{"id":455,"date":"2024-02-16T09:33:12","date_gmt":"2024-02-16T09:33:12","guid":{"rendered":"https:\/\/apollouniversity.edu.in\/blog\/?p=455"},"modified":"2025-12-13T11:44:02","modified_gmt":"2025-12-13T11:44:02","slug":"become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th","status":"publish","type":"post","link":"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/","title":{"rendered":"Top 10 Cyber Security Courses After 12th"},"content":{"rendered":"<p>In recent years, cyber security has evolved into a crucial component of every company\u2019s plan for longevity, security and advancement. With the expansion of businesses, the need for cybersecurity expertise is poised to rise continuously in the upcoming years.<\/p>\n<p>India is experiencing high demand for cybersecurity professionals, with a market value <a href=\"https:\/\/www.coherentmarketinsights.com\/industry-reports\/india-cyber-security-market\">expected to reach<\/a> USD 20.59 Bn by 2032. This demand is driven by accelerated digital transformation and a growing number of cyber threats, leading to increased investment and a talent shortage, especially in specialised roles like cloud security and AI-driven security.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">In this article<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #000000;color:#000000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #000000;color:#000000\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#The_Reason_Behind_the_Demand_of_Cyber_Security_Professionals\" >The Reason Behind the Demand of Cyber Security Professionals<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#Top_10_Cyber_Security_Courses_After_12th\" >Top 10 Cyber Security Courses After 12th<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#1_BTech_CSE_%E2%80%93_Cyber_Security\" >1. B.Tech CSE \u2013 Cyber Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#2_BCA_Cyber_Security\" >2. BCA Cyber Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#3_Diploma_in_Cybersecurity\" >3. Diploma in Cybersecurity<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#4_BSc_Cyber_Security\" >4. BSc Cyber Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#5_Diploma_in_Digital_Security_Forensics\" >5. Diploma in Digital Security &amp; Forensics<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#6_BCom_in_Fraud_Detection\" >6. BCom in Fraud Detection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#7_BCom_in_Cyber_Law\" >7. BCom in Cyber Law<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#8_BCom_Cyber_Crimes_Laws\" >8. BCom Cyber Crimes &amp; Laws<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#9_BSc_Cyber_Security_Networks\" >9. BSc Cyber Security Networks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#10_Cybersecurity_Certifications_CEH_CompTIA_Security_CISSP\" >10. Cybersecurity Certifications (CEH, CompTIA Security+, CISSP)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#Cybersecurity_Courses_Eligibility_and_Duration\" >Cybersecurity Courses Eligibility and Duration<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#Why_Choose_Cyber_Security_Courses_after_12th\" >Why Choose Cyber Security Courses after 12th?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#Fortify_Digital_Defending_at_The_Apollo_University\" >Fortify Digital Defending at The Apollo University<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#Championing_Cyber_Security\" >Championing Cyber Security<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"The_Reason_Behind_the_Demand_of_Cyber_Security_Professionals\"><\/span>The Reason Behind the Demand of Cyber Security Professionals<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Before exploring the options to pursue these most in-demand cyber security options, it is vital for you to know the actual reasons behind the escalating demand for cybersecurity positions and why the demand for skilled cyber security graduates is always high as compared to the supply of those graduates.<\/p>\n<p>Shockingly, hackers launch an attack approximately every 39 seconds, totalling around 2,244 attacks per day, as reported by the University of Maryland. Contemplate the vulnerability of digital networks to unauthorised third-party access, defined as a cyberattack.<\/p>\n<p>Organisations facing such attacks endure losses in data, finances and customer trust. To thwart these perilous cyber threats, the practice of cybersecurity is essential. It involves safeguarding networks and computer systems against unauthorised digital intrusions.