{"id":2917,"date":"2020-04-29T10:48:09","date_gmt":"2020-04-29T10:48:09","guid":{"rendered":"https:\/\/isf.tvz.hr\/?page_id=2917"},"modified":"2020-04-29T12:08:41","modified_gmt":"2020-04-29T12:08:41","slug":"labs","status":"publish","type":"page","link":"https:\/\/isf.tvz.hr\/index.php\/labs\/","title":{"rendered":"Labs"},"content":{"rendered":"<p><div id=\"admissions\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\"  style='background-color: #ffffff;background-position: left top;background-repeat: no-repeat;margin-bottom: 35px;margin-top: 50px;border-top-width:0px;border-bottom-width:0px;border-color:#e7e4e2;border-top-style:solid;border-bottom-style:solid;'><div class=\"fusion-builder-row fusion-row \"><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_2 fusion-builder-column-0 fusion-one-half fusion-column-first 1_2\"  style='margin-top:10px;margin-bottom:10px;width:48%; margin-right: 4%;'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-bottom:30px;\"><h2 class=\"title-heading-left\" style=\"margin:0;letter-spacing:2px;color:#d20000;\">THE GROWING RISKS<\/h2><\/div><div class=\"fusion-text\"><p>All relevant statistics on threats and cyberattacks report a huge increase in both attacks and financial losses, making training and development in the field of IT security and digital forensics an issue of national interest.<\/p>\n<p>Cyberattacks on critical infrastructures such as the financial one, transportation, electrical energy or communication can result in significant losses in every sense. The growing trends towards digitalization, connectivity and online work furthermore increase the everyday risk.<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep sep-none\" style=\"margin-left: auto;margin-right: auto;margin-top:20px;margin-bottom:20px;\"><\/div><div class=\"fusion-text\"><p>According to the National Cyber Security Center (part of GCHQ), the most common vector of attack is spam e-mail containing a malicious link or attachment. The second most common way one\u2019s computer might become compromised is through visiting genuine websites that have been compromised with malicious code (known as a watering hole attack), or advertisements that redirect one to a malicious server that will serve up advertisements to one\u2019s computer (known as malvertising).<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_2 fusion-builder-column-1 fusion-one-half fusion-column-last 1_2\"  style='margin-top:10px;margin-bottom:10px;width:48%'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><span class=\"fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><a href=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/04\/Chart-Cyber-attacks-in-numbers_1.jpg\" class=\"fusion-lightbox\" data-rel=\"iLightbox[fc94bb1e982831901c5]\" data-title=\"Chart-Cyber-attacks-in-numbers_1\" title=\"Chart-Cyber-attacks-in-numbers_1\"><img loading=\"lazy\" src=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/04\/Chart-Cyber-attacks-in-numbers_1.jpg\" data-orig-src=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/04\/Chart-Cyber-attacks-in-numbers_1.jpg\" width=\"800\" height=\"604\" alt=\"\" class=\"lazyload img-responsive wp-image-2919\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27604%27%20viewBox%3D%270%200%20800%20604%27%3E%3Crect%20width%3D%27800%27%20height%3D%273604%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/04\/Chart-Cyber-attacks-in-numbers_1-200x151.jpg 200w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/04\/Chart-Cyber-attacks-in-numbers_1-400x302.jpg 400w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/04\/Chart-Cyber-attacks-in-numbers_1-600x453.jpg 600w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/04\/Chart-Cyber-attacks-in-numbers_1.jpg 800w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1000px) 100vw, 800px\" \/><\/a><\/span><div class=\"fusion-text\"><p>Source: <a href=\"https:\/\/www.varonis.com\/blog\/cybersecurity-statistics\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.varonis.com\/blog\/cybersecurity-statistics\/<\/a><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/div><style type=\"text\/css\">.fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link) , .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):before, .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):after {color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover, .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover:before, .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover:after {color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 .pagination a.inactive:hover, .fusion-fullwidth.fusion-builder-row-1 .fusion-filters .fusion-filter.fusion-active a {border-color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 .pagination .current {border-color: #d20000; background-color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 .fusion-filters .fusion-filter.fusion-active a, .fusion-fullwidth.fusion-builder-row-1 .fusion-date-and-formats .fusion-format-box, .fusion-fullwidth.fusion-builder-row-1 .fusion-popover, .fusion-fullwidth.fusion-builder-row-1 .tooltip-shortcode {color: #d20000;}#main .fusion-fullwidth.fusion-builder-row-1 .post .blog-shortcode-post-title a:hover {color: #d20000;}<\/style><div id=\"requirement\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\"  style='background-color: #ffffff;background-position: left top;background-repeat: no-repeat;margin-bottom: 35px;margin-top: 35px;border-top-width:0px;border-bottom-width:0px;border-color:#e7e4e2;border-top-style:solid;border-bottom-style:solid;'><div class=\"fusion-builder-row fusion-row \"><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_1 fusion-builder-column-2 fusion-one-full fusion-column-first fusion-column-last 1_1\"  