{"id":355,"date":"2023-06-20T10:44:16","date_gmt":"2023-06-20T06:44:16","guid":{"rendered":"https:\/\/mec.noesislearnings.com\/?post_type=lp_course&#038;p=355"},"modified":"2025-08-11T15:20:25","modified_gmt":"2025-08-11T11:20:25","slug":"computer-engineering-cyber-security","status":"publish","type":"lp_course","link":"https:\/\/mec.edu.om\/ar\/Programmes\/computer-engineering-cyber-security\/","title":{"rendered":"\u0628\u0643\u0627\u0644\u0648\u0631\u064a\u0648\u0633 (\u0645\u0639 \u0645\u0631\u062a\u0628\u0629 \u0627\u0644\u0634\u0631\u0641) \u0641\u064a \u0647\u0646\u062f\u0633\u0629 \u0627\u0644\u0643\u0645\u0628\u064a\u0648\u062a\u0631 (\u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a)"},"content":{"rendered":"<p>In the thriving GCC region, including Oman, UAE, and Saudi Arabia, the demand for cybersecurity professionals rapidly increases as organisations prioritise protecting their digital assets and data. Your proficiency in information security will make you a highly sought-after professional in these dynamic economies, where safeguarding sensitive information is critical for businesses and governments.<\/p>\n<p>\u0635\u064f\u0645\u0645 \u0628\u0631\u0646\u0627\u0645\u062c \u0647\u0646\u062f\u0633\u0629 \u0627\u0644\u062d\u0627\u0633\u0628 \u0627\u0644\u0622\u0644\u064a \u0641\u064a \u0645\u0633\u0627\u0642\u060c \u0623\u0645\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a\u061b \u0644\u0631\u0641\u0639 \u0641\u0631\u0635\u062a\u0643 \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0648\u0638\u064a\u0641\u0629\u060c \u0648\u0645\u0646\u062d\u0643 \u0627\u0644\u0645\u0632\u064a\u062f \u0645\u0646 \u0627\u0644\u0641\u0631\u0635 \u0627\u0644\u0645\u0647\u0646\u064a\u0629 \u0627\u0644\u062a\u064a \u062a\u062a\u0637\u0644\u0628 \u0648\u062c\u0648\u062f\u0643 \u0643\u062e\u0628\u064a\u0631 \u0641\u064a \u0645\u062c\u0627\u0644 \u0627\u0644\u0623\u0645\u0627\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a. \u0648\u0623\u0646\u062a \u0643\u062e\u0631\u064a\u062c \u0645\u0646 \u0647\u0630\u0627 \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062c\u060c \u0633\u062a\u062a\u0645\u062a\u0639 \u0628\u0627\u0644\u0645\u0647\u0627\u0631\u0627\u062a \u0648\u0627\u0644\u062e\u0628\u0631\u0629 \u0627\u0644\u0623\u0633\u0627\u0633\u064a\u0629 \u0644\u062a\u0628\u0631\u0632 \u0641\u064a \u0635\u0646\u0627\u0639\u0627\u062a \u0645\u062a\u0646\u0648\u0639\u0629 \u062d\u064a\u062b \u064a\u0644\u0639\u0628 \u0623\u0645\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u062f\u0648\u0631\u064b\u0627 \u062d\u0627\u0633\u0645\u064b\u0627. \u0633\u064a\u0645\u0643\u0646 \u0647\u0630\u0627 \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u0637\u0644\u0628\u0629 \u0645\u0646 \u0627\u0643\u062a\u0633\u0627\u0628 \u0645\u0647\u0627\u0631\u0627\u062a \u0641\u064a \u0627\u0643\u062a\u0634\u0627\u0641 \u0648\u0627\u0644\u0642\u0636\u0627\u0621 \u0639\u0644\u0649 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0648\u0627\u0644\u062a\u0634\u063a\u064a\u0644 \u0627\u0644\u0622\u0645\u0646 \u0644\u0625\u0646\u062a\u0631\u0646\u062a \u0627\u0644\u0623\u0634\u064a\u0627\u0621\u060c \u0648\u0627\u0644\u062d\u0648\u0633\u0628\u0629 \u0627\u0644\u0633\u062d\u0627\u0628\u064a\u0629\u060c \u0648\u0627\u0644\u062d\u0633\u0627\u0633\u0627\u062a\u060c \u0648\u0634\u0628\u0643\u0627\u062a \u0627\u0644\u062d\u0627\u0633\u0628 \u0627\u0644\u0622\u0644\u064a\u060c \u0648\u0627\u0644\u0627\u062a\u0635\u0627\u0644\u0627\u062a \u0627\u0644\u0644\u0627\u0633\u0644\u0643\u064a\u0629.