<\/p>\n<p>As the volume of digital data continues to surge, an imminent quadrupling of cyberattacks is anticipated. Consequently, the demand for cybersecurity professionals is set to soar. Despite this, research indicates a shortage of skilled workers in the cybersecurity sector, unveiling boundless job opportunities.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Top_10_Cyber_Security_Courses_After_12th\"><\/span>Top 10 Cyber Security Courses After 12th<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>After completing the 12th grade, students interested in cybersecurity can pursue various courses to build their expertise in the field. Here are some popular options for Cyber Security Courses after 12th:<\/p>\n<h2><span class=\"ez-toc-section\" id=\"1_BTech_CSE_%E2%80%93_Cyber_Security\"><\/span><strong>1. B.Tech CSE \u2013 Cyber Security<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A four-year engineering programme focusing on programming, networks, cyber laws, ethical hacking, cryptography and digital forensics. Students learn to identify vulnerabilities, protect systems and handle real-time cyberattacks. It prepares you for roles in corporate security, IT companies, banking sectors and government cyber cells.<\/p>\n<p>&#8211; <strong>Eligibility:<\/strong> 10+2 with PCM; minimum 50%<br \/>\n&#8211; <strong>Duration:<\/strong> 4 years<br \/>\n&#8211; <strong>Fees:<\/strong> \u20b91.5\u20133.5 lakh per year<br \/>\n&#8211; <strong>Scope:<\/strong> Cybersecurity analyst, security engineer, penetration tester, forensic analyst.<br \/>\n&#8211; <strong>Average Salary:<\/strong> \u20b94\u201310 LPA for freshers<\/p>\n<h2><span class=\"ez-toc-section\" id=\"2_BCA_Cyber_Security\"><\/span><strong>2. BCA Cyber Security<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This programme teaches cybersecurity fundamentals, ethical hacking, app security, database security and cloud security alongside computer applications. It is ideal for students who want to enter cybersecurity without engineering.<\/p>\n<p>&#8211; <strong>Eligibility:<\/strong> 10+2 in any stream with Maths\/Computer preferred<br \/>\n&#8211; <strong>Duration:<\/strong> 3 years<br \/>\n&#8211; <strong>Fees:<\/strong> \u20b980,000\u2013\u20b91.5 lakh per year<br \/>\n&#8211; <strong>Scope:<\/strong> Cyber analyst, SOC analyst, malware analyst, IT security support<br \/>\n&#8211; <strong>Average Salary:<\/strong> \u20b93\u20137 LPA<\/p>\n<h2><span class=\"ez-toc-section\" id=\"3_Diploma_in_Cybersecurity\"><\/span><strong>3. Diploma in Cybersecurity<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A short-term technical programme focusing on practical skills like network security, ethical hacking tools, firewall setup and security audits. Suitable for students who want quick entry into the cybersecurity industry.<\/p>\n<p>&#8211; <strong>Eligibility:<\/strong> 10+2 (any stream); basic computer knowledge<br \/>\n&#8211; <strong>Duration:<\/strong> 6 months\u20131 year<br \/>\n&#8211; <strong>Fees:<\/strong> \u20b920,000\u2013\u20b980,000<br \/>\n&#8211; <strong>Scope:<\/strong> Junior security analyst, security technician, IT support security<br \/>\n&#8211; <strong>Average Salary:<\/strong> \u20b92\u20134 LPA<\/p>\n<h2><span class=\"ez-toc-section\" id=\"4_BSc_Cyber_Security\"><\/span><strong>4. BSc Cyber Security<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A science-oriented programme focusing on mathematics, cryptography, malware analysis, network security and digital forensics. Students gain strong analytical skills for the cybersecurity industry.<\/p>\n<p>&#8211; <strong>Eligibility:<\/strong> 10+2 Science with PCM\/PCMB<br \/>\n&#8211; <strong>Duration:<\/strong> 3 years<br \/>\n&#8211; <strong>Fees:<\/strong> \u20b960,000\u2013\u20b91.2 lakh per year<br \/>\n&#8211; <strong>Scope:<\/strong> Penetration tester, SOC analyst, forensic expert, incident responder<br \/>\n&#8211; <strong>Average Salary:<\/strong> \u20b93\u20138 LPA<\/p>\n<h2><span class=\"ez-toc-section\" id=\"5_Diploma_in_Digital_Security_Forensics\"><\/span><strong>5. Diploma in Digital Security &amp; Forensics<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This course teaches cyber forensics, digital crime investigation, email tracking, mobile forensics and data recovery. Useful for students interested in cybercrime investigation.<\/p>\n<p>&#8211; <strong>Eligibility:<\/strong> 10+2 (any stream).<br \/>\n&#8211; <strong>Duration:<\/strong> 1 year.<br \/>\n&#8211; <strong>Fees:<\/strong> \u20b930,000\u2013\u20b91 lakh.