{"id":35653,"date":"2023-12-03T20:27:12","date_gmt":"2023-12-03T14:57:12","guid":{"rendered":"https:\/\/www.collegechalo.com\/news\/?post_type=web-story&#038;p=35653"},"modified":"2023-12-03T20:27:13","modified_gmt":"2023-12-03T14:57:13","slug":"best-cyber-security-courses-after-12th","status":"publish","type":"web-story","link":"https:\/\/www.collegechalo.com\/news-panel\/web-stories\/best-cyber-security-courses-after-12th\/","title":{"rendered":"Best Cyber Security Courses After 12th"},"content":{"rendered":"<div id='div-gpt-ad-1590703159637-0' style='margin: 0 auto;text-align: center;padding: 10px 0 10px 0;'> <script> googletag.cmd.push(function() { googletag.display('div-gpt-ad-1590703159637-0'); googletag.pubads().refresh('div-gpt-ad-1590703159637-0'); }); <\/script> <\/div><p><html amp=\"\" lang=\"en\"><head><meta charSet=\"utf-8\"\/><meta name=\"viewport\" content=\"width=device-width,minimum-scale=1,initial-scale=1\"\/><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0.js\"><\/script><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0\/amp-story-1.0.js\" custom-element=\"amp-story\"><\/script><link href=\"https:\/\/fonts.googleapis.com\/css2?display=swap&amp;family=Roboto%3Awght%40400%3B700&amp;family=Cookie&amp;family=Roboto+Flex\" rel=\"stylesheet\"\/><link href=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses.png\" rel=\"preload\" as=\"image\"\/>\n<style amp-boilerplate=\"\">body{-webkit-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-moz-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-ms-animation:-amp-start 8s steps(1,end) 0s 1 normal both;animation:-amp-start 8s steps(1,end) 0s 1 normal both}@-webkit-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-moz-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-ms-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-o-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}<\/style>\n<p><noscript><\/p>\n<style amp-boilerplate=\"\">body{-webkit-animation:none;-moz-animation:none;-ms-animation:none;animation:none}<\/style>\n<p><\/noscript><\/p>\n<style amp-custom=\"\">\n              h1, h2, h3 { font-weight: normal; }<\/p>\n<p>              amp-story-page {\n                background-color: #131516;\n              }<\/p><div id='div-gpt-ad-1590703132682-0' style='margin: 0 auto;text-align: center;padding: 10px 0 10px 0;'> <script> googletag.cmd.push(function() { googletag.display('div-gpt-ad-1590703132682-0'); googletag.pubads().refresh('div-gpt-ad-1590703132682-0'); }); <\/script> <\/div>\n<p>              amp-story-grid-layer {\n                overflow: visible;\n              }<\/p>\n<p>              @media (max-aspect-ratio: 9 \/ 16)  {\n                @media (min-aspect-ratio: 320 \/ 678) {\n                  amp-story-grid-layer.grid-layer {\n                    margin-top: calc((100% \/ 0.5625 - 100% \/ 0.6666666666666666) \/ 2);\n                  }\n                }\n              }<\/p>\n<p>              @media not all and (min-resolution:.001dpcm) {\n                @media {\n                  p.text-wrapper > span {\n                    font-size: calc(100% - 0.5px);\n                  }\n                }\n              }<\/p>\n<p>              .page-fullbleed-area,\n              .page-background-overlay-area {\n                position: absolute;\n                overflow: hidden;\n                width: 100%;\n                left: 0;\n                height: calc(1.1851851851851851 * 100%);\n                top: calc((1 - 1.1851851851851851) * 100% \/ 2);\n              }<\/p>\n<p>              .element-overlay-area {\n                position: absolute;\n                width: 100%;\n                height: 100%;\n                top: 0;\n                left: 0;\n              }<\/p>\n<p>              .page-safe-area {\n                overflow: visible;\n                position: absolute;\n                top: 0;\n                bottom: 0;\n                left: 0;\n                right: 0;\n                width: 100%;\n                height: calc(0.84375 * 100%);\n                margin: auto 0;\n              }<\/p>\n<p>              .mask {\n                position: absolute;\n                overflow: hidden;\n              }<\/p>\n<p>              .fill {\n                position: absolute;\n                top: 0;\n                left: 0;\n                right: 0;\n                bottom: 0;\n                margin: 0;\n              }<\/p>\n<p>              @media (prefers-reduced-motion: no-preference) {\n                .animation-wrapper {\n                  opacity: var(--initial-opacity);\n                  transform: var(--initial-transform);\n                }\n              }<\/p>\n<p>              amp-story-grid-layer.align-bottom {\n                align-content: end;\n                padding: 0;\n              }<\/p>\n<p>              .captions-area {\n                padding: 0 32px 0;\n              }<\/p>\n<p>              amp-story-captions {\n                margin-bottom: 16px;\n                text-align: center;\n              }<\/p>\n<p>              amp-story-captions span {\n                display: inline-block;\n                margin: 0;\n                padding: 6px 12px;\n                vertical-align: middle;\n                border-radius: 15px;\n                background: rgba(11, 11, 11, 0.6);\n                color: rgba(255, 255, 255, 1);\n                font-family: -apple-system, BlinkMacSystemFont, \"Segoe UI\", Roboto, Oxygen-Sans, Ubuntu, Cantarell, \"Helvetica Neue\", sans-serif;;\n                font-size: calc(4 * var(--story-page-vw));\n                line-height: 1.4;\n                word-break: break-word;\n                word-wrap: break-word;\n                overflow-wrap: break-word;\n              }\n              <\/style>\n<p><meta name=\"web-stories-replace-head-start\"\/><title>Best Cyber Security Courses After 12th <\/title><link rel=\"canonical\" href=\"https:\/\/www.collegechalo.com\/news\/?post_type=web-story&amp;p=35653\"\/><meta name=\"web-stories-replace-head-end\"\/><\/head><body><amp-story standalone=\"\" publisher=\"College Chalo\" publisher-logo-src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png\" title=\"Best Cyber Security Courses After 12th \" poster-portrait-src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2021\/01\/cropped-cyberfea.jpeg\"><amp-story-page id=\"99ecc022-447b-4c0d-8f71-0888b6708046\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#1e2a33\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-b0fed30b-d0ba-40a3-9637-9ecf8d0a52a8\">\n<div style=\"position:absolute;width:275.49858%;height:100%;left:-87.74929%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses.png\" alt=\"Best Cyber Security Courses\" srcSet=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses.png 967w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-768x496.png 768w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-386x249.png 386w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-150x97.png 150w\" sizes=\"(min-width: 1024px) 124vh, 275vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<div class=\"element-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.7) 100%)\"><\/div>\n<\/div>\n<\/div>\n<div class=\"page-background-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.7) 100%)\"><\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.16505%;top:47.73463%;width:77.18447%;height:11.65049%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.628930817610063% 