{"id":3722,"date":"2022-04-15T19:31:03","date_gmt":"2022-04-15T19:31:03","guid":{"rendered":"http:\/\/embt-college.org\/embt1\/?page_id=3722"},"modified":"2022-04-16T19:22:25","modified_gmt":"2022-04-16T19:22:25","slug":"school-of-computing","status":"publish","type":"page","link":"https:\/\/embt-college.org\/embt1\/school-of-computing\/","title":{"rendered":"School of Computing"},"content":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1501236643896{padding-right: 18px !important;padding-left: 18px !important;}&#8221;][vc_column][vc_empty_space][rev_slider_vc alias=&#8221;home-2-1&#8243; enable_paspartu=&#8221;no&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1501056380037{padding-top: 30px !important;padding-right: 18px !important;padding-left: 18px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-offset-0 vc_col-lg-4 vc_col-md-offset-0 vc_col-md-4 vc_col-sm-offset-0&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-offset-0 vc_col-lg-4 vc_col-md-offset-0 vc_col-md-4 vc_col-sm-offset-0&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-offset-0 vc_col-lg-4 vc_col-md-offset-0 vc_col-md-4 vc_col-sm-offset-0&#8243;][\/vc_column][\/vc_row][vc_row content_text_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1501056573674{padding-top: 59px !important;padding-right: 18px !important;padding-bottom: 68px !important;padding-left: 18px !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-offset-2 vc_col-lg-8&#8243;]<div class=\"edgt-section-title-holder  edgt-st-standard edgt-st-title-left edgt-st-normal-space \" style=\"text-align: center\">\n\t<div class=\"edgt-st-inner\">\n\t\t\t\t\t<h2 class=\"edgt-st-title\" >\n\t\t\t\tBSc (Hons) Computing\t\t\t<\/h2>\n\t\t\t\t\t\t\t<p class=\"edgt-st-text\" style=\"color: #888;font-size: 18px;line-height: 33px;margin-top: 17px\">\n\t\t\t\tThe BSc (Hons) Computing course provides training and instruction on the design, use, support and maintenance of contemporary computer systems. It covers a range of topics that develop the skills necessary to work with complex IT infrastructure.\t\t\t<\/p>\n\t\t\t<\/div>\n<\/div>[vc_empty_space height=&#8221;45px&#8221;]<div class=\"edgt-elements-holder   edgt-one-column  edgt-responsive-mode-768 \" ><div class=\"edgt-eh-item  edgt-width-1-1   \"  data-item-class=\"edgt-eh-custom-4831\">\n\t<div class=\"edgt-eh-item-inner\">\n\t\t<div class=\"edgt-eh-item-content edgt-eh-custom-4831\" >\n\t\t\t<div class=\"edgt-icon-tabs edgt-icon-tabs-three\">\n    <ul class=\"edgt-icon-tabs-nav clearfix\">\n                    <li>\n                                    <a href=\"#tab-course-details\">\n                        <span class=\"edgt-icon-tabs-title-holder\">Course Details<\/span>\n                    <\/a>\n                            <\/li>\n                    <li>\n                                    <a href=\"#tab-features\">\n                        <span class=\"edgt-icon-tabs-title-holder\">Features<\/span>\n                    <\/a>\n                            <\/li>\n                    <li>\n                                    <a href=\"#tab-careers\">\n                        <span class=\"edgt-icon-tabs-title-holder\">Careers<\/span>\n                    <\/a>\n                            <\/li>\n            <\/ul>\n    <div class=\"edgt-icon-tab-container\" id=\"tab-course-details-798\" data-icon-pack=\"font_awesome\" data-icon-html=\"    &lt;span class=&quot;edgt-icon-shortcode edgt-normal   edgt-icon-medium&quot;  &gt;\n                    &lt;i class=&quot;edgt-icon-font-awesome fa  edgt-icon-element&quot; style=&quot;&quot; &gt;&lt;\/i&gt;            &lt;\/span&gt;\n\">[vc_column_text]<\/p>\n<p style=\"text-align: left;\">The Program develops the learners\u2019 understanding of the integration of hardware and software components. Learners will explore how hardware serves specific computer processing functions and investigate the use of various software applications.\u00a0 It also uses different tools and techniques to design, implement and test programs, following the system life cycle. Learners will use appropriate programming languages and learn about the principles of good programming to enable them to create computer programs.<\/p>\n<p>&nbsp;<\/p>\n<p>Students will also be able to understand the systems development life cycle and the role of systems methodologies within the life cycle. Learners will be introduced to different fact finding and problem-solving techniques and they will use these to analyse existing systems. They will recommend improvements and plan to implement these improvements for clients[\/vc_column_text]<\/div><div class=\"edgt-icon-tab-container\" id=\"tab-features-415\" data-icon-pack=\"font_awesome\" data-icon-html=\"    &lt;span class=&quot;edgt-icon-shortcode edgt-normal   edgt-icon-medium&quot;  &gt;\n                    &lt;i class=&quot;edgt-icon-font-awesome fa  edgt-icon-element&quot; style=&quot;&quot; &gt;&lt;\/i&gt;            &lt;\/span&gt;\n\">[vc_column_text]Level 4 aims to provide a firm foundation to support the more advanced studies; this first level introduces knowledge in approaches and principles found across the disciplines of computing and information systems, and it starts to develop in students skills of critical analysis and self- reflection.<\/p>\n<p>Level 5 aims to deepen the student\u2019s specialist knowledge in each of the main computing areas, including programming, computing architecture and software development. At this level, students will learn about the use of structured design, analysis and troubleshooting principles for computer systems. The aim is to develop in students intellectual skills such as understanding, problem solving and to promote the students\u2019 ability to analyse, synthesise and evaluate critically computing-related decisions.