{"id":234541,"date":"2024-04-25T18:04:03","date_gmt":"2024-04-25T11:04:03","guid":{"rendered":"https:\/\/as.nida.ac.th\/?page_id=234541"},"modified":"2024-08-08T14:14:26","modified_gmt":"2024-08-08T07:14:26","slug":"master-of-science-program-cyber","status":"publish","type":"page","link":"https:\/\/as.nida.ac.th\/en\/master-of-science-program-cyber\/","title":{"rendered":"Cybersecurity Risk Management (CYBER)"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;off|tablet&#8221; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#ff6d29&#8243; background_image=&#8221;https:\/\/as.nida.ac.th\/storage\/2024\/01\/venture_02.png&#8221; custom_padding=&#8221;||0px||false|false&#8221; custom_padding_phone=&#8221;60px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-a1027310-177f-434f-a6d4-64bc6bfc2d09%22:%91%22background_color%22%93}&#8221;][et_pb_row use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;4&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;d72c0383-6487-4f2c-ac5c-7d48a6376757&#8243; header_font=&#8221;Chakra Petch|700|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;60px&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;50px&#8221; header_font_size_phone=&#8221;24px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; header_line_height=&#8221;1.2em&#8221; sticky_enabled=&#8221;0&#8243;]<h1 class=\"elementor-heading-title elementor-size-default\">Master of Science Program in Cybersecurity Risk Management (CYBERSECURITY)<\/h1>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/as.nida.ac.th\/storage\/2024\/01\/electric-services-38.png&#8221; title_text=&#8221;electric-services-38&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|-15%|||false|false&#8221; custom_margin_tablet=&#8221;|-5%|||false|false&#8221; custom_margin_phone=&#8221;|-5%|||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/nida.ac.th\/admissions-calendar\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;\u0e23\u0e32\u0e22\u0e25\u0e30\u0e40\u0e2d\u0e35\u0e22\u0e14\u0e01\u0e32\u0e23\u0e23\u0e31\u0e1a\u0e2a\u0e21\u0e31\u0e04\u0e23&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;35px&#8221; button_icon=&#8221;&#x68;||divi||400&#8243; button_icon_placement=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/entrance.nida.ac.th\/registrar\/applogin.asp&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;\u0e2a\u0e21\u0e31\u0e04\u0e23\u0e40\u0e23\u0e35\u0e22\u0e19\u0e2d\u0e2d\u0e19\u0e44\u0e25\u0e19\u0e4c&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;35px&#8221; button_icon=&#8221;&#xf044;||fa||400&#8243; button_icon_placement=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_tabs active_tab_background_color=&#8221;#FE6D2A&#8221; active_tab_text_color=&#8221;#FFFFFF&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; tab_font_size=&#8221;20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_tab title=&#8221;\u0e20\u0e32\u0e1e\u0e23\u0e27\u0e21\u0e2b\u0e25\u0e31\u0e01\u0e2a\u0e39\u0e15\u0e23 &#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; body_font_size=&#8221;18px&#8221; body_ol_item_indent=&#8221;20px&#8221; global_colors_info=&#8221;{}&#8221;]<h2 style=\"text-align: center;\">Master of Science Program in Cybersecurity Risk Management (CYBERSECURITY)<\/h2>\n<p>Following advancement of information technology, it allows people to use technology to cause damages to each other or even to the public and private sectors. This leads to various countries including Thailand to pass law to control technology usage. In B.E. 2563, Thailand enforced the law on control of personal data usage. Thus, technology personnel need to understand this law to work in information technology safety and security in order to reduce risks of damages to information of an organization including risks of breaking the law.