa-plus\"><\/span>\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t \r\n\t\t\t\t\t\t\t\t<span class=\"ac_title_class\">\r\n\t\t\t\t\t\t\t\t\t4. Vulnerability Assessment\t\t\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t  <\/h4>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"ac_1573_collapse4\" class=\"wpsm_panel-collapse collapse \"  >\r\n\t\t\t\t\t\t  <div class=\"wpsm_panel-body\">\r\n\t\t\t\t\t\t\tLearn how to identify and analyze system vulnerabilities using industry tools and security scanning techniques.\t\t\t\t\t\t  <\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<!-- Inner panel End -->\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<!-- Inner panel Start -->\r\n\t\t\t\t\t<div class=\"wpsm_panel wpsm_panel-default\">\r\n\t\t\t\t\t\t<div class=\"wpsm_panel-heading\" role=\"tab\" >\r\n\t\t\t\t\t\t  <h4 class=\"wpsm_panel-title\">\r\n\t\t\t\t\t\t\t<a  class=\"collapsed\"  data-toggle=\"collapse\" data-parent=\"#wpsm_accordion_1573 \" href=\"javascript:void(0)\" data-target=\"#ac_1573_collapse5\" onclick=\"do_resize()\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"ac_open_cl_icon fa fa-plus\"><\/span>\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t \r\n\t\t\t\t\t\t\t\t<span class=\"ac_title_class\">\r\n\t\t\t\t\t\t\t\t\t5. Penetration Testing\t\t\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t  <\/h4>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"ac_1573_collapse5\" class=\"wpsm_panel-collapse collapse \"  >\r\n\t\t\t\t\t\t  <div class=\"wpsm_panel-body\">\r\n\t\t\t\t\t\t\tPerform simulated cyber attacks on systems to discover security weaknesses and understand how attackers exploit vulnerabilities.\t\t\t\t\t\t  <\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<!-- Inner panel End -->\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<!-- Inner panel Start -->\r\n\t\t\t\t\t<div class=\"wpsm_panel wpsm_panel-default\">\r\n\t\t\t\t\t\t<div class=\"wpsm_panel-heading\" role=\"tab\" >\r\n\t\t\t\t\t\t  <h4 class=\"wpsm_panel-title\">\r\n\t\t\t\t\t\t\t<a  class=\"collapsed\"  data-toggle=\"collapse\" data-parent=\"#wpsm_accordion_1573 \" href=\"javascript:void(0)\" data-target=\"#ac_1573_collapse6\" onclick=\"do_resize()\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"ac_open_cl_icon fa fa-plus\"><\/span>\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t \r\n\t\t\t\t\t\t\t\t<span class=\"ac_title_class\">\r\n\t\t\t\t\t\t\t\t\t6. Network Security\t\t\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t  <\/h4>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"ac_1573_collapse6\" class=\"wpsm_panel-collapse collapse \"  >\r\n\t\t\t\t\t\t  <div class=\"wpsm_panel-body\">\r\n\t\t\t\t\t\t\tUnderstand firewalls, intrusion detection systems, and security monitoring tools used to protect networks from cyber threats.\t\t\t\t\t\t  <\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<!-- Inner panel End -->\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<!-- Inner panel Start -->\r\n\t\t\t\t\t<div class=\"wpsm_panel wpsm_panel-default\">\r\n\t\t\t\t\t\t<div class=\"wpsm_panel-heading\" role=\"tab\" >\r\n\t\t\t\t\t\t  <h4 class=\"wpsm_panel-title\">\r\n\t\t\t\t\t\t\t<a  class=\"collapsed\"  data-toggle=\"collapse\" data-parent=\"#wpsm_accordion_1573 \" href=\"javascript:void(0)\" data-target=\"#ac_1573_collapse7\" onclick=\"do_resize()\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"ac_open_cl_icon fa fa-plus\"><\/span>\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t \r\n\t\t\t\t\t\t\t\t<span class=\"ac_title_class\">\r\n\t\t\t\t\t\t\t\t\t7. Web Application Security\t\t\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t  <\/h4>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"ac_1573_collapse7\" class=\"wpsm_panel-collapse collapse \"  >\r\n\t\t\t\t\t\t  <div class=\"wpsm_panel-body\">\r\n\t\t\t\t\t\t\tLearn how to identify security risks in web applications including SQL injection, cross-site scripting, and authentication vulnerabilities.\t\t\t\t\t\t  <\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<!-- Inner panel End -->\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<!-- Inner panel Start -->\r\n\t\t\t\t\t<div class=\"wpsm_panel wpsm_panel-default\">\r\n\t\t\t\t\t\t<div class=\"wpsm_panel-heading\" role=\"tab\" >\r\n\t\t\t\t\t\t  <h4 class=\"wpsm_panel-title\">\r\n\t\t\t\t\t\t\t<a  class=\"collapsed\"  data-toggle=\"collapse\" data-parent=\"#wpsm_accordion_1573 \" href=\"javascript:void(0)\" data-target=\"#ac_1573_collapse8\" onclick=\"do_resize()\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"ac_open_cl_icon fa fa-plus\"><\/span>\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t \r\n\t\t\t\t\t\t\t\t<span class=\"ac_title_class\">\r\n\t\t\t\t\t\t\t\t\t8. Security Operations &amp; Monitoring\t\t\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t  <\/h4>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"ac_1573_collapse8\" class=\"wpsm_panel-collapse collapse \"  >\r\n\t\t\t\t\t\t  <div class=\"wpsm_panel-body\">\r\n\t\t\t\t\t\t\tUnderstand how organizations monitor cyber threats, detect suspicious activities, and respond to security incidents.