[\/vc_column_text]<\/div><div class=\"edgt-icon-tab-container\" id=\"tab-careers-69\" data-icon-pack=\"font_awesome\" data-icon-html=\"    &lt;span class=&quot;edgt-icon-shortcode edgt-normal   edgt-icon-medium&quot;  &gt;\n                    &lt;i class=&quot;edgt-icon-font-awesome fa  edgt-icon-element&quot; style=&quot;&quot; &gt;&lt;\/i&gt;            &lt;\/span&gt;\n\">[vc_column_text]A key aim of the program is to prepare students for a career in computer systems development and support, and to enhance life-long learning skills. The course will develop knowledge, skills and competences for individuals to develop their careers in the modern computing industry.<\/p>\n<p>In particular, students will get the opportunity to engage with employers through a variety of mechanisms in core modules at levels 4, 5 and 6, including curricular and co-curricular activities taking place throughout the course. Most modules contain explicit statements concerning the practice and assessment of students reflective skills both individually and in groups. A wide range of the course modules also assess the student reflective practice through learning journals or logs contributing to personal development planning and career management. In this way, students will be encouraged to develop specific skills increasing their employability prospects by the end of the course.[\/vc_column_text]<\/div><\/div>\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][\/vc_row][vc_row content_text_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1501056573674{padding-top: 59px !important;padding-right: 18px !important;padding-bottom: 68px !important;padding-left: 18px !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-offset-2 vc_col-lg-8&#8243;]<div class=\"edgt-section-title-holder  edgt-st-standard edgt-st-title-left edgt-st-normal-space \" style=\"text-align: center\">\n\t<div class=\"edgt-st-inner\">\n\t\t\t\t\t<h2 class=\"edgt-st-title\" >\n\t\t\t\tMSc in I.T.\t\t\t<\/h2>\n\t\t\t\t\t\t\t<p class=\"edgt-st-text\" style=\"color: #888;font-size: 18px;line-height: 33px;margin-top: 17px\">\n\t\t\t\tThe MSc in I.T. program is a career-focused, up-to-date exploration of information technology, training you in the fundamentals and ne development of IT systems. It can also prepare you for industry-recognized Database Professional Certifications by Oracle, Microsoft and AWS.\t\t\t<\/p>\n\t\t\t<\/div>\n<\/div>[vc_empty_space height=&#8221;45px&#8221;]<div class=\"edgt-elements-holder   edgt-one-column  edgt-responsive-mode-768 \" ><div class=\"edgt-eh-item  edgt-width-1-1   \"  data-item-class=\"edgt-eh-custom-2229\">\n\t<div class=\"edgt-eh-item-inner\">\n\t\t<div class=\"edgt-eh-item-content edgt-eh-custom-2229\" >\n\t\t\t<div class=\"edgt-icon-tabs edgt-icon-tabs-three\">\n    <ul class=\"edgt-icon-tabs-nav clearfix\">\n                    <li>\n                                    <a href=\"#tab-course-details\">\n                        <span class=\"edgt-icon-tabs-title-holder\">Course Details<\/span>\n                    <\/a>\n                            <\/li>\n                    <li>\n                                    <a href=\"#tab-features\">\n                        <span class=\"edgt-icon-tabs-title-holder\">Features<\/span>\n                    <\/a>\n                            <\/li>\n                    <li>\n                                    <a href=\"#tab-careers\">\n                        <span class=\"edgt-icon-tabs-title-holder\">Careers<\/span>\n                    <\/a>\n                            <\/li>\n            <\/ul>\n    <div class=\"edgt-icon-tab-container\" id=\"tab-course-details-65\" data-icon-pack=\"font_awesome\" data-icon-html=\"    &lt;span class=&quot;edgt-icon-shortcode edgt-normal   edgt-icon-medium&quot;  &gt;\n                    &lt;i class=&quot;edgt-icon-font-awesome fa  edgt-icon-element&quot; style=&quot;&quot; &gt;&lt;\/i&gt;            &lt;\/span&gt;\n\">[vc_column_text]The course aims to develop a good understanding and knowledge of current and emerging IT and computer technologies. The course aims to equip students with a combination of relevant technical skills and &#8216;client-facing&#8217; awareness in preparation for, or in enhancement of, a career within the IT industry.<\/p>\n<p>The distance learning delivery mode offers significant flexibility whereby all teaching and learning materials are provided in the most advanced Virtual Learning Environment.<\/p>\n<p>Students can obtain an engaging and rewarding study experience with regular guidance, on-going support and timely feedback throughout their course from experienced academic tutors<\/p>\n<p>A variety of online facilities are available for interaction between both students and tutors, as well as among students.<\/p>\n<p>The course is specifically designed for career enhancement. It aims to equip students with a wide range of necessary knowledge and skills highly valued by employers and IT industry. These include mobile computing, IT security management, advanced databases and software project management.[\/vc_column_text]<\/div><div class=\"edgt-icon-tab-container\" id=\"tab-features-345\" data-icon-pack=\"font_awesome\" data-icon-html=\"    &lt;span class=&quot;edgt-icon-shortcode edgt-normal   edgt-icon-medium&quot;  &gt;\n                    &lt;i class=&quot;edgt-icon-font-awesome fa  edgt-icon-element&quot; style=&quot;&quot; &gt;&lt;\/i&gt;            &lt;\/span&gt;\n\">[vc_column_text]Stage 1 topics include:<br \/>\nStudents will attend an online Induction session<\/p>\n<p>Stage 2 topics include:<br \/>\nStudents need to complete six 20 credit taught modules<\/p>\n<p>1. Database Systems with Professional Certification<\/p>\n<p>2. Mobile Applications Design and Development<\/p>\n<p>3. IT Security Management<\/p>\n<p>4. Software Project Management<\/p>\n<p>5. Communication Technologies for IT<\/p>\n<p>6. Research and Development Skills<\/p>\n<p>Stage 3 topics include:<br \/>\nStudents need to take the 60-credit MSc project<\/p>\n<p>Assessment:<br \/>\nAll assessments are completed via staged coursework with a built-in oral presentation\/viva where appropriate using teleconference facility.