style='margin-top:10px;margin-bottom:10px;'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-bottom:30px;\"><h2 class=\"title-heading-left\" style=\"margin:0;letter-spacing:2px;color:#d20000;\">OUR LABS<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_3 fusion-builder-column-3 fusion-one-third fusion-column-first 1_3\"  style='margin-top:10px;margin-bottom:10px;width:33.33%;width:calc(33.33% - ( ( 4% ) * 0.3333 ) );margin-right: 4%;'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><span class=\"fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img loading=\"lazy\" src=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/02\/zicer_1.jpg\" data-orig-src=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/02\/zicer_1.jpg\" width=\"800\" height=\"526\" alt=\"\" title=\"zicer_1\" class=\"lazyload img-responsive wp-image-2135\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27526%27%20viewBox%3D%270%200%20800%20526%27%3E%3Crect%20width%3D%27800%27%20height%3D%273526%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/02\/zicer_1-200x132.jpg 200w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/02\/zicer_1-400x263.jpg 400w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/02\/zicer_1-600x395.jpg 600w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/02\/zicer_1.jpg 800w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1000px) 100vw, 600px\" \/><\/span><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_2_3 fusion-builder-column-4 fusion-two-third fusion-column-last 2_3\"  style='margin-top:10px;margin-bottom:10px;width:66.66%;width:calc(66.66% - ( ( 4% ) * 0.6666 ) );'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><div class=\"fusion-text\"><p>It is very important to ensure the possibility of continuous training and education in the field of information security and digital forensics, especially the opportunity for gaining practical knowledge in this field.<\/p>\n<p>The Zagreb University of Applied Sciences has more than 45 computer labs for lab exercise work, and several specialised computer and engineering labs such as Cisco lab, Mac lab, Laboratory of Strength of Materials, InfraRed Lab and LINUX Lab.<\/p>\n<p><span style=\"font-weight: 400;\">Software packages for education are carefully selected and we provide students with the opportunity to gain knowledge in the latest engineering tools such as Matlab, SolidWorks, LabView, Autocad, Adobe packages, various tools in the field of programming languages, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Computer infrastructure used by students in the Master Study of Information Security and Digital Forensics is adapted and configured to perform a university laboratory exercises programme through laboratory exercises.<\/span><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_2_3 fusion-builder-column-5 fusion-two-third fusion-column-first 2_3\"  style='margin-top:10px;margin-bottom:10px;width:66.66%;width:calc(66.66% - ( ( 4% ) * 0.6666 ) );margin-right: 4%;'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><div class=\"fusion-text\"><p>There are 5 computer classrooms where students gain practical knowledge and skills using:<\/p>\n<ul>\n<li><strong>various software packages<\/strong><br \/>\nEnCase, FTK, BlackBag Technologies, Secure Cube, FireEye, etc.<\/li>\n<li><strong>a range of open source tools<\/strong><br \/>\nKali Linux, Splunk, Wireshark, Volatility, Sanndbox, and numerous others<\/li>\n<\/ul>\n<p>Some specialised lab exercises from the course <a href=\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/network-security\/\"><strong>Network security<\/strong><\/a> are held in a specialised Cisco laboratory, and exercises in the course <strong><a href=\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/18\/it-forensics-of-documents-and-securities\/\" target=\"_blank\" rel=\"noopener noreferrer\">IT Forensics of Documents and Securities<\/a><\/strong>\u00a0are conducted on the instrument for digital forensics Docucenter 4500 with software PIA 7000.<\/p>\n<p>On top of all that, students can expect:<\/p>\n<ul>\n<li><strong>Setting up several cloud laboratories with licensed software<\/strong><br \/>\nIn this way, we enable the students to work with specialised forensic software from home or from work.<\/li>\n<li><strong>Recording all lectures and lab work<\/strong><br \/>\nIn this way, we make the material available through our learning management system, and students can upload their lab tasks or seminars there, and even partially write exams throughout their study programme.<\/li>\n<\/ul>\n<p>The physical equipment and operating systems of our labs are there to ensure that the students get to experience firsthand what the cyberspace environment looks like and how it works. They learn virtualisation technologies, network architectures, information security and cryptography, as well as the laws, policies and regulations that govern cyberspace<\/p>\n<p>Learn more about our <strong><a href=\"https:\/\/isf.tvz.hr\/index.php\/courses\/\">courses!