\t\t\t\t\t\t  <\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<!-- Inner panel End -->\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<!-- Inner panel Start -->\r\n\t\t\t\t\t<div class=\"wpsm_panel wpsm_panel-default\">\r\n\t\t\t\t\t\t<div class=\"wpsm_panel-heading\" role=\"tab\" >\r\n\t\t\t\t\t\t  <h4 class=\"wpsm_panel-title\">\r\n\t\t\t\t\t\t\t<a  class=\"collapsed\"  data-toggle=\"collapse\" data-parent=\"#wpsm_accordion_1573 \" href=\"javascript:void(0)\" data-target=\"#ac_1573_collapse9\" onclick=\"do_resize()\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"ac_open_cl_icon fa fa-plus\"><\/span>\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t \r\n\t\t\t\t\t\t\t\t<span class=\"ac_title_class\">\r\n\t\t\t\t\t\t\t\t\t9. Cyber Threat Intelligence\t\t\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t  <\/h4>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"ac_1573_collapse9\" class=\"wpsm_panel-collapse collapse \"  >\r\n\t\t\t\t\t\t  <div class=\"wpsm_panel-body\">\r\n\t\t\t\t\t\t\tLearn how security teams analyze cyber threats, malware behavior, and attacker techniques to improve security defenses.\t\t\t\t\t\t  <\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<!-- Inner panel End -->\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t<!-- Inner panel Start -->\r\n\t\t\t\t\t<div class=\"wpsm_panel wpsm_panel-default\">\r\n\t\t\t\t\t\t<div class=\"wpsm_panel-heading\" role=\"tab\" >\r\n\t\t\t\t\t\t  <h4 class=\"wpsm_panel-title\">\r\n\t\t\t\t\t\t\t<a  class=\"collapsed\"  data-toggle=\"collapse\" data-parent=\"#wpsm_accordion_1573 \" href=\"javascript:void(0)\" data-target=\"#ac_1573_collapse10\" onclick=\"do_resize()\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"ac_open_cl_icon fa fa-plus\"><\/span>\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t \r\n\t\t\t\t\t\t\t\t<span class=\"ac_title_class\">\r\n\t\t\t\t\t\t\t\t\t10. Real-World Cyber Security Projects\t\t\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t  <\/h4>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"ac_1573_collapse10\" class=\"wpsm_panel-collapse collapse \"  >\r\n\t\t\t\t\t\t  <div class=\"wpsm_panel-body\">\r\n\t\t\t\t\t\t\tWork on practical security labs and projects that simulate real cyber attack scenarios and defense strategies.\t\t\t\t\t\t  <\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<!-- Inner panel End -->\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\r\n<script type=\"text\/javascript\">\r\n\t\r\n\t\tfunction do_resize(){\r\n\r\n\t\t\tvar width=jQuery( '.wpsm_panel .wpsm_panel-body iframe' ).width();\r\n\t\t\tvar height=jQuery( '.wpsm_panel .wpsm_panel-body iframe' ).height();\r\n\r\n\t\t\tvar toggleSize = true;\r\n\t\t\tjQuery('iframe').animate({\r\n\t\t\t    width: toggleSize ? width : 640,\r\n\t\t\t    height: toggleSize ? height : 360\r\n\t\t\t  }, 250);\r\n\r\n\t\t\t  toggleSize = !toggleSize;\r\n\t\t}\r\n\t\t\r\n<\/script>\t\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\">\n<figure class=\"wp-block-image aligncenter size-large uicore-animate-scroll\" style=\"margin-top:var(--wp--preset--spacing--large);margin-right:0;margin-left:0\"><img fetchpriority=\"high\" decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-Mar-9-2026-08_19_35-PM-683x1024.png\" alt=\"\" class=\"wp-image-1576\" srcset=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-Mar-9-2026-08_19_35-PM-683x1024.png 683w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-Mar-9-2026-08_19_35-PM-200x300.png 200w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-Mar-9-2026-08_19_35-PM-768x1152.png 768w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-Mar-9-2026-08_19_35-PM.png 1024w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-accent-color has-text-color has-link-color has-space-grotesk-font-family wp-elements-ac63a5c0bb174e3692c7db14bfd97b92\" style=\"padding-top:var(--wp--preset--spacing--medium);padding-bottom:var(--wp--preset--spacing--small);font-style:normal;font-weight:500\"><strong>Build with the Best Tools<\/strong><\/h3>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-cabd6cf5 wp-block-columns-is-layout-flex\" style=\"padding-right:var(--wp--preset--spacing--x-large);padding-left:var(--wp--preset--spacing--x-large)\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full\" style=\"margin-top:var(--wp--preset--spacing--xx-small)\"><img