{"id":34,"date":"2023-12-18T08:24:35","date_gmt":"2023-12-18T08:24:35","guid":{"rendered":"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/?page_id=34"},"modified":"2025-01-28T16:37:25","modified_gmt":"2025-01-28T16:37:25","slug":"gallery","status":"publish","type":"page","link":"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/gallery\/","title":{"rendered":"Gallery"},"content":{"rendered":"\n<div style=\"height:0px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"cryptic-escape\">Cryptic Escape<\/h2>\n\n\n\n<details class=\"wp-block-details is-style-arrow-icon-details is-layout-flow wp-block-details-is-layout-flow\" style=\"border-style:none;border-width:0px\"><summary>Hide<\/summary>\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4774473&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1920\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"85\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0012-scaled.jpg\" alt=\"\" class=\"wp-image-85\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0012-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0012-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0012-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0012-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0012-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0012-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47748a9&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img decoding=\"async\" width=\"2560\" height=\"1920\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"90\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0014-scaled.jpg\" alt=\"\" class=\"wp-image-90\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0014-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0014-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0014-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0014-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0014-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0014-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4774c16&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"86\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0016-scaled.jpg\" alt=\"\" class=\"wp-image-86\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4774f2f&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"101\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0018-scaled.jpg\" alt=\"\" class=\"wp-image-101\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47752b0&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img decoding=\"async\" width=\"2560\" height=\"1920\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"96\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0020-scaled.jpg\" alt=\"\" class=\"wp-image-96\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0020-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0020-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0020-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0020-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0020-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0020-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4775630&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"92\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0022-scaled.jpg\" alt=\"\" class=\"wp-image-92\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0022-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0022-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0022-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0022-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0022-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0022-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477599f&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"95\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0024-scaled.jpg\" alt=\"\" class=\"wp-image-95\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0024-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0024-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0024-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0024-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0024-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0024-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4775ce6&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"91\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0026-scaled.jpg\" alt=\"\" class=\"wp-image-91\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0026-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0026-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0026-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0026-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0026-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0026-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477603b&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"94\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0028-scaled.jpg\" alt=\"\" class=\"wp-image-94\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0028-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0028-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0028-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0028-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0028-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0028-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47763c3&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"100\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0030-scaled.jpg\" alt=\"\" class=\"wp-image-100\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0030-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0030-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0030-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0030-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0030-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0030-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47766cb&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"98\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0032-scaled.jpg\" alt=\"\" class=\"wp-image-98\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4776a26&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"93\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0034-scaled.jpg\" alt=\"\" class=\"wp-image-93\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0034-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0034-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0034-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0034-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0034-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0034-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4776d71&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"102\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0036-scaled.jpg\" alt=\"\" class=\"wp-image-102\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0036-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0036-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0036-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0036-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0036-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0036-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47770a8&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"88\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0038-scaled.jpg\" alt=\"\" class=\"wp-image-88\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0038-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0038-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0038-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0038-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0038-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0038-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47773f8&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1440\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"87\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0040-scaled.jpg\" alt=\"\" class=\"wp-image-87\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0040-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0040-300x169.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0040-1024x576.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0040-768x432.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0040-1536x864.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0040-2048x1152.