<br \/>\n&#8211; <strong>Scope:<\/strong> Digital forensic assistant, cyber lab technician and investigation support roles.<br \/>\n&#8211; <strong>Average Salary:<\/strong> \u20b92.5\u20135 LPA.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"6_BCom_in_Fraud_Detection\"><\/span><strong>6. BCom in Fraud Detection<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This commerce-based programme focuses on financial fraud, auditing, forensic accounting, cyber fraud and risk management. Ideal for students interested in finance + cybersecurity.<\/p>\n<p>&#8211; <strong>Eligibility:<\/strong> 10+2 Commerce\/Any Stream<br \/>\n&#8211; <strong>Duration:<\/strong> 3 years<br \/>\n&#8211; <strong>Fees:<\/strong> \u20b940,000\u2013\u20b91 lakh per year<br \/>\n&#8211; <strong>Scope:<\/strong> Fraud analyst, risk consultant, compliance officer<br \/>\n&#8211; <strong>Average Salary:<\/strong> \u20b93\u20136 LPA<\/p>\n<h2><span class=\"ez-toc-section\" id=\"7_BCom_in_Cyber_Law\"><\/span><strong>7. BCom in Cyber Law<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Focuses on cyber legal frameworks, digital privacy laws, IT Act, cybercrime handling and corporate compliance. Great for students inclined towards law + technology.<\/p>\n<p>&#8211; <strong>Eligibility:<\/strong> 10+2 (any stream)<br \/>\n&#8211; <strong>Duration:<\/strong> 3 years<br \/>\n&#8211; <strong>Fees:<\/strong> \u20b940,000\u2013\u20b91 lakh per year<br \/>\n&#8211; <strong>Scope:<\/strong> Legal researcher, cyber law consultant, compliance executive<br \/>\n&#8211; <strong>Average Salary:<\/strong> \u20b93\u20136 LPA<\/p>\n<h2><span class=\"ez-toc-section\" id=\"8_BCom_Cyber_Crimes_Laws\"><\/span><strong>8. BCom Cyber Crimes &amp; Laws<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A commerce degree with a deeper focus on cybercrime management, financial crime, data misuse, online fraud and legal responses.<\/p>\n<p>&#8211; <strong>Eligibility:<\/strong> 10+2 in any stream<br \/>\n&#8211; <strong>Duration:<\/strong> 3 years<br \/>\n&#8211; <strong>Fees:<\/strong> \u20b940,000\u2013\u20b91 lakh per year<br \/>\n&#8211; <strong>Scope:<\/strong> Cybercrime analyst, digital fraud specialist, legal associate<br \/>\n&#8211; <strong>Average Salary:<\/strong> \u20b93\u20136 LPA<\/p>\n<h2><span class=\"ez-toc-section\" id=\"9_BSc_Cyber_Security_Networks\"><\/span><strong>9. BSc Cyber Security Networks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A technical science course focusing on network architecture, network security tools, firewalls, intrusion detection, malware prevention and secure system design.<\/p>\n<p>&#8211; <strong>Eligibility:<\/strong> 10+2 Science stream<br \/>\n&#8211; <strong>Duration:<\/strong> 3 years<br \/>\n&#8211; <strong>Fees:<\/strong> \u20b960,000\u2013\u20b91.2 lakh per year<br \/>\n&#8211; <strong>Scope:<\/strong> Network security engineer, SOC analyst, network penetration tester<br \/>\n&#8211; <strong>Average Salary:<\/strong> \u20b93\u20138 LPA<\/p>\n<h2><span class=\"ez-toc-section\" id=\"10_Cybersecurity_Certifications_CEH_CompTIA_Security_CISSP\"><\/span><strong>10. Cybersecurity Certifications (CEH, CompTIA Security+, CISSP)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>&nbsp;<\/p>\n<ul>\n<li>CEH (Certified Ethical Hacker)<\/li>\n<\/ul>\n<p>CEH trains you to think like a hacker and find weaknesses in systems legally. It covers ethical hacking tools, penetration testing and vulnerability analysis. Ideal for beginners in cybersecurity.<\/p>\n<p><strong>Career roles:<\/strong> Ethical hacker, penetration tester, SOC analyst<br \/>\n<strong>Salary:<\/strong> \u20b94\u201312 LPA<\/p>\n<ul>\n<li>CompTIA Security+<\/li>\n<\/ul>\n<p>Security+ is a beginner-friendly global certification focusing on network security, threats, cryptography and risk management. It validates foundational cybersecurity skills required for entry-level jobs.<\/p>\n<p><strong>Career roles:<\/strong> Security technician, SOC analyst (L1), network security support<br \/>\n<strong>Salary:<\/strong> \u20b93\u20137 LPA<\/p>\n<ul>\n<li>CISSP<\/li>\n<\/ul>\n<p>CISSP is an advanced certification for experienced professionals covering security architecture, governance, cloud security and risk management. It\u2019s globally respected and leads to senior security roles.<\/p>\n<p><strong>Career roles:<\/strong> Security manager, consultant, information security officer<br \/>\n<strong>Salary:<\/strong> \u20b912\u201330 LPA<\/p>\n<p>The availability of numerous cybersecurity courses for students implies a growing recognition of the importance of cybersecurity in today\u2019s digital landscape.