[kc_row use_container=”yes” _id=”436929″][kc_column width=”50%” _id=”686531″][kc_feature_box layout=”2″ title=”Cyber Security Seminar Webinar – Day 1″ desc=”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” show_button=”__empty__” _id=”280781″ image=”1019″][kc_spacing height=”20px” _id=”768105″][kc_button text_title=”1st Presenter – Introduction to Cybersecurity.pdf” _id=”852007″ link=”https://internetsociety.org.lr/wp-content/uploads/2021/03/Internet-Society-Presentation-Titus-G-Gooding.pdf|Introduction to Cybersecurity|” custom_css=”{`kc-css`:{`any`:{`button-style`:{`color|.kc_button`:`#ffffff`,`background-color|.kc_button`:`#000000`}}}}” show_icon=”yes” icon=”sl-arrow-down-circle” icon_position=”left”][kc_spacing height=”20px” _id=”845915″][kc_button text_title=”2nd Presenter -KILL-CHAIN.pdf” _id=”279″ link=”https://internetsociety.org.lr/wp-content/uploads/2021/03/KILL-CHAIN_Claudius-Thompson.pdf|KILL CHAIN|” custom_css=”{`kc-css`:{`any`:{`button-style`:{`color|.kc_button`:`#ffffff`,`background-color|.kc_button`:`#000000`}}}}” show_icon=”yes” icon=”sl-arrow-down-circle” icon_position=”left”][kc_spacing height=”20px” _id=”201882″][kc_button text_title=”3rd Presenter – Virus interpretation and management.pdf” _id=”692728″ link=”https://internetsociety.org.lr/wp-content/uploads/2021/03/Internet-Society-Presentation_G-Williams.pdf|Virus Interpretation and Management|” custom_css=”{`kc-css`:{`any`:{`button-style`:{`color|.kc_button`:`#ffffff`,`background-color|.kc_button`:`#000000`}}}}” show_icon=”yes” icon=”sl-arrow-down-circle” icon_position=”left”][kc_spacing height=”20px” _id=”675722″][kc_button text_title=”4th Presenter – How to prevent hacking of computers.pdf” _id=”138123″ link=”https://internetsociety.org.lr/wp-content/uploads/2021/03/Cybersecurity-ISOC-Liberia_Vladimir-Radunovic.pdf|How to prevent hacking of computers|” custom_css=”{`kc-css`:{`any`:{`button-style`:{`color|.kc_button`:`#ffffff`,`background-color|.kc_button`:`#000000`}}}}” show_icon=”yes” icon=”sl-arrow-down-circle” icon_position=”left”][/kc_column][kc_column width=”50%” _id=”989615″][kc_feature_box layout=”2″ title=”Cyber Security Seminar In-Person – Day 2″ desc=”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” show_button=”__empty__” _id=”404322″ image=”1019″][kc_spacing height=”20px” _id=”560625″][kc_button text_title=”1st Presenter -KILL-CHAIN cont.pdf” _id=”744754″ link=”https://internetsociety.org.lr/wp-content/uploads/2021/03/KILL-CHAIN_Claudius-Thompson.pdf|KILL CHAIN|” custom_css=”{`kc-css`:{`any`:{`button-style`:{`color|.kc_button`:`#ffffff`,`background-color|.kc_button`:`#000000`}}}}” show_icon=”yes” icon=”sl-arrow-down-circle” icon_position=”left”][kc_spacing height=”20px” _id=”663284″][kc_button text_title=”2nd Presenter – Cybersecurity Threats Targets and Pepetrator.pdf” _id=”600048″ link=”https://internetsociety.org.lr/wp-content/uploads/2021/03/Commissioner-Titus-Presentation-on-Cybersecurity-Threats-Targets-and-Pepetrator.pdf|Legal issues of Internet