{ "sikshya_all_content": [ { "ID": "34", "post_date": "2020-09-22 16:12:16", "post_date_gmt": "2020-09-22 16:12:16", "post_content": "
\r\n
The course subtitle says it all...If you're interested in how I build targeted email lists around profitable niches, sell to them, and then continuously\u00a0remarket more\u00a0products back to them...then this course is for you!I've been on both sides of the fence so I know how it feels. I got started in Affiliate Marketing a little under a year ago and while I saw decent sales, I couldn't help but wonder what I could make if I found more email leads.<\/div>\r\n<\/div>\r\n
\r\n
\r\n
\r\n
\r\n\r\nThis course will teach you\u00a0everything you need to know about UX, including design, content, and coding. And you\u2019ll learn from the ground up, so it doesn\u2019t matter how much experience you have when you start.\r\n\r\nYou\u2019ll be exposed to principles and strategies, but, more importantly, you\u2019ll learn how to actually apply these abstract concepts by coding\u00a0three different websites\u00a0for\u00a0three very different audiences.\r\n\r\nImprove Your Website with UX Strategies<\/strong>\r\n
    \r\n \t
  • Apply UX strategies to a site\u2019s content & design<\/li>\r\n \t
  • Understand Information Architecture to enhance the content on your website<\/li>\r\n \t
  • Know what dictates how your website should look<\/li>\r\n \t
  • Design and code a B2B website, a B2C blog, and an ecommerce site<\/li>\r\n<\/ul>\r\nUnderstand UX and Learn How to Develop Winning Websites<\/strong>\r\n\r\nThis course will help you stand out as a web designer, teaching you how to apply User Experience (UX) strategies that will make every site you build useful, usable, and valuable.\r\n\r\nReinforce what you\u2019re learning using the\u00a0bonus 30-page downloadable UX Guidebook<\/strong>. Filled with exercises and activities, the UX Guidebook is a great tool to reference as you progress through the course, or while developing your own custom sites.\r\n\r\nYou\u2019ll also get\u00a0hands-on experience<\/strong>\u00a0designing and coding three different types of sites<\/strong>. This will give you the confidence to pursue similar projects if you\u2019re already a website designer, if you want to get into web design, or if you want to enhance your current business site.\r\n\r\nContents and Overview<\/strong>\r\n\r\nEven if you\u2019re a complete beginner, this course will show you how to make a website\u00a0functional, attractive<\/strong>\u00a0and\u00a0successful<\/strong>. It will walk you through all of the steps required to enhance the User Experience on any site, right down to the code, content, and design.\r\n\r\nYou\u2019ll begin by defining\u00a0who your website users are<\/strong>\u00a0and\u00a0what they expect\u00a0<\/strong>from the website. You\u2019ll also learn how business goals \u2014 yours or your client\u2019s \u2014 have to be uncovered and addressed for site success.\r\n\r\nYou\u2019ll learn\u00a0what questions to ask both groups<\/strong>, and you\u2019ll use the answers to inform your content and design decisions.\r\n\r\nNext, you\u2019ll dig into\u00a0Information Architecture (IA)<\/strong>, which looks at the content on your website, how you should categorize it, what you should call it, and more.\r\n\r\nThis will lay the foundation on which you can further build out your website to make users flock to it, stay on it, and hopefully make purchases.\r\n\r\nPlus, you\u2019ll tackle how to design your website depending upon who your visitors are, whether your website is B2B (business-to-business), B2C (business-to-consumer), or an ecommerce site for selling products online.\r\n\r\nDifferent audiences have different needs, so learning\u00a0what your target user expects from your site<\/strong>means you\u2019ll be able to design and build a site that meets those expectations and leads to greater conversions.\r\n\r\nIn addition to knowing what you need to put into your website to make it stand out from the crowd, you\u2019ll also learn how to identify and remove\u00a0UX- and UI-related obstacles.<\/strong>\r\n\r\nThe ability to see and solve these problems will ensure every website you build moving forward will be\u00a0useful, usable<\/strong>\u00a0and\u00a0valuable<\/strong>\u00a0to the people who use it.\r\n\r\nMost importantly, you\u2019ll then learn how to actually\u00a0build<\/strong>\u00a0and\u00a0code<\/strong>\u00a0these types of sites using HTML, CSS, WordPress, and more.\r\n\r\nYou\u2019ll not only know how to\u00a0effectively design B2B, B2C, and ecommerce sites<\/strong>, but you\u2019ll also know exactly how to develop these sites, from start to finish.\r\n\r\nBy the end of this course, you\u2019ll have an\u00a0in-depth understanding of UX and web design<\/strong>, as well as the tools to develop a variety of sites with the right code.\r\n\r\nYou\u2019ll know why UX is so important to both users and businesses, what\u00a0content<\/strong>\u00a0is needed on a site, what\u00a0UI design<\/strong>\u00a0is appropriate, and how to transform your vision into a\u00a0fully functional website<\/strong>\u00a0using the most effective tools available.\r\n\r\n<\/div>\r\n<\/div>\r\n
