{"id":657,"date":"2024-01-27T10:40:22","date_gmt":"2024-01-27T10:40:22","guid":{"rendered":"https:\/\/staging.e5h.co.uk\/?page_id=657"},"modified":"2025-03-12T08:25:05","modified_gmt":"2025-03-12T08:25:05","slug":"training","status":"publish","type":"page","link":"https:\/\/icmscyber.com\/ja\/training\/","title":{"rendered":"\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0"},"content":{"rendered":"<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<div class=\"guten-element guten-spacer guten-0dKoYR\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u30b5\u30fc\u30d3\u30b9<\/h2>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"guten-9SxUId animated guten-element-hide slow desktop-fadeIn guten-image-box guten-element style-default\"><div class=\"inner-container\"><div class=\"image-box-header\"><img decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/01\/Training-Course-2.jpg\" height=\"1024\" width=\"1024\"\/><\/div><div class=\"image-box-body\"><div class=\"body-inner\"><h3 class=\"body-title icon-position-before\"><i><\/i><span>\u30c7\u30b8\u30bf\u30eb\u30fb\u30d5\u30a9\u30ec\u30f3\u30b8\u30c3\u30af\/\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8b1b\u5ea7<\/span><\/h3><p class=\"body-description\">\u4eca\u65e5\u306e\u30c7\u30b8\u30bf\u30eb\u6642\u4ee3\u3067\u306f\u30c7\u30b8\u30bf\u30eb\u8a3c\u62e0\u306f\u3001\u30c7\u30fc\u30bf\u4fb5\u5bb3\u8abf\u67fb\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u3001\u5185\u90e8\u4e0d\u6b63\u306a\u3069\u306e\u96fb\u5b50\u8a3c\u62e0\u3092\u6271\u3046\u3042\u3089\u3086\u308b\u7d44\u7e54\u306b\u3068\u3063\u3066\u4e0d\u53ef\u6b20\u306a\u30b9\u30ad\u30eb\u3067\u3059\u3002\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u76f4\u9762\u3057\u305f\u5834\u5408\u3001\u30a8\u30d3\u30c7\u30f3\u30b9\u306e\u7d1b\u5931\u3084\u4e0d\u6b63\u3092\u9632\u3050\u305f\u3081\u306b\u3001\u8fc5\u901f\u306b\u5bfe\u5fdc\u3057\u3001\u96fb\u5b50\u30a8\u30d3\u30c7\u30f3\u30b9\u3092\u6b63\u3057\u304f\u51e6\u7406\u3059\u308b\u3053\u3068\u304c\u91cd\u8981\u3067\u3059\u3002<br>\u5f53\u793e\u306e\u793e\u5185\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u30b3\u30fc\u30b9\u306f\u3001\u7d44\u7e54\u306b\u591a\u304f\u306e\u5229\u76ca\u3092\u3082\u305f\u3089\u3059\u8cbb\u7528\u5bfe\u52b9\u679c\u306e\u9ad8\u3044\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002<br>\u2013 \u5168\u30b3\u30fc\u30b9\u304c\u7279\u5b9a\u306e\u8981\u4ef6\u306b\u5408\u308f\u305b\u3066\u30ab\u30b9\u30bf\u30de\u30a4\u30ba\u5bfe\u5fdc\u53ef\u80fd<br>\u2013 \u8cbb\u7528\u5bfe\u52b9\u679c<br>\u2013 \u62c5\u5f53\u8005\u306e\u30b9\u30ad\u30eb\u3068\u4fe1\u983c\u6027\u306e\u5411\u4e0a<br>&#8211; Courses developed &#038; delivered by experienced forensic investigators<br>\u2013 \u5b9f\u7528\u7684\u304b\u3064\u9069\u7528\u6027<br>\u2013 \u30d5\u30ea\u30fc\u304a\u3088\u3073\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u306e\u5404\u7a2e\u30c4\u30fc\u30eb\u3092\u4f7f\u7528\u3057\u305f\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30cb\u30e5\u30fc\u30c8\u30e9\u30eb<\/p>\n<div class=\"guten-element guten-button-wrapper guten-o7fVx3\"><a class=\"guten-button guten-button-xs\" href=\"#\"><span><\/span><\/a><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"guten-element guten-spacer guten-SdyjAz\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<div class=\"wp-block-cover alignfull is-light\" style=\"min-height:457px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-center is-image-fill has-startupzy-text-background-color has-background\" style=\"grid-template-columns:56% auto\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/01\/cyber-security-1-1-1.jpg);background-position:50% 50%\"><img decoding=\"async\" width=\"640\" height=\"433\" src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/01\/cyber-security-1-1-1.jpg\" alt=\"Forensic Techniques for Auditors\" class=\"wp-image-711 size-full\" srcset=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/01\/cyber-security-1-1-1.jpg 640w, https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/01\/cyber-security-1-1-1-300x203.jpg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#000000;font-size:32px\"><strong>\u76e3\u67fb\u4eba\u306e\u305f\u3081\u306e1\u65e5\u9593\u306e\u30d5\u30a9\u30ec\u30f3\u30b8\u30c3\u30af\u6280\u8853<\/strong><\/h2>\n\n\n\n<p class=\"has-text-color\" style=\"color:#000000;font-size:17px\">\u76e3\u67fb\u4eba\u3068IT\u8981\u54e1\u306b\u3001\u5185\u90e8\u76e3\u67fb\u30d7\u30ed\u30bb\u30b9\u3092\u88dc\u5b8c\u3059\u308b\u305f\u3081\u306b\u5229\u7528\u3067\u304d\u308b\u69d8\u3005\u306a\u30d5\u30a9\u30ec\u30f3\u30b8\u30c3\u30af\u6280\u8853\u306b\u3064\u3044\u3066\u7406\u89e3\u3092\u6df1\u3081\u308b\u4e8b\u3092\u76ee\u7684\u3068\u3057\u305f1\u65e5\u9593\u306e\u30b3\u30fc\u30b9\u3002<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/icmscyber.com\/ja\/training\/forensic-techniques-for-auditors-course\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\" style=\"min-height:457px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-center