0.628930817610063% 0.628930817610063% 0.628930817610063% \/ 2.7777777777777777% 2.7777777777777777% 2.7777777777777777% 2.7777777777777777%\" id=\"el-a0b95712-f1e5-4ff4-a499-e06c4d242b34\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.13266509433962265% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.485437em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff599\">Best Cyber Security Courses After 12th&nbsp;<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:80.09709%;width:48.54369%;height:4.69256%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:1% 1% 1% 1% \/ 6.896551724137931% 6.896551724137931% 6.896551724137931% 6.896551724137931%\" id=\"el-f3f4a8b7-8b7f-44eb-8212-251dcfbedea8\">\n<h3 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.5914999999999999% 0;font-family:&quot;Cookie&quot;,cursive;font-size:0.420712em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">by Tanu Bhatnagar<\/span><\/span><\/h3>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:0;width:33.98058%;height:6.79612%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-fda38629-b072-48fe-afa1-aaaad12a3a83\"><a href=\"https:\/\/www.collegechalo.com\/news\/\" data-tooltip-icon=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2020\/03\/cropped-favicon-180x180.png\" data-tooltip-text=\"Home - College Chalo\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<div style=\"position:absolute;width:100%;height:111.11105%;left:0%;top:-5.55552%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png\" alt=\"123\"><\/amp-img><\/div>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"3180de20-73af-4789-bf00-854acb90e3d8\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#314a54\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-74c3db34-98a9-4223-a804-1aab6626c10a\">\n<div style=\"position:absolute;width:133.38544%;height:100%;left:-16.69272%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Cyber-Security.jpg\" alt=\"Bca In Cyber Security\" srcSet=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Cyber-Security.jpg 640w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Cyber-Security-471x628.jpg 471w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Cyber-Security-187x249.jpg 187w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Cyber-Security-150x200.jpg 150w\" sizes=\"(min-width: 1024px) 60vh, 133vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<div class=\"element-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.6) 100%)\"><\/div>\n<\/div>\n<\/div>\n<div class=\"page-background-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.6) 100%)\"><\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:6.5534%;top:45.79288%;width:82.52427%;height:10.67961%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.5882352941176471% 0.5882352941176471% 0.5882352941176471% 0.5882352941176471% \/ 3.0303030303030303% 3.0303030303030303% 3.0303030303030303% 3.0303030303030303%\" id=\"el-f9844db5-edcb-4d74-b3b1-bff60af5e65d\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.11580882352941198% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.453074em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff599\">Diploma in Cyber Security (PDCS)&nbsp;<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:7.76699%;top:66.99029%;width:81.31068%;height:21.0356%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.5970149253731344% 0.5970149253731344% 0.5970149253731344% 0.5970149253731344% \/ 1.5384615384615385% 1.5384615384615385% 1.5384615384615385% 1.5384615384615385%\" id=\"el-3cafe999-54c7-40b9-8b0d-317e9bd553c3\">\n<h3 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.0923507462686565% 0;font-family:&quot;Roboto Flex&quot;,sans-serif;font-size:0.355987em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"color: #fff\">Grasp essential knowledge in data security, risk management, and operations security, offering practical insights for real-world application.&nbsp;<\/span><\/span><\/h3>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:0;width:33.98058%;height:6.79612%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-4af54bc4-9696-47e0-b6b9-de0c8b405121\"><a href=\"https:\/\/www.collegechalo.com\/news\/\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<div style=\"position:absolute;width:100%;height:111.11105%;left:0%;top:-5.55552%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png\" alt=\"123\"><\/amp-img><\/div>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"1b131557-10b0-4eba-9545-c69fca95e365\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#271725\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-cd8c1673-235d-4927-b353-d8beb10ff581\">\n<div style=\"position:absolute;width:310.19157%;height:100%;left:-163.42912%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Caltech-Cybersecurity.png\" alt=\"Caltech Cybersecurity\" srcSet=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Caltech-Cybersecurity.png 759w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Caltech-Cybersecurity-434x249.png 434w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Caltech-Cybersecurity-150x86.png 150w\" sizes=\"(min-width: 1024px) 140vh, 310vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<div class=\"element-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.5) 100%)\"><\/div>\n<\/div>\n<\/div>\n<div class=\"page-background-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.5) 100%)\"><\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:5.09709%;top:47.411%;width:89.56311%;height:15.04854%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.5420054200542005% 0.5420054200542005% 0.5420054200542005% 0.5420054200542005% \/ 2.1505376344086025% 2.1505376344086025% 2.1505376344086025% 2.1505376344086025%\" id=\"el-8ca1e1e2-5bf6-401e-be56-7e06e5c88189\">\n<h3 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.09908536585365846% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.420712em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff599\">Certified Information System Security Professional (CISSP)<\/span><br \/>\n&nbsp;<span style=\"color: #fff599\">&nbsp;<\/span><\/span><\/h3>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:74.27184%;width:76.45631%;height:21.0356%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6349206349206349% 0.6349206349206349% 0.6349206349206349% 0.6349206349206349% \/ 1.5384615384615385% 1.5384615384615385% 1.5384615384615385% 1.5384615384615385%\" id=\"el-78c688d5-dfd0-446b-8129-bb0dae644b47\">\n<h3 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.09821428571428548% 0;font-family:&quot;Roboto Flex&quot;,sans-serif;font-size:0.355987em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"color: #fff\">Attain a profound understanding of information security practices with a globally recognized CISSP certification, enhancing your professional credentials.