    \r\n
    <\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>", "post_title": "Digital & Affiliate Marketing", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "digital-affiliate-marketing", "to_ping": "", "post_modified": "2020-09-23 17:11:29", "post_modified_gmt": "2020-09-23 17:11:29", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_courses", "post_mime_type": "", "term_taxonomy": [ { "term_id": "3", "name": "Social Media", "slug": "social-media", "term_group": "0", "taxonomy": "sik_course_category", "description": "", "parent": "0", "count": "1" }, { "term_id": "4", "name": "Digital Marketing", "slug": "digital-marketing", "term_group": "0", "taxonomy": "sik_course_category", "description": "", "parent": "0", "count": "1" }, { "term_id": "5", "name": "Digital Marketing", "slug": "digital-marketing", "term_group": "0", "taxonomy": "sik_course_tag", "description": "", "parent": "0", "count": "1" }, { "term_id": "6", "name": "Email Marketing", "slug": "email-marketing", "term_group": "0", "taxonomy": "sik_course_tag", "description": "", "parent": "0", "count": "1" } ], "meta": [ { "meta_id": "120", "post_id": "34", "meta_key": "sikshya_course_duration", "meta_value": "100" }, { "meta_id": "121", "post_id": "34", "meta_key": "sikshya_course_duration_time", "meta_value": "hour" }, { "meta_id": "122", "post_id": "34", "meta_key": "sikshya_course_level", "meta_value": "intermediate" }, { "meta_id": "123", "post_id": "34", "meta_key": "sikshya_instructor", "meta_value": "1" }, { "meta_id": "124", "post_id": "34", "meta_key": "sikshya_course_requirements", "meta_value": "a:4:{i:0;s:15:\"What is email ?\";i:1;s:41:\"Basic knowledge about Gmail & Mail Server\";i:2;s:31:\"Different type of mail clients.\";i:3;s:35:\"Outlook setup and social media idea\";}" }, { "meta_id": "125", "post_id": "34", "meta_key": "sikshya_course_outcomes", "meta_value": "a:4:{i:0;s:61:\"How to build an email list from scratch in no more than a day\";i:1;s:51:\"How to find profitable Affiliate Marketing products\";i:2;s:38:\"How to use an email list to make money\";i:3;s:40:\"How to remarket back to profitable leads\";}" }, { "meta_id": "126", "post_id": "34", "meta_key": "sikshya_course_video_source", "meta_value": "youtube" }, { "meta_id": "127", "post_id": "34", "meta_key": "sikshya_course_youtube_video_url", "meta_value": "https:\/\/www.youtube.com\/watch?v=Ec9nqdwIjQI" }, { "meta_id": "128", "post_id": "34", "meta_key": "sikshya_course_regular_price", "meta_value": "39" }, { "meta_id": "129", "post_id": "34", "meta_key": "sikshya_course_discounted_price", "meta_value": "20" }, { "meta_id": "130", "post_id": "34", "meta_key": "sikshya_course_active_tab", "meta_value": "curriculum" }, { "meta_id": "151", "post_id": "34", "meta_key": "_thumbnail_id", "meta_value": "44" } ], "image_attributes": [ "https:\/\/demo.mantrabrain.com\/pragyan\/wp-content\/uploads\/sites\/18\/2020\/09\/startup-849805_12801.jpg", 1280, 853, false ] }, { "ID": "38", "post_date": "2020-09-22 16:14:55", "post_date_gmt": "2020-09-22 16:14:55", "post_content": "", "post_title": "General Introduction & Overview", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "general-introduction-overview", "to_ping": "", "post_modified": "2020-09-22 16:14:55", "post_modified_gmt": "2020-09-22 16:14:55", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "142", "post_id": "38", "meta_key": "course_id", "meta_value": "34" }, { "meta_id": "342", "post_id": "38", "meta_key": "section_order", "meta_value": "1" } ], "image_attributes": false }, { "ID": "39", "post_date": "2020-09-22 16:15:11", "post_date_gmt": "2020-09-22 16:15:11", "post_content": "", "post_title": "Building Unlimited Email Lists", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "building-unlimited-email-lists", "to_ping": "", "post_modified": "2020-09-22 16:15:11", "post_modified_gmt": "2020-09-22 