
{"id":3024,"date":"2025-08-15T19:53:58","date_gmt":"2025-08-15T19:53:58","guid":{"rendered":"https:\/\/rmct.ae\/?post_type=product&#038;p=3024"},"modified":"2025-08-15T19:53:58","modified_gmt":"2025-08-15T19:53:58","slug":"cybersecurity-for-hse-professionals","status":"publish","type":"product","link":"https:\/\/rmct.ae\/ar\/product\/cybersecurity-for-hse-professionals\/","title":{"rendered":"Cybersecurity for HSE Professionals"},"content":{"rendered":"<div style=\"font-family: Arial, sans-serif; line-height: 1.6; color: #333; padding: 20px; background-color: #f9fafa; border: 1px solid #d1e2e6; border-radius: 8px; margin-bottom: 30px;\">\n<h3 style=\"color: #004b8d; margin-bottom: 10px;\">Cybersecurity for HSE Professionals<\/h3>\n<p style=\"margin-bottom: 20px;\">\n    Prepares HSE professionals to protect sensitive safety data and systems against cyber threats through robust protocols and proactive risk management.\n  <\/p>\n<h4 style=\"color: #004b8d; margin-bottom: 10px;\">Objectives<\/h4>\n<ul style=\"list-style-type: disc; padding-left: 20px; margin-bottom: 20px;\">\n<li>Understand cybersecurity risks in safety systems.<\/li>\n<li>Implement secure data protocols and threat management.<\/li>\n<li>Conduct cybersecurity risk assessments.<\/li>\n<\/ul>\n<h4 style=\"color: #004b8d; margin-bottom: 10px;\">Who Should Attend<\/h4>\n<ul style=\"list-style-type: disc; padding-left: 20px; margin-bottom: 20px;\">\n<li>HSE managers<\/li>\n<li>IT security professionals<\/li>\n<li>Compliance officers<\/li>\n<\/ul>\n<h4 style=\"color: #004b8d; margin-bottom: 10px;\">Outcome<\/h4>\n<p style=\"margin-bottom: 20px;\">\n    Participants will be able to safeguard safety systems and data against cyber threats, ensuring operational security and compliance.\n  <\/p>\n<h4 style=\"color: #004b8d; margin-bottom: 10px;\">Duration<\/h4>\n<p>3 Days<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity for HSE Professionals Prepares HSE professionals to protect sensitive safety data and systems against cyber threats through robust protocols and proactive risk management. Objectives Understand cybersecurity risks in safety&hellip;<\/p>","protected":false},"featured_media":1362,"comment_status":"open","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":""},"product_brand":[],"product_cat":[67,119],"product_tag":[446],"class_list":{"0":"post-3024","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-courses","7":"product_cat-health-and-safety","8":"product_tag-hs06","10":"first","11":"instock","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"uagb_featured_image_src":{"full":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals.png",1920,1280,false],"thumbnail":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-150x150.png",150,150,true],"medium":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-300x200.png",300,200,true],"medium_large":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-768x512.png",768,512,true],"large":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-1024x683.png",1024,683,true],"1536x1536":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-1536x1024.png",1536,1024,true],"2048x2048":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals.png",1920,1280,false],"trp-custom-language-flag":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals.png",18,12,false],"post-thumbnail":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-370x247.png",370,247,true],"hogwords-thumb-huge":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-1170x658.png",1170,658,true],"hogwords-thumb-big":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-760x589.png",760,589,true],"hogwords-thumb-big-team":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-760x532.png",760,532,true],"hogwords-thumb-big-team-avatar":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-600x600.png",600,600,true],"hogwords-thumb-med":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-370x208.png",370,208,true],"hogwords-thumb-tiny":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-150x150.png",150,150,true],"hogwords-thumb-masonry-big":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-760x507.png",760,507,true],"hogwords-thumb-masonry":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-370x247.png",370,247,true],"woocommerce_thumbnail":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-500x375.png",500,375,true],"woocommerce_single":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-600x400.png",600,400,true],"woocommerce_gallery_thumbnail":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-100x100.png",100,100,true],"trx_addons-thumb-small":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-270x152.png",270,152,true],"trx_addons-thumb-portrait":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-370x493.png",370,493,true],"trx_addons-thumb-avatar":["https:\/\/rmct.ae\/wp-content\/uploads\/2025\/02\/Cybersecurity-for-HSE-Professionals-370x370.png",370,370,true]},"uagb_author_info":{"display_name":"admin","author_link":"https:\/\/rmct.ae\/ar\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"Cybersecurity for HSE Professionals Prepares HSE professionals to protect sensitive safety data and systems against cyber threats through robust protocols and proactive risk management. Objectives Understand cybersecurity risks in safety&hellip;","_links":{"self":[{"href":"https:\/\/rmct.ae\/ar\/wp-json\/wp\/v2\/product\/3024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rmct.ae\/ar\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/rmct.ae\/ar\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/rmct.ae\/ar\/wp-json\/wp\/v2\/comments?post=3024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rmct.ae\/ar\/wp-json\/wp\/v2\/media\/1362"}],"wp:attachment":[{"href":"https:\/\/rmct.ae\/ar\/wp-json\/wp\/v2\/media?parent=3024"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/rmct.ae\/ar\/wp-json\/wp\/v2\/product_brand?post=3024"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/rmct.ae\/ar\/wp-json\/wp\/v2\/product_cat?post=3024"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/rmct.ae\/ar\/wp-json\/wp\/v2\/product_tag?post=3024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}