<\/span><\/span><\/h3>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:0;width:33.98058%;height:6.79612%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-b1e4846d-4783-41c6-a44f-45a859a7addb\"><a href=\"https:\/\/www.collegechalo.com\/news\/\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<div style=\"position:absolute;width:100%;height:111.11105%;left:0%;top:-5.55552%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png\" alt=\"123\"><\/amp-img><\/div>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"849a434e-b453-4cb3-a620-e013a06ca76d\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#0f1235\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-27174dff-c544-4414-bda4-aaed768d9c17\">\n<div style=\"position:absolute;width:281.76101%;height:100%;left:-38.79717%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/06\/cyber.png\" alt=\"Cyber\" srcSet=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/06\/cyber.png 252w\" sizes=\"(min-width: 1024px) 126vh, 280vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<div class=\"element-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.6) 100%)\"><\/div>\n<\/div>\n<\/div>\n<div class=\"page-background-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.6) 100%)\"><\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:48.54369%;width:71.35922%;height:10.03236%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6802721088435374% 0.6802721088435374% 0.6802721088435374% 0.6802721088435374% \/ 3.225806451612903% 3.225806451612903% 3.225806451612903% 3.225806451612903%\" id=\"el-56add19f-0a3e-4bb0-be5e-89aa9da11663\">\n<h3 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.12436224489795907% 0;font-family:&quot;Roboto Flex&quot;,sans-serif;font-size:0.420712em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff599\">Cyber Security and Networking<\/span><span style=\"color: #fff599\">&nbsp;<\/span><\/span><\/h3>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:10.19417%;top:66.34304%;width:79.61165%;height:21.19741%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6097560975609756% 0.6097560975609756% 0.6097560975609756% 0.6097560975609756% \/ 1.5267175572519083% 1.5267175572519083% 1.5267175572519083% 1.5267175572519083%\" id=\"el-ce879ff7-5726-4e51-a25b-f9273f4ca7cd\">\n<h3 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.0943216463414632% 0;font-family:&quot;Roboto Flex&quot;,sans-serif;font-size:0.355987em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"color: #fff\">Grasp essential knowledge in data security, risk management, and operations security, offering practical insights for real-world application.&nbsp;<\/span><\/span><\/h3>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:0;width:33.98058%;height:6.79612%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-e0b6a87e-7f66-4cd0-ba48-a9720b86222b\"><a href=\"https:\/\/www.collegechalo.com\/news\/\" data-tooltip-icon=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2020\/03\/cropped-favicon-180x180.png\" data-tooltip-text=\"Home - College Chalo\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<div style=\"position:absolute;width:100%;height:111.11105%;left:0%;top:-5.55552%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png\" alt=\"123\"><\/amp-img><\/div>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"72613325-90a8-45d5-b7e1-a1bcb49ffab6\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#ccccd0\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-89aa3bb2-0ca3-44de-a5a9-c6d6d01b026e\">\n<div style=\"position:absolute;width:199.2674%;height:100%;left:-49.6337%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet.png\" alt=\"Best Cyber Security Courses Your After 12th Course Cheat Sheet\" srcSet=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet.png 714w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-704x628.png 704w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-279x249.png 279w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-150x134.png 150w\" sizes=\"(min-width: 1024px) 90vh, 200vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<div class=\"element-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.7) 100%)\"><\/div>\n<\/div>\n<\/div>\n<div class=\"page-background-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.7) 100%)\"><\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:51.13269%;width:71.84466%;height:4.85437%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6756756756756757% 0.6756756756756757% 0.6756756756756757% 0.6756756756756757% \/ 6.666666666666667% 6.666666666666667% 6.666666666666667% 6.666666666666667%\" id=\"el-f368a2c7-372d-43ba-9bf8-683fb9113368\">\n<h3 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.12352195945945935% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.420712em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff599\">Caltech Cybersecurity<\/span><span style=\"font-weight: 700; color: #fff599\">&nbsp;<\/span><\/span><\/h3>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:65.85761%;width:77.6699%;height:21.19741%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.625% 0.625% 0.625% 0.625% \/ 1.5267175572519083% 1.5267175572519083% 1.5267175572519083% 1.5267175572519083%\" id=\"el-05c17b23-12d7-4cab-885a-ef22931a0d9f\">\n<h3 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.09667968749999978% 0;font-family:&quot;Roboto Flex&quot;,sans-serif;font-size:0.355987em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"color: #fff\">Explore fundamental aspects of computer security and privacy, addressing security engineering, network security, and cryptography.<\/span><\/span><\/h3>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:0;width:33.98058%;height:6.79612%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-0754c1d3-5d3e-4995-986c-28dbcfb123a3\"><a href=\"https:\/\/www.collegechalo.com\/news\/\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<div style=\"position:absolute;width:100%;height:111.11105%;left:0%;top:-5.55552%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png\" alt=\"123\"><\/amp-img><\/div>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"42f0068e-632f-46d7-9b8b-1f894de50873\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#243ca6\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-e2ee69b9-e862-4357-94a5-d9571282e8f2\">\n<div style=\"position:absolute;width:257.16073%;height:100%;left:-78.58036%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2021\/01\/cyberfea-1.jpeg\" alt=\"Cyberfea\" srcSet=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2021\/01\/cyberfea-1.jpeg 771w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2021\/01\/cyberfea-1-768x531.jpeg 768w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2021\/01\/cyberfea-1-300x207.jpeg 300w\" sizes=\"(min-width: 1024px) 116vh, 257vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<div class=\"element-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.7) 100%)\"><\/div>\n<\/div>\n<\/div>\n<div class=\"page-background-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.7) 100%)\"><\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:47.411%;width:81.79612%;height:10.67961%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.5934718100890208% 0.5934718100890208% 0.5934718100890208% 0.5934718100890208% \/ 3.0303030303030303% 3.0303030303030303% 3.0303030303030303% 3.0303030303030303%\" id=\"el-89f89be8-7764-48cc-ac86-76e5004a97b0\">\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.11683976261127617% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.453074em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff599\">Advanced Executive Program In Cybersecurity<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:10.67961%;top:65.21036%;width:83.73786%;height:21.0356%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.5797101449275363% 0.5797101449275363% 0.5797101449275363% 0.5797101449275363% \/ 1.5384615384615385% 1.5384615384615385% 1.5384615384615385% 1.5384615384615385%\" id=\"el-c12218e8-7b85-462f-ad86-cca9710607ac\">\n<h3 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.08967391304347805% 0;font-family:&quot;Roboto Flex&quot;,sans-serif;font-size:0.355987em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"color: #fff\">Receive a holistic education in threat analysis, risk assessment, and incident response, tailored for professionals aiming for excellence in cybersecurity strategy.