{"id":168,"date":"2013-12-19T13:09:17","date_gmt":"2013-12-19T13:09:17","guid":{"rendered":"http:\/\/www.ict-forensics-consulting.com\/?page_id=168"},"modified":"2013-12-28T20:48:25","modified_gmt":"2013-12-28T20:48:25","slug":"ready-made-training","status":"publish","type":"page","link":"http:\/\/www.ict-forensics-consulting.com\/HR\/training\/ready-made-training\/","title":{"rendered":"Gotovi seminari"},"content":{"rendered":"<p><\/p>\n<p style=\"text-align: justify;\">U mogu\u0107nosti smo ponuditi Vam gotove seminare i treninge u trajanju od pola do tri radna dana, ovisno o Va\u0161im potrebama, sa sljede\u0107im temama:<\/p>\n<ol>\n<li style=\"text-align: justify;\">Vje\u0161ta\u010denja u informatici i telekomunikacijama<\/li>\n<li style=\"text-align: justify;\">Kazneni postupci, sudska vje\u0161ta\u010denja i korporativna informatika<\/li>\n<li style=\"text-align: justify;\">Korporativno upravljanje informatikom (ICT governance)<\/li>\n<li style=\"text-align: justify;\">Kreiranje prora\u010duna odjela informatike<\/li>\n<li style=\"text-align: justify;\">Integralna sigurnost (funkcija CSO)<\/li>\n<li style=\"text-align: justify;\">Informacijska sigurnost\u00a0(funkcija CISO)<\/li>\n<li style=\"text-align: justify;\">Modeliranje poslovnih procesa (po\u010detni seminar)<\/li>\n<li style=\"text-align: justify;\">Razvoj ljudskih resursa u ICT sektoru<\/li>\n<\/ol>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>U mogu\u0107nosti smo ponuditi Vam gotove seminare i treninge u trajanju od pola do tri radna dana, ovisno o Va\u0161im potrebama, sa sljede\u0107im temama: Vje\u0161ta\u010denja u informatici i telekomunikacijama Kazneni postupci, sudska vje\u0161ta\u010denja i korporativna informatika Korporativno upravljanje informatikom (ICT&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":119,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":[],"_links":{"self":[{"href":"http:\/\/www.ict-forensics-consulting.com\/HR\/wp-json\/wp\/v2\/pages\/168"}],"collection":[{"href":"http:\/\/www.ict-forensics-consulting.com\/HR\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.ict-forensics-consulting.com\/HR\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.ict-forensics-consulting.com\/HR\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.ict-forensics-consulting.com\/HR\/wp-json\/wp\/v2\/comments?post=168"}],"version-history":[{"count":7,"href":"http:\/\/www.ict-forensics-consulting.com\/HR\/wp-json\/wp\/v2\/pages\/168\/revisions"}],"predecessor-version":[{"id":472,"href":"http:\/\/www.ict-forensics-consulting.com\/HR\/wp-json\/wp\/v2\/pages\/168\/revisions\/472"}],"up":[{"embeddable":true,"href":"http:\/\/www.ict-forensics-consulting.com\/HR\/wp-json\/wp\/v2\/pages\/119"}],"wp:attachment":[{"href":"http:\/\/www.ict-forensics-consulting.com\/HR\/wp-json\/wp\/v2\/media?parent=168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}