[\/vc_column_text]<\/div><div class=\"edgt-icon-tab-container\" id=\"tab-careers-143\" data-icon-pack=\"font_awesome\" data-icon-html=\"    &lt;span class=&quot;edgt-icon-shortcode edgt-normal   edgt-icon-medium&quot;  &gt;\n                    &lt;i class=&quot;edgt-icon-font-awesome fa  edgt-icon-element&quot; style=&quot;&quot; &gt;&lt;\/i&gt;            &lt;\/span&gt;\n\">[vc_column_text]Successful completion of this course offers wide-ranging career opportunities in the IT industry in either private or public sectors.<\/p>\n<p>Graduates will be equipped to work in a variety of areas such as database administration, project management, mobile and web development, business or systems analysis, IT consultancy, support services, product management and training.[\/vc_column_text]<\/div><\/div>\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][\/vc_row][vc_row content_text_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1501056573674{padding-top: 59px !important;padding-right: 18px !important;padding-bottom: 68px !important;padding-left: 18px !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-offset-2 vc_col-lg-8&#8243;]<div class=\"edgt-section-title-holder  edgt-st-standard edgt-st-title-left edgt-st-normal-space \" style=\"text-align: center\">\n\t<div class=\"edgt-st-inner\">\n\t\t\t\t\t<h2 class=\"edgt-st-title\" >\n\t\t\t\tIDESA Certified Data Science Professional (ICDSP) Diploma\t\t\t<\/h2>\n\t\t\t\t\t\t\t<p class=\"edgt-st-text\" style=\"color: #888;font-size: 18px;line-height: 33px;margin-top: 17px\">\n\t\t\t\tThe IDESA Certified Data Science Professional (ICDSP) Diploma covers a range of topics pertaining to accessing and manipulating data, as well as techniques for data mining and modelling using supervised and unsupervised learning systems.\t\t\t<\/p>\n\t\t\t<\/div>\n<\/div>[vc_empty_space height=&#8221;45px&#8221;]<div class=\"edgt-elements-holder   edgt-one-column  edgt-responsive-mode-768 \" ><div class=\"edgt-eh-item  edgt-width-1-1   \"  data-item-class=\"edgt-eh-custom-2946\">\n\t<div class=\"edgt-eh-item-inner\">\n\t\t<div class=\"edgt-eh-item-content edgt-eh-custom-2946\" >\n\t\t\t<div class=\"edgt-icon-tabs edgt-icon-tabs-three\">\n    <ul class=\"edgt-icon-tabs-nav clearfix\">\n                    <li>\n                                    <a href=\"#tab-program-area-1\">\n                        <span class=\"edgt-icon-tabs-title-holder\">Program Area 1<\/span>\n                    <\/a>\n                            <\/li>\n                    <li>\n                                    <a href=\"#tab-program-area-2\">\n                        <span class=\"edgt-icon-tabs-title-holder\">Program Area 2<\/span>\n                    <\/a>\n                            <\/li>\n                    <li>\n                                    <a href=\"#tab-program-area-3\">\n                        <span class=\"edgt-icon-tabs-title-holder\">Program Area 3<\/span>\n                    <\/a>\n                            <\/li>\n            <\/ul>\n    <div class=\"edgt-icon-tab-container\" id=\"tab-program-area-1-818\" data-icon-pack=\"font_awesome\" data-icon-html=\"    &lt;span class=&quot;edgt-icon-shortcode edgt-normal   edgt-icon-medium&quot;  &gt;\n                    &lt;i class=&quot;edgt-icon-font-awesome fa  edgt-icon-element&quot; style=&quot;&quot; &gt;&lt;\/i&gt;            &lt;\/span&gt;\n\">[vc_column_text]<\/p>\n<p style=\"text-align: left;\">Covers &#8211;<\/p>\n<p>1. Accessing and Manipulating Data<\/p>\n<ul>\n<li>1.1 Preparing data for analysis and modelling<\/li>\n<li>1.2 Developing optimal data structures<\/li>\n<li>1.3 Transforming data into usable datasets<\/li>\n<li>1.4 Exploratory data analysis including identification of anomalies and outliers<\/li>\n<li>1.5 Handling missing data &#8211; imputation and other methods<\/li>\n<\/ul>\n<p>[\/vc_column_text]<\/div><div class=\"edgt-icon-tab-container\" id=\"tab-program-area-2-715\" data-icon-pack=\"font_awesome\" data-icon-html=\"    &lt;span class=&quot;edgt-icon-shortcode edgt-normal   edgt-icon-medium&quot;  &gt;\n                    &lt;i class=&quot;edgt-icon-font-awesome fa  edgt-icon-element&quot; style=&quot;&quot; &gt;&lt;\/i&gt;            &lt;\/span&gt;\n\">[vc_column_text]<\/p>\n<p style=\"text-align: left;\">Covers &#8211;<\/p>\n<p>2. Data Mining and Modelling: Supervised and Unsupervised Learning Systems<\/p>\n<ul>\n<li>2.1 Classification methods 2.2 Regression methods \u2013 linear, logistic and non-linear regression models<\/li>\n<li>2.3 Time-series forecasting methods<\/li>\n<li>2.4 Ensemble methods e.g. Boosted Decision Trees and Forests<\/li>\n<li>2.5 Association-based data mining schemes<\/li>\n<li>2.6 Unsupervised learning through clustering segmentation<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>3. Advanced AI and Machine Learning (ML) Systems<\/p>\n<ul>\n<li>3.1 Designing AI and ML distributed processing architectures<\/li>\n<li>3.2 Configuring AI\/ML workflows and pipelines<\/li>\n<li>3.3 Working with Artificial Neural Networks (ANNs)<\/li>\n<\/ul>\n<p>[\/vc_column_text]<\/div><div class=\"edgt-icon-tab-container\" id=\"tab-program-area-3-215\" data-icon-pack=\"font_awesome\" data-icon-html=\"    &lt;span class=&quot;edgt-icon-shortcode edgt-normal   edgt-icon-medium&quot;  &gt;\n                    &lt;i class=&quot;edgt-icon-font-awesome fa  