<\/p>\n<p>The Master of Science Program in Cybersecurity Risk Management is an integration of fields in information security and technology risk management under the computer science program together with laws under the law program. This is to create a new and modern program that responds to the needs of the workforce market and rapidly changing global trend. Additionally, it integrates resources and personnel in education to work in multidisciplinary fields in order to create new knowledge.<\/p>\n<p>This program is hoped to produce master\u2019s degree graduates to have the 21st century skills by being capable and competent in information security, information risk management and laws. They will have inquiry skills to apply in the work involving cybersecurity, which are scarce in the current period of time.<\/p>\n<p><strong>Potential careers<\/strong><\/p>\n<ul>\n<li>Chief Information Security Officer (CISO)<\/li>\n<li>Chief Security Officer (CSO)<\/li>\n<li>Cloud Security Architect<\/li>\n<li>Cyber Operations Specialist<\/li>\n<li>Data Controller<\/li>\n<li>Data Protection Officer (DPO)<\/li>\n<li>Data Processor<\/li>\n<\/ul>[\/et_pb_tab][et_pb_tab title=&#8221;\u0e42\u0e04\u0e23\u0e07\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e2b\u0e25\u0e31\u0e01\u0e2a\u0e39\u0e15\u0e23&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; body_font_size=&#8221;18px&#8221; body_ol_item_indent=&#8221;20px&#8221; custom_css_free_form=&#8221;@media only screen and (max-width: 840px) {||table.responsive {||margin-bottom: 0;||overflow: hidden;||overflow-x: scroll;||display: block;||white-space: nowrap;||}||}&#8221; global_colors_info=&#8221;{}&#8221;]<table class=\"responsive\">\n<tbody>\n<tr>\n<td width=\"222\"><strong>\u00a0<\/strong><\/td>\n<td width=\"198\"><strong>Plan A2: Thesis<\/strong><\/td>\n<td width=\"186\"><strong>Plan B: Non-thesis<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"222\">Foundation courses<\/td>\n<td width=\"198\">Non-credit<\/td>\n<td width=\"186\">Non-credit<\/td>\n<\/tr>\n<tr>\n<td width=\"222\">Core courses<\/td>\n<td width=\"198\">9 credits<\/td>\n<td width=\"186\">9 credits<\/td>\n<\/tr>\n<tr>\n<td width=\"222\">Elective courses<\/td>\n<td width=\"198\">15 credits<\/td>\n<td width=\"186\">24 credits<\/td>\n<\/tr>\n<tr>\n<td width=\"222\">Independent study<\/td>\n<td width=\"198\">&#8211;<\/td>\n<td width=\"186\">3 credits<\/td>\n<\/tr>\n<tr>\n<td width=\"222\">Comprehensive exam<\/td>\n<td width=\"198\">Exam<\/td>\n<td width=\"186\">Exam<\/td>\n<\/tr>\n<tr>\n<td width=\"222\">Oral exam<\/td>\n<td width=\"198\">&#8211;<\/td>\n<td width=\"186\">Exam<\/td>\n<\/tr>\n<tr>\n<td width=\"222\">Thesis (Passed thesis)<\/td>\n<td width=\"198\">12 credits<\/td>\n<td width=\"186\">&#8211;<\/td>\n<\/tr>\n<tr>\n<td width=\"222\"><strong>Not less than<\/strong><\/td>\n<td width=\"198\"><strong>36 credits<\/strong><\/td>\n<td width=\"186\"><strong>36 credits<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>[\/et_pb_tab][et_pb_tab title=&#8221;\u0e23\u0e32\u0e22\u0e25\u0e30\u0e40\u0e2d\u0e35\u0e22\u0e14\u0e27\u0e34\u0e0a\u0e32&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; body_font_size=&#8221;18px&#8221; body_ol_item_indent=&#8221;20px&#8221; custom_css_free_form=&#8221;@media only screen and (max-width: 840px) {||table.responsive {||margin-bottom: 0;||overflow: hidden;||overflow-x: