{"id":164,"date":"2024-05-25T21:36:23","date_gmt":"2024-05-25T21:36:23","guid":{"rendered":"https:\/\/tec.alnoor.edu.iq\/?page_id=164"},"modified":"2026-03-11T05:38:02","modified_gmt":"2026-03-11T05:38:02","slug":"cyber-security-technology-engineering","status":"publish","type":"page","link":"https:\/\/tec.alnoor.edu.iq\/en\/cyber-security-technology-engineering\/","title":{"rendered":"Cyber Security Techniques Engineering"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"164\" class=\"elementor elementor-164\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ac67bc e-con-full e-flex e-con e-parent\" data-id=\"6ac67bc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a9b2739 elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"a9b2739\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1439\" src=\"https:\/\/tec.alnoor.edu.iq\/wp-content\/uploads\/2024\/11\/IMG_3711-scaled.jpg\" class=\"attachment-full size-full wp-image-2899\" alt=\"\" srcset=\"https:\/\/tec.alnoor.edu.iq\/wp-content\/uploads\/2024\/11\/IMG_3711-scaled.jpg 2560w, https:\/\/tec.alnoor.edu.iq\/wp-content\/uploads\/2024\/11\/IMG_3711-300x169.jpg 300w, https:\/\/tec.alnoor.edu.iq\/wp-content\/uploads\/2024\/11\/IMG_3711-1024x576.jpg 1024w, https:\/\/tec.alnoor.edu.iq\/wp-content\/uploads\/2024\/11\/IMG_3711-768x432.jpg 768w, https:\/\/tec.alnoor.edu.iq\/wp-content\/uploads\/2024\/11\/IMG_3711-1536x864.jpg 1536w, https:\/\/tec.alnoor.edu.iq\/wp-content\/uploads\/2024\/11\/IMG_3711-2048x1152.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-479fc0ce e-con-full e-flex e-con e-parent\" data-id=\"479fc0ce\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-56f3620a e-con-full e-flex e-con e-child\" data-id=\"56f3620a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-fd8b070 e-con-full e-flex e-con e-child\" data-id=\"fd8b070\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15ef818 elementor-widget elementor-widget-heading\" data-id=\"15ef818\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Department of  Cyber Security Techniques Engineering<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14363636 ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"14363636\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-center text- icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon icon icon-briefcase\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    About the Department                <\/h3>\n                        \t\t  \t<p>The Cyber Security Techniques Engineering Department is an academic discipline aimed at training students on the latest methods and techniques used to protect information systems and networks from digital threats and attacks. The department focuses on providing the necessary technical and theoretical skills to design and implement strong security strategies to protect data and devices from breaches.\n\nThe curriculum in this department includes specialized topics such as networking, encryption, malware protection, penetration testing, and vulnerability analysis. It also covers concepts of security governance and compliance with international standards like ISO 27001, in addition to developing strategies for incident management and responding to cybersecurity attacks.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-357b095b e-con-full e-flex e-con e-parent\" data-id=\"357b095b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-6427c42d e-con-full e-flex e-con e-child\" data-id=\"6427c42d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-31491e1f e-grid e-con-full e-con e-child\" data-id=\"31491e1f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-509ad20 e-con-full e-flex e-con e-child\" data-id=\"509ad20\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;shape_divider_bottom&quot;:&quot;book&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M806,94.7C619.5,90,500,20.3,500,1.7c-1,18.6-117.5,88.3-306,93C92,97.2,0,97.9,0,97.9v-0l0,0v2.3h1000v-2.3 C1000,97.7,920.3,97.6,806,94.7z M350,65.1L350,65.1L350,65.1L350,65.1z\"\/>\n<\/svg>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65568a67 ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"65568a67\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-center text- icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon icon icon-target-2\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Department Objectives                <\/h3>\n                        \t\t  \t<p>\u2022\tTraining Highly Skilled Engineers: Preparing engineers with a high level of understanding, knowledge, and both academic and technical preparation. Graduates will combine engineering concepts with technical creativity, scientific proficiency, and high-quality execution in cybersecurity and cloud computing engineering.\n\n\u2022\tDeveloping IT Security Professionals: Training engineers responsible for building, designing, and securing IT systems in institutions to prevent data breaches, protect against hackers, viruses, and other threats, and oversee network infrastructure. They will manage various network types and security systems, troubleshoot network infrastructure and security devices, and provide guidance and solutions for various challenges.\n\n\u2022\tEnhancing Cloud Computing and Security Skills: Equipping engineers with the scientific and technical expertise needed to handle cloud computing operations, utilize vulnerability assessment tools to identify security issues, monitor failures, evaluate security patches, mitigate vulnerabilities, and assist in security documentation and disaster recovery solutions.