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4777732&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"97\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0042-scaled.jpg\" alt=\"\" class=\"wp-image-97\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0042-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0042-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0042-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0042-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0042-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0042-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4777a4c&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"89\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0047-scaled.jpg\" alt=\"\" class=\"wp-image-89\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0047-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0047-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0047-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0047-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0047-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0047-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4777d6d&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"99\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0049-scaled.jpg\" alt=\"\" class=\"wp-image-99\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0049-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0049-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0049-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0049-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0049-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0049-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477809a&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1200\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"75\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0051.jpg\" alt=\"\" class=\"wp-image-75\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0051.jpg 1600w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0051-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0051-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0051-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0051-1536x1152.jpg 1536w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47783c3&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"1600\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"76\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0052.jpg\" alt=\"\" class=\"wp-image-76\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0052.jpg 1200w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0052-225x300.jpg 225w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0052-768x1024.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0052-1152x1536.jpg 1152w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47786d5&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"1600\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"77\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0053.jpg\" alt=\"\" class=\"wp-image-77\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0053.jpg 1200w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0053-225x300.jpg 225w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0053-768x1024.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0053-1152x1536.jpg 1152w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4778a02&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1200\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"74\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0054.jpg\" alt=\"\" class=\"wp-image-74\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0054.jpg 1600w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0054-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0054-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0054-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0054-1536x1152.jpg 1536w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4778d2e&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1200\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"79\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0055.jpg\" alt=\"\" class=\"wp-image-79\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0055.jpg 1600w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0055-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0055-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0055-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0055-1536x1152.jpg 1536w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477903e&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1200\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"81\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0056.jpg\" alt=\"\" class=\"wp-image-81\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0056.jpg 1600w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0056-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0056-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0056-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0056-1536x1152.jpg 1536w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4779361&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1200\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"78\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0057.jpg\" alt=\"\" class=\"wp-image-78\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0057.jpg 1600w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0057-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0057-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0057-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0057-1536x1152.jpg 1536w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4779687&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1200\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"84\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0058.jpg\" alt=\"\" class=\"wp-image-84\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0058.jpg 1600w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0058-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0058-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0058-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0058-1536x1152.jpg 1536w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47799e3&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1200\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"83\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0059.jpg\" alt=\"\" class=\"wp-image-83\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0059.jpg 1600w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0059-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0059-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0059-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0059-1536x1152.jpg 1536w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4779d26&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1200\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"80\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0060.jpg\" alt=\"\" class=\"wp-image-80\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0060.jpg 1600w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0060-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0060-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0060-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0060-1536x1152.jpg 1536w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477a02d&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-full has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"82\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0061.jpg\" alt=\"\" class=\"wp-image-82\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n<\/figure>\n<\/details>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">More of Cryptic Escape<\/h2>\n\n\n\n<details class=\"wp-block-details is-style-arrow-icon-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Hide<\/summary>\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477a94b&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"766\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"103\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0063-1024x766.jpg\" alt=\"\" class=\"wp-image-103\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0063-1024x766.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0063-300x224.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0063-768x575.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0063-1536x1149.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0063-2048x1532.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477ac80&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"766\" height=\"1024\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"122\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0065-766x1024.jpg\" alt=\"\" class=\"wp-image-122\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0065-766x1024.jpg 766w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0065-224x300.jpg 224w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0065-768x1027.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0065-1149x1536.jpg 1149w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0065-1532x2048.jpg 1532w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0065-scaled.jpg 1915w\" sizes=\"(max-width: 766px) 100vw, 766px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477af9f&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border is-style-default wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"766\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"131\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0067-1024x766.jpg\" alt=\"\" class=\"wp-image-131\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0067-1024x766.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0067-300x224.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0067-768x575.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0067-1536x1149.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0067-2048x1532.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477b2f7&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"766\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"124\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0069-1024x766.jpg\" alt=\"\" class=\"wp-image-124\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0069-1024x766.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0069-300x224.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0069-768x575.