is-image-fill has-startupzy-text-background-color has-background\" style=\"grid-template-columns:56% auto\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/09\/Forensic-Awareness-1024x1024.png);background-position:50% 50%\"><img decoding=\"async\" src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/09\/Forensic-Awareness-1024x1024.png\" alt=\"Forensic Awareness\" class=\"wp-image-1920 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#000000;font-size:32px\"><strong>1-Day Digital Forensics Awareness &amp; Incident Response<\/strong><\/h2>\n\n\n\n<p class=\"has-text-color\" style=\"color:#000000;font-size:17px\">A 1-day course specifically designed for IT staff who may encounter cyber security threats in their roles.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/icmscyber.com\/ja\/digital-forensic-awareness-incident-response-course\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\" style=\"min-height:646px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-center is-image-fill has-startupzy-text-background-color has-background\" style=\"grid-template-columns:56% auto\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/02\/Forensic-Data-Collection-1.jpg);background-position:50% 50%\"><img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/02\/Forensic-Data-Collection-1.jpg\" alt=\"Forensic Data Collection\" class=\"wp-image-1102 size-full\" srcset=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/02\/Forensic-Data-Collection-1.jpg 512w, https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/02\/Forensic-Data-Collection-1-300x300.jpg 300w, https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/02\/Forensic-Data-Collection-1-150x150.jpg 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#000000;font-size:32px\"><strong>\u30d5\u30a1\u30fc\u30b9\u30c8\u30fb\u30ec\u30b9\u30dd\u30f3\u30c0\u30fc\uff08\u521d\u671f\u5bfe\u5fdc\u8005\uff09\u306e\u305f\u3081\u306e2\u65e5\u9593\u306e\u30c7\u30b8\u30bf\u30eb\u30fb\u30d5\u30a9\u30ec\u30f3\u30b8\u30c3\u30af\u30fb\u30c7\u30fc\u30bf\u53ce\u96c6<\/strong><\/h2>\n\n\n\n<p class=\"has-text-color translation-block\" style=\"color:#000000;font-size:17px\">2\u65e5\u9593\u306e\u30c7\u30b8\u30bf\u30eb\u30fb\u30d5\u30a9\u30ec\u30f3\u30b8\u30c3\u30af\u3000\u30d5\u30a1\u30fc\u30b9\u30c8\u30fb\u30ec\u30b9\u30dd\u30f3\u30c0\u30fc\uff08\u521d\u671f\u5bfe\u5fdc\u8005\uff09\u30b3\u30fc\u30b9\u306e\u305f\u3081\u306e\u30c7\u30fc\u30bf\u53ce\u96c6\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5f8c\u306b\u96fb\u5b50\u7684\u306b\u4fdd\u5b58\u3055\u308c\u305f\u60c5\u5831(ESI)\u3092\u6cd5\u7684\u306b\u4fdd\u5b58\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\u3001\u307e\u305f\u306f\u6cd5\u7684\u63aa\u7f6e\u3092\u30b5\u30dd\u30fc\u30c8\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u30c1\u30fc\u30e0\u306eIT\u8981\u54e1\u3001\u30e1\u30f3\u30d0\u30fc\u306b\u7406\u60f3\u7684\u3067\u3059\u3002<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/icmscyber.com\/ja\/digital-forensics-data-collections-for-first-responders-course\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\" style=\"min-height:647px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-center is-image-fill has-startupzy-text-background-color has-background\" style=\"grid-template-columns:56% auto\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/09\/Digital-Forensic-Investigator.jpg);background-position:50% 50%\"><img decoding=\"async\" width=\"640\" height=\"285\" src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/09\/Digital-Forensic-Investigator.jpg\" alt=\"Digital Forensic Investigator\" class=\"wp-image-1945 size-full\" srcset=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/09\/Digital-Forensic-Investigator.jpg 640w, https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/09\/Digital-Forensic-Investigator-300x134.jpg 300w, https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/09\/Digital-Forensic-Investigator-18x8.jpg 18w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#000000;font-size:32px\"><strong>3-Day Digital Forensics Foundation Investigators Course<\/strong><\/h2>\n\n\n\n<p class=\"has-text-color\" style=\"color:#000000;font-size:17px\">The 3-day Digital Forensics &#8211; Foundation for Investigators course provides essential knowledge and practical skills for professionals involved in investigating digital incidents, cybercrimes, and data breaches.