edgt-icon-element&quot; style=&quot;&quot; &gt;&lt;\/i&gt;            &lt;\/span&gt;\n\">[vc_column_text]4. Data Science Tools, Platforms and Languages<\/p>\n<ul>\n<li>4.1 Developing R-language data mining systems<\/li>\n<li>4.2 R-Studio packages for data science<\/li>\n<li>4.3 Python-language data mining<\/li>\n<li>4.4 Visualization tools and visual analytics<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>5. Commercial Applications and Productionized DS Systems<\/p>\n<ul>\n<li>5.1 Matching technologies to business requirements<\/li>\n<li>5.2 Selecting tools and toolsets to match the analysis context<\/li>\n<li>5.3 Monitoring and tuning AI\/ML system performance<\/li>\n<\/ul>\n<p>[\/vc_column_text]<\/div><\/div>\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][\/vc_row][vc_row content_text_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1501056573674{padding-top: 59px !important;padding-right: 18px !important;padding-bottom: 68px !important;padding-left: 18px !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-offset-2 vc_col-lg-8&#8243;]<div class=\"edgt-section-title-holder  edgt-st-standard edgt-st-title-left edgt-st-normal-space \" style=\"text-align: center\">\n\t<div class=\"edgt-st-inner\">\n\t\t\t\t\t<h2 class=\"edgt-st-title\" >\n\t\t\t\tIDESA Certified Cyber &amp; Information Security Specialist (ICCISS) Diploma\t\t\t<\/h2>\n\t\t\t\t\t\t\t<p class=\"edgt-st-text\" style=\"color: #888;font-size: 18px;line-height: 33px;margin-top: 17px\">\n\t\t\t\tThe IDESA Certified Cyber &amp; Information Security Specialist (ICCISS) Diploma deals with the management of Information and Cyber Security (ICS) as well as the role definitions, purposes and responsibilities of cyber-security professionals. It looks at techniques for designing and implementing security-hardened systems, and methods for managing security incidents.\t\t\t<\/p>\n\t\t\t<\/div>\n<\/div>[vc_empty_space height=&#8221;45px&#8221;]<div class=\"edgt-elements-holder   edgt-one-column  edgt-responsive-mode-768 \" ><div class=\"edgt-eh-item  edgt-width-1-1   \"  data-item-class=\"edgt-eh-custom-7083\">\n\t<div class=\"edgt-eh-item-inner\">\n\t\t<div class=\"edgt-eh-item-content edgt-eh-custom-7083\" >\n\t\t\t<div class=\"edgt-icon-tabs edgt-icon-tabs-three\">\n    <ul class=\"edgt-icon-tabs-nav clearfix\">\n                    <li>\n                                    <a href=\"#tab-program-area-1\">\n                        <span class=\"edgt-icon-tabs-title-holder\">Program Area 1<\/span>\n                    <\/a>\n                            <\/li>\n                    <li>\n                                    <a href=\"#tab-program-area-2\">\n                        <span class=\"edgt-icon-tabs-title-holder\">Program Area 2<\/span>\n                    <\/a>\n                            <\/li>\n                    <li>\n                                    <a href=\"#tab-program-area-3\">\n                        <span class=\"edgt-icon-tabs-title-holder\">Program Area 3<\/span>\n                    <\/a>\n                            <\/li>\n            <\/ul>\n    <div class=\"edgt-icon-tab-container\" id=\"tab-program-area-1-417\" data-icon-pack=\"font_awesome\" data-icon-html=\"    &lt;span class=&quot;edgt-icon-shortcode edgt-normal   edgt-icon-medium&quot;  &gt;\n                    &lt;i class=&quot;edgt-icon-font-awesome fa  edgt-icon-element&quot; style=&quot;&quot; &gt;&lt;\/i&gt;            &lt;\/span&gt;\n\">[vc_column_text]<\/p>\n<p style=\"text-align: left;\">Covers &#8211;<\/p>\n<p>1. Managing Information and Cyber Security (ICS); role definitions, purposes and responsibilities<\/p>\n<ul>\n<li>1.1 ICS threats\/risks typologies and taxonomies; Strategies and policies<\/li>\n<li>1.2 Governance, compliance and risk management methods for ICS; cost-risk trade-offs.<\/li>\n<li>1.3 ICS cultural and organizational influences; Security awareness training<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>2. Designing and Implementing Secure Systems<\/p>\n<ul>\n<li>2.1 Security architectures; architectural frameworks for security hardening (e.g. TOGAF framework)<\/li>\n<li>2.2 Developing SyOps for secure systems<\/li>\n<li>2.3 Security testing techniques (e.g. OWASP methods)<\/li>\n<li>2.4 Vulnerability assessments and mitigation approaches<\/li>\n<li>2.5 Business continuity planning; hot, warm and cold standby schemes<\/li>\n<li>2.6 Addressing physical security issues &amp; social engineering threats<\/li>\n<\/ul>\n<p>[\/vc_column_text]<\/div><div class=\"edgt-icon-tab-container\" id=\"tab-program-area-2-615\" data-icon-pack=\"font_awesome\" data-icon-html=\"    &lt;span class=&quot;edgt-icon-shortcode edgt-normal   edgt-icon-medium&quot;  &gt;\n                    &lt;i class=&quot;edgt-icon-font-awesome fa  edgt-icon-element&quot; style=&quot;&quot; &gt;&lt;\/i&gt;            &lt;\/span&gt;\n\">[vc_column_text]Covers &#8211;<\/p>\n<p>3. Managing Security Incidents<\/p>\n<ul>\n<li>3.1 ICS incident management formal methods, tooling and toolsets<\/li>\n<li>3.2 Investigative processes; Dealing with security breaches<\/li>\n<li>3.3 Digital\/Cyber Forensics techniques<\/li>\n<li>3.4 Deploying remediation controls and solutions<\/li>\n<\/ul>\n<p>[\/vc_column_text]<\/div><div class=\"edgt-icon-tab-container\" id=\"tab-program-area-3-392\" data-icon-pack=\"font_awesome\" data-icon-html=\"    &lt;span class=&quot;edgt-icon-shortcode edgt-normal   edgt-icon-medium&quot;  &gt;\n                    &lt;i class=&quot;edgt-icon-font-awesome fa  edgt-icon-element&quot; style=&quot;&quot; &gt;&lt;\/i&gt;            &lt;\/span&gt;\n\">[vc_column_text]<\/p>\n<p style=\"text-align: left;\">Covers &#8211;<\/p>\n<p>4. Managing Audit, Assurance and Review Processes<\/p>\n<ul>\n<li>4.1 ICS audit processes; Cyclical continuous improvement workflows<\/li>\n<li>4.2 Conducting effective security reviews and health checks<\/li>\n<li>4.3 ICS support and triage models for effective security assurance &amp; business continuity planning.