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0069-1536x1149.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0069-2048x1532.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477b646&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"766\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"120\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0070-1024x766.jpg\" alt=\"\" class=\"wp-image-120\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0070-1024x766.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0070-300x224.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0070-768x575.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0070-1536x1149.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0070-2048x1532.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477b951&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"132\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0071-1024x766.jpg\" alt=\"\" class=\"wp-image-132\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477bc2c&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"119\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0072-766x1024.jpg\" alt=\"\" class=\"wp-image-119\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477bf00&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"142\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0076-1024x766.jpg\" alt=\"\" class=\"wp-image-142\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477c1fb&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"123\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0078-1024x766.jpg\" alt=\"\" class=\"wp-image-123\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477c4ff&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"137\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0080-1024x766.jpg\" alt=\"\" class=\"wp-image-137\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477c7d5&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"147\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0082-1024x766.jpg\" alt=\"\" class=\"wp-image-147\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477caf7&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"766\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"143\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0084-1024x766.jpg\" alt=\"\" class=\"wp-image-143\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0084-1024x766.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0084-300x224.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0084-768x575.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0084-1536x1149.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0084-2048x1532.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477ce3d&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"766\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"141\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0086-1024x766.jpg\" alt=\"\" class=\"wp-image-141\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0086-1024x766.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0086-300x224.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0086-768x575.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0086-1536x1149.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0086-2048x1532.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477d183&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"766\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"133\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0088-1024x766.jpg\" alt=\"\" class=\"wp-image-133\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0088-1024x766.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0088-300x224.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0088-768x575.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0088-1536x1149.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0088-2048x1532.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477d4ce&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"766\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"148\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0090-1024x766.jpg\" alt=\"\" class=\"wp-image-148\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0090-1024x766.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0090-300x224.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0090-768x575.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0090-1536x1149.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0090-2048x1532.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477d7e4&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"766\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"136\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0092-1024x766.jpg\" alt=\"\" class=\"wp-image-136\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0092-1024x766.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0092-300x224.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0092-768x575.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0092-1536x1149.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0092-2048x1532.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477daf3&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"766\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"139\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0094-1024x766.jpg\" alt=\"\" class=\"wp-image-139\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0094-1024x766.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0094-300x224.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0094-768x575.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0094-1536x1149.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0094-2048x1532.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477de13&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"766\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"138\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0096-1024x766.jpg\" alt=\"\" class=\"wp-image-138\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0096-1024x766.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0096-300x224.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0096-768x575.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0096-1536x1149.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0096-2048x1532.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477e11b&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"134\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0098-1024x766.jpg\" alt=\"\" class=\"wp-image-134\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477e422&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"126\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0100-1024x766.jpg\" alt=\"\" class=\"wp-image-126\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477e709&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"130\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0102-1024x766.jpg\" alt=\"\" class=\"wp-image-130\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477e9e4&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"140\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0104-1024x766.jpg\" alt=\"\" class=\"wp-image-140\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477ecdb&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"127\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0106-1024x766.jpg\" alt=\"\" class=\"wp-image-127\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477efd7&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"144\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0108-1024x766.jpg\" alt=\"\" class=\"wp-image-144\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477f2c5&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"145\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0110-1024x766.jpg\" alt=\"\" class=\"wp-image-145\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477f5c4&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"135\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0112-1024x766.jpg\" alt=\"\" class=\"wp-image-135\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477f8bb&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"125\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0114-1024x766.jpg\" alt=\"\" class=\"wp-image-125\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477fbd7&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"766\" height=\"1024\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"128\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0116-766x1024.jpg\" alt=\"\" class=\"wp-image-128\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0116-766x1024.jpg 766w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0116-224x300.jpg 224w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0116-768x1027.