scroll;||display: block;||white-space: nowrap;||}||}&#8221; global_colors_info=&#8221;{}&#8221;]<strong>Course details<\/strong>\n\n<strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (1) Foundation courses <\/strong>mean courses designed to provide knowledge at levels below graduate studies for students to be ready for the master\u2019s degree level including\n<table class=\"responsive\">\n<tbody>\n<tr>\n<td width=\"96\">ND 4000<\/td>\n<td width=\"445\">Foundation for Graduate Studies<\/td>\n<td width=\"96\">3(2 \u2013 2 -5)<\/td>\n<\/tr>\n<tr>\n<td width=\"96\">LC 4001<\/td>\n<td width=\"445\">Reading Skills Development in English for Graduate Studies<\/td>\n<td width=\"96\">3(2 \u2013 2 -5)<\/td>\n<\/tr>\n<tr>\n<td width=\"96\">LC 4002<\/td>\n<td width=\"445\">Integrated English Language Skills Development<\/td>\n<td width=\"96\">3(2 \u2013 2 -5)<\/td>\n<\/tr>\n<tr>\n<td width=\"96\">LC 4011*<\/td>\n<td width=\"445\">Remedial Reading Skills Development in English for Graduate Studies<\/td>\n<td width=\"96\">3(2 \u2013 2 -5)<\/td>\n<\/tr>\n<tr>\n<td width=\"96\">LC 4012*<\/td>\n<td width=\"445\">Remedial Integrated English Language Skills Development<\/td>\n<td width=\"96\">3(2 \u2013 2 -5)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table class=\"responsive\">\n<tbody>\n<tr>\n<td width=\"96\">CRM 4001<\/td>\n<td width=\"445\">Legal System and Juristic Method<\/td>\n<td width=\"96\">3(3 &#8211; 0 &#8211; 6)<\/td>\n<\/tr>\n<tr>\n<td width=\"96\">CRM 4002<\/td>\n<td width=\"445\">Cybersecurity Operations<\/td>\n<td width=\"96\">3(3 &#8211; 0 &#8211; 6)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<strong>Note<\/strong>\u00a0\u00a0\u00a0\u00a0\u00a0 1. Requirements and exceptions for foundation courses shall be in accordance with an announcement of the School\/Institute except those for English foundation courses offered by the Graduate School of Language and Communication, which shall be in accordance with the conditions of the English for Graduate course.\n<ol start=\"2\">\n\t<li>In case the English for Graduate Studies course is revised, supplementary English foundation courses required in this program shall change according to the revised English for Graduate Studies course.<\/li>\n<\/ol>\n<strong>(2) Core courses<\/strong> mean courses designed for students to have the specific knowledge and expertise including the followings: (9 credits of the core courses are required for Plan A2 and Plan B)\n<table class=\"responsive\">\n<tbody>\n<tr>\n<td width=\"102\">CRM 6001<\/td>\n<td width=\"439\">Information Security Management<\/td>\n<td width=\"96\">3(3\u20130\u20136)<\/td>\n<\/tr>\n<tr>\n<td width=\"102\">CRM 6002<\/td>\n<td width=\"439\">Information Security Risk Analysis<\/td>\n<td width=\"96\">3(3\u20130\u20136)<\/td>\n<\/tr>\n<tr>\n<td width=\"102\">CRM 6003<\/td>\n<td width=\"439\">Cybersecurity Law<\/td>\n<td width=\"96\">3(3\u20130\u20136)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<strong>(<\/strong><strong>3) Elective courses<\/strong>\n<table class=\"responsive\">\n<tbody>\n<tr>\n<td width=\"102\">CRM 7001<\/td>\n<td width=\"439\">Computer and Network Security<\/td>\n<td width=\"96\">3(3\u20130\u20136)<\/td>\n<\/tr>\n<tr>\n<td width=\"102\">CRM 7002<\/td>\n<td width=\"439\">Cloud Computing Security<\/td>\n<td width=\"96\">3(3\u20130\u20136)<\/td>\n<\/tr>\n<tr>\n<td width=\"102\">CRM 7004<\/td>\n<td width=\"439\">Penetration Testing and Vulnerability Analysis<\/td>\n<td width=\"96\">3(3\u20130\u20136)<\/td>\n<\/tr>\n<tr>\n<td width=\"102\">CRM 7005<\/td>\n<td width=\"439\">Digital Forensics and