\n\n \u064a\u0631\u0643\u0632 \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0639\u0644\u0649 \u0647\u0646\u062f\u0633\u0629 \u0623\u0645\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0644\u0644\u0623\u0646\u0638\u0645\u0629 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u0629 \u0623\u0648 \u0627\u0644\u0641\u064a\u0632\u064a\u0627\u0626\u064a\u0629\u060c \u0627\u0644\u062a\u064a \u062a\u0635\u0628\u062d \u0623\u0643\u062b\u0631 \u0627\u0646\u062a\u0634\u0627\u0631\u064b\u0627 \u064a\u0648\u0645\u064b\u0627 \u0628\u0639\u062f \u064a\u0648\u0645. <span lang=\"EN-GB\" xml:lang=\"EN-GB\">This programme will allow students to acquire skills in detecting and eliminating vulnerabilities and the safe operation of the Internet of Things, cloud computing, sensors, computer networks, and wireless communications. The programme emphasises the information security engineering of cyber or physical systems, which are becoming more prevalent daily.\u00a0<\/span><\/p>\n<p>\u0639\u0644\u0649 \u0645\u062f\u0627\u0631 \u0631\u062d\u0644\u062a\u0643 \u0627\u0644\u0623\u0643\u0627\u062f\u064a\u0645\u064a\u0629\u060c \u0633\u062a\u062a\u0639\u0645\u0642 \u0641\u064a \u0639\u0648\u0627\u0644\u0645 \u0623\u0645\u0627\u0646 \u0627\u0644\u0634\u0628\u0643\u0627\u062a\u060c \u0648\u0627\u0644\u0627\u062e\u062a\u0631\u0627\u0642 \u0627\u0644\u0623\u062e\u0644\u0627\u0642\u064a\u060c \u0648\u0627\u0644\u062a\u062d\u0642\u064a\u0642\u0627\u062a \u0627\u0644\u0631\u0642\u0645\u064a\u0629\u060c \u0648\u0625\u062f\u0627\u0631\u0629 \u0627\u0644\u0623\u062e\u0637\u0627\u0631 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u0629\u060c \u0648\u0647\u064a \u0645\u0647\u0627\u0631\u0627\u062a \u0645\u0637\u0644\u0648\u0628\u0629 \u0628\u0634\u062f\u0629 \u0641\u064a \u0639\u0627\u0644\u0645 \u0627\u0644\u062a\u0643\u0646\u0648\u0644\u0648\u062c\u064a\u0627 \u0627\u0644\u0646\u0627\u0645\u064a \u0641\u064a \u0645\u0646\u0637\u0642\u0629 \u0645\u062c\u0644\u0633 \u0627\u0644\u062a\u0639\u0627\u0648\u0646 \u0644\u062f\u0648\u0644 \u0627\u0644\u062e\u0644\u064a\u062c \u0627\u0644\u0639\u0631\u0628\u064a.<\/p>\n<p><span lang=\"EN-GB\" xml:lang=\"EN-GB\">\u0646\u0647\u062c\u0646\u0627 \u0641\u064a \u0627\u0644\u062a\u0639\u0644\u0645 \u0627\u0644\u0639\u0645\u0644\u064a \u064a\u062c\u0647\u0632\u0643 \u0628\u062a\u062c\u0631\u0628\u0629 \u0627\u0644\u0639\u0627\u0644\u0645 \u0627\u0644\u062d\u0642\u064a\u0642\u064a\u060c \u0645\u0645\u0627 \u064a\u062c\u0639\u0644\u0643 \u0645\u0633\u062a\u0639\u062f\u064b\u0627 \u0644\u0645\u0648\u0627\u062c\u0647\u0629 \u062a\u062d\u062f\u064a\u0627\u062a \u0627\u0644\u0623\u0645\u0627\u0646 \u0627\u0644\u0645\u0639\u0642\u062f\u0629 \u0648\u0627\u0644\u0645\u0633\u0627\u0647\u0645\u0629 \u0641\u064a \u0628\u0646\u0627\u0621 \u0623\u0646\u0638\u0645\u0629 \u062f\u0641\u0627\u0639 \u0642\u0648\u064a\u0629 \u0636\u062f \u0627\u0644\u062a\u0647\u062f\u064a\u062f\u0627\u062a \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u0629.\n\u064a\u0628\u062f\u0623 \u0647\u0630\u0627 \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0628\u062f\u0648\u0631\u0627\u062a \u0645\u0635\u0645\u0645\u0629 \u0644\u0628\u0646\u0627\u0621 \u0645\u0647\u0627\u0631\u0627\u062a\u0643 \u0627\u0644\u0623\u0633\u0627\u0633\u064a\u0629 \u0641\u064a \u062a\u0642\u0646\u064a\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a. \u0633\u062a\u0631\u0643\u0632 \u0628\u0639\u062f \u0630\u0644\u0643 \u0639\u0644\u0649 \u062c\u0627\u0646\u0628 \u0623\u0645\u0627\u0646 \u0627\u0644\u0634\u0628\u0643\u0629 \u0641\u064a \u062a\u0642\u0646\u064a\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a\u060c \u062d\u064a\u062b \u0633\u062a\u062a\u0639\u0644\u0645 \u062a\u0642\u0646\u064a\u0627\u062a \u0645\u0627\u064a\u0643\u0631\u0648\u0633\u0648\u0641\u062a \u0648\u0633\u064a\u0633\u0643\u0648 \u0648\u0645\u0648\u0627\u0636\u064a\u0639 \u0623\u0645\u0627\u0646 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0648\u0627\u0644\u062a\u062d\u0642\u064a\u0642 \u0627\u0644\u0631\u0642\u0645\u064a \u0648\u063a\u064a\u0631\u0647\u0627. \u0628\u0627\u0644\u062a\u062d\u062f\u064a\u062f\u060c \u0633\u064a\u062a\u0639\u0644\u0645 \u0627\u0644\u0637\u0644\u0628\u0629 \u0643\u064a\u0641\u064a\u0629 \u062a\u0635\u0645\u064a\u0645 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u060c \u0628\u0645\u0627 \u0641\u064a \u0630\u0644\u0643 \u062e\u0637\u0629 \u0644\u0625\u062f\u0627\u0631\u0629 \u0648\u0635\u064a\u0627\u0646\u0629 \u0627\u0644\u0634\u0628\u0643\u0629\u061b \u0648\u0643\u064a\u0641\u064a\u0629 \u062a\u062b\u0628\u064a\u062a \u0648\u062a\u0643\u0648\u064a\u0646 \u062e\u062f\u0645\u0627\u062a \u0627\u0644\u062e\u0627\u062f\u0645 \u0627\u0644\u0645\u062a\u0642\u062f\u0645\u0629\u061b \u0648\u062a\u0646\u0641\u064a\u0630 \u0627\u0644\u0628\u0646\u064a\u0629 \u0627\u0644\u062a\u062d\u062a\u064a\u0629 \u0644\u0644\u062e\u0627\u062f\u0645 \u0627\u0644\u0645\u062a\u0642\u062f\u0645\u0629\u061b \u0648\u062d\u0644 \u0645\u0634\u0643\u0644\u0627\u062a \u062a\u0642\u0646\u064a\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a\u061b \u0648\u0643\u064a\u0641\u064a\u0629 \u0627\u0644\u062a\u0639\u0627\u0645\u0644 \u0645\u0639 \u0627\u0644\u062a\u062d\u0642\u064a\u0642 \u0627\u0644\u0631\u0642\u0645\u064a \u0648\u062a\u062d\u0642\u064a\u0642 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u0629 \u0648\u0625\u062f\u0627\u0631\u0629 \u0648\u0636\u0639 \u0627\u0644\u0623\u0645\u0627\u0646 \u0648\u0627\u0644\u0633\u064a\u0627\u0633\u0627\u062a.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>In the thriving GCC region, including Oman, UAE, and Saudi Arabia, the demand for cybersecurity professionals rapidly increases as organisations&hellip; <a class=\"more-link\" href=\"https:\/\/mec.edu.om\/ar\/Programmes\/computer-engineering-cyber-security\/\">\u0645\u062a\u0627\u0628\u0639\u0629 \u0642\u0631\u0627\u0621\u0629 <span class=\"screen-reader-text\">\u0628\u0643\u0627\u0644\u0648\u0631\u064a\u0648\u0633 (\u0645\u0639 \u0645\u0631\u062a\u0628\u0629 \u0627\u0644\u0634\u0631\u0641) \u0641\u064a \u0647\u0646\u062f\u0633\u0629 \u0627\u0644\u0643\u0645\u0628\u064a\u0648\u062a\u0631 (\u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a)<\/span><\/a><\/p>","protected":false},"featured_media":7570,"comment_status":"open","ping_status":"closed","template":"","course_category":[30,31,51,52],"course_tag":[],"class_list":["post-355","lp_course","type-lp_course","status-publish","has-post-thumbnail","hentry","course_category-engineering","course_category-science-technology","course_category-undergraduate-science-technology","course_category-undergraduate-engineering","entry","course"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Study Computer Engineering - Information Security at MEC<\/title>\n<meta name=\"description\" content=\"Unleash your potential in Computer Engineering (Information Security). Be at the forefront of technological innovation and design. Shape the future with us!