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Cybersecurity_Courses_Eligibility_and_Duration\"><\/span>Cybersecurity Courses Eligibility and Duration<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Most cyber security courses after 12th require students to have a background in Science\/Maths\/Computer Applications, though many diploma and certification programmes are open to students from other streams too.<\/p>\n<ul>\n<li><strong>Diploma\/Certificate Courses- <\/strong>6 months to 1 year<\/li>\n<li><strong>Undergraduate Programmes-<\/strong> 3 to 4 years<\/li>\n<li><strong>Specialised Certifications-<\/strong> Duration varies from a few weeks to several months<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Why_Choose_Cyber_Security_Courses_after_12th\"><\/span>Why Choose Cyber Security Courses after 12th?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>There are several crucial reasons to select cyber security course after completing your 12th standard.<\/p>\n<ul>\n<li><strong>High Demand for Experts \u2013<\/strong> As cyberattacks on individuals, companies and governments are on the rise, the need for skilled professionals has increased.<\/li>\n<li><strong>Career Security\u2013 <\/strong>Cybersecurity is considered a \u201cfuture-proof\u201d career because digital systems will always need protection<strong>.<\/strong><\/li>\n<li><strong>Varied Career Paths\u2013 <\/strong>You will find diverse roles, from ethical hacker, security analyst and penetration tester to cyber forensics expert.<\/li>\n<li><strong>Global Scope- <\/strong>These skills are in demand worldwide, offering opportunities both in India and abroad.<\/li>\n<li><strong>Good Pay Scales\u2013 <\/strong>Starting packages are often higher than average IT roles due to the skill shortage.<\/li>\n<\/ul>\n<h3>What You\u2019ll Learn in These Courses?<\/h3>\n<p>Cybersecurity programmes are designed to build both theoretical knowledge as well as hands-on skills. Typical areas include:<\/p>\n<ul>\n<li><strong>Fundamentals of Networking &amp; Operating Systems- <\/strong>Building a strong tech foundation<\/li>\n<li><strong>Cyber Threats &amp; Attack Types- <\/strong>Malware, phishing, ransomware, social engineering<\/li>\n<li><strong>Ethical Hacking &amp; Penetration Testing- <\/strong>Learning how to test systems for vulnerabilities<\/li>\n<li><strong>Cryptography &amp; Data Protection-<\/strong> Securing data via encryption techniques<\/li>\n<li><strong>Network and Web Security- <\/strong>Protecting systems, servers and online platforms<\/li>\n<li><strong>Cloud &amp; Mobile Security-<\/strong> Safeguarding modern platforms widely used by individuals and businesses<\/li>\n<li><strong>Cyber Laws &amp; Ethics- <\/strong>Understanding the legal and ethical side of cybersecurity<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Fortify_Digital_Defending_at_The_Apollo_University\"><\/span>Fortify Digital Defending at The Apollo University<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"https:\/\/apollouniversity.edu.in\/\">The Apollo University<\/a> is an esteemed university and renowned among candidates as it believes in experiential learning to be a common practice in its teaching-learning process. The hands-on learning experience at The Apollo University is carefully organised and overseen to encourage academic exploration while fostering the development of career, leadership and intellectual skills.<\/p>\n<p>The University offers the best <a href=\"https:\/\/apollouniversity.edu.in\/course\/b-tech-cse-cyber-security\/\">B.Tech. CSE- Cyber Security<\/a> on account of multiple reasons.<\/p>\n<p>The B.Tech CSE (Cyber Security) programme at the University is an evolving field within Computer Science and Engineering (CSE). To meet the growing demand for proficient security professionals in both public and private sectors, the Computer Science and Engineering department introduced the B. Tech programme in Computer Science and Engineering (Cyber Security) starting in 2023.<\/p>\n<p>The Cyber Security curriculum equips students with practical, hands-on experience in securing systems and applications. It fosters an understanding of legal aspects related to cybersecurity and hones the skills necessary for leading, managing and contributing to the development of cybersecurity solutions. The department comprises highly qualified and experienced faculty members and maintains a robust connection with industries to enhance students\u2019 practical knowledge.