16:15:11", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "141", "post_id": "39", "meta_key": "course_id", "meta_value": "34" }, { "meta_id": "343", "post_id": "39", "meta_key": "section_order", "meta_value": "3" } ], "image_attributes": false }, { "ID": "40", "post_date": "2020-09-22 16:15:26", "post_date_gmt": "2020-09-22 16:15:26", "post_content": "", "post_title": "Professional Email Templates & Strategy", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "professional-email-templates-strategy", "to_ping": "", "post_modified": "2020-09-22 16:15:26", "post_modified_gmt": "2020-09-22 16:15:26", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "140", "post_id": "40", "meta_key": "course_id", "meta_value": "34" }, { "meta_id": "344", "post_id": "40", "meta_key": "section_order", "meta_value": "2" } ], "image_attributes": false }, { "ID": "41", "post_date": "2020-09-22 16:15:44", "post_date_gmt": "2020-09-22 16:15:44", "post_content": "", "post_title": "Writing Email Checklist", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "writing-email-checklist", "to_ping": "", "post_modified": "2020-09-22 16:15:44", "post_modified_gmt": "2020-09-22 16:15:44", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "143", "post_id": "41", "meta_key": "section_id", "meta_value": "40" }, { "meta_id": "144", "post_id": "41", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "42", "post_date": "2020-09-22 16:16:02", "post_date_gmt": "2020-09-22 16:16:02", "post_content": "", "post_title": "Web email hunting", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "web-email-hunting", "to_ping": "", "post_modified": "2020-09-22 16:16:02", "post_modified_gmt": "2020-09-22 16:16:02", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "145", "post_id": "42", "meta_key": "section_id", "meta_value": "39" }, { "meta_id": "146", "post_id": "42", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "43", "post_date": "2020-09-22 16:16:14", "post_date_gmt": "2020-09-22 16:16:14", "post_content": "", "post_title": "Welcome", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "welcome", "to_ping": "", "post_modified": "2020-09-22 16:16:14", "post_modified_gmt": "2020-09-22 16:16:14", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "147", "post_id": "43", "meta_key": "section_id", "meta_value": "38" }, { "meta_id": "148", "post_id": "43", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "45", "post_date": "2020-09-22 16:39:50", "post_date_gmt": "2020-09-22 16:39:50", "post_content": "PHP started out as a small open source project that evolved as more and more people found out how useful it was. Rasmus Lerdorf unleashed the first version of PHP way back in 1994.\r\n
      \r\n \t
    • PHP is a recursive acronym for \"PHP: Hypertext Preprocessor\".<\/li>\r\n \t
    • PHP is a server side scripting language that is embedded in HTML. It is used to manage dynamic content, databases, session tracking, even build entire e-commerce sites.<\/li>\r\n \t
    • It is integrated with a number of popular databases, including MySQL, PostgreSQL, Oracle, Sybase, Informix, and Microsoft SQL Server.<\/li>\r\n \t
    • PHP is pleasingly zippy in its execution, especially when compiled as an Apache module on the Unix side. The MySQL server, once started, executes even very complex queries with huge result sets in record-setting time.<\/li>\r\n \t
    • PHP supports a large number of major protocols such as POP3, IMAP, and LDAP. PHP4 added support for Java and distributed object architectures (COM and CORBA), making n-tier development a possibility for the first time.<\/li>\r\n \t
    • PHP is forgiving: PHP language tries to be as forgiving as possible.<\/li>\r\n \t
    • PHP Syntax is C-Like.<\/li>\r\n<\/ul>\r\nPHP started out as a small open source project that evolved as more and more people found out how useful it was. Rasmus Lerdorf unleashed the first version of PHP way back in 1994.\r\n
        \r\n \t
      • PHP is a recursive acronym for \"PHP: Hypertext Preprocessor\".<\/li>\r\n \t
      • PHP is a server side scripting language that is embedded in HTML. It is used to manage dynamic content, databases, session tracking, even build entire e-commerce sites.<\/li>\r\n \t
      • It is integrated with a number of popular databases, including MySQL, PostgreSQL, Oracle, Sybase, Informix, and Microsoft SQL Server.<\/li>\r\n \t
      • PHP is pleasingly zippy in its execution, especially when compiled as an Apache module on the Unix side. The MySQL server, once started, executes even very complex queries with huge result sets in record-setting time.<\/li>\r\n \t
