{"id":5970,"date":"2025-06-19T15:46:38","date_gmt":"2025-06-19T13:46:38","guid":{"rendered":"https:\/\/ict-academy.si\/usposabljanje\/ethical-hacking\/"},"modified":"2025-12-10T12:34:12","modified_gmt":"2025-12-10T10:34:12","slug":"ethical-hacking","status":"publish","type":"tribe_events","link":"https:\/\/ict-academy.si\/en\/usposabljanje\/ethical-hacking\/","title":{"rendered":"Ethical hacking"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p><span class=\"TextRun SCXW30146948 BCX8\" lang=\"SL-SI\" data-contrast=\"auto\" xml:lang=\"SL-SI\"><span class=\"NormalTextRun SCXW30146948 BCX8\">The course trains participants to identify<\/span><span class=\"NormalTextRun CommentStart CommentHighlightPipeRest CommentHighlightRest SCXW30146948 BCX8\"> and exploit<\/span> <span class=\"NormalTextRun CommentHighlightPipeRest SCXW30146948 BCX8\">security vulnerabilities in a controlled environment through hands-on exercises and real-world scenarios. Participants gain insight into the mindset of attackers and learn how to effectively conduct security testing, analyze the results, and propose appropriate improvements. The program is suitable for anyone looking to begin a career in ethical   <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW30146948 BCX8\">hacking <\/span><span class=\"NormalTextRun SCXW30146948 BCX8\">or enhance their existing cybersecurity knowledge.<\/span><\/span><span class=\"EOP SCXW30146948 BCX8\" data-ccp-props=\"{}\"> <\/span><\/p>\n","protected":false},"author":5,"featured_media":5967,"template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[61,104,117],"tribe_events_cat":[108,98,107,106],"class_list":["post-5970","tribe_events","type-tribe_events","status-publish","has-post-thumbnail","hentry","tag-cybersecurity","tag-protocols","tag-trends","tribe_events_cat-all","tribe_events_cat-cisco-academy","tribe_events_cat-networks","tribe_events_cat-security","cat_all","cat_cisco-academy","cat_networks","cat_security"],"acf":[],"_links":{"self":[{"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/tribe_events\/5970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":1,"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/tribe_events\/5970\/revisions"}],"predecessor-version":[{"id":6228,"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/tribe_events\/5970\/revisions\/6228"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/media\/5967"}],"wp:attachment":[{"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/media?parent=5970"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/tags?post=5970"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/tribe_events_cat?post=5970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}