<\/li>\n<\/ul>\n<p>[\/vc_column_text]<\/div><\/div>\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1500631507905{padding-right: 18px !important;padding-left: 18px !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-offset-0 vc_col-lg-4 vc_col-md-offset-0 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_empty_space height=&#8221;40px&#8221;][\/vc_column][vc_column offset=&#8221;vc_col-lg-offset-0 vc_col-lg-4 vc_col-md-offset-0 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_empty_space height=&#8221;40px&#8221;][\/vc_column][vc_column offset=&#8221;vc_col-lg-offset-0 vc_col-lg-4 vc_col-md-offset-0 vc_col-md-6 vc_col-sm-offset-0&#8243;][vc_empty_space][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1501057960243{padding-top: 73px !important;padding-right: 18px !important;padding-bottom: 17px !important;padding-left: 18px !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-offset-0 vc_col-lg-6 vc_col-md-offset-1 vc_col-md-10&#8243;]<div class=\"edgt-int-icon-showcase edgt-autoplay\"><div class=\"edgt-int-icon-showcase-inner\"><div class=\"edgt-showcase-item-holder\">\n\t<div class=\"edgt-showcase-icon\">\n\t\t    <span class=\"edgt-icon-shortcode edgt-circle   edgt-icon-medium\" style=\"background-color: #fed072\" >\n                    <span aria-hidden=\"true\" class=\"edgt-icon-linear-icons lnr lnr-graduation-hat edgt-icon-element\" style=\"\" ><\/span>            <\/span>\n\t<\/div>\n\t<div class=\"edgt-showcase-content\">\n\t\t<div class=\"edgt-showcase-content-table\">\n\t\t\t<div class=\"edgt-showcase-content-cell\">\n\t\t\t\t\t\t\t\t\t<h3 class='edgt-showcase-title'>BBA Management<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"edgt-showcase-content-inner\">\n\t\t\t\t\t\tBBA Management Degree Courses featuring strategic management, finance, accounting, human resource management etc&#8230;\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div><div class=\"edgt-showcase-item-holder\">\n\t<div class=\"edgt-showcase-icon\">\n\t\t    <span class=\"edgt-icon-shortcode edgt-circle   edgt-icon-medium\" style=\"background-color: #00d0ff\" >\n                    <span aria-hidden=\"true\" class=\"edgt-icon-linear-icons lnr lnr-graduation-hat edgt-icon-element\" style=\"\" ><\/span>            <\/span>\n\t<\/div>\n\t<div class=\"edgt-showcase-content\">\n\t\t<div class=\"edgt-showcase-content-table\">\n\t\t\t<div class=\"edgt-showcase-content-cell\">\n\t\t\t\t\t\t\t\t\t<h3 class='edgt-showcase-title'>Master of Business Administration<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"edgt-showcase-content-inner\">\n\t\t\t\t\t\tThe Master of Business Administration (MBA) Degree Course deals with advanced professional practice and issues pertaining to corporate strategic management, business finance, managerial accounting, human resource management, research methods and business information systems.\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div><div class=\"edgt-showcase-item-holder\">\n\t<div class=\"edgt-showcase-icon\">\n\t\t    <span class=\"edgt-icon-shortcode edgt-circle   edgt-icon-medium\" style=\"background-color: #f09b89\" >\n                    <span aria-hidden=\"true\" class=\"edgt-icon-linear-icons lnr lnr-graduation-hat edgt-icon-element\" style=\"\" ><\/span>            <\/span>\n\t<\/div>\n\t<div class=\"edgt-showcase-content\">\n\t\t<div class=\"edgt-showcase-content-table\">\n\t\t\t<div class=\"edgt-showcase-content-cell\">\n\t\t\t\t\t\t\t\t\t<h3 class='edgt-showcase-title'>ATHE Diplomas<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"edgt-showcase-content-inner\">\n\t\t\t\t\t\tThe ATHE Level 4 &amp; 5 Extended Diplomas in Management cover topics pertaining to organizational behaviour, Customer Relationship Management, Employability Skills, Business Law, Personal and Professional Development.\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div><div class=\"edgt-showcase-item-holder\">\n\t<div class=\"edgt-showcase-icon\">\n\t\t    <span class=\"edgt-icon-shortcode edgt-circle   edgt-icon-medium\" style=\"background-color: #ff94c4\" >\n                    <span aria-hidden=\"true\" class=\"edgt-icon-linear-icons lnr lnr-graduation-hat edgt-icon-element\" style=\"\" ><\/span>            <\/span>\n\t<\/div>\n\t<div class=\"edgt-showcase-content\">\n\t\t<div class=\"edgt-showcase-content-table\">\n\t\t\t<div class=\"edgt-showcase-content-cell\">\n\t\t\t\t\t\t\t\t\t<h3 class='edgt-showcase-title'>BSc Computing<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"edgt-showcase-content-inner\">\n\t\t\t\t\t\tThe BSc Computing course aims to equip students with a wide range of necessary knowledge and skills pertaining to software development, systems analysis, cloud computing, programming, database design etc&#8230;\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div><div class=\"edgt-showcase-item-holder\">\n\t<div class=\"edgt-showcase-icon\">\n\t\t    <span class=\"edgt-icon-shortcode edgt-circle   edgt-icon-medium\" style=\"background-color: #ea6d23\" >\n                    <span aria-hidden=\"true\" class=\"edgt-icon-linear-icons lnr lnr-license edgt-icon-element\" style=\"\" ><\/span>            <\/span>\n\t<\/div>\n\t<div class=\"edgt-showcase-content\">\n\t\t<div class=\"edgt-showcase-content-table\">\n\t\t\t<div class=\"edgt-showcase-content-cell\">\n\t\t\t\t\t\t\t\t\t<h3 class='edgt-showcase-title'>MSc in I.T.<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"edgt-showcase-content-inner\">\n\t\t\t\t\t\tThe MSc I.T. course aims to develop a good understanding and knowledge of current and emerging IT and computer technologies. The course aims to equip students with a combination of relevant technical skills and &#8216;client-facing&#8217; awareness in preparation for, or in enhancement of, a career within the IT industry.