decoding=\"async\" width=\"204\" height=\"40\" src=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/Burpsuite.png\" alt=\"\" class=\"wp-image-1585\" srcset=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/Burpsuite.png 204w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/Burpsuite-200x40.png 200w\" sizes=\"(max-width: 204px) 100vw, 204px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full\" style=\"margin-top:var(--wp--preset--spacing--xx-small);margin-bottom:0\"><img decoding=\"async\" width=\"2000\" height=\"446\" src=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/Metasploit_logo_and_wordmark.png\" alt=\"\" class=\"wp-image-1586\" srcset=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/Metasploit_logo_and_wordmark.png 2000w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/Metasploit_logo_and_wordmark-300x67.png 300w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/Metasploit_logo_and_wordmark-1024x228.png 1024w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/Metasploit_logo_and_wordmark-768x171.png 768w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/Metasploit_logo_and_wordmark-1536x343.png 1536w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:0;padding-bottom:0\">\n<figure class=\"wp-block-image aligncenter size-full\" style=\"margin-top:var(--wp--preset--spacing--xx-small);margin-bottom:0\"><img loading=\"lazy\" decoding=\"async\" width=\"2400\" height=\"585\" src=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/virtualbox-logo-png-transparent.png\" alt=\"\" class=\"wp-image-1587\" srcset=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/virtualbox-logo-png-transparent.png 2400w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/virtualbox-logo-png-transparent-300x73.png 300w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/virtualbox-logo-png-transparent-1024x250.png 1024w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/virtualbox-logo-png-transparent-768x187.png 768w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/virtualbox-logo-png-transparent-1536x374.png 1536w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/virtualbox-logo-png-transparent-2048x499.png 2048w\" sizes=\"(max-width: 2400px) 100vw, 2400px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\" style=\"margin-top:0\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"203\" src=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/72d1f12edf758d24f5b6db73bac4f297-linux-logo.jpg\" alt=\"\" class=\"wp-image-1588\" srcset=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/72d1f12edf758d24f5b6db73bac4f297-linux-logo.jpg 500w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/72d1f12edf758d24f5b6db73bac4f297-linux-logo-300x122.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full\" style=\"margin-top:0;margin-bottom:0\"><img loading=\"lazy\" decoding=\"async\" width=\"2400\" height=\"662\" src=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/wireshark-logo-png-transparent.png\" alt=\"\" class=\"wp-image-1589\" srcset=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/wireshark-logo-png-transparent.png 2400w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/wireshark-logo-png-transparent-300x83.png 300w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/wireshark-logo-png-transparent-1024x282.png 1024w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/wireshark-logo-png-transparent-768x212.png 768w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/wireshark-logo-png-transparent-1536x424.png 1536w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/wireshark-logo-png-transparent-2048x565.png 2048w\" sizes=\"(max-width: 2400px) 100vw, 2400px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-3922f238 wp-block-columns-is-layout-flex\" style=\"padding-right:var(--wp--preset--spacing--x-large);padding-left:var(--wp--preset--spacing--x-large)\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\" style=\"margin-top:0;margin-bottom:0\"><img loading=\"lazy\" decoding=\"async\" width=\"336\" height=\"180\" src=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/Logo_nmap.png\" alt=\"\" class=\"wp-image-1581\" srcset=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/Logo_nmap.png 336w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/Logo_nmap-300x161.png 300w\" sizes=\"(max-width: 336px) 100vw, 336px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\" style=\"margin-top:0\"><img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"645\" src=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/lg-684b47b1684e8-Kali-Linux.jpg\" alt=\"\" class=\"wp-image-1582\" style=\"aspect-ratio:0.8119885997977383;width:80px;height:auto\" srcset=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/lg-684b47b1684e8-Kali-Linux.jpg 480w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/lg-684b47b1684e8-Kali-Linux-223x300.jpg 