\n\n\u2022\tCyber Threat Analysis and Risk Assessment: Training engineers with technical and analytical skills to analyze data logs, conduct risk assessments in security breach incidents, identify compromised system components, and detect potential threats. Graduates will also be proficient in ethical hacking to assess network security and uncover vulnerabilities to ensure system safety.\n\n\u2022\tContinuous Curriculum Development: Constantly improving academic programs through collaboration with Arab and international academic institutions. The goal is to align with Iraq\u2019s national cybersecurity and defense programs, meet market demands, and create an optimal learning environment using the latest teaching methods.\n\n\u2022\tFaculty and Staff Development: Providing ongoing professional development for faculty members, technicians, and administrative staff through participation in seminars, conferences, and workshops organized by the department or similar departments in local and international universities.\n\n\u2022\tGraduate Follow-up and Community Engagement: Collaborating with organizations to track graduates\u2019 performance and conduct continuous evaluations to ensure their effective contribution to society. A long-term plan will be implemented to enhance community engagement and expand its impact.\n\n\u2022\tProviding Technical and Academic Consultancy: Offering expertise and guidance in cybersecurity and cloud computing to government and academic institutions, ensuring best practices in security and IT management.\n<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-27688382 e-con-full e-flex e-con e-child\" data-id=\"27688382\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;shape_divider_bottom&quot;:&quot;book&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M806,94.7C619.5,90,500,20.3,500,1.7c-1,18.6-117.5,88.3-306,93C92,97.2,0,97.9,0,97.9v-0l0,0v2.3h1000v-2.3 C1000,97.7,920.3,97.6,806,94.7z M350,65.1L350,65.1L350,65.1L350,65.1z\"\/>\n<\/svg>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25b4f1e3 ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"25b4f1e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-center text- icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon icon icon-envelope11\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Department Mission                <\/h3>\n                        \t\t  \t<p>The goal is to prepare outstanding and competent technical engineers in the field of technical, organizational, and administrative means for protecting computers, networks, and data from cyberattacks. The department aims to motivate students' scientific potential by bridging the gap between theoretical foundations and the practical application of programs, ensuring alignment with internationally recognized standards for the field. Graduates will be capable of meeting the demands of the public, private, and mixed job markets. Additionally, the department seeks to build and develop collaborative relationships with engineering and technical entities both locally and internationally.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-502726c e-grid e-con-full e-con e-child\" data-id=\"502726c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-cc1a773 e-con-full e-flex e-con e-child\" data-id=\"cc1a773\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;shape_divider_bottom&quot;:&quot;book&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M806,94.7C619.5,90,500,20.3,500,1.7c-1,18.6-117.5,88.3-306,93C92,97.2,0,97.9,0,97.9v-0l0,0v2.3h1000v-2.3 C1000,97.7,920.3,97.6,806,94.7z M350,65.1L350,65.1L350,65.1L350,65.1z\"\/>\n<\/svg>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ac00e4d ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"1ac00e4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-center text- icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon icon icon-menu-3\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Department Vision                <\/h3>\n                        \t\t  \t<p>The department aims to be an innovative, pioneering, and effective entity within the regional and global academic community in the field of Cybersecurity and Cloud Computing. It seeks to contribute to the development and service of the local community by providing skilled professionals and offering scientific and technical advice in the field of cybersecurity. Additionally, the department works on ensuring the quality of the infrastructure for IT departments across various government sectors. It is committed to designing and building scalable, secure, and robust security systems, as well as working on systems and networks for data centers. Furthermore, the department aims to help institutions understand advanced cyber threats and develop strategies to protect their networks.\n\n\n<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2dc478c e-con-full e-flex e-con e-child\" data-id=\"2dc478c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;shape_divider_bottom&quot;:&quot;book&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M806,94.7C619.5,90,500,20.3,500,1.7c-1,18.6-117.5,88.3-306,93C92,97.2,0,97.9,0,97.9v-0l0,0v2.3h1000v-2.3 C1000,97.7,920.3,97.6,806,94.7z M350,65.1L350,65.1L350,65.1L350,65.1z\"\/>\n<\/svg>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7156e37f ekit-equal-height-enable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"7156e37f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-center text- icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon icon icon-tab\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Graduate Description                <\/h3>\n                        \t\t  \t<p>A graduate of the Cybersecurity Techniques Engineering  Department is a specialized professional in protecting information systems and networks from digital threats. They possess expertise in security analysis and testing techniques and are proficient in securing networks using tools such as firewalls and intrusion detection systems. Additionally, they have advanced encryption skills to safeguard data and can effectively handle and respond to security incidents while implementing disaster recovery plans.