<\/span><\/span><\/h3>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:0;width:33.98058%;height:6.79612%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-5839c483-462c-4e15-a925-1d6b84781b06\"><a href=\"https:\/\/www.collegechalo.com\/news\/\" data-tooltip-icon=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2020\/03\/cropped-favicon-180x180.png\" data-tooltip-text=\"Home - College Chalo\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<div style=\"position:absolute;width:100%;height:111.11105%;left:0%;top:-5.55552%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png\" alt=\"123\"><\/amp-img><\/div>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"df49d626-6363-4c0d-b2d0-2d7bc936e52b\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#2b3043\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-777ad951-325d-43ab-bef7-2e8b64dc6971\">\n<div style=\"position:absolute;width:258.7267%;height:100%;left:-144.46752%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-.png\" alt=\"Best Cyber Security Courses Your After 12th Course Cheat Sheet ....\" srcSet=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-.png 668w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet--362x249.png 362w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet--150x103.png 150w\" sizes=\"(min-width: 1024px) 117vh, 260vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<div class=\"element-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.7) 100%)\"><\/div>\n<\/div>\n<\/div>\n<div class=\"page-background-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.7) 100%)\"><\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:42.55663%;width:76.45631%;height:10.03236%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6349206349206349% 0.6349206349206349% 0.6349206349206349% 0.6349206349206349% \/ 3.225806451612903% 3.225806451612903% 3.225806451612903% 3.225806451612903%\" id=\"el-ec30eead-2175-41fa-9153-5d8733e30f6e\">\n<h3 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.11607142857142846% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.420712em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700; font-style: italic; color: #fff599\">CEH (v12) &#8211; Certified Ethical Hacking Course<\/span><span style=\"font-weight: 700; color: #fff599\">&nbsp;<\/span><\/span><\/h3>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:63.59223%;width:76.45631%;height:25.56634%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6349206349206349% 0.6349206349206349% 0.6349206349206349% 0.6349206349206349% \/ 1.2658227848101267% 1.2658227848101267% 1.2658227848101267% 1.2658227848101267%\" id=\"el-8cebaafc-6d47-43f0-ad94-e144155ee000\">\n<h3 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.09821428571428548% 0;font-family:&quot;Roboto Flex&quot;,sans-serif;font-size:0.355987em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"color: #fff\">Delve into advanced hacker methodologies from an ethical perspective, preparing to identify and rectify vulnerabilities with precision and responsibility.<\/span><\/span><\/h3>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:0;width:33.98058%;height:6.79612%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-e422951e-997a-4430-9f57-72b98a675ee9\"><a href=\"https:\/\/www.collegechalo.com\/news\/\" data-tooltip-icon=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2020\/03\/cropped-favicon-180x180.png\" data-tooltip-text=\"Home - College Chalo\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<div style=\"position:absolute;width:100%;height:111.11105%;left:0%;top:-5.55552%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png\" alt=\"123\"><\/amp-img><\/div>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"9f6d45a8-82bb-465c-8262-b7b0d48a056d\" auto-advance-after=\"7s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#cbd0d3\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-edc529e8-fb1b-4c5d-8271-f0e0eff577db\">\n<div style=\"position:absolute;width:133.38544%;height:100%;left:-16.69272%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Web-Development-Design.jpg\" alt=\"Bca In Web Development &amp; Design\" srcSet=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Web-Development-Design.jpg 640w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Web-Development-Design-471x628.jpg 471w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Web-Development-Design-187x249.jpg 187w,https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Web-Development-Design-150x200.jpg 150w\" sizes=\"(min-width: 1024px) 60vh, 133vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<div class=\"element-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.7) 100%)\"><\/div>\n<\/div>\n<\/div>\n<div class=\"page-background-overlay-area\" style=\"background-image:linear-gradient(0.5turn, rgba(0,0,0,0) 0%, rgba(0,0,0,0.7) 100%)\"><\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:calc(12.62136% - 1px);top:calc(73.13916% - 1px);width:calc(80.09709% + 2px);height:calc(10.67961% + 2px);opacity:1\">\n<div style=\"top:0;left:0;right:0;bottom:0;width:100%;height:100%;position:absolute;border-width:1px 1px 1px 1px;border-color:rgba(255,255,255,1);border-style:solid;border-radius:0.6060606060606061% 0.6060606060606061% 0.6060606060606061% 0.6060606060606061% \/ 3.0303030303030303% 3.0303030303030303% 3.0303030303030303% 3.0303030303030303%;pointer-events:initial;display:block;z-index:0\" id=\"el-ad9730a6-72bf-4c4f-9e5e-3b9cc908c83f\"><a href=\"https:\/\/www.collegechalo.com\/news\/web-stories\/top-8-bca-specializations-in-2024\/\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<h2 class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.11931818181818202% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.453074em;line-height:1.2;text-align:center;padding:0;color:#000000\"><span><span style=\"color: #fff\">Top 5 BCA Specializations in 2024<\/span><\/span><\/h2>\n<p><\/a><\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:0;width:33.98058%;height:6.79612%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-464ed9ba-7307-4d7f-ad0d-c39533df581f\"><a href=\"https:\/\/www.collegechalo.com\/news\/\" data-tooltip-icon=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2020\/03\/cropped-favicon-180x180.png\" data-tooltip-text=\"Home - College Chalo\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<div style=\"position:absolute;width:100%;height:111.11105%;left:0%;top:-5.55552%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png\" alt=\"123\"><\/amp-img><\/div>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><\/amp-story><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover the top cybersecurity courses after 12th grade, offering practical expertise, foundational mastery, elite certifications, comprehensive approaches, strategic leadership development.