{"version":"1.0","provider_name":"Wawiwa Tech","provider_url":"https:\/\/wawiwa-tech.com\/de","author_name":"Odette Iochana","author_url":"https:\/\/wawiwa-tech.com\/de\/author\/odette\/","title":"Cyber Threat Intelligence","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"5HT4JALBDD\"><a href=\"https:\/\/wawiwa-tech.com\/de\/upskilling\/cybersecurity\/cyber-threat-intelligence\/\">Cyber-Bedrohungsdaten<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/wawiwa-tech.com\/de\/upskilling\/cybersecurity\/cyber-threat-intelligence\/embed\/#?secret=5HT4JALBDD\" width=\"600\" height=\"338\" title=\"&quot;Aufkl\u00e4rung \u00fcber Cyber-Bedrohungen&quot; - Wawiwa Tech\" data-secret=\"5HT4JALBDD\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/wawiwa-tech.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>","thumbnail_url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-threat-and-intelligence.png","thumbnail_width":1456,"thumbnail_height":816,"description":"This unique and fascinating course was specifically designed for those technology and cybersecurity professionals who want to take the next step in expanding their knowledge of Cyber Threat Intelligence and Threat Hunting Techniques. The purpose of this course is to familiarize students with the world of Cyber Threat Intelligence and Threat Hunting investigations, with an emphasis on OSINT tools in the finance industry, ethical hacking, malware analysis, and digital forensics processes."}