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0116-1149x1536.jpg 1149w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0116-1532x2048.jpg 1532w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0116-scaled.jpg 1915w\" sizes=\"(max-width: 766px) 100vw, 766px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea477feb3&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"146\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0118-1024x766.jpg\" alt=\"\" class=\"wp-image-146\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4780188&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"108\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0121-768x1024.jpg\" alt=\"\" class=\"wp-image-108\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea478047b&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"121\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0122-1024x768.jpg\" alt=\"\" class=\"wp-image-121\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea478075f&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"112\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0123-1024x768.jpg\" alt=\"\" class=\"wp-image-112\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4780a72&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"106\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0125-1024x768.jpg\" alt=\"\" class=\"wp-image-106\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0125-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0125-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0125-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0125.jpg 1156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4780d86&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"107\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0126-1024x768.jpg\" alt=\"\" class=\"wp-image-107\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0126-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0126-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0126-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0126.jpg 1156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47810c5&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"110\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0127-1024x768.jpg\" alt=\"\" class=\"wp-image-110\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0127-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0127-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0127-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0127.jpg 1156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47813e7&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"116\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0128-1024x768.jpg\" alt=\"\" class=\"wp-image-116\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47816d3&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"105\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0129-1024x768.jpg\" alt=\"\" class=\"wp-image-105\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47819de&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"111\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0130-1024x768.jpg\" alt=\"\" class=\"wp-image-111\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4781d78&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"115\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0131-1024x768.jpg\" alt=\"\" class=\"wp-image-115\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47820a9&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"114\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0132-1024x768.jpg\" alt=\"\" class=\"wp-image-114\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4782403&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"109\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0133-1024x768.jpg\" alt=\"\" class=\"wp-image-109\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0133-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0133-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0133-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0133.jpg 1156w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4782712&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"117\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0134-1024x768.jpg\" alt=\"\" class=\"wp-image-117\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47829f1&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"118\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2023\/12\/IMG-20231211-WA0135-1024x768.jpg\" alt=\"\" class=\"wp-image-118\" style=\"border-radius:20px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n<\/figure>\n<\/details>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"codemaster\">CodeMaster<\/h2>\n\n\n\n<details class=\"wp-block-details is-style-arrow-icon-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Hide<\/summary>\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-6 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4783390&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border is-style-rounded is-style-rounded--3 wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"393\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.52.36-1-1024x1024.jpeg\" alt=\"\" class=\"wp-image-393\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.52.36-1-1024x1024.jpeg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.52.36-1-300x300.jpeg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.52.36-1-150x150.jpeg 150w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.52.36-1-768x768.jpeg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.52.36-1-1536x1536.jpeg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.52.36-1.jpeg 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea47839b0&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border is-style-rounded is-style-rounded--4 wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"392\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.53.44-1024x768.jpeg\" alt=\"\" class=\"wp-image-392\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.53.44-1024x768.jpeg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.53.44-300x225.jpeg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.53.44-768x576.jpeg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.53.44.jpeg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4783cd5&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"460\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"391\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.59-1-1024x460.jpeg\" alt=\"\" class=\"wp-image-391\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.59-1-1024x460.jpeg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.59-1-300x135.jpeg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.59-1-768x345.jpeg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.59-1.jpeg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea478402d&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"460\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"390\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.59-2-1024x460.jpeg\" alt=\"\" class=\"wp-image-390\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.59-2-1024x460.jpeg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.59-2-300x135.jpeg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.59-2-768x345.jpeg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.59-2.jpeg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4784367&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"460\" height=\"1024\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"389\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.58-460x1024.jpeg\" alt=\"\" class=\"wp-image-389\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.58-460x1024.jpeg 460w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.58-135x300.jpeg 135w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.58.jpeg 575w\" sizes=\"(max-width: 460px) 100vw, 460px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea478469c&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"461\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"388\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.54.07-1024x461.jpeg\" alt=\"\" class=\"wp-image-388\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.54.07-1024x461.jpeg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.54.07-300x135.jpeg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.54.07-768x346.jpeg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-24-at-08.54.07.jpeg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e7ea4784ca1&quot;}\" data-wp-interactive=\"core\/image\" class=\"wp-block-image size-large has-custom-border is-style-rounded is-style-rounded--5 wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"460\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on-async--click=\"actions.showLightbox\" data-wp-on-async--load=\"callbacks.setButtonStyles\" data-wp-on-async-window--resize=\"callbacks.setButtonStyles\" data-id=\"387\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.59-1024x460.jpeg\" alt=\"\" class=\"wp-image-387\" style=\"border-radius:20px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.59-1024x460.jpeg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.59-300x135.jpeg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.59-768x345.jpeg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/01\/WhatsApp-Image-2024-01-26-at-20.51.59.jpeg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on-async--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n<\/figure>\n<\/details>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"x-factor\" style=\"margin-top:var(--wp--preset--spacing--10);margin-right:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--10);margin-left:var(--wp--preset--spacing--60)\">X-factOR<\/h2>\n\n\n\n<details class=\"wp-block-details is-style-arrow-icon-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Hide<\/summary>\n<figure class=\"wp-block-gallery has-nested-images columns-3 is-cropped wp-block-gallery-21 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full has-custom-border is-style-rounded expandable-image