{"version":"1.0","provider_name":"Cloud Computing and Cyber Security Bundled Programme","provider_url":"https:\/\/www.lithan.com\/cloud-and-cybersecurity","author_name":"admin","author_url":"https:\/\/www.lithan.com\/cloud-and-cybersecurity\/author\/admin_0yw1kh0l\/","title":"Cloud and Cyber Security Bundled Programme","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"4yFOmencFu\"><a href=\"https:\/\/www.lithan.com\/cloud-and-cybersecurity\/\">Cloud and Cyber Security Bundled Programme<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.lithan.com\/cloud-and-cybersecurity\/embed\/#?secret=4yFOmencFu\" width=\"600\" height=\"338\" title=\"&#8220;Cloud and Cyber Security Bundled Programme&#8221; &#8212; Cloud Computing and Cyber Security Bundled Programme\" data-secret=\"4yFOmencFu\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","description":"Become a Cloud &#038; Cybersecurity Specialist* funded up to 95%, even though you are a total beginner *Job placement assistance is provided after training completion. Job placement is not guaranteed. In today\u2019s digital world, cloud computing and cybersecurity skills are essential for anyone entering and growing in an IT career. As more businesses begin their [...]","thumbnail_url":"https:\/\/www.lithan.com\/cloud-and-cybersecurity\/wp-content\/uploads\/sites\/18\/2025\/07\/cloud-computing-cybersecurity.png"}