<\/p>\n<h3>Programme Highlights<\/h3>\n<p>Here are the main attributes of the university\u2019s <a href=\"https:\/\/apollouniversity.edu.in\/course\/btech-in-computer-science-and-engineering\/\">B. Tech programme in Computer Science and Engineering<\/a> with a specialisation in Cyber Security.<\/p>\n<ul>\n<li>Engage in Computer Science projects with Microsoft India and Harvard Medical School, Boston, USA.<\/li>\n<li>Benefit from a faculty comprising highly qualified and research-oriented professionals.<\/li>\n<li>Use the degree as a stepping stone for advanced studies like M. Tech. and Ph.D. in the field.<\/li>\n<li>Experience a well-defined teaching-learning process incorporating technology-based methodologies.<\/li>\n<li>Enhance communication and aptitude skills through soft skill training programmes by renowned professional companies.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Championing_Cyber_Security\"><\/span>Championing Cyber Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The realm of cybersecurity is rapidly expanding and the demand for skilled professionals is at an all-time high. Completing B.Tech in Cyber Security equips you for diverse roles, including Application Security Analyst, Network Security Engineer and Security Consultant. Embrace the future of cybersecurity, where continuous learning and certifications pave the way for a rewarding career. Take the first step towards securing the digital world \u2013 choose B.Tech Cyber Security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent years, cyber security has evolved into a crucial component of every company\u2019s plan for longevity, security and advancement. With the expansion of businesses, the need for cybersecurity expertise is poised to rise continuously in the upcoming years. India is experiencing high demand for cybersecurity professionals, with a market value expected to reach USD&hellip; <a class=\"more-link\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/\">Continue reading <span class=\"screen-reader-text\">Top 10 Cyber Security Courses After 12th<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":456,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-455","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engineering","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top Cyber Security Courses After 12th: Scope, Salary &amp; More<\/title>\n<meta name=\"description\" content=\"Explore the top 10 cyber security courses after 12th, including their eligibility, duration, fees, scope, and average salary.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Cyber Security Courses After 12th: Scope, Salary &amp; More\" \/>\n<meta property=\"og:description\" content=\"Explore the top 10 cyber security courses after 12th, including their eligibility, duration, fees, scope, and average salary.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apollouniversity.edu.in\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-16T09:33:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-13T11:44:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/apollouniversity.edu.in\/blog\/wp-content\/uploads\/2024\/02\/Become-a-Part-of-Cyber-Safeguard-Dive-Into-Cyber-Security-Courses-After-12th-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"superadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ApolloUniv\" \/>\n<meta name=\"twitter:site\" content=\"@ApolloUniv\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"superadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\\\/\"},\"author\":{\"name\":\"superadmin\",\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/#\\\/schema\\\/person\\\/8de33b28beb28878f3b4a7525a58984c\"},\"headline\":\"Top 10 Cyber Security Courses After 12th\",\"datePublished\":\"2024-02-16T09:33:12+00:00\",\"dateModified\":\"2025-12-13T11:44:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\\\/\"},\"wordCount\":1587,\"publisher\":{\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Become-a-Part-of-Cyber-Safeguard-Dive-Into-Cyber-Security-Courses-After-12th-1.webp\",\"articleSection\":[\"Engineering\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\\\/\",\"url\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\\\/\",\"name\":\"Top Cyber Security Courses After 12th: Scope, Salary & More\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Become-a-Part-of-Cyber-Safeguard-Dive-Into-Cyber-Security-Courses-After-12th-1.webp\",\"datePublished\":\"2024-02-16T09:33:12+00:00\",\"dateModified\":\"2025-12-13T11:44:02+00:00\",\"description\":\"Explore the top 10 cyber security courses after 12th, including their eligibility, duration, fees, scope, and average salary.