<\/a><\/strong><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_3 fusion-builder-column-6 fusion-one-third fusion-column-last 1_3\"  style='margin-top:10px;margin-bottom:10px;width:33.33%;width:calc(33.33% - ( ( 4% ) * 0.3333 ) );'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><span class=\"fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img loading=\"lazy\" src=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/04\/projektina_1-1.jpg\" data-orig-src=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/04\/projektina_1-1.jpg\" width=\"800\" height=\"600\" alt=\"\" title=\"projektina_1\" class=\"lazyload img-responsive wp-image-2847\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27800%27%20height%3D%27600%27%20viewBox%3D%270%200%20800%20600%27%3E%3Crect%20width%3D%27800%27%20height%3D%273600%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/04\/projektina_1-1-200x150.jpg 200w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/04\/projektina_1-1-400x300.jpg 400w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/04\/projektina_1-1-600x450.jpg 600w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/04\/projektina_1-1.jpg 800w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1000px) 100vw, 600px\" \/><\/span><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/div><style type=\"text\/css\">.fusion-fullwidth.fusion-builder-row-2 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link) , .fusion-fullwidth.fusion-builder-row-2 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):before, .fusion-fullwidth.fusion-builder-row-2 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):after {color: #d20000;}.fusion-fullwidth.fusion-builder-row-2 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover, .fusion-fullwidth.fusion-builder-row-2 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover:before, .fusion-fullwidth.fusion-builder-row-2 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover:after {color: #d20000;}.fusion-fullwidth.fusion-builder-row-2 .pagination a.inactive:hover, .fusion-fullwidth.fusion-builder-row-2 .fusion-filters .fusion-filter.fusion-active a {border-color: #d20000;}.fusion-fullwidth.fusion-builder-row-2 .pagination .current {border-color: #d20000; background-color: #d20000;}.fusion-fullwidth.fusion-builder-row-2 .fusion-filters .fusion-filter.fusion-active a, .fusion-fullwidth.fusion-builder-row-2 .fusion-date-and-formats .fusion-format-box, .fusion-fullwidth.fusion-builder-row-2 .fusion-popover, .fusion-fullwidth.fusion-builder-row-2 .tooltip-shortcode {color: #d20000;}#main .fusion-fullwidth.fusion-builder-row-2 .post .blog-shortcode-post-title a:hover {color: #d20000;}<\/style><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Labs - TVZ - Information Security and Digital Forensics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/isf.tvz.hr\/index.php\/labs\/\" \/>\n<meta property=\"og:locale\" content=\"hr_HR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Labs - TVZ - Information Security and Digital Forensics\" \/>\n<meta property=\"og:url\" content=\"https:\/\/isf.tvz.hr\/index.php\/labs\/\" \/>\n<meta property=\"og:site_name\" content=\"TVZ - Information Security and Digital Forensics\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-29T12:08:41+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Procijenjeno vrijeme \u010ditanja\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/isf.tvz.hr\/#website\",\"url\":\"https:\/\/isf.tvz.hr\/\",\"name\":\"TVZ - Information Security and Digital Forensics\",\"description\":\"Study Programme\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/isf.tvz.hr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"hr\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/labs\/#webpage\",\"url\":\"https:\/\/isf.tvz.hr\/index.php\/labs\/\",\"name\":\"Labs - TVZ - Information Security and Digital Forensics\",\"isPartOf\":{\"@id\":\"https:\/\/isf.tvz.hr\/#website\"},\"datePublished\":\"2020-04-29T10:48:09+00:00\",\"dateModified\":\"2020-04-29T12:08:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/labs\/#breadcrumb\"},\"inLanguage\":\"hr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/isf.tvz.hr\/index.php\/labs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/labs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/isf.tvz.hr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Labs\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Labs - TVZ - Information Security and Digital Forensics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/isf.tvz.hr\/index.php\/labs\/","og_locale":"hr_HR","og_type":"article","og_title":"Labs - TVZ - Information Security and Digital Forensics","og_url":"https:\/\/isf.tvz.hr\/index.php\/labs\/","og_site_name":"TVZ - Information Security and Digital Forensics","article_modified_time":"2020-04-29T12:08:41+00:00","twitter_card":"summary_large_image","twitter_misc":{"Procijenjeno vrijeme \u010ditanja":"13 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/isf.tvz.hr\/#website","url":"https:\/\/isf.tvz.hr\/","name":"TVZ - Information Security and Digital Forensics","description":"Study Programme","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/isf.tvz.hr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"hr"},{"@type":"WebPage","@id":"https:\/\/isf.tvz.hr\/index.php\/labs\/#webpage","url":"https:\/\/isf.tvz.hr\/index.php\/labs\/","name":"Labs - TVZ - Information Security and Digital Forensics","isPartOf":{"@id":"https:\/\/isf.tvz.hr\/#website"},"datePublished":"2020-04-29T10:48:09+00:00","dateModified":"2020-04-29T12:08:41+00:00","breadcrumb":{"@id":"https:\/\/isf.tvz.hr\/index.php\/labs\/#breadcrumb"},"inLanguage":"hr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/isf.tvz.hr\/index.php\/labs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/isf.tvz.hr\/index.php\/labs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/isf.tvz.hr\/"},{"@type":"ListItem","position":2,"name":"Labs"}]}]}},"_links":{"self":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/pages\/2917"}],"collection":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/comments?post=2917"}],"version-history":[{"count":14,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/pages\/2917\/revisions"}],"predecessor-version":[{"id":2933,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/pages\/2917\/revisions\/2933"}],"wp:attachment":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/media?parent=2917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}