\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div><div class=\"edgt-showcase-item-holder\">\n\t<div class=\"edgt-showcase-icon\">\n\t\t    <span class=\"edgt-icon-shortcode edgt-circle   edgt-icon-medium\" style=\"background-color: #5bd7cb\" >\n                    <span aria-hidden=\"true\" class=\"edgt-icon-linear-icons lnr lnr-license edgt-icon-element\" style=\"\" ><\/span>            <\/span>\n\t<\/div>\n\t<div class=\"edgt-showcase-content\">\n\t\t<div class=\"edgt-showcase-content-table\">\n\t\t\t<div class=\"edgt-showcase-content-cell\">\n\t\t\t\t\t\t\t\t\t<h3 class='edgt-showcase-title'>Health-Care Management Courses<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"edgt-showcase-content-inner\">\n\t\t\t\t\t\tHealth-Care Management Courses cover concepts and practices in the health-care sector-key approaches &amp; trends.\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div><div class=\"edgt-showcase-item-holder\">\n\t<div class=\"edgt-showcase-icon\">\n\t\t    <span class=\"edgt-icon-shortcode edgt-circle   edgt-icon-medium\" style=\"background-color: #395584\" >\n                    <span aria-hidden=\"true\" class=\"edgt-icon-linear-icons lnr lnr-license edgt-icon-element\" style=\"\" ><\/span>            <\/span>\n\t<\/div>\n\t<div class=\"edgt-showcase-content\">\n\t\t<div class=\"edgt-showcase-content-table\">\n\t\t\t<div class=\"edgt-showcase-content-cell\">\n\t\t\t\t\t\t\t\t\t<h3 class='edgt-showcase-title'>Project Management Courses<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"edgt-showcase-content-inner\">\n\t\t\t\t\t\tThe courses characterize the key project planning phases and project control techniques. Added emphasis is placed on the use of structured methodologies for project initiation, estimation, control and closeout. The risks associated with running large projects are discussed, as well as measures for mitigating these risks.\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div><div class=\"edgt-showcase-item-holder\">\n\t<div class=\"edgt-showcase-icon\">\n\t\t    <span class=\"edgt-icon-shortcode edgt-circle   edgt-icon-medium\" style=\"background-color: #e8ea62\" >\n                    <span aria-hidden=\"true\" class=\"edgt-icon-linear-icons lnr lnr-license edgt-icon-element\" style=\"\" ><\/span>            <\/span>\n\t<\/div>\n\t<div class=\"edgt-showcase-content\">\n\t\t<div class=\"edgt-showcase-content-table\">\n\t\t\t<div class=\"edgt-showcase-content-cell\">\n\t\t\t\t\t\t\t\t\t<h3 class='edgt-showcase-title'>Hospitality &amp; Hotel Management Courses<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"edgt-showcase-content-inner\">\n\t\t\t\t\t\tThe Hospitality &amp; Hotel Management Courses cover contemporary hospitality and hotel management techniques. The courses impart practical knowledge of hospitality concepts, hotel management practices and operations control techniques, to allow more effective work in the sector.\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><div class=\"edgt-int-icon-circle\"><\/div><\/div>[vc_empty_space height=&#8221;45px&#8221;][\/vc_column][vc_column offset=&#8221;vc_col-lg-6&#8243;][vc_single_image image=&#8221;3616&#8243; img_size=&#8221;400&#215;600&#8243; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;45px&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1500631548026{padding-right: 18px !important;padding-left: 18px !important;}&#8221;][vc_column]<div class=\"edgt-separator-holder clearfix  edgt-separator-center edgt-separator-full-width\">\n\t<div class=\"edgt-separator\" style=\"border-color: #ececec;border-style: solid;border-bottom-width: 1px\"><\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1500631570681{padding-right: 18px !important;padding-left: 18px !important;}&#8221;][vc_column]<div class=\"edgt-separator-holder clearfix  edgt-separator-center edgt-separator-full-width\">\n\t<div class=\"edgt-separator\" style=\"border-color: #ececec;border-style: solid;border-bottom-width: 1px\"><\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row content_text_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1500631576241{padding-top: 73px !important;padding-right: 18px !important;padding-bottom: 68px !important;padding-left: 18px !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-offset-2 vc_col-lg-8&#8243;]<div class=\"edgt-section-title-holder  edgt-st-standard edgt-st-title-left edgt-st-normal-space \" style=\"text-align: center\">\n\t<div class=\"edgt-st-inner\">\n\t\t\t\t\t<h2 class=\"edgt-st-title\" >\n\t\t\t\tKey Computing Programs\t\t\t<\/h2>\n\t\t\t\t\t<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1500631581696{padding-top: 8px !important;padding-right: 18px !important;padding-left: 18px !important;}&#8221;][vc_column width=&#8221;5\/6&#8243; offset=&#8221;vc_col-lg-offset-0 vc_col-lg-4 vc_col-md-offset-0 vc_col-md-4 vc_col-sm-offset-1&#8243; css=&#8221;.vc_custom_1500464842641{padding-right: 10% !important;}&#8221;]<div class=\"edgt-iwt clearfix  edgt-iwt-icon-left-from-title edgt-iwt-icon-medium\">\n\t<div class=\"edgt-iwt-content\" >\n\t\t\t\t\t<h4 class=\"edgt-iwt-title\" >\n\t\t\t\t\t\t\t\t\t<span class=\"edgt-iwt-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"58\" height=\"55\" src=\"https:\/\/embt-college.org\/embt1\/wp-content\/uploads\/2017\/07\/h2-icon-2.png\" class=\"attachment-full size-full\" alt=\"a\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"edgt-iwt-title-text\">BSc Computing<\/span>\n\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_empty_space height=&#8221;30px&#8221;][\/vc_column][vc_column width=&#8221;5\/6&#8243; offset=&#8221;vc_col-lg-offset-0 vc_col-lg-4 vc_col-md-offset-0 vc_col-md-4 vc_col-sm-offset-1&#8243; css=&#8221;.vc_custom_1500464850412{padding-right: 10% !important;}&#8221;]<div class=\"edgt-iwt clearfix  edgt-iwt-icon-left-from-title edgt-iwt-icon-medium\">\n\t<div class=\"edgt-iwt-content\" >\n\t\t\t\t\t<h4 class=\"edgt-iwt-title\" >\n\t\t\t\t\t\t\t\t\t<span class=\"edgt-iwt-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"58\" height=\"55\" src=\"https:\/\/embt-college.org\/embt1\/wp-content\/uploads\/2017\/07\/h2-icon-2.png\" class=\"attachment-full size-full\" alt=\"a\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"edgt-iwt-title-text\">MSc in I.T.