<\/p>\n","protected":false},"author":1,"featured_media":35683,"template":"","meta":{"web_stories_publisher_logo":31857,"web_stories_poster":[],"web_stories_products":[],"footnotes":""},"web_story_category":[],"web_story_tag":[],"class_list":["post-35653","web-story","type-web-story","status-publish","has-post-thumbnail","hentry"],"story_data":{"version":47,"pages":[{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":967,"height":624,"sizes":{"medium":{"file":"Best-Cyber-Security-Courses-386x249.png","width":386,"height":249,"filesize":151177,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-386x249.png"},"thumbnail":{"file":"Best-Cyber-Security-Courses-253x131.png","width":253,"height":131,"filesize":61209,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-253x131.png"},"medium_large":{"file":"Best-Cyber-Security-Courses-768x496.png","width":768,"height":496,"filesize":493672,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-768x496.png"},"web-stories-poster-portrait":{"file":"Best-Cyber-Security-Courses-640x624.png","width":640,"height":624,"filesize":558573,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-640x624.png"},"web-stories-publisher-logo":{"file":"Best-Cyber-Security-Courses-96x96.png","width":96,"height":96,"filesize":18974,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-96x96.png"},"web-stories-thumbnail":{"file":"Best-Cyber-Security-Courses-150x97.png","width":150,"height":97,"filesize":28289,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-150x97.png"},"full":{"file":"Best-Cyber-Security-Courses.png","width":967,"height":624,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#1e2a33","blurHash":"U79@hp7%D4I800tl.89F$xMcW??w01-BX7-P","creationDate":"2023-12-01T15:11:16","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses.png","id":35595,"alt":"Best Cyber Security Courses","local":false},"type":"image","x":48,"y":0,"width":330,"height":213,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"b0fed30b-d0ba-40a3-9637-9ecf8d0a52a8","isBackground":true,"isHidden":false,"overlay":{"type":"linear","rotation":0,"stops":[{"color":{"r":0,"g":0,"b":0,"a":0},"position":0},{"color":{"r":0,"g":0,"b":0,"a":1},"position":1}],"alpha":0.7}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":30,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #fff599\">Best Cyber Security Courses After 12th&nbsp;<\/span>","x":46,"y":295,"width":318,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":72,"id":"a0b95712-f1e5-4ff4-a499-e06c4d242b34"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Cookie"},"fontSize":26,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #fff\">by Tanu Bhatnagar<\/span>","x":48,"y":495,"width":200,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":29,"id":"f3f4a8b7-8b7f-44eb-8212-251dcfbedea8"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":96,"height":32,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#043c94","blurHash":"UG7mtN}R^6]#s@r:ngjZ#z$+xCfls7s:ohjY","creationDate":"2023-10-02T10:29:56","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png","id":31857,"alt":"123","local":false},"type":"image","x":48,"y":0,"width":140,"height":42,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"fda38629-b072-48fe-afa1-aaaad12a3a83","link":{"needsProxy":false,"url":"https:\/\/www.collegechalo.com\/news\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2020\/03\/cropped-favicon-180x180.png","desc":"Home - College Chalo"}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"99ecc022-447b-4c0d-8f71-0888b6708046","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"817fa291-ec6a-452e-9d03-748879deb40f"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":640,"height":853,"sizes":{"medium":{"file":"BCA-in-Cyber-Security-187x249.jpg","width":187,"height":249,"filesize":12661,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Cyber-Security-187x249.jpg"},"large":{"file":"BCA-in-Cyber-Security-471x628.jpg","width":471,"height":628,"filesize":48693,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Cyber-Security-471x628.jpg"},"thumbnail":{"file":"BCA-in-Cyber-Security-253x131.jpg","width":253,"height":131,"filesize":10301,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Cyber-Security-253x131.jpg"},"web-stories-publisher-logo":{"file":"BCA-in-Cyber-Security-96x96.jpg","width":96,"height":96,"filesize":4659,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Cyber-Security-96x96.jpg"},"web-stories-thumbnail":{"file":"BCA-in-Cyber-Security-150x200.jpg","width":150,"height":200,"filesize":9317,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Cyber-Security-150x200.jpg"},"full":{"file":"BCA-in-Cyber-Security.jpg","width":640,"height":853,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Cyber-Security.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#314a54","blurHash":"UJDJ|:JUv~MwM__4V=Rj~C#*S$XTsR?Ht7NH","creationDate":"2023-11-09T09:01:29","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Cyber-Security.jpg","id":34280,"alt":"Bca In Cyber Security","local":false},"type":"image","x":48,"y":0,"width":320,"height":427,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"74c3db34-98a9-4223-a804-1aab6626c10a","isBackground":true,"isHidden":false,"overlay":{"type":"linear","rotation":0,"stops":[{"color":{"r":0,"g":0,"b":0,"a":0},"position":0},{"color":{"r":0,"g":0,"b":0,"a":1},"position":1}],"alpha":0.6}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":28,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #fff599\">Diploma in Cyber Security (PDCS)&nbsp;<\/span>","x":27,"y":283,"width":340,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":66,"id":"f9844db5-edcb-4d74-b3b1-bff60af5e65d"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto Flex"},"fontSize":22,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"color: #fff\">Grasp essential knowledge in data security, risk management, and operations security, offering practical insights for real-world application.&nbsp;<\/span>","x":32,"y":414,"width":335,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":130,"id":"3cafe999-54c7-40b9-8b0d-317e9bd553c3"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":96,"height":32,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#043c94","blurHash":"UG7mtN}R^6]#s@r:ngjZ#z$+xCfls7s:ohjY","creationDate":"2023-10-02T10:29:56","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png","id":31857,"alt":"123","local":false},"type":"image","x":48,"y":0,"width":140,"height":42,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"4af54bc4-9696-47e0-b6b9-de0c8b405121","link":{"needsProxy":false,"url":"https:\/\/www.collegechalo.com\/news\/","rel":[],"type":"regular","pageId":null,"icon":null,"desc":null}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"3180de20-73af-4789-bf00-854acb90e3d8","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"8b1c634c-b524-4c76-a85d-4e1205f67386"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":68.80558318760083,"focalY":49.90234472560884,"resource":{"type":"image","mimeType":"image\/png","width":759,"height":435,"sizes":{"medium":{"file":"Caltech-Cybersecurity-434x249.png","width":434,"height":249,"filesize":145085,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Caltech-Cybersecurity-434x249.png"},"thumbnail":{"file":"Caltech-Cybersecurity-253x131.png","width":253,"height":131,"filesize":53674,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Caltech-Cybersecurity-253x131.png"},"web-stories-poster-portrait":{"file":"Caltech-Cybersecurity-640x435.png","width":640,"height":435,"filesize":332456,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Caltech-Cybersecurity-640x435.png"},"web-stories-publisher-logo":{"file":"Caltech-Cybersecurity-96x96.png","width":96,"height":96,"filesize":18248,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Caltech-Cybersecurity-96x96.png"},"web-stories-thumbnail":{"file":"Caltech-Cybersecurity-150x86.png","width":150,"height":86,"filesize":24605,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Caltech-Cybersecurity-150x86.png"},"full":{"file":"Caltech-Cybersecurity.png","width":759,"height":435,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Caltech-Cybersecurity.