{"id":10142,"date":"2024-03-27T10:52:03","date_gmt":"2024-03-27T05:22:03","guid":{"rendered":"https:\/\/rsmpoly.org\/?p=10142"},"modified":"2024-03-27T10:52:03","modified_gmt":"2024-03-27T05:22:03","slug":"guest-lecture-on-cyber-security-and-cyber-laws","status":"publish","type":"post","link":"https:\/\/rsmpoly.org\/index.php\/2024\/03\/27\/guest-lecture-on-cyber-security-and-cyber-laws\/","title":{"rendered":"Guest Lecture on \u201cCyber Security and Cyber Laws\u201d"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-10144\" src=\"https:\/\/rsmpoly.org\/wp-content\/uploads\/2024\/03\/3-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/rsmpoly.org\/wp-content\/uploads\/2024\/03\/3-300x200.jpg 300w, https:\/\/rsmpoly.org\/wp-content\/uploads\/2024\/03\/3-1024x682.jpg 1024w, https:\/\/rsmpoly.org\/wp-content\/uploads\/2024\/03\/3-768x512.jpg 768w, https:\/\/rsmpoly.org\/wp-content\/uploads\/2024\/03\/3-360x240.jpg 360w, https:\/\/rsmpoly.org\/wp-content\/uploads\/2024\/03\/3.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<div dir=\"auto\">MVPS\u2019s Rajarshi Shahu Maharaj Polytechnic,Nashik has conducted Expert Lecture on &#8220;Cyber Security and Cyber Crime \u201d for Third year Information Technology Students on 31st January 2024.<\/div>\n<div dir=\"auto\">The lecture was delivered by Dr. Tanmay Dikshit and Mr. Sambhaji Shinde (Cyber and digital forensic experts)<\/div>\n<div dir=\"auto\">The session was Co-ordinated by Prof. S. S. Tile under the guidance of Prof.M. B. Patil(HOD-IF) and Principal Prof.Prashant Patil.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>MVPS\u2019s Rajarshi Shahu Maharaj Polytechnic,Nashik has conducted Expert Lecture on &#8220;Cyber Security and Cyber Crime \u201d for Third year Information Technology Students on 31st January 2024. The lecture was delivered by Dr. Tanmay Dikshit and Mr. Sambhaji Shinde (Cyber and <a href=\"https:\/\/rsmpoly.org\/index.php\/2024\/03\/27\/guest-lecture-on-cyber-security-and-cyber-laws\/\" class=\"read-more\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":4,"featured_media":10143,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[71],"tags":[],"class_list":["post-10142","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-recent-event"],"acf":[],"_links":{"self":[{"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/posts\/10142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/comments?post=10142"}],"version-history":[{"count":1,"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/posts\/10142\/revisions"}],"predecessor-version":[{"id":10145,"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/posts\/10142\/revisions\/10145"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/media\/10143"}],"wp:attachment":[{"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/media?parent=10142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/categories?post=10142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/tags?post=10142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}