Investigations<\/td>\n<td width=\"96\">3(3\u20130\u20136)<\/td>\n<\/tr>\n<tr>\n<td width=\"102\">CRM 7006<\/td>\n<td width=\"439\">Information Security Policy<\/td>\n<td width=\"96\">3(3\u20130\u20136)<\/td>\n<\/tr>\n<tr>\n<td width=\"102\">CRM 7007<\/td>\n<td width=\"439\">Information Systems Governance<\/td>\n<td width=\"96\">3(3\u20130\u20136)<\/td>\n<\/tr>\n<tr>\n<td width=\"102\">CRM 7008<\/td>\n<td width=\"439\">Cybercrime Law<\/td>\n<td width=\"96\">3(3\u20130\u20136)<\/td>\n<\/tr>\n<tr>\n<td width=\"102\">CRM 7009<\/td>\n<td width=\"439\">Electronic Commerce Law<\/td>\n<td width=\"96\">3(3\u20130\u20136)<\/td>\n<\/tr>\n<tr>\n<td width=\"102\">CRM 7010<\/td>\n<td width=\"439\">Data Protection and Privacy Law<\/td>\n<td width=\"96\">3(3\u20130\u20136)<\/td>\n<\/tr>\n<tr>\n<td width=\"102\">CRM 7011<\/td>\n<td width=\"439\">Information Security and IT Risk Management<\/td>\n<td width=\"96\">3(3\u20130\u20136)<\/td>\n<\/tr>\n<tr>\n<td width=\"102\">CRM 7012<\/td>\n<td width=\"439\">Information Security Auditing<\/td>\n<td width=\"96\">3(3\u20130\u20136)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<strong>(4) Independent study<\/strong>\n<table class=\"responsive\">\n<tbody>\n<tr>\n<td width=\"102\">CRM 9000<\/td>\n<td width=\"439\">Independent Study<\/td>\n<td width=\"114\">3(0 \u2013 0 -12)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<strong>\u00a0 \u00a0\u00a0(5) Thesis<\/strong>\n<table class=\"responsive\">\n<tbody>\n<tr>\n<td width=\"102\">CRM 9004<\/td>\n<td width=\"439\">Thesis<\/td>\n<td width=\"114\">12 credits<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\"><strong>\u00a0<\/strong><\/p>[\/et_pb_tab][et_pb_tab title=&#8221;\u0e04\u0e48\u0e32\u0e18\u0e23\u0e23\u0e21\u0e40\u0e19\u0e35\u0e22\u0e21\u0e41\u0e25\u0e30\u0e04\u0e48\u0e32\u0e43\u0e0a\u0e49\u0e08\u0e48\u0e32\u0e22&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; body_font_size=&#8221;18px&#8221; body_ol_item_indent=&#8221;20px&#8221; global_colors_info=&#8221;{}&#8221;]<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/as.nida.ac.th\/storage\/2024\/05\/CSIS-\u0e1e\u0e34\u0e40\u0e28\u0e29-1.jpg\" width=\"1200\" height=\"929\" alt=\"\" class=\"wp-image-234545 alignnone size-full\" \/> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/as.nida.ac.th\/storage\/2024\/05\/CYBER-\u0e1b\u0e01\u0e15\u0e34.jpg\" width=\"1200\" height=\"929\" alt=\"\" class=\"wp-image-234546 alignnone size-medium\" \/><\/p>[\/et_pb_tab][et_pb_tab title=&#8221;\u0e40\u0e25\u0e48\u0e21\u0e2b\u0e25\u0e31\u0e01\u0e2a\u0e39\u0e15\u0e23&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; body_font_size=&#8221;18px&#8221; body_ol_item_indent=&#8221;20px&#8221; custom_css_free_form=&#8221;@media only screen and (max-width: 840px) {||table.responsive {||margin-bottom: 0;||overflow: hidden;||overflow-x: scroll;||display: block;||white-space: nowrap;||}||}&#8221; global_colors_info=&#8221;{}&#8221;]<p style=\"text-align: center;\"><a href=\"https:\/\/as.nida.ac.th\/storage\/2024\/05\/\u0e40\u0e25\u0e48\u0e21\u0e2b\u0e25\u0e31\u0e01\u0e2a\u0e39\u0e15\u0e23-\u0e1b.\u0e42\u0e17-CYBER.pdf\">Download Document<\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/as.nida.ac.th\/storage\/2024\/05\/\u0e40\u0e25\u0e48\u0e21\u0e2b\u0e25\u0e31\u0e01\u0e2a\u0e39\u0e15\u0e23-\u0e1b.