wp-duotone-unset-8 is-style-rounded--7\"><img loading=\"lazy\" decoding=\"async\" width=\"368\" height=\"277\" data-id=\"544\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/Picture2.jpg\" alt=\"\" class=\"wp-image-544\" style=\"border-style:none;border-width:0px;border-radius:0px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/Picture2.jpg 368w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/Picture2-300x226.jpg 300w\" sizes=\"(max-width: 368px) 100vw, 368px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-style-rounded is-style-rounded--9\"><img decoding=\"async\" data-id=\"543\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113751603-scaled.jpg\" alt=\"\" class=\"wp-image-543\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-style-rounded is-style-rounded--10\"><img decoding=\"async\" data-id=\"542\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113747857-scaled.jpg\" alt=\"\" class=\"wp-image-542\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-style-rounded is-style-rounded--11\"><img loading=\"lazy\" decoding=\"async\" width=\"1441\" height=\"2560\" data-id=\"541\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113437642_HDR-scaled.jpg\" alt=\"\" class=\"wp-image-541\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113437642_HDR-scaled.jpg 1441w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113437642_HDR-169x300.jpg 169w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113437642_HDR-576x1024.jpg 576w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113437642_HDR-768x1365.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113437642_HDR-864x1536.jpg 864w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113437642_HDR-1153x2048.jpg 1153w\" sizes=\"(max-width: 1441px) 100vw, 1441px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-style-rounded is-style-rounded--12\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-id=\"534\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0260-1-scaled.jpg\" alt=\"\" class=\"wp-image-534\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0260-1-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0260-1-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0260-1-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0260-1-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0260-1-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0260-1-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-style-rounded is-style-rounded--13\"><img loading=\"lazy\" decoding=\"async\" width=\"1441\" height=\"2560\" data-id=\"540\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113421312_HDR-scaled.jpg\" alt=\"\" class=\"wp-image-540\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113421312_HDR-scaled.jpg 1441w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113421312_HDR-169x300.jpg 169w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113421312_HDR-576x1024.jpg 576w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113421312_HDR-768x1365.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113421312_HDR-864x1536.jpg 864w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113421312_HDR-1153x2048.jpg 1153w\" sizes=\"(max-width: 1441px) 100vw, 1441px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-style-rounded is-style-rounded--14\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-id=\"535\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0258-1-scaled.jpg\" alt=\"\" class=\"wp-image-535\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0258-1-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0258-1-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0258-1-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0258-1-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0258-1-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0258-1-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-style-rounded is-style-rounded--15\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-id=\"536\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0287-1-scaled.jpg\" alt=\"\" class=\"wp-image-536\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0287-1-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0287-1-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0287-1-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0287-1-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0287-1-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0287-1-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-style-rounded is-style-rounded--16\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-id=\"537\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0280-1-scaled.jpg\" alt=\"\" class=\"wp-image-537\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0280-1-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0280-1-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0280-1-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0280-1-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0280-1-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0280-1-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-style-rounded is-style-rounded--17\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-id=\"532\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0262-1-scaled.jpg\" alt=\"\" class=\"wp-image-532\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0262-1-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0262-1-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0262-1-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0262-1-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0262-1-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0262-1-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-style-rounded is-style-rounded--18\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1441\" data-id=\"538\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113339213_HDR-scaled.jpg\" alt=\"\" class=\"wp-image-538\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113339213_HDR-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113339213_HDR-300x169.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113339213_HDR-1024x576.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113339213_HDR-768x432.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113339213_HDR-1536x864.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113339213_HDR-2048x1153.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-style-rounded is-style-rounded--19\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1441\" data-id=\"539\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113405583_HDR-scaled.jpg\" alt=\"\" class=\"wp-image-539\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113405583_HDR-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113405583_HDR-300x169.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113405583_HDR-1024x576.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113405583_HDR-768x432.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113405583_HDR-1536x864.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_20240513_113405583_HDR-2048x1153.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-style-rounded is-style-rounded--20\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-id=\"533\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0261-1-scaled.jpg\" alt=\"\" class=\"wp-image-533\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0261-1-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0261-1-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0261-1-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0261-1-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0261-1-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG_0261-1-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/figure>\n<\/details>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"showDown\">showDown<\/h2>\n\n\n\n<details class=\"wp-block-details is-style-arrow-icon-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Hide<\/summary>\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-37 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--22\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" data-id=\"570\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/4-1-1024x575.jpg\" alt=\"\" class=\"wp-image-570\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/4-1-1024x575.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/4-1-300x169.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/4-1-768x431.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/4-1.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--23\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" data-id=\"569\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/3-1-1024x575.jpg\" alt=\"\" class=\"wp-image-569\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/3-1-1024x575.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/3-1-300x169.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/3-1-768x431.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/3-1.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--24\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" data-id=\"568\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/2-1-1024x575.jpg\" alt=\"\" class=\"wp-image-568\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/2-1-1024x575.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/2-1-300x169.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/2-1-768x431.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/2-1.