<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Tecnologia Wawiwa</provider_name><provider_url>https://wawiwa-tech.com/pt</provider_url><author_name>Odette Iochana</author_name><author_url>https://wawiwa-tech.com/pt/author/odette/</author_url><title>Network Forensics</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="LFYSUofKEA"&gt;&lt;a href="https://wawiwa-tech.com/pt/upskilling/cybersecurity/network-forensics/"&gt;Forense de rede&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://wawiwa-tech.com/pt/upskilling/cybersecurity/network-forensics/embed/#?secret=LFYSUofKEA" width="600" height="338" title=""Forense de rede" - Wawiwa Tech" data-secret="LFYSUofKEA" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://wawiwa-tech.com/wp-includes/js/wp-embed.min.js
&lt;/script&gt;</html><thumbnail_url>https://wawiwa-tech.com/wp-content/uploads/2024/02/Network-Forensics-1024x574.png</thumbnail_url><thumbnail_width>1024</thumbnail_width><thumbnail_height>574</thumbnail_height><description>Designed to elevate the capabilities, skills, and knowledge of students in cybersecurity investigations and network forensics, this course targets individuals eager to deepen their understanding and proficiency. By attending this course, you'll gain experience with breakthrough methods, procedures, technology, and tools for conducting investigations that are more efficient, accurate, and beneficial.</description></oembed>