\u0e42\u0e17-CYBER.pdf\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/as.nida.ac.th\/storage\/2024\/04\/\u0e1b\u0e01-Cyber-01-724x1024-1.jpg\" width=\"268\" height=\"379\" alt=\"\" class=\"wp-image-234548 alignnone size-full\" \/><\/a><\/p>\n<table class=\"responsive\">\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"486\"><strong>ELOs<\/strong><\/td>\n<td width=\"147\"><strong>Levels of Educational Learning Outcomes in Bloom\u2019s Taxonomy<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"66\">ELO 1<\/td>\n<td width=\"420\">ELO 1: Follows the official Academic Code of Ethics and makes decisions to adhere to professional principles and policies.<\/td>\n<td width=\"147\">understand<\/td>\n<\/tr>\n<tr>\n<td width=\"66\">ELO 2<\/td>\n<td width=\"420\">ELO 2: Understand the principles, theories, and knowledge necessary for lifelong self-learning.<\/td>\n<td width=\"147\">understand<\/td>\n<\/tr>\n<tr>\n<td width=\"66\">ELO 3<\/td>\n<td width=\"420\">ELO 3: Creatively apply knowledge for practical problem solving.<\/td>\n<td width=\"147\">apply<\/td>\n<\/tr>\n<tr>\n<td width=\"66\">ELO 4<\/td>\n<td width=\"420\">\n<p>ELO 4: \u0e27\u0e34\u0e40\u0e04\u0e23\u0e32\u0e30\u0e2b\u0e4c\u0e40\u0e0a\u0e34\u0e07\u0e27\u0e34\u0e1e\u0e32\u0e01\u0e29\u0e4c\u0e43\u0e19\u0e1b\u0e23\u0e30\u0e40\u0e14\u0e47\u0e19\u0e17\u0e32\u0e07\u0e08\u0e23\u0e34\u0e22\u0e18\u0e23\u0e23\u0e21 \u0e01\u0e0e\u0e2b\u0e21\u0e32\u0e22 \u0e04\u0e27\u0e32\u0e21\u0e21\u0e31\u0e48\u0e19\u0e04\u0e07 \u0e41\u0e25\u0e30\u0e2a\u0e31\u0e07\u0e04\u0e21\u0e40\u0e0a\u0e34\u0e07\u0e40\u0e17\u0e04\u0e19\u0e34\u0e04 (socio-technical issues) \u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e43\u0e0a\u0e49\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e01\u0e25\u0e22\u0e38\u0e17\u0e18\u0e4c\u0e17\u0e32\u0e07\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28\u0e43\u0e19\u0e01\u0e32\u0e23\u0e08\u0e31\u0e14\u0e01\u0e32\u0e23\u0e1b\u0e23\u0e30\u0e40\u0e14\u0e47\u0e19\u0e40\u0e2b\u0e25\u0e48\u0e32\u0e19\u0e35\u0e49<\/p>\n<\/td>\n<td width=\"147\">analyze and evaluate<\/td>\n<\/tr>\n<tr>\n<td width=\"66\">ELO 5<\/td>\n<td width=\"420\">ELO 5: Effectively present and communicate knowledge and information to target audiences.<\/td>\n<td width=\"147\">create<\/td>\n<\/tr>\n<tr>\n<td width=\"66\">ELO 6<\/td>\n<td width=\"420\">ELO 6: Use information technology effectively to solve actual practical problems.<\/td>\n<td width=\"147\">create<\/td>\n<\/tr>\n<\/tbody>\n<\/table>[\/et_pb_tab][et_pb_tab title=&#8221;Facebook&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; body_font_size=&#8221;18px&#8221; body_ol_item_indent=&#8221;20px&#8221; global_colors_info=&#8221;{}&#8221;]<p style=\"text-align: center;\"><iframe loading=\"lazy\" src=\"https:\/\/www.facebook.com\/plugins\/page.php?href=https%3A%2F%2Fwww.facebook.com%2FCyberNIDA&amp;tabs=timeline&amp;width=340&amp;height=500&amp;small_header=false&amp;adapt_container_width=true&amp;hide_cover=false&amp;show_facepile=true&amp;appId\" width=\"340\" height=\"500\" style=\"border: none; overflow: hidden;\" scrolling=\"no\" frameborder=\"0\" allowfullscreen=\"true\" allow=\"autoplay; clipboard-write; encrypted-media; picture-in-picture; web-share\"><\/iframe><\/p>[\/et_pb_tab][\/et_pb_tabs][\/et_pb_column][\/et_pb_row][\/et_pb_section]","protected":false},"excerpt":{"rendered":"<p>\u0e27\u0e17.