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mec.edu.om\/ar\/Programmes\/computer-engineering-cyber-security\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mec.edu.om\\\/Programmes\\\/computer-engineering-cyber-security\\\/\",\"url\":\"https:\\\/\\\/mec.edu.om\\\/Programmes\\\/computer-engineering-cyber-security\\\/\",\"name\":\"Study Computer Engineering - Information Security at MEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mec.edu.om\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mec.edu.om\\\/Programmes\\\/computer-engineering-cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mec.edu.om\\\/Programmes\\\/computer-engineering-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mec.edu.om\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/image-2801-16-224x300-1.webp\",\"datePublished\":\"2023-06-20T06:44:16+00:00\",\"dateModified\":\"2025-08-11T11:20:25+00:00\",\"description\":\"Unleash your potential in Computer Engineering (Information Security). Be at the forefront of technological innovation and design. Shape the future with us!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mec.edu.om\\\/Programmes\\\/computer-engineering-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mec.edu.om\\\/Programmes\\\/computer-engineering-cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/mec.edu.om\\\/Programmes\\\/computer-engineering-cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mec.edu.om\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/image-2801-16-224x300-1.webp\",\"contentUrl\":\"https:\\\/\\\/mec.edu.om\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/image-2801-16-224x300-1.webp\",\"width\":224,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mec.edu.om\\\/Programmes\\\/computer-engineering-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mec.edu.om\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Courses\",\"item\":\"https:\\\/\\\/mec.edu.om\\\/en\\\/courses\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"BEng (Hons) in Computer Engineering (Cyber Security)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mec.edu.om\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/mec.edu.om\\\/en\\\/\",\"name\":\"Middle East College\",\"description\":\"Enterprising. Resilient. Impactful.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mec.edu.om\\\/en\\\/#organization\"},\"alternateName\":\"Middle East College Oman\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mec.edu.om\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mec.edu.om\\\/en\\\/#organization\",\"name\":\"Middle East College(MEC)\",\"alternateName\":\"Middle East College(MEC)\",\"url\":\"https:\\\/\\\/mec.edu.om\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/mec.edu.om\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mec.edu.om\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/mec-logo.png\",\"contentUrl\":\"https:\\\/\\\/mec.edu.om\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/mec-logo.png\",\"width\":243,\"height\":54,\"caption\":\"Middle East College(MEC)\"},\"image\":{\"@id\":\"https:\\\/\\\/mec.edu.om\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/MiddleEastCollege\",\"https:\\\/\\\/x.com\\\/MEC_Oman\",\"https:\\\/\\\/instagram.com\\\/MEC_Oman\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Study Computer Engineering - Information Security at MEC","description":"Unleash your potential in Computer Engineering (Information Security). Be at the forefront of technological innovation and design. Shape the future with us!