{"id":76336,"date":"2015-05-25T08:28:39","date_gmt":"2015-05-25T13:28:39","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?post_type=tribe_events&p=76336"},"modified":"2015-05-25T09:02:57","modified_gmt":"2015-05-25T14:02:57","slug":"june-2015-scholarship-distance-learning-data-security-iso-27001-270002-standards","status":"publish","type":"tribe_events","link":"https:\/\/ict-pulse.com\/events\/june-2015-scholarship-distance-learning-data-security-iso-27001-270002-standards\/","title":{"rendered":"Scholarship: Distance-learning course on Data Security and ISO 27001 and 270002 standards"},"content":{"rendered":"

Scholarship!<\/strong><\/h2>\n\n\n\n\n\n\n\n
\n

Offered by:<\/b><\/span><\/p>\n<\/td>\n

\n

(National Telecommunication Research and Training Institute of Peru [INICTEL-UNI] National University of Engineering of Peru)<\/span><\/p>\n<\/td>\n<\/tr>\n

\n

Type of Course:<\/b><\/span><\/p>\n<\/td>\n

\n

On-line<\/span><\/p>\n<\/td>\n<\/tr>\n

\n

Date(s):<\/b><\/span><\/p>\n<\/td>\n

\n

July 20, 2015 – August 21, 2015<\/span><\/p>\n<\/td>\n<\/tr>\n

\n

Number of scholarships:<\/b><\/span><\/p>\n<\/td>\n

\n

12 Scholarships (Professional Development Scholarship Program and OAS\/CITEL)<\/span><\/p>\n<\/td>\n<\/tr>\n

\n

Deadline for presentation of candidacies:<\/b><\/span><\/p>\n<\/td>\n

\n

June 19, 2015 – Washington, D.C., United States of America<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

 <\/p>\n

more<\/a><\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

Scholarship! Offered by: (National Telecommunication Research and Training Institute of Peru [INICTEL-UNI] National University of Engineering of Peru) Type of Course: On-line Date(s): July 20, 2015 – August 21, 2015 […]<\/p>\n","protected":false},"author":2,"featured_media":6184,"comment_status":"open","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[206,236,228,218],"class_list":["post-76336","tribe_events","type-tribe_events","status-publish","has-post-thumbnail","hentry","tribe_events_cat-cybercrimecybersecurity-3","tribe_events_cat-ict-tech","tribe_events_cat-online","tribe_events_cat-training-course","cat_cybercrimecybersecurity-3","cat_ict-tech","cat_online","cat_training-course"],"aioseo_notices":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events\/76336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=76336"}],"version-history":[{"count":0,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events\/76336\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/6184"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=76336"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=76336"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events_cat?post=76336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}