\u0e21. \u0e2a\u0e32\u0e02\u0e32\u0e27\u0e34\u0e0a\u0e32\u0e01\u0e32\u0e23\u0e08\u0e31\u0e14\u0e01\u0e32\u0e23\u0e04\u0e27\u0e32\u0e21\u0e40\u0e2a\u0e35\u0e48\u0e22\u0e07\u0e04\u0e27\u0e32\u0e21\u0e21\u0e31\u0e48\u0e19\u0e04\u0e07\u0e17\u0e32\u0e07\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c (CYBERSECURITY)\u0e2b\u0e25\u0e31\u0e01\u0e2a\u0e39\u0e15\u0e23\u0e27\u0e34\u0e17\u0e22\u0e32\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e21\u0e2b\u0e32\u0e1a\u0e31\u0e13\u0e11\u0e34\u0e15 \u0e2a\u0e32\u0e02\u0e32\u0e27\u0e34\u0e0a\u0e32\u0e01\u0e32\u0e23\u0e08\u0e31\u0e14\u0e01\u0e32\u0e23\u0e04\u0e27\u0e32\u0e21\u0e40\u0e2a\u0e35\u0e48\u0e22\u0e07\u0e04\u0e27\u0e32\u0e21\u0e21\u0e31\u0e48\u0e19\u0e04\u0e07\u0e17\u0e32\u0e07\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c \u0e08\u0e32\u0e01\u0e04\u0e27\u0e32\u0e21\u0e01\u0e49\u0e32\u0e27\u0e2b\u0e19\u0e49\u0e32\u0e17\u0e32\u0e07\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 \u0e17\u0e33\u0e43\u0e2b\u0e49\u0e1a\u0e38\u0e04\u0e04\u0e25\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e43\u0e0a\u0e49\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e43\u0e19\u0e01\u0e32\u0e23\u0e17\u0e33\u0e04\u0e27\u0e32\u0e21\u0e40\u0e2a\u0e35\u0e22\u0e2b\u0e32\u0e22\u0e43\u0e2b\u0e49\u0e41\u0e01\u0e48\u0e1a\u0e38\u0e04\u0e04\u0e25\u0e2d\u0e37\u0e48\u0e19\u0e2b\u0e23\u0e37\u0e2d\u0e41\u0e21\u0e49\u0e01\u0e23\u0e30\u0e17\u0e31\u0e48\u0e07\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e17\u0e31\u0e49\u0e07\u0e20\u0e32\u0e04\u0e23\u0e31\u0e10\u0e41\u0e25\u0e30\u0e40\u0e2d\u0e01\u0e0a\u0e19 \u0e08\u0e36\u0e07\u0e17\u0e33\u0e43\u0e2b\u0e49\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28\u0e15\u0e48\u0e32\u0e07 \u0e46 \u0e23\u0e27\u0e21\u0e17\u0e31\u0e49\u0e07\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28\u0e44\u0e17\u0e22\u0e44\u0e14\u0e49\u0e2d\u0e2d\u0e01\u0e01\u0e0e\u0e2b\u0e21\u0e32\u0e22\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e04\u0e27\u0e1a\u0e04\u0e38\u0e21\u0e01\u0e32\u0e23\u0e43\u0e0a\u0e49\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35 \u0e41\u0e25\u0e30\u0e43\u0e19\u0e1b\u0e35 2563 \u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28\u0e44\u0e17\u0e22\u0e08\u0e30\u0e21\u0e35\u0e01\u0e32\u0e23\u0e1a\u0e31\u0e07\u0e04\u0e31\u0e1a\u0e43\u0e0a\u0e49\u0e01\u0e0e\u0e2b\u0e21\u0e32\u0e22\u0e04\u0e27\u0e1a\u0e04\u0e38\u0e21\u0e01\u0e32\u0e23\u0e43\u0e0a\u0e49\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e2a\u0e48\u0e27\u0e19\u0e1a\u0e38\u0e04\u0e04\u0e25 \u0e14\u0e31\u0e07\u0e19\u0e31\u0e49\u0e19\u0e1a\u0e38\u0e04\u0e25\u0e32\u0e01\u0e23\u0e17\u0e32\u0e07\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e08\u0e33\u0e40\u0e1b\u0e47\u0e19\u0e15\u0e49\u0e2d\u0e07\u0e40\u0e02\u0e49\u0e32\u0e43\u0e08\u0e01\u0e0e\u0e2b\u0e21\u0e32\u0e22\u0e40\u0e2b\u0e25\u0e48\u0e32\u0e19\u0e35\u0e49\u0e43\u0e19\u0e01\u0e32\u0e23\u0e17\u0e33\u0e07\u0e32\u0e19\u0e14\u0e49\u0e32\u0e19\u0e04\u0e27\u0e32\u0e21\u0e21\u0e31\u0e48\u0e19\u0e04\u0e07\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e02\u0e2d\u0e07\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 \u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e25\u0e14\u0e04\u0e27\u0e32\u0e21\u0e40\u0e2a\u0e35\u0e48\u0e22\u0e07\u0e43\u0e19\u0e01\u0e32\u0e23\u0e40\u0e01\u0e34\u0e14\u0e04\u0e27\u0e32\u0e21\u0e40\u0e2a\u0e35\u0e22\u0e2b\u0e32\u0e22\u0e15\u0e48\u0e2d\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28\u0e02\u0e2d\u0e07\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23 \u0e23\u0e27\u0e21\u0e17\u0e31\u0e49\u0e07\u0e25\u0e14\u0e04\u0e27\u0e32\u0e21\u0e40\u0e2a\u0e35\u0e48\u0e22\u0e07\u0e43\u0e19\u0e01\u0e32\u0e23\u0e25\u0e30\u0e40\u0e21\u0e34\u0e14\u0e01\u0e0e\u0e2b\u0e21\u0e32\u0e22 \u0e17\u0e31\u0e49\u0e07\u0e19\u0e35\u0e49\u0e2b\u0e25\u0e31\u0e01\u0e2a\u0e39\u0e15\u0e23\u0e27\u0e34\u0e17\u0e22\u0e32\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e21\u0e2b\u0e32\u0e1a\u0e31\u0e13\u0e11\u0e34\u0e15 \u0e01\u0e32\u0e23\u0e08\u0e31\u0e14\u0e01\u0e32\u0e23\u0e04\u0e27\u0e32\u0e21\u0e40\u0e2a\u0e35\u0e48\u0e22\u0e07\u0e04\u0e27\u0e32\u0e21\u0e21\u0e31\u0e48\u0e19\u0e04\u0e07\u0e17\u0e32\u0e07\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c \u0e40\u0e1b\u0e47\u0e19\u0e01\u0e32\u0e23\u0e2b\u0e25\u0e2d\u0e21\u0e23\u0e27\u0e21\u0e2a\u0e32\u0e02\u0e32\u0e27\u0e34\u0e0a\u0e32\u0e04\u0e27\u0e32\u0e21\u0e21\u0e31\u0e48\u0e19\u0e04\u0e07\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 \u0e01\u0e32\u0e23\u0e08\u0e31\u0e14\u0e01\u0e32\u0e23\u0e04\u0e27\u0e32\u0e21\u0e40\u0e2a\u0e35\u0e48\u0e22\u0e07\u0e17\u0e32\u0e07\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e43\u0e19\u0e2b\u0e25\u0e31\u0e01\u0e2a\u0e39\u0e15\u0e23\u0e27\u0e34\u0e17\u0e22\u0e32\u0e01\u0e32\u0e23\u0e04\u0e2d\u0e21\u0e1e\u0e34\u0e27\u0e40\u0e15\u0e2d\u0e23\u0e4c \u0e41\u0e25\u0e30\u0e2a\u0e32\u0e02\u0e32\u0e27\u0e34\u0e0a\u0e32\u0e01\u0e0e\u0e2b\u0e21\u0e32\u0e22\u0e43\u0e19\u0e2b\u0e25\u0e31\u0e01\u0e2a\u0e39\u0e15\u0e23\u0e19\u0e34\u0e15\u0e34\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e4c\u0e40\u0e02\u0e49\u0e32\u0e44\u0e27\u0e49\u0e43\u0e2b\u0e49\u0e40\u0e1b\u0e47\u0e19\u0e40\u0e19\u0e37\u0e49\u0e2d\u0e40\u0e14\u0e35\u0e22\u0e27\u0e01\u0e31\u0e19 \u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e2b\u0e25\u0e31\u0e01\u0e2a\u0e39\u0e15\u0e23\u0e43\u0e2b\u0e21\u0e48\u0e43\u0e2b\u0e49\u0e17\u0e31\u0e19\u0e2a\u0e21\u0e31\u0e22\u0e15\u0e23\u0e07\u0e01\u0e31\u0e1a\u0e04\u0e27\u0e32\u0e21\u0e15\u0e49\u0e2d\u0e07\u0e01\u0e32\u0e23\u0e02\u0e2d\u0e07\u0e15\u0e25\u0e32\u0e14\u0e41\u0e23\u0e07\u0e07\u0e32\u0e19\u0e41\u0e25\u0e30\u0e01\u0e23\u0e30\u0e41\u0e2a\u0e42\u0e25\u0e01\u0e17\u0e35\u0e48\u0e40\u0e1b\u0e25\u0e35\u0e48\u0e22\u0e19\u0e41\u0e1b\u0e25\u0e07\u0e44\u0e1b\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e23\u0e27\u0e14\u0e40\u0e23\u0e47\u0e27 \u0e19\u0e2d\u0e01\u0e08\u0e32\u0e01\u0e19\u0e35\u0e49\u0e22\u0e31\u0e07\u0e40\u0e1b\u0e47\u0e19\u0e01\u0e32\u0e23\u0e2b\u0e25\u0e2d\u0e21\u0e23\u0e27\u0e21\u0e17\u0e23\u0e31\u0e1e\u0e22\u0e32\u0e01\u0e23\u0e41\u0e25\u0e30\u0e1a\u0e38\u0e04\u0e25\u0e32\u0e01\u0e23\u0e14\u0e49\u0e32\u0e19\u0e01\u0e32\u0e23\u0e40\u0e23\u0e35\u0e22\u0e19\u0e01\u0e32\u0e23\u0e2a\u0e2d\u0e19\u0e43\u0e2b\u0e49\u0e17\u0e33\u0e07\u0e32\u0e19\u0e02\u0e49\u0e32\u0e21\u0e2a\u0e32\u0e02\u0e32\u0e27\u0e34\u0e0a\u0e32\u0e41\u0e25\u0e30\u0e1a\u0e39\u0e23\u0e13\u0e32\u0e01\u0e32\u0e23\u0e43\u0e2b\u0e49\u0e40\u0e01\u0e34\u0e14\u0e04\u0e27\u0e32\u0e21\u0e23\u0e39\u0e49\u0e43\u0e2b\u0e21\u0e48 \u0e2b\u0e25\u0e31\u0e01\u0e2a\u0e39\u0e15\u0e23\u0e19\u0e35\u0e49\u0e08\u0e36\u0e07\u0e15\u0e49\u0e2d\u0e07\u0e01\u0e32\u0e23\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e21\u0e2b\u0e32\u0e1a\u0e31\u0e13\u0e11\u0e34\u0e15\u0e17\u0e35\u0e48\u0e21\u0e35\u0e17\u0e31\u0e01\u0e29\u0e30\u0e43\u0e19\u0e28\u0e15\u0e27\u0e23\u0e23\u0e29\u0e17\u0e35\u0e48 21 \u0e42\u0e14\u0e22\u0e21\u0e35\u0e04\u0e27\u0e32\u0e21\u0e23\u0e39\u0e49\u0e04\u0e27\u0e32\u0e21\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e43\u0e19\u0e14\u0e49\u0e32\u0e19\u0e04\u0e27\u0e32\u0e21\u0e21\u0e31\u0e48\u0e19\u0e04\u0e07\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 \u0e01\u0e32\u0e23\u0e08\u0e31\u0e14\u0e01\u0e32\u0e23\u0e04\u0e27\u0e32\u0e21\u0e40\u0e2a\u0e35\u0e48\u0e22\u0e07\u0e17\u0e32\u0e07\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 \u0e41\u0e25\u0e30\u0e01\u0e0e\u0e2b\u0e21\u0e32\u0e22 \u0e21\u0e35\u0e17\u0e31\u0e01\u0e29\u0e30\u0e43\u0e19\u0e01\u0e32\u0e23\u0e04\u0e49\u0e19\u0e04\u0e27\u0e49\u0e32\u0e2b\u0e32\u0e04\u0e27\u0e32\u0e21\u0e23\u0e39\u0e49\u0e14\u0e49\u0e27\u0e22\u0e15\u0e19\u0e40\u0e2d\u0e07 \u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e19\u0e33\u0e44\u0e1b\u0e1b\u0e23\u0e30\u0e22\u0e38\u0e01\u0e15\u0e4c\u0e43\u0e0a\u0e49\u0e43\u0e19\u0e01\u0e32\u0e23\u0e17\u0e33\u0e07\u0e32\u0e19\u0e17\u0e35\u0e48\u0e14\u0e39\u0e41\u0e25\u0e04\u0e27\u0e32\u0e21\u0e21\u0e31\u0e48\u0e19\u0e04\u0e07\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e17\u0e32\u0e07\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c\u0e17\u0e35\u0e48\u0e01\u0e33\u0e25\u0e31\u0e07\u0e02\u0e32\u0e14\u0e41\u0e04\u0e25\u0e19\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e21\u0e32\u0e01\u0e43\u0e19\u0e42\u0e25\u0e01\u0e1b\u0e31\u0e08\u0e08\u0e38\u0e1a\u0e31\u0e19 \u0e41\u0e19\u0e27\u0e2d\u0e32\u0e0a\u0e35\u0e1e \u0e1c\u0e39\u0e49\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e2a\u0e39\u0e07\u0e2a\u0e38\u0e14\u0e14\u0e49\u0e32\u0e19\u0e04\u0e27\u0e32\u0e21\u0e21\u0e31\u0e48\u0e19\u0e04\u0e07\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 \u0e1c\u0e39\u0e49\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e2a\u0e39\u0e07\u0e2a\u0e38\u0e14\u0e14\u0e49\u0e32\u0e19\u0e04\u0e27\u0e32\u0e21\u0e21\u0e31\u0e48\u0e19\u0e04\u0e07\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22 \u0e2a\u0e16\u0e32\u0e1b\u0e19\u0e34\u0e01\u0e04\u0e27\u0e32\u0e21\u0e21\u0e31\u0e48\u0e19\u0e04\u0e07\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e1a\u0e19\u0e04\u0e25\u0e32\u0e27\u0e14\u0e4c \u0e1c\u0e39\u0e49\u0e40\u0e0a\u0e35\u0e48\u0e22\u0e27\u0e0a\u0e32\u0e0d\u0e1b\u0e0f\u0e34\u0e1a\u0e31\u0e15\u0e34\u0e01\u0e32\u0e23\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c \u0e1c\u0e39\u0e49\u0e04\u0e27\u0e1a\u0e04\u0e38\u0e21\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e2a\u0e48\u0e27\u0e19\u0e1a\u0e38\u0e04\u0e04\u0e25 \u0e40\u0e08\u0e49\u0e32\u0e2b\u0e19\u0e49\u0e32\u0e17\u0e35\u0e48\u0e04\u0e38\u0e49\u0e21\u0e04\u0e23\u0e2d\u0e07\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e2a\u0e48\u0e27\u0e19\u0e1a\u0e38\u0e04\u0e04\u0e25 \u0e1c\u0e39\u0e49\u0e1b\u0e23\u0e30\u0e21\u0e27\u0e25\u0e1c\u0e25\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e2a\u0e48\u0e27\u0e19\u0e1a\u0e38\u0e04\u0e04\u0e25 \u00a0 \u0e41\u0e1c\u0e19 \u0e012 \u0e17\u0e33\u0e27\u0e34\u0e17\u0e22\u0e32\u0e19\u0e34\u0e1e\u0e19\u0e18\u0e4c \u0e41\u0e1c\u0e19 \u0e02 \u0e44\u0e21\u0e48\u0e17\u0e33\u0e27\u0e34\u0e17\u0e22\u0e32\u0e19\u0e34\u0e1e\u0e19\u0e18\u0e4c \u0e2b\u0e21\u0e27\u0e14\u0e27\u0e34\u0e0a\u0e32\u0e40\u0e2a\u0e23\u0e34\u0e21\u0e1e\u0e37\u0e49\u0e19\u0e10\u0e32\u0e19 \u0e44\u0e21\u0e48\u0e19\u0e31\u0e1a\u0e2b\u0e19\u0e48\u0e27\u0e22\u0e01\u0e34\u0e15 \u0e44\u0e21\u0e48\u0e19\u0e31\u0e1a\u0e2b\u0e19\u0e48\u0e27\u0e22\u0e01\u0e34\u0e15 \u0e2b\u0e21\u0e27\u0e14\u0e27\u0e34\u0e0a\u0e32\u0e2b\u0e25\u0e31\u0e01 9 \u0e2b\u0e19\u0e48\u0e27\u0e22\u0e01\u0e34\u0e15 9 \u0e2b\u0e19\u0e48\u0e27\u0e22\u0e01\u0e34\u0e15 \u0e2b\u0e21\u0e27\u0e14\u0e27\u0e34\u0e0a\u0e32\u0e40\u0e25\u0e37\u0e2d\u0e01 15 \u0e2b\u0e19\u0e48\u0e27\u0e22\u0e01\u0e34\u0e15 [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","cybocfi_hide_featured_image":"","footnotes":""},"_links":{"self":[{"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/pages\/234541"}],"collection":[{"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/comments?post=234541"}],"version-history":[{"count":10,"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/pages\/234541\/revisions"}],"predecessor-version":[{"id":251317,"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/pages\/234541\/revisions\/251317"}],"wp:attachment":[{"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/media?parent=234541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}