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--25\"><img loading=\"lazy\" decoding=\"async\" width=\"769\" height=\"1024\" data-id=\"566\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240625-WA0055-769x1024.jpg\" alt=\"\" class=\"wp-image-566\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240625-WA0055-769x1024.jpg 769w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240625-WA0055-225x300.jpg 225w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240625-WA0055-768x1023.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240625-WA0055.jpg 961w\" sizes=\"(max-width: 769px) 100vw, 769px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--26\"><img decoding=\"async\" data-id=\"565\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0049-1024x768.jpg\" alt=\"\" class=\"wp-image-565\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--27\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" data-id=\"567\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/1-1-1024x575.jpg\" alt=\"\" class=\"wp-image-567\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/1-1-1024x575.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/1-1-300x169.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/1-1-768x431.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/1-1.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--28\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" data-id=\"559\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0042-1-1024x768.jpg\" alt=\"\" class=\"wp-image-559\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0042-1-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0042-1-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0042-1-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0042-1-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0042-1-2048x1536.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--29\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" data-id=\"560\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0041-1024x768.jpg\" alt=\"\" class=\"wp-image-560\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0041-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0041-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0041-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0041-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0041-2048x1536.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--30\"><img decoding=\"async\" data-id=\"561\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0048-1024x768.jpg\" alt=\"\" class=\"wp-image-561\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--31\"><img decoding=\"async\" data-id=\"563\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0044-1024x768.jpg\" alt=\"\" class=\"wp-image-563\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--32\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" data-id=\"564\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0046-1024x768.jpg\" alt=\"\" class=\"wp-image-564\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0046-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0046-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0046-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0046-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0046-2048x1536.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--33\"><img decoding=\"async\" data-id=\"558\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0039-1024x768.jpg\" alt=\"\" class=\"wp-image-558\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--34\"><img decoding=\"async\" data-id=\"557\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0040-1024x768.jpg\" alt=\"\" class=\"wp-image-557\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--35\"><img decoding=\"async\" data-id=\"556\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0038-1-1024x768.jpg\" alt=\"\" class=\"wp-image-556\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--36\"><img decoding=\"async\" data-id=\"555\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2024\/07\/IMG-20240630-WA0037-1024x768.jpg\" alt=\"\" class=\"wp-image-555\" \/><\/figure>\n<\/figure>\n<\/details>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"the-hacker-games\">theHackerGames<\/h2>\n\n\n\n<details class=\"wp-block-details is-style-arrow-icon-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Hide<\/summary>\n<figure class=\"wp-block-gallery has-nested-images columns-2 is-cropped wp-block-gallery-46 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full has-custom-border is-style-rounded is-style-rounded--38\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1920\" data-id=\"625\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/1-scaled.jpg\" alt=\"\" class=\"wp-image-625\" style=\"border-style:none;border-width:0px\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/1-scaled.jpg 2560w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/1-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/1-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/1-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/1-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/1-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--39\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" data-id=\"624\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/2-1024x768.jpg\" alt=\"\" class=\"wp-image-624\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/2-1024x768.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/2-300x225.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/2-768x576.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/2-1536x1152.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/2-2048x1536.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--40\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" data-id=\"623\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/3-1024x576.jpg\" alt=\"\" class=\"wp-image-623\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/3-1024x576.jpg 1024w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/3-300x169.jpg 300w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/3-768x432.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/3-1536x864.jpg 1536w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/3-2048x1152.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--41\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"1280\" data-id=\"620\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/4-768x1024.jpg\" alt=\"\" class=\"wp-image-620\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/4-768x1024.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/4-225x300.jpg 225w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/4.jpg 960w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--42\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" data-id=\"619\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/5-768x1024.jpg\" alt=\"\" class=\"wp-image-619\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/5-768x1024.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/5-225x300.jpg 225w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/5.jpg 960w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--43\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" data-id=\"622\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/6-768x1024.jpg\" alt=\"\" class=\"wp-image-622\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/6-768x1024.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/6-225x300.jpg 225w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/6.jpg 960w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--44\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" data-id=\"618\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/7-768x1024.jpg\" alt=\"\" class=\"wp-image-618\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/7-768x1024.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/7-225x300.jpg 225w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/7.jpg 960w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--45\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" data-id=\"621\" src=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/8-768x1024.jpg\" alt=\"\" class=\"wp-image-621\" srcset=\"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/8-768x1024.jpg 768w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/8-225x300.jpg 225w, https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-content\/uploads\/sites\/16\/2025\/01\/8.jpg 960w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/figure>\n<\/figure>\n<\/details>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--47\"><a class=\"wp-block-button__link wp-element-button\" href=\"#top\">Back to top<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptic Escape More of Cryptic Escape CodeMaster X-factOR showDown theHackerGames<\/p>\n","protected":false},"author":16,"featured_media":0,"parent":0,"menu_order":-2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-34","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-json\/wp\/v2\/pages\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":62,"href":"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-json\/wp\/v2\/pages\/34\/revisions"}],"predecessor-version":[{"id":631,"href":"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-json\/wp\/v2\/pages\/34\/revisions\/631"}],"wp:attachment":[{"href":"https:\/\/newhorizonindia.edu\/co-curricular\/cybersecurity-and-ethical-hacking\/wp-json\/wp\/v2\/media?parent=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}