\n\nThis graduate is capable of working in multidisciplinary environments and communicating effectively with both technical and non-technical teams. Furthermore, they are skilled in using security tools such as Wireshark and Nmap and rely on analytical and strategic thinking to counter threats. With in-depth knowledge of cybersecurity, they are prepared to take on various roles, including security consultant, network security engineer, or incident investigator, while maintaining a commitment to continuous learning to keep pace with advancements in this dynamic field.\n\n\n<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7396de3 e-con-full e-flex e-con e-parent\" data-id=\"7396de3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-fa4ca61 e-con-full e-flex e-con e-child\" data-id=\"fa4ca61\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a6b7a5 e-con-full e-flex e-con e-parent\" data-id=\"1a6b7a5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ebd0958 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"ebd0958\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;horizontal_scroll&quot;:&quot;disable&quot;,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"247269720\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\" data-no-translation-aria-label=\"\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-2472697201\" data-tab-title-id=\"e-n-tab-title-2472697201\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-2472697201\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u0627\u0644\u0645\u062d\u0627\u0636\u0631\u0627\u062a\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2472697202\" data-tab-title-id=\"e-n-tab-title-2472697202\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2472697202\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u0648\u0635\u0641 \u0627\u0644\u0645\u0642\u0631\u0631\u0627\u062a\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-2472697203\" data-tab-title-id=\"e-n-tab-title-2472697203\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-2472697203\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\t\u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u0627\u0643\u0627\u062f\u064a\u0645\u064a\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-2472697201\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2472697201\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-fdb069f e-con-full e-flex e-con e-child\" data-id=\"fdb069f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2472697202\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2472697202\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-6aa5b15 e-con-full e-flex e-con e-child\" data-id=\"6aa5b15\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2df2c90 e-flex e-con-boxed e-con e-child\" data-id=\"2df2c90\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4773278 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"4773278\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/drive.google.com\/drive\/folders\/1X5GWeGGGOKuAgaR7Mf4QaTRQdwziTOVh?usp=sharing\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">\u0648\u0635\u0641 \u0627\u0644\u0645\u0642\u0631\u0631 2025-2026<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-2472697203\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-2472697203\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-abb7ae7 e-con-full e-flex e-con e-child\" data-id=\"abb7ae7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u0642\u0633\u0645 \u0647\u0646\u062f\u0633\u0629 \u062a\u0642\u0646\u064a\u0627\u062a \u0627\u0644\u0627\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0646\u0628\u0630\u0629 \u0639\u0646 \u0627\u0644\u0642\u0633\u0645 \u0642\u0633\u0645 \u0647\u0646\u062f\u0633\u0629 \u062a\u0642\u0646\u064a\u0627\u062a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0647\u0648 \u062a\u062e\u0635\u0635 \u0623\u0643\u0627\u062f\u064a\u0645\u064a \u064a\u0647\u062f\u0641 \u0625\u0644\u0649 \u062a\u062f\u0631\u064a\u0628 \u0627\u0644\u0637\u0644\u0627\u0628 [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-164","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/tec.alnoor.edu.iq\/en\/wp-json\/wp\/v2\/pages\/164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tec.alnoor.edu.iq\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tec.alnoor.edu.iq\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tec.alnoor.edu.iq\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/tec.alnoor.edu.iq\/en\/wp-json\/wp\/v2\/comments?post=164"}],"version-history":[{"count":110,"href":"https:\/\/tec.alnoor.edu.iq\/en\/wp-json\/wp\/v2\/pages\/164\/revisions"}],"predecessor-version":[{"id":4466,"href":"https:\/\/tec.alnoor.edu.iq\/en\/wp-json\/wp\/v2\/pages\/164\/revisions\/4466"}],"wp:attachment":[{"href":"https:\/\/tec.alnoor.edu.iq\/en\/wp-json\/wp\/v2\/media?parent=164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}