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#271725","blurHash":"UHBoH|3G-qxG#rS$Ne$ibCnhSxsTR.s-R*j=","creationDate":"2023-12-01T15:16:10","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Caltech-Cybersecurity.png","id":35596,"alt":"Caltech Cybersecurity","local":false},"type":"image","x":48,"y":0,"width":330,"height":189,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"cd8c1673-235d-4927-b353-d8beb10ff581","isBackground":true,"isHidden":false,"overlay":{"type":"linear","rotation":0,"stops":[{"color":{"r":0,"g":0,"b":0,"a":0},"position":0},{"color":{"r":0,"g":0,"b":0,"a":1},"position":1}],"alpha":0.5}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":26,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #fff599\">Certified Information System Security Professional (CISSP)<\/span>\n&nbsp;<span style=\"color: #fff599\">&nbsp;<\/span>","x":21,"y":293,"width":369,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":93,"id":"8ca1e1e2-5bf6-401e-be56-7e06e5c88189"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto Flex"},"fontSize":22,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"color: #fff\">Attain a profound understanding of information security practices with a globally recognized CISSP certification, enhancing your professional credentials.<\/span>","x":48,"y":459,"width":315,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":130,"id":"78c688d5-dfd0-446b-8129-bb0dae644b47"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":96,"height":32,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#043c94","blurHash":"UG7mtN}R^6]#s@r:ngjZ#z$+xCfls7s:ohjY","creationDate":"2023-10-02T10:29:56","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png","id":31857,"alt":"123","local":false},"type":"image","x":48,"y":0,"width":140,"height":42,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"b1e4846d-4783-41c6-a44f-45a859a7addb","link":{"needsProxy":false,"url":"https:\/\/www.collegechalo.com\/news\/","rel":[],"type":"regular","pageId":null,"icon":null,"desc":null}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"1b131557-10b0-4eba-9545-c69fca95e365","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"5a22e149-33b3-49c0-8420-b6110cdaafa5"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":31.51506678376879,"focalY":49.90136913966181,"resource":{"type":"image","mimeType":"image\/png","width":252,"height":159,"sizes":{"thumbnail":{"file":"cyber-252x131.png","width":252,"height":131,"filesize":29217,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/06\/cyber-252x131.png"},"full":{"file":"cyber.png","width":252,"height":159,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/06\/cyber.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#0f1235","blurHash":"UO6u-j%%V?MIo~o#o0aJH=MwoztlRPRPS4bv","creationDate":"2023-06-10T07:02:42","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/06\/cyber.png","id":25182,"alt":"Cyber","local":false,"provider":"local"},"type":"image","x":48,"y":0,"width":126,"height":80,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"27174dff-c544-4414-bda4-aaed768d9c17","isBackground":true,"isHidden":false,"overlay":{"type":"linear","rotation":0,"stops":[{"color":{"r":0,"g":0,"b":0,"a":0},"position":0},{"color":{"r":0,"g":0,"b":0,"a":1},"position":1}],"alpha":0.6}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto Flex"},"fontSize":26,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #fff599\">Cyber Security and Networking<\/span><span style=\"color: #fff599\">&nbsp;<\/span>","x":48,"y":300,"width":294,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":62,"id":"56add19f-0a3e-4bb0-be5e-89aa9da11663"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto Flex"},"fontSize":22,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"color: #fff\">Grasp essential knowledge in data security, risk management, and operations security, offering practical insights for real-world application.&nbsp;<\/span>","x":42,"y":410,"width":328,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":131,"id":"ce879ff7-5726-4e51-a25b-f9273f4ca7cd"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":96,"height":32,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#043c94","blurHash":"UG7mtN}R^6]#s@r:ngjZ#z$+xCfls7s:ohjY","creationDate":"2023-10-02T10:29:56","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png","id":31857,"alt":"123","local":false},"type":"image","x":48,"y":0,"width":140,"height":42,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"e0b6a87e-7f66-4cd0-ba48-a9720b86222b","link":{"needsProxy":false,"url":"https:\/\/www.collegechalo.com\/news\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2020\/03\/cropped-favicon-180x180.png","desc":"Home - College Chalo"}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"849a434e-b453-4cb3-a620-e013a06ca76d","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"95eae0ae-a0ef-4b40-8a33-3bfc95beb5e1"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":714,"height":637,"sizes":{"medium":{"file":"Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-279x249.png","width":279,"height":249,"filesize":90329,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-279x249.png"},"large":{"file":"Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-704x628.png","width":704,"height":628,"filesize":429252,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-704x628.png"},"thumbnail":{"file":"Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-253x131.png","width":253,"height":131,"filesize":46084,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-253x131.png"},"web-stories-poster-portrait":{"file":"Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-640x637.png","width":640,"height":637,"filesize":425503,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-640x637.png"},"web-stories-publisher-logo":{"file":"Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-96x96.png","width":96,"height":96,"filesize":15650,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-96x96.png"},"web-stories-thumbnail":{"file":"Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-150x134.png","width":150,"height":134,"filesize":30541,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-150x134.png"},"full":{"file":"Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet.png","width":714,"height":637,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#ccccd0","blurHash":"UsIrKkxuxtWB~pt7xuayWBWBM{j[bIWBRjj[","creationDate":"2023-12-01T15:10:39","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet.png","id":35594,"alt":"Best Cyber Security Courses Your After 12th Course Cheat Sheet","local":false},"type":"image","x":48,"y":0,"width":330,"height":294,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"89aa3bb2-0ca3-44de-a5a9-c6d6d01b026e","isBackground":true,"isHidden":false,"overlay":{"type":"linear","rotation":0,"stops":[{"color":{"r":0,"g":0,"b":0,"a":0},"position":0},{"color":{"r":0,"g":0,"b":0,"a":1},"position":1}],"alpha":0.7}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":26,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #fff599\">Caltech Cybersecurity<\/span><span style=\"font-weight: 700; color: #fff599\">&nbsp;<\/span>","x":48,"y":316,"width":296,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":30,"id":"f368a2c7-372d-43ba-9bf8-683fb9113368"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto Flex"},"fontSize":22,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"color: #fff\">Explore fundamental aspects of computer security and privacy, addressing security engineering, network security, and cryptography.