<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Wawiwa Tech</provider_name><provider_url>https://wawiwa-tech.com/es</provider_url><author_name>Odette Iochana</author_name><author_url>https://wawiwa-tech.com/es/author/odette/</author_url><title>Network Forensics</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="850PO3vLv5"&gt;&lt;a href="https://wawiwa-tech.com/es/upskilling/cybersecurity/network-forensics/"&gt;An&#xE1;lisis forense de redes&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://wawiwa-tech.com/es/upskilling/cybersecurity/network-forensics/embed/#?secret=850PO3vLv5" width="600" height="338" title=""An&#xE1;lisis forense de redes" - Wawiwa Tech" data-secret="850PO3vLv5" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://wawiwa-tech.com/wp-includes/js/wp-embed.min.js
&lt;/script&gt;</html><thumbnail_url>https://wawiwa-tech.com/wp-content/uploads/2024/02/Network-Forensics-1024x574.png</thumbnail_url><thumbnail_width>1024</thumbnail_width><thumbnail_height>574</thumbnail_height><description>Designed to elevate the capabilities, skills, and knowledge of students in cybersecurity investigations and network forensics, this course targets individuals eager to deepen their understanding and proficiency. By attending this course, you'll gain experience with breakthrough methods, procedures, technology, and tools for conducting investigations that are more efficient, accurate, and beneficial.</description></oembed>