      • PHP supports a large number of major protocols such as POP3, IMAP, and LDAP. PHP4 added support for Java and distributed object architectures (COM and CORBA), making n-tier development a possibility for the first time.<\/li>\r\n \t
      • PHP is forgiving: PHP language tries to be as forgiving as possible.<\/li>\r\n \t
      • PHP Syntax is C-Like.<\/li>\r\n<\/ul>", "post_title": "PHP Tutorials for Beginners", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "php-tutorials-for-beginners", "to_ping": "", "post_modified": "2020-09-23 17:12:13", "post_modified_gmt": "2020-09-23 17:12:13", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_courses", "post_mime_type": "", "term_taxonomy": [ { "term_id": "7", "name": "Software Development", "slug": "software-development", "term_group": "0", "taxonomy": "sik_course_category", "description": "", "parent": "0", "count": "3" }, { "term_id": "8", "name": "PHP", "slug": "php", "term_group": "0", "taxonomy": "sik_course_tag", "description": "", "parent": "0", "count": "1" }, { "term_id": "9", "name": "Website Development", "slug": "website-development", "term_group": "0", "taxonomy": "sik_course_tag", "description": "", "parent": "0", "count": "1" } ], "meta": [ { "meta_id": "156", "post_id": "45", "meta_key": "_thumbnail_id", "meta_value": "46" }, { "meta_id": "157", "post_id": "45", "meta_key": "sikshya_course_duration", "meta_value": "50" }, { "meta_id": "158", "post_id": "45", "meta_key": "sikshya_course_duration_time", "meta_value": "hour" }, { "meta_id": "159", "post_id": "45", "meta_key": "sikshya_course_level", "meta_value": "beginner" }, { "meta_id": "160", "post_id": "45", "meta_key": "sikshya_instructor", "meta_value": "1" }, { "meta_id": "161", "post_id": "45", "meta_key": "sikshya_course_requirements", "meta_value": "a:3:{i:0;s:28:\"Basic Idea about Programming\";i:1;s:18:\"HTML\/CSS knowledge\";i:2;s:25:\"Proper idea about website\";}" }, { "meta_id": "162", "post_id": "45", "meta_key": "sikshya_course_outcomes", "meta_value": "a:3:{i:0;s:30:\"You can build realtime project\";i:1;s:31:\"Proper knowledge on programming\";i:2;s:25:\"Freelancing job placement\";}" }, { "meta_id": "163", "post_id": "45", "meta_key": "sikshya_course_video_source", "meta_value": "youtube" }, { "meta_id": "164", "post_id": "45", "meta_key": "sikshya_course_youtube_video_url", "meta_value": "" }, { "meta_id": "165", "post_id": "45", "meta_key": "sikshya_course_regular_price", "meta_value": "" }, { "meta_id": "166", "post_id": "45", "meta_key": "sikshya_course_discounted_price", "meta_value": "" }, { "meta_id": "167", "post_id": "45", "meta_key": "sikshya_course_active_tab", "meta_value": "curriculum" } ], "image_attributes": [ "https:\/\/demo.mantrabrain.com\/pragyan\/wp-content\/uploads\/sites\/18\/2020\/09\/php-tutsplus1.png", 400, 277, false ] }, { "ID": "47", "post_date": "2020-09-22 16:31:01", "post_date_gmt": "2020-09-22 16:31:01", "post_content": "", "post_title": "Introduction & Overview", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "introduction-overview", "to_ping": "", "post_modified": "2020-09-22 16:31:01", "post_modified_gmt": "2020-09-22 16:31:01", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "172", "post_id": "47", "meta_key": "course_id", "meta_value": "45" }, { "meta_id": "345", "post_id": "47", "meta_key": "section_order", "meta_value": "1" } ], "image_attributes": false }, { "ID": "48", "post_date": "2020-09-22 16:32:07", "post_date_gmt": "2020-09-22 16:32:07", "post_content": "", "post_title": "PHP Basics", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "php-basics", "to_ping": "", "post_modified": "2020-09-22 16:32:07", "post_modified_gmt": "2020-09-22 16:32:07", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "171", "post_id": "48", "meta_key": "course_id", "meta_value": "45" }, { "meta_id": "346", "post_id": "48", "meta_key": "section_order", "meta_value": "2" } ], "image_attributes": false }, { "ID": "49", "post_date": "2020-09-22 16:32:25", "post_date_gmt": "2020-09-22 16:32:25", "post_content": "", "post_title": "Procedural PHP", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "procedural-php", "to_ping": "", "post_modified": "2020-09-22 16:32:25", "post_modified_gmt": "2020-09-22 16:32:25", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "170", "post_id": "49", "meta_key": "course_id", "meta_value": "45" }, { "meta_id": "347", "post_id": "49", "meta_key": "section_order", "meta_value": "3" } ], "image_attributes": false }, { "ID": "50", "post_date": "2020-09-22 16:32:34", "post_date_gmt": "2020-09-22 16:32:34", "post_content": "", "post_title": "Object Oriented Programming in PHP", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "object-oriented-programming-in-php", "to_ping": "", "post_modified": "2020-09-22 16:32:34", "post_modified_gmt": "2020-09-22 16:32:34", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "169", "post_id": "50", "meta_key": "course_id", "meta_value": "45" }, { "meta_id": "348", "post_id": "50", "meta_key": "section_order", "meta_value": "4" } ], "image_attributes": false }, { "ID": "51", "post_date": "2020-09-22 16:32:48", "post_date_gmt": "2020-09-22 16:32:48", "post_content": "", "post_title": "MVC ( Model, View, Controller) in PHP", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "mvc-model-view-controller-in-php", "to_ping": "", "post_modified": "2020-09-22 16:32:48", "post_modified_gmt": "2020-09-22 16:32:48", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "168", "post_id": "51", "meta_key": "course_id", "meta_value": "45" }, { "meta_id": "349", "post_id": "51", "meta_key": "section_order", "meta_value": "5" } ], "image_attributes": false }, { "ID": "52", "post_date": "2020-09-22 16:36:55", "post_date_gmt": "2020-09-22 16:36:55", "post_content": "", "post_title": "MVC Pattern & Idea", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "mvc-pattern-idea", "to_ping": "", "post_modified": "2020-09-22 16:36:55", "post_modified_gmt": "2020-09-22 16:36:55", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "175", "post_id": "52", "meta_key": "section_id", "meta_value": "51" }, { "meta_id": "176", "post_id": "52", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "53", "post_date": "2020-09-22 16:37:10", "post_date_gmt": "2020-09-22 16:37:10", "post_content": "", "post_title": "MVC Workflow on real time project", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "mvc-workflow-on-real-time-project", "to_ping": "", "post_modified": "2020-09-22 16:37:10", "post_modified_gmt": "2020-09-22 16:37:10", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "173", "post_id": "53", "meta_key": "section_id", "meta_value": "51" }, { "meta_id": "174", "post_id": "53", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "54", "post_date": "2020-09-22 16:37:34", "post_date_gmt": "2020-09-22 16:37:34", "post_content": "", "post_title": "Classes & Objects Introduction", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "classes-objects-introduction", "to_ping": "", "post_modified": "2020-09-22 16:37:34", "post_modified_gmt": "2020-09-22 16:37:34", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "181", "post_id": "54", "meta_key": "section_id", "meta_value": "50" }, { "meta_id": "182", "post_id": "54", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "55", "post_date": "2020-09-22 16:37:46", "post_date_gmt": "2020-09-22 16:37:46", "post_content": "", "post_title": "Abstract Class in PHP", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "abstract-class-in-php", "to_ping": "", "post_modified": "2020-09-22 16:37:46", "post_modified_gmt": "2020-09-22 16:37:46", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "179", "post_id": "55", "meta_key": "section_id", "meta_value": "50" }, { "meta_id": "180", "post_id": "55", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "56", "post_date": "2020-09-22 16:38:08", "post_date_gmt": "2020-09-22 16:38:08", "post_content": "", "post_title": "Design Pattern", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "design-pattern", "to_ping": "", "post_modified": "2020-09-22 16:38:08", "post_modified_gmt": "2020-09-22 16:38:08", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "177", "post_id": "56", "meta_key": "section_id", "meta_value": "50" }, { "meta_id": "178", "post_id": "56", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "57", "post_date": "2020-09-22 16:38:19", "post_date_gmt": "2020-09-22 16:38:19", "post_content": "", "post_title": "PHP Functions", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "php-functions", "to_ping": "", "post_modified": "2020-09-22 16:38:19", "post_modified_gmt": "2020-09-22 16:38:19", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "187", "post_id": "57", "meta_key": "section_id", "meta_value": "49" }, { "meta_id": "188", "post_id": "57", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "58", "post_date": "2020-09-22 16:38:27", "post_date_gmt": "2020-09-22 16:38:27", "post_content": "", "post_title": "Functional