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/icmscyber.com\/ja\/training\/digital-forensics-foundation-investigators-course\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\" style=\"min-height:511px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-center is-image-fill has-startupzy-text-background-color has-background\" style=\"grid-template-columns:56% auto\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/09\/Digital-Forensics-Foundation.png);background-position:50% 50%\"><img decoding=\"async\" width=\"665\" height=\"416\" src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/09\/Digital-Forensics-Foundation.png\" alt=\"Digital Forensics Foundation\" class=\"wp-image-1949 size-full\" srcset=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/09\/Digital-Forensics-Foundation.png 665w, https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/09\/Digital-Forensics-Foundation-300x188.png 300w, https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/09\/Digital-Forensics-Foundation-18x12.png 18w\" sizes=\"(max-width: 665px) 100vw, 665px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#000000;font-size:32px\"><strong>4\u65e5\u9593\u30c7\u30b8\u30bf\u30eb\u30fb\u30d5\u30a9\u30ec\u30f3\u30b8\u30c3\u30af\u57fa\u790e\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u30b3\u30fc\u30b9<\/strong><\/h2>\n\n\n\n<p class=\"has-text-color\" style=\"color:#000000;font-size:17px\">4\u65e5\u9593\u306b\u308f\u305f\u308b\u30c7\u30b8\u30bf\u30eb\u30fb\u30d5\u30a9\u30ec\u30f3\u30b8\u30c3\u30af\u57fa\u790e\u8b1b\u5ea7\u306f\u3001\u30c7\u30b8\u30bf\u30eb\u30fb\u30d5\u30a9\u30ec\u30f3\u30b8\u30c3\u30af\u306e\u8abf\u67fb\u5b98\u3068\u3057\u3066\u3001\u3042\u308b\u3044\u306f\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u80fd\u529b\u3092\u9ad8\u3081\u305f\u3044\u3068\u8003\u3048\u3066\u3044\u308bCyber Security\u793e\u306e\u5c02\u9580\u5bb6\u3068\u3057\u3066\u3001\u30ad\u30e3\u30ea\u30a2\u30a2\u30c3\u30d7\u3057\u305f\u3044\u65b9\u306b\u6700\u9069\u3067\u3059\u3002<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/icmscyber.com\/ja\/training\/digital-forensic-foundation-course\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\" style=\"min-height:586px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-center is-image-fill has-startupzy-text-background-color has-background\" style=\"grid-template-columns:56% auto\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/01\/cyber-threats-1.png);background-position:50% 50%\"><img decoding=\"async\" width=\"640\" height=\"465\" src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/01\/cyber-threats-1.png\" alt=\"Cyber Threats\" class=\"wp-image-741 size-full\" srcset=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/01\/cyber-threats-1.png 640w, https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/01\/cyber-threats-1-300x218.png 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#000000;font-size:32px\"><strong>\u7ba1\u7406\u8005\u5411\u30511\u65e5\u9593\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0<\/strong><\/h2>\n\n\n\n<p class=\"has-text-color\" style=\"color:#000000;font-size:17px\">\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u306f\u81ea\u5206\u3067\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u3067\u304d\u308b\u3082\u306e\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u304c\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u306f\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u3067\u304d\u308b\u3082\u306e\u3067\u3042\u308a\u3001\u30ea\u30b9\u30af\u30d9\u30fc\u30b9\u306e\u30a2\u30d7\u30ed\u30fc\u30c1\u3092\u691c\u8a0e\u3059\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002\u5f53\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u3067\u306f\u3001\u7ba1\u7406\u8077\u3084\u7d4c\u55b6\u5e79\u90e8\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u7406\u89e3\u30fb\u8a55\u4fa1\u30fb\u7a4d\u6975\u7684\u306a\u53d6\u308a\u7d44\u307f\u3092\u884c\u3046\u305f\u3081\u306e\u6e96\u5099\u3092\u3057\u307e\u3059\u3002<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/icmscyber.com\/ja\/cybersecurity-training-for-managers-course\/\">Learn more<\/a><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u30b5\u30fc\u30d3\u30b9<\/p>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-657","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/pages\/657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/comments?post=657"}],"version-history":[{"count":0,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/pages\/657\/revisions"}],"wp:attachment":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/media?parent=657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}