<\/span>\n\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_empty_space height=&#8221;30px&#8221;][\/vc_column][vc_column width=&#8221;5\/6&#8243; offset=&#8221;vc_col-lg-offset-0 vc_col-lg-4 vc_col-md-offset-0 vc_col-md-4 vc_col-sm-offset-1&#8243; css=&#8221;.vc_custom_1500464857348{padding-right: 10% !important;}&#8221;]<div class=\"edgt-iwt clearfix  edgt-iwt-icon-left-from-title edgt-iwt-icon-medium\">\n\t<div class=\"edgt-iwt-content\" >\n\t\t\t\t\t<h4 class=\"edgt-iwt-title\" >\n\t\t\t\t\t\t\t\t\t<span class=\"edgt-iwt-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"58\" height=\"55\" src=\"https:\/\/embt-college.org\/embt1\/wp-content\/uploads\/2017\/07\/h2-icon-2.png\" class=\"attachment-full size-full\" alt=\"a\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"edgt-iwt-title-text\">L4, L5, L6 Computing Diplomas<\/span>\n\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1501058772978{padding-top: 24px !important;padding-right: 18px !important;padding-bottom: 58px !important;padding-left: 18px !important;}&#8221;][vc_column width=&#8221;5\/6&#8243; offset=&#8221;vc_col-lg-offset-0 vc_col-lg-4 vc_col-md-offset-0 vc_col-md-4 vc_col-sm-offset-1&#8243; css=&#8221;.vc_custom_1500464842641{padding-right: 10% !important;}&#8221;]<div class=\"edgt-iwt clearfix  edgt-iwt-icon-left-from-title edgt-iwt-icon-medium\">\n\t<div class=\"edgt-iwt-content\" >\n\t\t\t\t\t<h4 class=\"edgt-iwt-title\" >\n\t\t\t\t\t\t\t\t\t<span class=\"edgt-iwt-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"58\" height=\"55\" src=\"https:\/\/embt-college.org\/embt1\/wp-content\/uploads\/2017\/07\/h2-icon-2.png\" class=\"attachment-full size-full\" alt=\"a\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"edgt-iwt-title-text\">IDESA Certified Cyber &amp; Information Security Specialist (ICCISS) Diploma<\/span>\n\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_empty_space height=&#8221;30px&#8221;][\/vc_column][vc_column width=&#8221;5\/6&#8243; offset=&#8221;vc_col-lg-offset-0 vc_col-lg-4 vc_col-md-offset-0 vc_col-md-4 vc_col-sm-offset-1&#8243; css=&#8221;.vc_custom_1500464850412{padding-right: 10% !important;}&#8221;]<div class=\"edgt-iwt clearfix  edgt-iwt-icon-left-from-title edgt-iwt-icon-medium\">\n\t<div class=\"edgt-iwt-content\" >\n\t\t\t\t\t<h4 class=\"edgt-iwt-title\" >\n\t\t\t\t\t\t\t\t\t<span class=\"edgt-iwt-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"58\" height=\"55\" src=\"https:\/\/embt-college.org\/embt1\/wp-content\/uploads\/2017\/07\/h2-icon-2.png\" class=\"attachment-full size-full\" alt=\"a\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"edgt-iwt-title-text\">IDESA Certified Data Science Professional (ICDSP) Diploma<\/span>\n\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_empty_space height=&#8221;30px&#8221;][\/vc_column][vc_column width=&#8221;5\/6&#8243; offset=&#8221;vc_col-lg-offset-0 vc_col-lg-4 vc_col-md-offset-0 vc_col-md-4 vc_col-sm-offset-1&#8243; css=&#8221;.vc_custom_1500464857348{padding-right: 10% !important;}&#8221;]<div class=\"edgt-iwt clearfix  edgt-iwt-icon-left-from-title edgt-iwt-icon-medium\">\n\t<div class=\"edgt-iwt-content\" >\n\t\t\t\t\t<h4 class=\"edgt-iwt-title\" >\n\t\t\t\t\t\t\t\t\t<span class=\"edgt-iwt-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"58\" height=\"55\" src=\"https:\/\/embt-college.org\/embt1\/wp-content\/uploads\/2017\/07\/h2-icon-2.png\" class=\"attachment-full size-full\" alt=\"a\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"edgt-iwt-title-text\">IDESA Certified Enterprise &amp; Solution Architect (ICESA) Diploma<\/span>\n\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1501058597394{padding-right: 34px !important;padding-left: 33px !important;}&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1502464536701{padding-top: 22px !important;padding-bottom: 53px !important;background-image: url(http:\/\/educator.edge-themes.com\/wp-content\/uploads\/2017\/07\/h2-call-to-action.png?id=1669) !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221;][vc_column_inner]<div class=\"edgt-call-to-action-holder  edgt-block-layout \">\n\t<div class=\"edgt-cta-inner \">\n\t\t<div class=\"edgt-cta-text-holder\">\n\t\t\t<div class=\"edgt-cta-text\">\n<h4>Apply for a place online or by visiting your nearest EMBT College educational center and completing the application form.<\/h4>\n<\/div>\n\t\t<\/div>\n\t\t<div class=\"edgt-cta-button-holder\" >\n\t\t\t<div class=\"edgt-cta-button\"><a itemprop=\"url\" href=\"http:\/\/embt-college.org\/embt1\/apply\/\" target=\"_self\" style=\"background-color: #ea6d23\" class=\"edgt-btn edgt-btn-medium edgt-btn-solid\"  >    <span class=\"edgt-btn-text\">Apply Online Now!