

{"id":760,"date":"2021-05-10T13:10:58","date_gmt":"2021-05-10T11:10:58","guid":{"rendered":"https:\/\/ui.iit.cnr.it\/?page_id=760"},"modified":"2021-06-24T10:42:07","modified_gmt":"2021-06-24T08:42:07","slug":"masters","status":"publish","type":"page","link":"https:\/\/tsp.iit.cnr.it\/en\/education\/masters\/","title":{"rendered":"Masters"},"content":{"rendered":"<h4 class=\"wp-block-heading\"><strong><a rel=\"noreferrer noopener\" href=\"http:\/\/www.cybersecuritymaster.it\" target=\"_blank\">Cyber Security Master<\/a> <span style=\"color:#003157\" class=\"has-inline-color\">1st Level Professional Master Degree<\/span><\/strong><\/h4>\n\n\n\n<p><em>Organized  by IIT-CNR and Dipartimento di Ingegneria dell\u2019Informazione &#8211; Universit\u00e0 degli Studi di Pisa<br><\/em><br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.iit.cnr.it\/fabio.martinelli\" target=\"_blank\">Fabio Martinelli<\/a>, Master&#8217;s Scientific Committee<br><br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.iit.cnr.it\/paolo.mori\" target=\"_blank\">Paolo Mori<\/a>, course \u201cMobile and Cloud Security\u201d<br><br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.iit.cnr.it\/gianpiero.costantino\" target=\"_blank\">Gianpiero Costantino<\/a>, LAB on Secure Tool and Application: Offensive Security e Hacking Tools<br><br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.iit.cnr.it\/andrea.saracino\" target=\"_blank\">Andrea Saracino<\/a>, course &#8220;Secure Application Development&#8221;<br><\/p>","protected":false},"excerpt":{"rendered":"<p>Cyber Security Master 1st Level Professional Master Degree Organized by IIT-CNR and Dipartimento di Ingegneria dell\u2019Informazione &#8211; Universit\u00e0 degli Studi di PisaFabio Martinelli, Master&#8217;s Scientific Committee Paolo Mori, course \u201cMobile and Cloud Security\u201d Gianpiero Costantino, LAB on Secure Tool and Application: Offensive Security e Hacking Tools Andrea Saracino, course &#8220;Secure Application Development&#8221;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":752,"menu_order":34,"comment_status":"closed","ping_status":"closed","template":"pagina_con_sottopagine.php","meta":{"footnotes":""},"class_list":["post-760","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/760","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/comments?post=760"}],"version-history":[{"count":6,"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/760\/revisions"}],"predecessor-version":[{"id":1172,"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/760\/revisions\/1172"}],"up":[{"embeddable":true,"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/752"}],"wp:attachment":[{"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/media?parent=760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}