PHP", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "functional-php", "to_ping": "", "post_modified": "2020-09-22 16:38:27", "post_modified_gmt": "2020-09-22 16:38:27", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "185", "post_id": "58", "meta_key": "section_id", "meta_value": "49" }, { "meta_id": "186", "post_id": "58", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "59", "post_date": "2020-09-22 16:38:36", "post_date_gmt": "2020-09-22 16:38:36", "post_content": "", "post_title": "Logic Development", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "logic-development", "to_ping": "", "post_modified": "2020-09-22 16:38:36", "post_modified_gmt": "2020-09-22 16:38:36", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "183", "post_id": "59", "meta_key": "section_id", "meta_value": "49" }, { "meta_id": "184", "post_id": "59", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "60", "post_date": "2020-09-22 16:39:00", "post_date_gmt": "2020-09-22 16:39:00", "post_content": "", "post_title": "Variables & Constants", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "variables-constants", "to_ping": "", "post_modified": "2020-09-22 16:39:00", "post_modified_gmt": "2020-09-22 16:39:00", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "193", "post_id": "60", "meta_key": "section_id", "meta_value": "48" }, { "meta_id": "194", "post_id": "60", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "61", "post_date": "2020-09-22 16:39:07", "post_date_gmt": "2020-09-22 16:39:07", "post_content": "", "post_title": "If conditions", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "if-conditions", "to_ping": "", "post_modified": "2020-09-22 16:39:07", "post_modified_gmt": "2020-09-22 16:39:07", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "191", "post_id": "61", "meta_key": "section_id", "meta_value": "48" }, { "meta_id": "192", "post_id": "61", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "62", "post_date": "2020-09-22 16:39:17", "post_date_gmt": "2020-09-22 16:39:17", "post_content": "", "post_title": "Loop & it's types", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "loop-its-types", "to_ping": "", "post_modified": "2020-09-22 16:39:17", "post_modified_gmt": "2020-09-22 16:39:17", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "189", "post_id": "62", "meta_key": "section_id", "meta_value": "48" }, { "meta_id": "190", "post_id": "62", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "63", "post_date": "2020-09-22 16:39:27", "post_date_gmt": "2020-09-22 16:39:27", "post_content": "", "post_title": "General Introduction of PHP", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "general-introduction-of-php", "to_ping": "", "post_modified": "2020-09-22 16:39:27", "post_modified_gmt": "2020-09-22 16:39:27", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "199", "post_id": "63", "meta_key": "section_id", "meta_value": "47" }, { "meta_id": "200", "post_id": "63", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "64", "post_date": "2020-09-22 16:39:37", "post_date_gmt": "2020-09-22 16:39:37", "post_content": "", "post_title": "PHP Versions", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "php-versions", "to_ping": "", "post_modified": "2020-09-22 16:39:37", "post_modified_gmt": "2020-09-22 16:39:37", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "197", "post_id": "64", "meta_key": "section_id", "meta_value": "47" }, { "meta_id": "198", "post_id": "64", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "65", "post_date": "2020-09-22 16:39:45", "post_date_gmt": "2020-09-22 16:39:45", "post_content": "", "post_title": "Opensource & PHP", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "opensource-php", "to_ping": "", "post_modified": "2020-09-22 16:39:45", "post_modified_gmt": "2020-09-22 16:39:45", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "195", "post_id": "65", "meta_key": "section_id", "meta_value": "47" }, { "meta_id": "196", "post_id": "65", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "68", "post_date": "2020-09-23 02:54:19", "post_date_gmt": "2020-09-23 02:54:19", "post_content": "Ethical hacking is the process of attempting to penetrate computer systems and networks with the intention of locating weaknesses and vulnerabilities (real and potential) that could be exploited by malicious hackers. Any information uncovered is then used to improve the system\u2019s security and plug loopholes. Sound interesting? Then an online ethical hacking course is for you.