<\/span>    <\/a><\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row content_text_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1501059126511{padding-top: 45px !important;padding-right: 18px !important;padding-bottom: 15px !important;padding-left: 18px !important;}&#8221;][vc_column]<div class=\"edgt-image-gallery  edgt-ig-grid-type   edgt-image-behavior-lightbox\">\n\t<div class=\"edgt-ig-inner edgt-ig-grid edgt-ig-three-columns edgt-ig-normal-space\">\n\t\t\t\t\t<div class=\"edgt-ig-image\">\n\t\t\t\t<div class=\"edgt-ig-image-inner\">\n\t\t\t\t\t\t\t\t\t\t\t<a itemprop=\"image\" class=\"edgt-ig-lightbox\" href=\"https:\/\/embt-college.org\/embt1\/wp-content\/uploads\/2022\/04\/happy-college-students-looking-camera-smiles-313879979-scaled.jpg\" data-rel=\"prettyPhoto[image_gallery_pretty_photo-288]\" title=\"Happy,College,Students,Looking,At,Camera,With,Smiles\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/embt-college.org\/embt1\/wp-content\/uploads\/2022\/04\/happy-college-students-looking-camera-smiles-313879979-scaled-450x300.jpg\" alt=\"\" width=\"450\" height=\"300\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"edgt-ig-image\">\n\t\t\t\t<div class=\"edgt-ig-image-inner\">\n\t\t\t\t\t\t\t\t\t\t\t<a itemprop=\"image\" class=\"edgt-ig-lightbox\" href=\"https:\/\/embt-college.org\/embt1\/wp-content\/uploads\/2022\/04\/education-teenager-knowledge-learning-concept-404329870-v2-scaled.jpg\" data-rel=\"prettyPhoto[image_gallery_pretty_photo-288]\" title=\"Education,Teenager,Knowledge,Learning,Concept\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/embt-college.org\/embt1\/wp-content\/uploads\/2022\/04\/education-teenager-knowledge-learning-concept-404329870-v2-scaled-450x300.jpg\" alt=\"\" width=\"450\" height=\"300\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"edgt-ig-image\">\n\t\t\t\t<div class=\"edgt-ig-image-inner\">\n\t\t\t\t\t\t\t\t\t\t\t<a itemprop=\"image\" class=\"edgt-ig-lightbox\" href=\"https:\/\/embt-college.org\/embt1\/wp-content\/uploads\/2022\/04\/students-walk-talk-using-mobile-devices-478513852-v2-scaled.jpg\" data-rel=\"prettyPhoto[image_gallery_pretty_photo-288]\" title=\"Students,Walk,And,Talk,Using,Mobile,Devices,In,University\">\n\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/embt-college.org\/embt1\/wp-content\/uploads\/2022\/04\/students-walk-talk-using-mobile-devices-478513852-v2-scaled-450x300.jpg\" alt=\"\" width=\"450\" height=\"300\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1501059050964{padding-top: 0px !important;padding-right: 18px !important;padding-bottom: 0px !important;padding-left: 18px !important;}&#8221;][vc_column css=&#8221;.vc_custom_1501059057794{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;]<div class=\"edgt-separator-holder clearfix  edgt-separator-center edgt-separator-full-width\">\n\t<div class=\"edgt-separator\" style=\"border-color: #ececec;border-style: solid;border-bottom-width: 1px;margin-top: 0px;margin-bottom: 0px\"><\/div>\n<\/div>\n[\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1501236643896{padding-right: 18px !important;padding-left: 18px !important;}&#8221;][vc_column][vc_empty_space][rev_slider_vc alias=&#8221;home-2-1&#8243; enable_paspartu=&#8221;no&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1501056380037{padding-top: 30px !important;padding-right: 18px !important;padding-left: 18px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-offset-0 vc_col-lg-4 vc_col-md-offset-0 vc_col-md-4 vc_col-sm-offset-0&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-offset-0 vc_col-lg-4 vc_col-md-offset-0 vc_col-md-4 vc_col-sm-offset-0&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-lg-offset-0 vc_col-lg-4 vc_col-md-offset-0 vc_col-md-4 vc_col-sm-offset-0&#8243;][\/vc_column][\/vc_row][vc_row content_text_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1501056573674{padding-top: 59px !important;padding-right: 18px !important;padding-bottom: 68px !important;padding-left: 18px !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-offset-2 vc_col-lg-8&#8243;][vc_empty_space height=&#8221;45px&#8221;][\/vc_column][\/vc_row][vc_row content_text_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1501056573674{padding-top: 59px !important;padding-right: 18px !important;padding-bottom: 68px !important;padding-left: 18px !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-offset-2 vc_col-lg-8&#8243;][vc_empty_space height=&#8221;45px&#8221;][\/vc_column][\/vc_row][vc_row content_text_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1501056573674{padding-top: 59px !important;padding-right: 18px !important;padding-bottom: 68px !important;padding-left: 18px !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-offset-2 vc_col-lg-8&#8243;][vc_empty_space height=&#8221;45px&#8221;][\/vc_column][\/vc_row][vc_row content_text_aligment=&#8221;center&#8221; css=&#8221;.vc_custom_1501056573674{padding-top: 59px !important;padding-right: 18px !important;padding-bottom: 68px !important;padding-left: 18px !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-offset-2 vc_col-lg-8&#8243;][vc_empty_space height=&#8221;45px&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1500631507905{padding-right: 18px !important;padding-left: 18px !important;}&#8221;][vc_column [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"spay_email":"","footnotes":""},"class_list":["post-3722","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/embt-college.org\/embt1\/wp-json\/wp\/v2\/pages\/3722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/embt-college.org\/embt1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/embt-college.org\/embt1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/embt-college.org\/embt1\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/embt-college.org\/embt1\/wp-json\/wp\/v2\/comments?post=3722"}],"version-history":[{"count":9,"href":"https:\/\/embt-college.org\/embt1\/wp-json\/wp\/v2\/pages\/3722\/revisions"}],"predecessor-version":[{"id":3788,"href":"https:\/\/embt-college.org\/embt1\/wp-json\/wp\/v2\/pages\/3722\/revisions\/3788"}],"wp:attachment":[{"href":"https:\/\/embt-college.org\/embt1\/wp-json\/wp\/v2\/media?parent=3722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}