{"id":44,"date":"2023-09-27T14:52:36","date_gmt":"2023-09-27T07:52:36","guid":{"rendered":"http:\/\/ittraining.kmitl.ac.th\/?page_id=44"},"modified":"2024-03-11T10:39:35","modified_gmt":"2024-03-11T03:39:35","slug":"blog","status":"publish","type":"page","link":"http:\/\/ittraining.kmitl.ac.th\/?page_id=44","title":{"rendered":"Blog"},"content":{"rendered":"\n<div class=\"wp-block-media-text alignfull has-media-on-the-right is-stacked-on-mobile is-vertically-aligned-center is-style-default\" style=\"grid-template-columns:auto 76%\"><div class=\"wp-block-media-text__content\">\n<h1 class=\"wp-block-heading has-text-color\" style=\"color:#000000\"><strong>\u0e04\u0e2d\u0e23\u0e4c\u0e2a\u0e1d\u0e36\u0e01\u0e2d\u0e1a\u0e23\u0e21<\/strong><\/h1>\n<\/div><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" loading=\"lazy\" width=\"1800\" height=\"600\" src=\"http:\/\/ittraining.kmitl.ac.th\/wp-content\/uploads\/2023\/10\/\u0e14\u0e35\u0e44\u0e0b\u0e19\u0e4c\u0e17\u0e35\u0e48\u0e22\u0e31\u0e07\u0e44\u0e21\u0e48\u0e44\u0e14\u0e49\u0e15\u0e31\u0e49\u0e07\u0e0a\u0e37\u0e48\u0e2d-1.jpg\" alt=\"\" class=\"wp-image-147 size-full\"\/><\/figure><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>\u0e04\u0e2d\u0e23\u0e4c\u0e2a\u0e1d\u0e36\u0e01\u0e2d\u0e1a\u0e23\u0e21\u0e17\u0e31\u0e49\u0e07\u0e2b\u0e21\u0e14<\/strong><\/h4>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-5 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/ittraining.kmitl.ac.th\/wp-content\/uploads\/2024\/03\/IT.png\" alt=\"\" class=\"wp-image-178\" style=\"width:1170px;height:981px\" width=\"1170\" height=\"981\"\/><\/figure>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e17\u0e32\u0e07\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c\u0e2a\u0e33\u0e2b\u0e23\u0e31\u0e1a\u0e18\u0e23\u0e23\u0e21\u0e32\u0e20\u0e34\u0e1a\u0e32\u0e25\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28<\/strong> <br>(<strong>Cyber Security for IT Governance<\/strong>)<\/h2>\n\n\n\n<p><strong>\u0e08\u0e31\u0e14\u0e42\u0e14\u0e22 \u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e1e\u0e23\u0e30\u0e08\u0e2d\u0e21\u0e40\u0e01\u0e25\u0e49\u0e32\u0e40\u0e08\u0e49\u0e32\u0e04\u0e38\u0e13\u0e17\u0e2b\u0e32\u0e23\u0e25\u0e32\u0e14\u0e01\u0e23\u0e30\u0e1a\u0e31\u0e07<br>\ud83d\udcb4\u0e04\u0e48\u0e32\u0e25\u0e07\u0e17\u0e30\u0e40\u0e1a\u0e35\u0e22\u0e19\u0e17\u0e48\u0e32\u0e19\u0e25\u0e30&nbsp;<mark>3,000<\/mark>&nbsp;\u0e1a\u0e32\u0e17<br>\u0e25\u0e07\u0e17\u0e30\u0e40\u0e1a\u0e35\u0e22\u0e44\u0e14\u0e49\u0e17\u0e35\u0e48&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/forms.gle\/Q262QVGgjFWLRwyS7\" target=\"_blank\">https:\/\/forms.gle\/KJBmKbiczmsahF937<\/a><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/ittraining.kmitl.ac.th\/wp-content\/uploads\/2024\/02\/image.jpeg\" alt=\"This image has an empty alt attribute; its file name is EA.jpg\" class=\"wp-image-169\" style=\"width:412px;height:583px\" width=\"412\" height=\"583\"\/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\">\u0e2b\u0e25\u0e31\u0e01\u0e2a\u0e39\u0e15\u0e23\u0e1d\u0e01\u0e2d\u0e1a\u0e23\u0e21\u0e40\u0e0a\u0e34\u0e07\u0e1b\u0e0f\u0e34\u0e1a\u0e31\u0e15\u0e34\u0e01\u0e32\u0e23 \u0e01\u0e32\u0e23\u0e08\u0e31\u0e14\u0e17\u0e33\u0e2a\u0e16\u0e32\u0e1b\u0e31\u0e15\u0e22\u0e01\u0e23\u0e23\u0e21\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23<br>(Enterprise Architecture) \u0e01\u0e23\u0e13\u0e35\u0e28\u0e36\u0e01\u0e29\u0e32 :\u0e01\u0e32\u0e23\u0e17\u0e33 IT Security<\/h5>\n\n\n\n<p>\u0e08\u0e31\u0e14\u0e42\u0e14\u0e22 \u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e1e\u0e23\u0e30\u0e08\u0e2d\u0e21\u0e40\u0e01\u0e25\u0e49\u0e32\u0e40\u0e08\u0e49\u0e32\u0e04\u0e38\u0e13\u0e17\u0e2b\u0e32\u0e23\u0e25\u0e32\u0e14\u0e01\u0e23\u0e30\u0e1a\u0e31\u0e07<br>\ud83d\udcb4\u0e04\u0e48\u0e32\u0e25\u0e07\u0e17\u0e30\u0e40\u0e1a\u0e35\u0e22\u0e19\u0e17\u0e48\u0e32\u0e19\u0e25\u0e30&nbsp;<mark>3,000<\/mark>&nbsp;\u0e1a\u0e32\u0e17<br><strong>\u0e25\u0e07\u0e17\u0e30\u0e40\u0e1a\u0e35\u0e22\u0e44\u0e14\u0e49\u0e17\u0e35\u0e48<\/strong>&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/forms.gle\/KJBmKbiczmsahF937\" target=\"_blank\">https:\/\/forms.gle\/KJBmKbiczmsahF937<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-primary\"><a class=\"wp-block-button__link wp-element-button\" href=\"http:\/\/ittraining.kmitl.ac.th\/wp-admin\/post.php?post=135&amp;action=edit\">LEARN MORE<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0e04\u0e2d\u0e23\u0e4c\u0e2a\u0e1d\u0e36\u0e01\u0e2d\u0e1a\u0e23\u0e21 \u0e04\u0e2d\u0e23\u0e4c\u0e2a\u0e1d\u0e36\u0e01\u0e2d\u0e1a\u0e23\u0e21\u0e17\u0e31\u0e49\u0e07\u0e2b\u0e21\u0e14 \u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e17\u0e32\u0e07\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c\u0e2a\u0e33\u0e2b\u0e23\u0e31\u0e1a\u0e18\u0e23\u0e23\u0e21\u0e32\u0e20\u0e34\u0e1a\u0e32\u0e25\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 (Cyber Security for IT Governance) \u0e08\u0e31\u0e14\u0e42\u0e14\u0e22 \u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e1e\u0e23\u0e30\u0e08\u0e2d\u0e21\u0e40\u0e01\u0e25\u0e49\u0e32\u0e40\u0e08\u0e49\u0e32\u0e04\u0e38\u0e13\u0e17\u0e2b\u0e32\u0e23\u0e25\u0e32\u0e14\u0e01\u0e23\u0e30\u0e1a\u0e31\u0e07\ud83d\udcb4\u0e04\u0e48\u0e32\u0e25\u0e07\u0e17\u0e30\u0e40\u0e1a\u0e35\u0e22\u0e19\u0e17\u0e48\u0e32\u0e19\u0e25\u0e30&nbsp;3,000&nbsp;\u0e1a\u0e32\u0e17\u0e25\u0e07\u0e17\u0e30\u0e40\u0e1a\u0e35\u0e22\u0e44\u0e14\u0e49\u0e17\u0e35\u0e48&nbsp;https:\/\/forms.gle\/KJBmKbiczmsahF937 \u0e2b\u0e25\u0e31\u0e01\u0e2a\u0e39\u0e15\u0e23\u0e1d\u0e01\u0e2d\u0e1a\u0e23\u0e21\u0e40\u0e0a\u0e34\u0e07\u0e1b\u0e0f\u0e34\u0e1a\u0e31\u0e15\u0e34\u0e01\u0e32\u0e23 \u0e01\u0e32\u0e23\u0e08\u0e31\u0e14\u0e17\u0e33\u0e2a\u0e16\u0e32\u0e1b\u0e31\u0e15\u0e22\u0e01\u0e23\u0e23\u0e21\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23(Enterprise Architecture) \u0e01\u0e23\u0e13\u0e35\u0e28\u0e36\u0e01\u0e29\u0e32 :\u0e01\u0e32\u0e23\u0e17\u0e33 IT Security \u0e08\u0e31\u0e14\u0e42\u0e14\u0e22 \u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\u0e1e\u0e23\u0e30\u0e08\u0e2d\u0e21\u0e40\u0e01\u0e25\u0e49\u0e32\u0e40\u0e08\u0e49\u0e32\u0e04\u0e38\u0e13\u0e17\u0e2b\u0e32\u0e23\u0e25\u0e32\u0e14\u0e01\u0e23\u0e30\u0e1a\u0e31\u0e07\ud83d\udcb4\u0e04\u0e48\u0e32\u0e25\u0e07\u0e17\u0e30\u0e40\u0e1a\u0e35\u0e22\u0e19\u0e17\u0e48\u0e32\u0e19\u0e25\u0e30&nbsp;3,000&nbsp;\u0e1a\u0e32\u0e17\u0e25\u0e07\u0e17\u0e30\u0e40\u0e1a\u0e35\u0e22\u0e44\u0e14\u0e49\u0e17\u0e35\u0e48&nbsp;https:\/\/forms.gle\/KJBmKbiczmsahF937<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"_links":{"self":[{"href":"http:\/\/ittraining.kmitl.ac.th\/index.php?rest_route=\/wp\/v2\/pages\/44"}],"collection":[{"href":"http:\/\/ittraining.kmitl.ac.th\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/ittraining.kmitl.ac.th\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/ittraining.kmitl.ac.th\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/ittraining.kmitl.ac.th\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=44"}],"version-history":[{"count":18,"href":"http:\/\/ittraining.kmitl.ac.th\/index.php?rest_route=\/wp\/v2\/pages\/44\/revisions"}],"predecessor-version":[{"id":179,"href":"http:\/\/ittraining.kmitl.ac.th\/index.php?rest_route=\/wp\/v2\/pages\/44\/revisions\/179"}],"wp:attachment":[{"href":"http:\/\/ittraining.kmitl.ac.th\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}