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\\\/#primaryimage\",\"url\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Become-a-Part-of-Cyber-Safeguard-Dive-Into-Cyber-Security-Courses-After-12th-1.webp\",\"contentUrl\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Become-a-Part-of-Cyber-Safeguard-Dive-Into-Cyber-Security-Courses-After-12th-1.webp\",\"width\":800,\"height\":500,\"caption\":\"Cyber Security Courses After 12th\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 10 Cyber Security Courses After 12th\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/\",\"name\":\"Blogs\",\"description\":\"Apollo University\",\"publisher\":{\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"EducationalOrganization\",\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/#organization\",\"name\":\"Apollo University\",\"url\":\"https:\\\/\\\/mintcream-buffalo-126059.hostingersite.com\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/logo.png\",\"width\":102,\"height\":70,\"caption\":\"Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apollouniv\\\/\",\"https:\\\/\\\/twitter.com\\\/ApolloUniv\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/the-apollo-university\\\/?trk=public_profile_experience-item_profile-section-card_image-click&originalSubdomain=in\",\"https:\\\/\\\/instagram.com\\\/theapollouniversity_ap?igshid=Zjc2ZTc4Nzk=\"],\"foundingDate\":\"2021\",\"founder\":{\"@type\":\"Organization\",\"name\":\"Apollo University\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/#\\\/schema\\\/person\\\/8de33b28beb28878f3b4a7525a58984c\",\"name\":\"superadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7da5914634b267b2bbc07eab48fa612d56fff16fbd2ac538db71c189491f9903?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7da5914634b267b2bbc07eab48fa612d56fff16fbd2ac538db71c189491f9903?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7da5914634b267b2bbc07eab48fa612d56fff16fbd2ac538db71c189491f9903?s=96&d=mm&r=g\",\"caption\":\"superadmin\"},\"sameAs\":[\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\"],\"url\":\"https:\\\/\\\/apollouniversity.edu.in\\\/blog\\\/author\\\/superadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top Cyber Security Courses After 12th: Scope, Salary & More","description":"Explore the top 10 cyber security courses after 12th, including their eligibility, duration, fees, scope, and average salary.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/","og_locale":"en_US","og_type":"article","og_title":"Top Cyber Security Courses After 12th: Scope, Salary & More","og_description":"Explore the top 10 cyber security courses after 12th, including their eligibility, duration, fees, scope, and average salary.","og_url":"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/apollouniversity.edu.in","article_published_time":"2024-02-16T09:33:12+00:00","article_modified_time":"2025-12-13T11:44:02+00:00","og_image":[{"width":800,"height":500,"url":"https:\/\/apollouniversity.edu.in\/blog\/wp-content\/uploads\/2024\/02\/Become-a-Part-of-Cyber-Safeguard-Dive-Into-Cyber-Security-Courses-After-12th-1.webp","type":"image\/webp"}],"author":"superadmin","twitter_card":"summary_large_image","twitter_creator":"@ApolloUniv","twitter_site":"@ApolloUniv","twitter_misc":{"Written by":"superadmin","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#article","isPartOf":{"@id":"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/"},"author":{"name":"superadmin","@id":"https:\/\/apollouniversity.edu.in\/blog\/#\/schema\/person\/8de33b28beb28878f3b4a7525a58984c"},"headline":"Top 10 Cyber Security Courses After 12th","datePublished":"2024-02-16T09:33:12+00:00","dateModified":"2025-12-13T11:44:02+00:00","mainEntityOfPage":{"@id":"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/"},"wordCount":1587,"publisher":{"@id":"https:\/\/apollouniversity.edu.in\/blog\/#organization"},"image":{"@id":"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#primaryimage"},"thumbnailUrl":"https:\/\/apollouniversity.edu.in\/blog\/wp-content\/uploads\/2024\/02\/Become-a-Part-of-Cyber-Safeguard-Dive-Into-Cyber-Security-Courses-After-12th-1.webp","articleSection":["Engineering"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/","url":"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/","name":"Top Cyber Security Courses After 12th: Scope, Salary & More","isPartOf":{"@id":"https:\/\/apollouniversity.edu.