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mec.edu.om\/ar\/Programmes\/computer-engineering-cyber-security\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/mec.edu.om\/Programmes\/computer-engineering-cyber-security\/","url":"https:\/\/mec.edu.om\/Programmes\/computer-engineering-cyber-security\/","name":"Study Computer Engineering - Information Security at MEC","isPartOf":{"@id":"https:\/\/mec.edu.om\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mec.edu.om\/Programmes\/computer-engineering-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/mec.edu.om\/Programmes\/computer-engineering-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/mec.edu.om\/wp-content\/uploads\/2024\/07\/image-2801-16-224x300-1.webp","datePublished":"2023-06-20T06:44:16+00:00","dateModified":"2025-08-11T11:20:25+00:00","description":"Unleash your potential in Computer Engineering (Information Security). Be at the forefront of technological innovation and design. Shape the future with us!","breadcrumb":{"@id":"https:\/\/mec.edu.om\/Programmes\/computer-engineering-cyber-security\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mec.edu.om\/Programmes\/computer-engineering-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/mec.edu.om\/Programmes\/computer-engineering-cyber-security\/#primaryimage","url":"https:\/\/mec.edu.om\/wp-content\/uploads\/2024\/07\/image-2801-16-224x300-1.webp","contentUrl":"https:\/\/mec.edu.om\/wp-content\/uploads\/2024\/07\/image-2801-16-224x300-1.webp","width":224,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/mec.edu.om\/Programmes\/computer-engineering-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mec.edu.om\/"},{"@type":"ListItem","position":2,"name":"Courses","item":"https:\/\/mec.edu.om\/en\/courses\/"},{"@type":"ListItem","position":3,"name":"BEng (Hons) in Computer Engineering (Cyber Security)"}]},{"@type":"WebSite","@id":"https:\/\/mec.edu.om\/en\/#website","url":"https:\/\/mec.edu.om\/en\/","name":"\u0643\u0644\u064a\u0629 \u0627\u0644\u0634\u0631\u0642 \u0627\u0644\u0623\u0648\u0633\u0637","description":"Enterprising. Resilient. Impactful.","publisher":{"@id":"https:\/\/mec.edu.om\/en\/#organization"},"alternateName":"Middle East College Oman","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mec.edu.om\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/mec.edu.om\/en\/#organization","name":"Middle East College(MEC)","alternateName":"Middle East College(MEC)","url":"https:\/\/mec.edu.om\/en\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/mec.edu.om\/en\/#\/schema\/logo\/image\/","url":"https:\/\/mec.edu.om\/wp-content\/uploads\/2023\/05\/mec-logo.png","contentUrl":"https:\/\/mec.edu.om\/wp-content\/uploads\/2023\/05\/mec-logo.png","width":243,"height":54,"caption":"Middle East College(MEC)"},"image":{"@id":"https:\/\/mec.edu.om\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/MiddleEastCollege","https:\/\/x.com\/MEC_Oman","https:\/\/instagram.com\/MEC_Oman"]}]}},"_links":{"self":[{"href":"https:\/\/mec.edu.om\/ar\/wp-json\/wp\/v2\/lp_course\/355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mec.edu.om\/ar\/wp-json\/wp\/v2\/lp_course"}],"about":[{"href":"https:\/\/mec.edu.om\/ar\/wp-json\/wp\/v2\/types\/lp_course"}],"replies":[{"embeddable":true,"href":"https:\/\/mec.edu.om\/ar\/wp-json\/wp\/v2\/comments?post=355"}],"version-history":[{"count":22,"href":"https:\/\/mec.edu.om\/ar\/wp-json\/wp\/v2\/lp_course\/355\/revisions"}],"predecessor-version":[{"id":8801,"href":"https:\/\/mec.edu.om\/ar\/wp-json\/wp\/v2\/lp_course\/355\/revisions\/8801"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mec.edu.om\/ar\/wp-json\/wp\/v2\/media\/7570"}],"wp:attachment":[{"href":"https:\/\/mec.edu.om\/ar\/wp-json\/wp\/v2\/media?parent=355"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/mec.edu.om\/ar\/wp-json\/wp\/v2\/course_category?post=355"},{"taxonomy":"course_tag","embeddable":true,"href":"https:\/\/mec.edu.om\/ar\/wp-json\/wp\/v2\/course_tag?post=355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}