\r\n\r\nEthical hacking is sometimes referred to as penetration testing, intrusion testing, or red teaming. There are many types of hackers, and ethical hackers are usually referred to as white hat hackers. This skill is in high demand and a white hat hacking course can jumpstart your cybersecurity career.\r\n\r\nEthical hacking is the process of attempting to penetrate computer systems and networks with the intention of locating weaknesses and vulnerabilities (real and potential) that could be exploited by malicious hackers. Any information uncovered is then used to improve the system\u2019s security and plug loopholes. Sound interesting? Then an online ethical hacking course is for you.\r\n\r\nEthical hacking is sometimes referred to as penetration testing, intrusion testing, or red teaming. There are many types of hackers, and ethical hackers are usually referred to as white hat hackers. This skill is in high demand and a white hat hacking course can jumpstart your cybersecurity career.\r\n\r\n ", "post_title": "The Ultimate Photography Course", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "the-ultimate-photography-course", "to_ping": "", "post_modified": "2020-09-23 17:24:13", "post_modified_gmt": "2020-09-23 17:24:13", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_courses", "post_mime_type": "", "term_taxonomy": [ { "term_id": "24", "name": "Photography", "slug": "photography", "term_group": "0", "taxonomy": "sik_course_category", "description": "", "parent": "0", "count": "1" }, { "term_id": "25", "name": "photography", "slug": "photography", "term_group": "0", "taxonomy": "sik_course_tag", "description": "", "parent": "0", "count": "1" } ], "meta": [ { "meta_id": "221", "post_id": "68", "meta_key": "sikshya_course_duration", "meta_value": "340" }, { "meta_id": "222", "post_id": "68", "meta_key": "sikshya_course_duration_time", "meta_value": "hour" }, { "meta_id": "223", "post_id": "68", "meta_key": "sikshya_course_level", "meta_value": "all" }, { "meta_id": "224", "post_id": "68", "meta_key": "sikshya_instructor", "meta_value": "1" }, { "meta_id": "225", "post_id": "68", "meta_key": "sikshya_course_requirements", "meta_value": "a:1:{i:0;s:0:\"\";}" }, { "meta_id": "226", "post_id": "68", "meta_key": "sikshya_course_outcomes", "meta_value": "a:1:{i:0;s:0:\"\";}" }, { "meta_id": "227", "post_id": "68", "meta_key": "sikshya_course_video_source", "meta_value": "youtube" }, { "meta_id": "228", "post_id": "68", "meta_key": "sikshya_course_youtube_video_url", "meta_value": "" }, { "meta_id": "229", "post_id": "68", "meta_key": "sikshya_course_regular_price", "meta_value": "" }, { "meta_id": "230", "post_id": "68", "meta_key": "sikshya_course_discounted_price", "meta_value": "" }, { "meta_id": "231", "post_id": "68", "meta_key": "sikshya_course_active_tab", "meta_value": "media" }, { "meta_id": "250", "post_id": "68", "meta_key": "_thumbnail_id", "meta_value": "71" } ], "image_attributes": [ "https:\/\/demo.mantrabrain.com\/pragyan\/wp-content\/uploads\/sites\/18\/2020\/09\/camera-581126_12801.jpg", 1280, 853, false ] }, { "ID": "69", "post_date": "2020-09-23 02:54:10", "post_date_gmt": "2020-09-23 02:54:10", "post_content": "Machine Learning evolved from computer science that primarily studies the design of algorithms that can learn from experience. To learn, they need data that has certain attributes based on which the algorithms try to find some meaningful predictive patterns. Majorly, ML tasks can be categorized as concept learning, clustering, predictive modeling, etc. The ultimate goal of ML algorithms is to be able to take decisions without any human intervention correctly. Predicting the stocks or weather are a couple of applications of machine learning algorithms.\r\n\r\nThere are various machine learning algorithms like Decision trees, Naive Bayes, Random forest, Support vector machine, K-nearest neighbor, K-means clustering, etc.\r\n\r\nFrom the class of machine learning algorithms, the one that you will be using today is k-nearest neighbor.\r\n\r\nNow, the question is what exactly is K-Nearest Neighbor algorithm, so let us find out!\r\n\r\nMachine Learning evolved from computer science that primarily studies the design of algorithms that can learn from experience. To learn, they need data that has certain attributes based on which the algorithms try to find some meaningful predictive patterns. Majorly, ML tasks can be categorized as concept learning, clustering, predictive modeling, etc. The ultimate goal of ML algorithms is to be able to take decisions without any human intervention correctly. Predicting the stocks or weather are a couple of applications of machine learning algorithms.