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#primaryimage"},"image":{"@id":"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#primaryimage"},"thumbnailUrl":"https:\/\/apollouniversity.edu.in\/blog\/wp-content\/uploads\/2024\/02\/Become-a-Part-of-Cyber-Safeguard-Dive-Into-Cyber-Security-Courses-After-12th-1.webp","datePublished":"2024-02-16T09:33:12+00:00","dateModified":"2025-12-13T11:44:02+00:00","description":"Explore the top 10 cyber security courses after 12th, including their eligibility, duration, fees, scope, and average salary.","breadcrumb":{"@id":"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#primaryimage","url":"https:\/\/apollouniversity.edu.in\/blog\/wp-content\/uploads\/2024\/02\/Become-a-Part-of-Cyber-Safeguard-Dive-Into-Cyber-Security-Courses-After-12th-1.webp","contentUrl":"https:\/\/apollouniversity.edu.in\/blog\/wp-content\/uploads\/2024\/02\/Become-a-Part-of-Cyber-Safeguard-Dive-Into-Cyber-Security-Courses-After-12th-1.webp","width":800,"height":500,"caption":"Cyber Security Courses After 12th"},{"@type":"BreadcrumbList","@id":"https:\/\/apollouniversity.edu.in\/blog\/become-a-part-of-cyber-safeguard-dive-into-cyber-security-courses-after-12th\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/apollouniversity.edu.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Top 10 Cyber Security Courses After 12th"}]},{"@type":"WebSite","@id":"https:\/\/apollouniversity.edu.in\/blog\/#website","url":"https:\/\/apollouniversity.edu.in\/blog\/","name":"Blogs","description":"Apollo University","publisher":{"@id":"https:\/\/apollouniversity.edu.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/apollouniversity.edu.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"EducationalOrganization","@id":"https:\/\/apollouniversity.edu.in\/blog\/#organization","name":"Apollo University","url":"https:\/\/mintcream-buffalo-126059.hostingersite.com","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/apollouniversity.edu.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/apollouniversity.edu.in\/blog\/wp-content\/uploads\/2022\/12\/logo.png","contentUrl":"https:\/\/apollouniversity.edu.in\/blog\/wp-content\/uploads\/2022\/12\/logo.png","width":102,"height":70,"caption":"Blogs"},"image":{"@id":"https:\/\/apollouniversity.edu.in\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apollouniv\/","https:\/\/twitter.com\/ApolloUniv","https:\/\/www.linkedin.com\/company\/the-apollo-university\/?trk=public_profile_experience-item_profile-section-card_image-click&originalSubdomain=in","https:\/\/instagram.com\/theapollouniversity_ap?igshid=Zjc2ZTc4Nzk="],"foundingDate":"2021","founder":{"@type":"Organization","name":"Apollo University"}},{"@type":"Person","@id":"https:\/\/apollouniversity.edu.in\/blog\/#\/schema\/person\/8de33b28beb28878f3b4a7525a58984c","name":"superadmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7da5914634b267b2bbc07eab48fa612d56fff16fbd2ac538db71c189491f9903?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7da5914634b267b2bbc07eab48fa612d56fff16fbd2ac538db71c189491f9903?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7da5914634b267b2bbc07eab48fa612d56fff16fbd2ac538db71c189491f9903?s=96&d=mm&r=g","caption":"superadmin"},"sameAs":["https:\/\/apollouniversity.edu.in\/blog"],"url":"https:\/\/apollouniversity.edu.in\/blog\/author\/superadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/apollouniversity.edu.in\/blog\/wp-json\/wp\/v2\/posts\/455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/apollouniversity.edu.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/apollouniversity.edu.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/apollouniversity.edu.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/apollouniversity.edu.in\/blog\/wp-json\/wp\/v2\/comments?post=455"}],"version-history":[{"count":5,"href":"https:\/\/apollouniversity.edu.in\/blog\/wp-json\/wp\/v2\/posts\/455\/revisions"}],"predecessor-version":[{"id":2023,"href":"https:\/\/apollouniversity.edu.in\/blog\/wp-json\/wp\/v2\/posts\/455\/revisions\/2023"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/apollouniversity.edu.in\/blog\/wp-json\/wp\/v2\/media\/456"}],"wp:attachment":[{"href":"https:\/\/apollouniversity.edu.in\/blog\/wp-json\/wp\/v2\/media?parent=455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/apollouniversity.edu.in\/blog\/wp-json\/wp\/v2\/categories?post=455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/apollouniversity.edu.in\/blog\/wp-json\/wp\/v2\/tags?post=455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}