223w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\" style=\"margin-top:0\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/02\/Python-logo-notext.svg_-scaled.png\" alt=\"\" class=\"wp-image-1359\" style=\"width:94px;height:auto\" srcset=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/02\/Python-logo-notext.svg_-scaled.png 2560w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/02\/Python-logo-notext.svg_-300x300.png 300w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/02\/Python-logo-notext.svg_-1024x1024.png 1024w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/02\/Python-logo-notext.svg_-150x150.png 150w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/02\/Python-logo-notext.svg_-768x768.png 768w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/02\/Python-logo-notext.svg_-120x120.png 120w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/02\/Python-logo-notext.svg_-1536x1536.png 1536w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/02\/Python-logo-notext.svg_-2048x2048.png 2048w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/02\/Python-logo-notext.svg_-100x100.png 100w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/02\/Python-logo-notext.svg_-200x200.png 200w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/02\/Python-logo-notext.svg_-400x400.png 400w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/02\/Python-logo-notext.svg_-500x500.png 500w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:0;padding-bottom:0\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\" style=\"margin-top:0\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"495\" src=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/17363626.png\" alt=\"\" class=\"wp-image-1583\" style=\"aspect-ratio:0.8625842367418693;width:78px;height:auto\" srcset=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/17363626.png 512w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/17363626-300x290.png 300w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\" style=\"margin-top:0;margin-left:0\"><img loading=\"lazy\" decoding=\"async\" width=\"1136\" height=\"1082\" src=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/OWASP_ZAP_logo.png\" alt=\"\" class=\"wp-image-1584\" style=\"aspect-ratio:1.0500410172272354;width:95px;height:auto\" srcset=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/OWASP_ZAP_logo.png 1136w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/OWASP_ZAP_logo-300x286.png 300w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/OWASP_ZAP_logo-1024x975.png 1024w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/OWASP_ZAP_logo-768x731.png 768w\" sizes=\"(max-width: 1136px) 100vw, 1136px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-accent-color has-text-color has-link-color wp-elements-be7ca6faa818957d7930eb8f5f381596\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--small);font-style:normal;font-weight:500\"><strong>Highlights Of The Cyber Security Course<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-Mar-9-2026-08_52_03-PM-1024x683.png\" alt=\"\" class=\"wp-image-1578\" style=\"width:918px;height:auto\" srcset=\"https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-Mar-9-2026-08_52_03-PM-1024x683.png 1024w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-Mar-9-2026-08_52_03-PM-300x200.png 300w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-Mar-9-2026-08_52_03-PM-768x512.png 768w, https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2026\/03\/ChatGPT-Image-Mar-9-2026-08_52_03-PM.png 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-accent-color has-text-color has-link-color wp-elements-73b78b43d05080d8dc8b48302194b262\" style=\"margin-top:var(--wp--preset--spacing--large);margin-bottom:var(--wp--preset--spacing--small);font-style:normal;font-weight:500\"><strong>Course overview<\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-center has-hover-color has-text-color has-link-color has-small-font-size wp-elements-ac76e4cff494f59cb984a023df9c5a51\">This Cyber Security course is designed for beginners and professionals who want<br>to build real world design skills with hands on offline training.