{"id":9874,"date":"2024-02-20T11:11:43","date_gmt":"2024-02-20T05:41:43","guid":{"rendered":"https:\/\/rsmpoly.org\/?p=9874"},"modified":"2024-02-20T11:11:43","modified_gmt":"2024-02-20T05:41:43","slug":"conducted-guest-lecture-on-cyber-security-digital-forensic-27th-feb-2023","status":"publish","type":"post","link":"https:\/\/rsmpoly.org\/index.php\/2024\/02\/20\/conducted-guest-lecture-on-cyber-security-digital-forensic-27th-feb-2023\/","title":{"rendered":"Conducted Guest Lecture on Cyber  Security &amp; Digital Forensic (27th Feb.  2023)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-9875\" src=\"https:\/\/rsmpoly.org\/wp-content\/uploads\/2024\/02\/22-23-3-1-300x286.jpg\" alt=\"\" width=\"300\" height=\"286\" srcset=\"https:\/\/rsmpoly.org\/wp-content\/uploads\/2024\/02\/22-23-3-1-300x286.jpg 300w, https:\/\/rsmpoly.org\/wp-content\/uploads\/2024\/02\/22-23-3-1-283x270.jpg 283w, https:\/\/rsmpoly.org\/wp-content\/uploads\/2024\/02\/22-23-3-1.jpg 438w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-9876\" src=\"https:\/\/rsmpoly.org\/wp-content\/uploads\/2024\/02\/22-23-3.1-1-300x284.jpg\" alt=\"\" width=\"300\" height=\"284\" srcset=\"https:\/\/rsmpoly.org\/wp-content\/uploads\/2024\/02\/22-23-3.1-1-300x284.jpg 300w, https:\/\/rsmpoly.org\/wp-content\/uploads\/2024\/02\/22-23-3.1-1-286x270.jpg 286w, https:\/\/rsmpoly.org\/wp-content\/uploads\/2024\/02\/22-23-3.1-1.jpg 442w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><strong>Guest lecture\u2019 was organized for Third Year students of Computer Technology Department. It was Co-ordinated by Mr. P. D. Boraste and Guided by Mr. Tanmay S. Dixit, Cyber Security &amp; Digital Forensic Expert. <\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Guest lecture\u2019 was organized for Third Year students of Computer Technology Department. It was Co-ordinated by Mr. P. D. Boraste and Guided by Mr. Tanmay S. Dixit, Cyber Security &amp; Digital Forensic Expert.<\/p>\n","protected":false},"author":9,"featured_media":9876,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[71],"tags":[],"class_list":["post-9874","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-recent-event"],"acf":[],"_links":{"self":[{"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/posts\/9874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/comments?post=9874"}],"version-history":[{"count":1,"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/posts\/9874\/revisions"}],"predecessor-version":[{"id":9877,"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/posts\/9874\/revisions\/9877"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/media\/9876"}],"wp:attachment":[{"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/media?parent=9874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/categories?post=9874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rsmpoly.org\/index.php\/wp-json\/wp\/v2\/tags?post=9874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}