governance|” custom_css=”{`kc-css`:{`any`:{`button-style`:{`color|.kc_button`:`#ffffff`,`background-color|.kc_button`:`#000000`}}}}” show_icon=”yes” icon=”sl-arrow-down-circle” icon_position=”left”][kc_spacing height=”20px” _id=”862884″][kc_button text_title=”3rd Presenter – Treats.pdf” _id=”472356″ link=”https://internetsociety.org.lr/wp-content/uploads/2021/03/TREATs.pdf|Treats|” custom_css=”{`kc-css`:{`any`:{`button-style`:{`color|.kc_button`:`#ffffff`,`background-color|.kc_button`:`#000000`}}}}” show_icon=”yes” icon=”sl-arrow-down-circle” icon_position=”left”][kc_spacing height=”20px” _id=”480165″][kc_button text_title=”4th Presenter – Encryption.pdf” _id=”85043″ link=”https://internetsociety.org.lr/wp-content/uploads/2020/10/State-of-Internet-Access-and-infrastructure-in-Liberia_Com_Zotawon-D.-Titus.pdf|The State of Internet Access & Infrastructure in Liberia Zotawon D. Titus.pdf|” custom_css=”{`kc-css`:{`any`:{`button-style`:{`color|.kc_button`:`#ffffff`,`background-color|.kc_button`:`#000000`}}}}” show_icon=”yes” icon=”sl-arrow-down-circle” icon_position=”left”][kc_spacing height=”20px” _id=”566535″][kc_button text_title=”5th Presenter – Law Enforcement Procedures in Liberia.pdf” _id=”984124″ link=”https://internetsociety.org.lr/wp-content/uploads/2020/10/ISOC-Slides-MultistakeholderApproach-20161103_Mr-Kine.pdf|Law Enforcement Procedures in Liberia|” custom_css=”{`kc-css`:{`any`:{`button-style`:{`color|.kc_button`:`#ffffff`,`background-color|.kc_button`:`#000000`}}}}” show_icon=”yes” icon=”sl-arrow-down-circle” icon_position=”left”][kc_spacing height=”20px” _id=”733057″][/kc_column][/kc_row][kc_row use_container=”yes” _id=”90005″][kc_column width=”12/12″ video_mute=”no” _id=”243992″][kc_title text=”UGhvdG9zICYgVmlkZW9z” _id=”95644″ type=”h1″ title_wrap=”yes” css_custom=”{`kc-css`:{`any`:{`title-style`:{`text-align|+.kc_title,.kc_title,.kc_title a.kc_title_link`:`center`}}}}”][/kc_column][/kc_row][kc_row use_container=”yes” _id=”935439″][kc_column width=”12/12″ video_mute=”no” _id=”345593″][kc_spacing height=”30px” _id=”632861″][/kc_column][/kc_row][kc_row use_container=”yes” _id=”319405″][kc_column width=”50%” _id=”659329″][kc_raw_code code=”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” _id=”909111″][kc_raw_code code=”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” _id=”154054″][kc_raw_code code=”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” _id=”5133″][/kc_column][kc_column width=”50%” _id=”351285″][kc_raw_code code=”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” _id=”766132″][kc_raw_code code=”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” _id=”551950″][kc_raw_code code=”PHNjcmlwdD4NCiAgd2luZG93LmZiQXN5bmNJbml0ID0gZnVuY3Rpb24oKSB7DQogICAgRkIuaW5pdCh7DQogICAgICB4ZmJtbCAgICAgIDogdHJ1ZSwNCiAgICAgIHZlcnNpb24gICAgOiAndjguMCcNCiAgICB9KTsNCiAgfTsgDQo8L3NjcmlwdD4NCjxzY3JpcHQgYXN5bmMgZGVmZXIgc3JjPSJodHRwczovL2Nvbm5lY3QuZmFjZWJvb2submV0L2VuX1VTL3Nkay5qcyI+PC9zY3JpcHQ+DQogIA0KPGRpdiANCiAgY2xhc3M9ImZiLXBvc3QiIA0KICBkYXRhLWhyZWY9Imh0dHBzOi8vZmIud2F0Y2gvNHRSMlJBWklmVi8iIA0KICBkYXRhLXdpZHRoPSI1MDAiPjwvZGl2Pg==” _id=”682958″][/kc_column][/kc_row]