<\/span>","x":48,"y":407,"width":320,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":131,"id":"05c17b23-12d7-4cab-885a-ef22931a0d9f"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":96,"height":32,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#043c94","blurHash":"UG7mtN}R^6]#s@r:ngjZ#z$+xCfls7s:ohjY","creationDate":"2023-10-02T10:29:56","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png","id":31857,"alt":"123","local":false},"type":"image","x":48,"y":0,"width":140,"height":42,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"0754c1d3-5d3e-4995-986c-28dbcfb123a3","link":{"needsProxy":false,"url":"https:\/\/www.collegechalo.com\/news\/","rel":[],"type":"regular","pageId":null,"icon":null,"desc":null}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"72613325-90a8-45d5-b7e1-a1bcb49ffab6","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"574470a1-084a-4ff4-89d2-6108dc2f4ee3"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":771,"height":533,"sizes":{"medium":{"file":"cyberfea-1-300x207.jpeg","width":300,"height":207,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2021\/01\/cyberfea-1-300x207.jpeg"},"thumbnail":{"file":"cyberfea-1-150x150.jpeg","width":150,"height":150,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2021\/01\/cyberfea-1-150x150.jpeg"},"medium_large":{"file":"cyberfea-1-768x531.jpeg","width":768,"height":531,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2021\/01\/cyberfea-1-768x531.jpeg"},"full":{"file":"cyberfea-1.jpeg","width":771,"height":533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2021\/01\/cyberfea-1.jpeg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#243ca6","blurHash":"UEB;^qo#00IFQskWo=WA00R5??t3yoM|ryoe","creationDate":"2021-01-13T10:57:18","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2021\/01\/cyberfea-1.jpeg","id":6385,"alt":"Cyberfea","local":false},"type":"image","x":48,"y":0,"width":330,"height":228,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"e2ee69b9-e862-4357-94a5-d9571282e8f2","isBackground":true,"isHidden":false,"overlay":{"type":"linear","rotation":0,"stops":[{"color":{"r":0,"g":0,"b":0,"a":0},"position":0},{"color":{"r":0,"g":0,"b":0,"a":1},"position":1}],"alpha":0.7}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":28,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #fff599\">Advanced Executive Program In Cybersecurity<\/span>","x":48,"y":293,"width":337,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":66,"id":"89f89be8-7764-48cc-ac86-76e5004a97b0"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto Flex"},"fontSize":22,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"color: #fff\">Receive a holistic education in threat analysis, risk assessment, and incident response, tailored for professionals aiming for excellence in cybersecurity strategy.<\/span>","x":44,"y":403,"width":345,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":130,"id":"c12218e8-7b85-462f-ad86-cca9710607ac"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":96,"height":32,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#043c94","blurHash":"UG7mtN}R^6]#s@r:ngjZ#z$+xCfls7s:ohjY","creationDate":"2023-10-02T10:29:56","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png","id":31857,"alt":"123","local":false},"type":"image","x":48,"y":0,"width":140,"height":42,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"5839c483-462c-4e15-a925-1d6b84781b06","link":{"needsProxy":false,"url":"https:\/\/www.collegechalo.com\/news\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2020\/03\/cropped-favicon-180x180.png","desc":"Home - College Chalo"}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"42f0068e-632f-46d7-9b8b-1f894de50873","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"6246a4f3-e6a5-406b-bbee-d9d706fd3a86"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":75.16329669970239,"focalY":49.90136913966181,"resource":{"type":"image","mimeType":"image\/png","width":668,"height":459,"sizes":{"medium":{"file":"Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet--362x249.png","width":362,"height":249,"filesize":156213,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet--362x249.png"},"thumbnail":{"file":"Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet--253x131.png","width":253,"height":131,"filesize":70005,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet--253x131.png"},"web-stories-poster-portrait":{"file":"Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet--640x459.png","width":640,"height":459,"filesize":397987,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet--640x459.png"},"web-stories-publisher-logo":{"file":"Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet--96x96.png","width":96,"height":96,"filesize":22094,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet--96x96.png"},"web-stories-thumbnail":{"file":"Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet--150x103.png","width":150,"height":103,"filesize":34252,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet--150x103.png"},"full":{"file":"Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-.png","width":668,"height":459,"mimeType":"image\/png","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#2b3043","blurHash":"U5B3?NyX4m-X.9Vsoatm00Mzxv$__49ZWE=}","creationDate":"2023-12-01T15:08:55","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/12\/Best-Cyber-Security-Courses-Your-after-12th-Course-Cheat-Sheet-.png","id":35593,"alt":"Best Cyber Security Courses Your After 12th Course Cheat Sheet ....","local":false},"type":"image","x":48,"y":0,"width":330,"height":226,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"777ad951-325d-43ab-bef7-2e8b64dc6971","isBackground":true,"isHidden":false,"overlay":{"type":"linear","rotation":0,"stops":[{"color":{"r":0,"g":0,"b":0,"a":0},"position":0},{"color":{"r":0,"g":0,"b":0,"a":1},"position":1}],"alpha":0.7}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":26,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; font-style: italic; color: #fff599\">CEH (v12) - Certified Ethical Hacking Course<\/span><span style=\"font-weight: 700; color: #fff599\">&nbsp;<\/span>","x":48,"y":263,"width":315,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":62,"id":"ec30eead-2175-41fa-9153-5d8733e30f6e"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto Flex"},"fontSize":22,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"color: #fff\">Delve into advanced hacker methodologies from an ethical perspective, preparing to identify and rectify vulnerabilities with precision and responsibility.