

{"id":760,"date":"2021-05-10T13:10:58","date_gmt":"2021-05-10T11:10:58","guid":{"rendered":"https:\/\/ui.iit.cnr.it\/?page_id=760"},"modified":"2021-06-24T11:43:11","modified_gmt":"2021-06-24T09:43:11","slug":"masters","status":"publish","type":"page","link":"https:\/\/cyb.iit.cnr.it\/en\/education\/masters\/","title":{"rendered":"Masters and teaching"},"content":{"rendered":"<h4 class=\"wp-block-heading\"><strong><a rel=\"noreferrer noopener\" href=\"http:\/\/www.cybersecuritymaster.it\" target=\"_blank\">Cyber Security<\/a> <span style=\"color:#003157\" class=\"has-inline-color\">1st level Professional Master Degree<\/span><\/strong><\/h4>\n\n\n\n<p><em>Organized by IIT-CNR and Dipartimento di Ingegneria dell\u2019Informazione &#8211; Universit\u00e0 degli Studi di Pisa<br><\/em><br>Courses \u201cCyber Intelligence Analytics\u201d, \u201cCyber Intelligence | Social Media Data Gathering\u201d, \u201cCyber Intelligence\u201d<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><br><br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/masterbigdata.it\/it\" target=\"_blank\">Big Data Analytics &amp; Social Mining<\/a><\/strong> <strong><span style=\"color:#003157\" class=\"has-inline-color\">2nd level Professional Master Degree<\/span><\/strong><\/h4>\n\n\n\n<p><em>Organized by ISTI-CNR, IIT-CNR and Universit\u00e0 di Pisa<br><\/em><br>Course \u201cBig data sources, crowdsourcing, crowdsensing\u201d<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><br><br><strong><span style=\"color:#003157\" class=\"has-inline-color\">Ingegneria Informatica<\/span> <span style=\"color:#003157\" class=\"has-inline-color\">Bachelor degree<\/span><\/strong><\/h4>\n\n\n\n<p><em>Universit\u00e0 di Pisa<\/em><\/p>\n\n\n\n<p><br>Course \u201cProgettazione web\u201d<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><br><br><strong><span style=\"color:#003157\" class=\"has-inline-color\">Informatica Umanistica<\/span> <span style=\"color:#003157\" class=\"has-inline-color\">Bachelor degree<\/span><\/strong><\/h4>\n\n\n\n<p><em>Universit\u00e0 di Pisa<\/em><\/p>\n\n\n\n<p><br>Course \u201cProgettazione Grafica\u201d<\/p>","protected":false},"excerpt":{"rendered":"<p>Cyber Security 1st level Professional Master Degree Organized by IIT-CNR and Dipartimento di Ingegneria dell\u2019Informazione &#8211; Universit\u00e0 degli Studi di PisaCourses \u201cCyber Intelligence Analytics\u201d, \u201cCyber Intelligence | Social Media Data Gathering\u201d, \u201cCyber Intelligence\u201d Big Data Analytics &amp; Social Mining 2nd level Professional Master Degree Organized by ISTI-CNR, IIT-CNR and Universit\u00e0 di PisaCourse \u201cBig data sources, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":752,"menu_order":14,"comment_status":"closed","ping_status":"closed","template":"pagina_con_sottopagine.php","meta":{"footnotes":""},"class_list":["post-760","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/760","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/comments?post=760"}],"version-history":[{"count":6,"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/760\/revisions"}],"predecessor-version":[{"id":1154,"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/760\/revisions\/1154"}],"up":[{"embeddable":true,"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/752"}],"wp:attachment":[{"href":"https:\/\/cyb.iit.cnr.it\/en\/wp-json\/wp\/v2\/media?parent=760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}