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\" style=\"font-size:13px\"><table class=\"has-neutral-background-color has-text-color has-background has-link-color has-fixed-layout\" style=\"color:#5b0643;border-width:2px\"><thead><tr><th>Course Name<\/th><th>About Course<\/th><th>Duration<\/th><th>Mode<\/th><th>Eligibility <\/th><\/tr><\/thead><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-regular has-space-grotesk-font-family\" style=\"font-size:14px\"><table class=\"has-secondary-color has-text-color has-link-color has-fixed-layout\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Cyber Security (Foundation Program)<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Learn networking, ethical hacking basics, vulnerability scanning and cyber defense techniques<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>6 Month<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Offline<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>10+2 \/Diploma \/ PUC\/ Bachelor&#8217;s Degree or Any Stream<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Cyber Security (Advanced Program)<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Advanced penetration testing, web security, threat intelligence and security monitoring<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>12 Month<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Offline<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>10+2 \/Diploma \/ PUC\/ Bachelor&#8217;s Degree or Any Stream<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Turn Your Passion Into a Career In Cyber Security Apply Now \u2192 Cyber security has become one of the fastest-growing fields as organizations increasingly depend on digital systems and online infrastructure. Businesses, governments, and technology companies require skilled professionals who can protect networks, systems, and sensitive information from cyber threats. At HelloGrowing, our Cyber Security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1317,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_eb_attr":"","_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-46","page","type-page","status-publish","has-post-thumbnail","hentry"],"_hostinger_reach_plugin_has_subscription_block":false,"_hostinger_reach_plugin_is_elementor":false,"uagb_featured_image_src":{"full":["https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2025\/12\/CYBER.jpg",1524,1036,false],"thumbnail":["https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2025\/12\/CYBER-150x150.jpg",150,150,true],"medium":["https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2025\/12\/CYBER-300x204.jpg",300,204,true],"medium_large":["https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2025\/12\/CYBER-768x522.jpg",768,522,true],"large":["https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2025\/12\/CYBER-1024x696.jpg",1024,696,true],"tf-client-image-size":["https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2025\/12\/CYBER-120x120.jpg",120,120,true],"1536x1536":["https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2025\/12\/CYBER.jpg",1524,1036,false],"2048x2048":["https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2025\/12\/CYBER.jpg",1524,1036,false],"_nx_notification_thumb_100_100":["https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2025\/12\/CYBER-100x100.jpg",100,100,true],"_nx_notification_thumb_200_200":["https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2025\/12\/CYBER-200x200.jpg",200,200,true],"_nx_notification_thumb_300_300":["https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2025\/12\/CYBER-300x300.jpg",300,300,true],"_nx_notification_thumb_400_400":["https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2025\/12\/CYBER-400x400.jpg",400,400,true],"_nx_notification_thumb_500_500":["https:\/\/hellogrowing.com\/ranchi\/wp-content\/uploads\/2025\/12\/CYBER-500x500.jpg",500,500,true]},"uagb_author_info":{"display_name":"info.hello.growing","author_link":"https:\/\/hellogrowing.com\/ranchi\/author\/info-hello-growing\/"},"uagb_comment_info":0,"uagb_excerpt":"Turn Your Passion Into a Career In Cyber Security Apply Now \u2192 Cyber security has become one of the fastest-growing fields as organizations increasingly depend on digital systems and online infrastructure. Businesses, governments, and technology companies require skilled professionals who can protect networks, systems, and sensitive information from cyber threats. At HelloGrowing, our Cyber Security&hellip;","_links":{"self":[{"href":"https:\/\/hellogrowing.com\/ranchi\/wp-json\/wp\/v2\/pages\/46","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hellogrowing.com\/ranchi\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hellogrowing.com\/ranchi\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hellogrowing.com\/ranchi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hellogrowing.com\/ranchi\/wp-json\/wp\/v2\/comments?post=46"}],"version-history":[{"count":18,"href":"https:\/\/hellogrowing.com\/ranchi\/wp-json\/wp\/v2\/pages\/46\/revisions"}],"predecessor-version":[{"id":1893,"href":"https:\/\/hellogrowing.com\/ranchi\/wp-json\/wp\/v2\/pages\/46\/revisions\/1893"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hellogrowing.com\/ranchi\/wp-json\/wp\/v2\/media\/1317"}],"wp:attachment":[{"href":"https:\/\/hellogrowing.com\/ranchi\/wp-json\/wp\/v2\/media?parent=46"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}