<\/span>","x":48,"y":393,"width":315,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":158,"id":"8cebaafc-6d47-43f0-ad94-e144155ee000"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":96,"height":32,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#043c94","blurHash":"UG7mtN}R^6]#s@r:ngjZ#z$+xCfls7s:ohjY","creationDate":"2023-10-02T10:29:56","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png","id":31857,"alt":"123","local":false},"type":"image","x":48,"y":0,"width":140,"height":42,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"e422951e-997a-4430-9f57-72b98a675ee9","link":{"needsProxy":false,"url":"https:\/\/www.collegechalo.com\/news\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2020\/03\/cropped-favicon-180x180.png","desc":"Home - College Chalo"}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"df49d626-6363-4c0d-b2d0-2d7bc936e52b","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"87d7ec08-0402-42a1-97a6-d9f9cda5b05b"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":640,"height":853,"sizes":{"medium":{"file":"BCA-in-Web-Development-Design-187x249.jpg","width":187,"height":249,"filesize":13028,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Web-Development-Design-187x249.jpg"},"large":{"file":"BCA-in-Web-Development-Design-471x628.jpg","width":471,"height":628,"filesize":45339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Web-Development-Design-471x628.jpg"},"thumbnail":{"file":"BCA-in-Web-Development-Design-253x131.jpg","width":253,"height":131,"filesize":9941,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Web-Development-Design-253x131.jpg"},"web-stories-publisher-logo":{"file":"BCA-in-Web-Development-Design-96x96.jpg","width":96,"height":96,"filesize":4709,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Web-Development-Design-96x96.jpg"},"web-stories-thumbnail":{"file":"BCA-in-Web-Development-Design-150x200.jpg","width":150,"height":200,"filesize":9752,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Web-Development-Design-150x200.jpg"},"full":{"file":"BCA-in-Web-Development-Design.jpg","width":640,"height":853,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Web-Development-Design.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#cbd0d3","blurHash":"URJRggyF%2V[_NNIbbIUMcxuRjNa0JMxIUX8","creationDate":"2023-11-09T09:39:53","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/11\/BCA-in-Web-Development-Design.jpg","id":34284,"alt":"Bca In Web Development & Design","local":false},"type":"image","x":48,"y":0,"width":320,"height":427,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"edc529e8-fb1b-4c5d-8271-f0e0eff577db","isBackground":true,"isHidden":false,"overlay":{"type":"linear","rotation":0,"stops":[{"color":{"r":0,"g":0,"b":0,"a":0},"position":0},{"color":{"r":0,"g":0,"b":0,"a":1},"position":1}],"alpha":0.7}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":28,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"center","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"color: #fff\">Top 5 BCA Specializations in 2024<\/span>","x":52,"y":452,"width":330,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":66,"id":"ad9730a6-72bf-4c4f-9e5e-3b9cc908c83f","border":{"left":1,"right":1,"top":1,"bottom":1,"lockedWidth":false,"color":{"color":{"r":255,"g":255,"b":255}}},"link":{"needsProxy":false,"url":"https:\/\/www.collegechalo.com\/news\/web-stories\/top-8-bca-specializations-in-2024\/","rel":[],"type":"regular","pageId":null,"icon":null,"desc":null}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":96,"height":32,"sizes":[],"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#043c94","blurHash":"UG7mtN}R^6]#s@r:ngjZ#z$+xCfls7s:ohjY","creationDate":"2023-10-02T10:29:56","src":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2023\/10\/college-chalo.png","id":31857,"alt":"123","local":false},"type":"image","x":48,"y":0,"width":140,"height":42,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"464ed9ba-7307-4d7f-ad0d-c39533df581f","link":{"needsProxy":false,"url":"https:\/\/www.collegechalo.com\/news\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/www.collegechalo.com\/news\/wp-content\/uploads\/2020\/03\/cropped-favicon-180x180.png","desc":"Home - College Chalo"}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"9f6d45a8-82bb-465c-8262-b7b0d48a056d","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"03a6d90c-d456-41dc-91cb-12e25ce9068d"},"animations":[]}],"fonts":{"Roboto":{"family":"Roboto","weights":[100,300,400,500,700,900],"styles":["italic","regular"],"variants":[[0,100],[1,100],[0,300],[1,300],[0,400],[1,400],[0,500],[1,500],[0,700],[1,700],[0,900],[1,900]],"fallbacks":["Helvetica Neue","Helvetica","sans-serif"],"service":"fonts.google.com","metrics":{"upm":2048,"asc":1900,"des":-500,"tAsc":1536,"tDes":-512,"tLGap":102,"wAsc":1946,"wDes":512,"xH":1082,"capH":1456,"yMin":-555,"yMax":2163,"hAsc":1900,"hDes":-500,"lGap":0}},"Cookie":{"family":"Cookie","fallbacks":["cursive"],"weights":[400],"styles":["regular"],"variants":[[0,400]],"service":"fonts.google.com","metrics":{"upm":1000,"asc":789,"des":-320,"tAsc":789,"tDes":-320,"tLGap":0,"wAsc":789,"wDes":320,"xH":115,"capH":312,"yMin":-320,"yMax":789,"hAsc":789,"hDes":-320,"lGap":0}},"Roboto Flex":{"family":"Roboto Flex","fallbacks":["sans-serif"],"weights":[400],"styles":["regular"],"variants":[[0,400]],"service":"fonts.google.com","metrics":{"upm":2048,"asc":1900,"des":-500,"tAsc":1900,"tDes":-500,"tLGap":0,"wAsc":2461,"wDes":600,"xH":1052,"capH":1456,"yMin":-600,"yMax":2461,"hAsc":1900,"hDes":-500,"lGap":0}}},"autoAdvance":true,"defaultPageDuration":7,"currentStoryStyles":{"colors":[]}},"story_poster":{"id":35683,"url":"https:\/\/www.collegechalo.com\/news-panel\/wp-content\/uploads\/2021\/01\/cropped-cyberfea.jpeg","width":640,"height":853,"needsProxy":false},"_links":{"self":[{"href":"https:\/\/www.collegechalo.com\/news-panel\/wp-json\/web-stories\/v1\/web-story\/35653"}],"collection":[{"href":"https:\/\/www.collegechalo.com\/news-panel\/wp-json\/web-stories\/v1\/web-story"}],"about":[{"href":"https:\/\/www.collegechalo.com\/news-panel\/wp-json\/wp\/v2\/types\/web-story"}],"author":[{"embeddable":true,"href":"https:\/\/www.collegechalo.com\/news-panel\/wp-json\/web-stories\/v1\/users\/1"}],"version-history":[{"count":2,"href":"https:\/\/www.collegechalo.com\/news-panel\/wp-json\/web-stories\/v1\/web-story\/35653\/revisions"}],"predecessor-version":[{"id":35685,"href":"https:\/\/www.collegechalo.com\/news-panel\/wp-json\/web-stories\/v1\/web-story\/35653\/revisions\/35685"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.collegechalo.com\/news-panel\/wp-json\/web-stories\/v1\/media\/35683"}],"wp:attachment":[{"href":"https:\/\/www.collegechalo.com\/news-panel\/wp-json\/web-stories\/v1\/media?parent=35653"}],"wp:term":[{"taxonomy":"web_story_category","embeddable":true,"href":"https:\/\/www.collegechalo.com\/news-panel\/wp-json\/web-stories\/v1\/web_story_category?post=35653"},{"taxonomy":"web_story_tag","embeddable":true,"href":"https:\/\/www.collegechalo.com\/news-panel\/wp-json\/web-stories\/v1\/web_story_tag?post=35653"}],"wp:lock":[{"embeddable":true,"href":"https:\/\/www.collegechalo.com\/news-panel\/wp-json\/web-stories\/v1\/web-story\/35653\/lock"}],"wp:publisherlogo":[{"embeddable":true,"href":"https:\/\/www.collegechalo.com\/news-panel\/wp-json\/web-stories\/v1\/media\/31857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}