\r\n\r\nThere are various machine learning algorithms like Decision trees, Naive Bayes, Random forest, Support vector machine, K-nearest neighbor, K-means clustering, etc.\r\n\r\nFrom the class of machine learning algorithms, the one that you will be using today is k-nearest neighbor.\r\n\r\nNow, the question is what exactly is K-Nearest Neighbor algorithm, so let us find out!\r\n\r\n \r\n\r\n ", "post_title": "Machine Learning [A to Z]", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "machine-learning-a-to-z", "to_ping": "", "post_modified": "2020-09-23 17:18:57", "post_modified_gmt": "2020-09-23 17:18:57", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_courses", "post_mime_type": "", "term_taxonomy": [ { "term_id": "7", "name": "Software Development", "slug": "software-development", "term_group": "0", "taxonomy": "sik_course_category", "description": "", "parent": "0", "count": "3" }, { "term_id": "21", "name": "Data", "slug": "data", "term_group": "0", "taxonomy": "sik_course_tag", "description": "", "parent": "0", "count": "1" } ], "meta": [ { "meta_id": "234", "post_id": "69", "meta_key": "sikshya_course_duration", "meta_value": "320" }, { "meta_id": "235", "post_id": "69", "meta_key": "sikshya_course_duration_time", "meta_value": "hour" }, { "meta_id": "236", "post_id": "69", "meta_key": "sikshya_course_level", "meta_value": "all" }, { "meta_id": "237", "post_id": "69", "meta_key": "sikshya_instructor", "meta_value": "1" }, { "meta_id": "238", "post_id": "69", "meta_key": "sikshya_course_requirements", "meta_value": "a:1:{i:0;s:0:\"\";}" }, { "meta_id": "239", "post_id": "69", "meta_key": "sikshya_course_outcomes", "meta_value": "a:1:{i:0;s:0:\"\";}" }, { "meta_id": "240", "post_id": "69", "meta_key": "sikshya_course_video_source", "meta_value": "youtube" }, { "meta_id": "241", "post_id": "69", "meta_key": "sikshya_course_youtube_video_url", "meta_value": "" }, { "meta_id": "242", "post_id": "69", "meta_key": "sikshya_course_regular_price", "meta_value": "" }, { "meta_id": "243", "post_id": "69", "meta_key": "sikshya_course_discounted_price", "meta_value": "" }, { "meta_id": "244", "post_id": "69", "meta_key": "sikshya_course_active_tab", "meta_value": "general" }, { "meta_id": "247", "post_id": "69", "meta_key": "_thumbnail_id", "meta_value": "70" } ], "image_attributes": [ "https:\/\/demo.mantrabrain.com\/pragyan\/wp-content\/uploads\/sites\/18\/2020\/09\/tech-5090539_12801.jpg", 1280, 877, false ] }, { "ID": "72", "post_date": "2020-09-23 02:57:31", "post_date_gmt": "2020-09-23 02:57:31", "post_content": "Ethical hacking is the process of attempting to penetrate computer systems and networks with the intention of locating weaknesses and vulnerabilities (real and potential) that could be exploited by malicious hackers. Any information uncovered is then used to improve the system\u2019s security and plug loopholes. Sound interesting? Then an online ethical hacking course is for you.\r\n\r\nEthical hacking is sometimes referred to as penetration testing, intrusion testing, or red teaming. There are many types of hackers, and ethical hackers are usually referred to as white hat hackers. This skill is in high demand and a white hat hacking course can jumpstart your cybersecurity career.\r\n\r\nEthical hacking is the process of attempting to penetrate computer systems and networks with the intention of locating weaknesses and vulnerabilities (real and potential) that could be exploited by malicious hackers. Any information uncovered is then used to improve the system\u2019s security and plug loopholes. Sound interesting? Then an online ethical hacking course is for you.\r\n\r\nEthical hacking is sometimes referred to as penetration testing, intrusion testing, or red teaming. There are many types of hackers, and ethical hackers are usually referred to as white hat hackers. This skill is in high demand and a white hat hacking course can jumpstart your cybersecurity career.\r\n\r\n ", "post_title": "The Complete Financial Analyst Course", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "the-complete-financial-analyst-course", "to_ping": "", "post_modified": "2020-09-23 17:21:36", "post_modified_gmt": "2020-09-23 17:21:36", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_courses", "post_mime_type": "", "term_taxonomy": [ { "term_id": "22", "name": "Finance", "slug": "finance", "term_group": "0", "taxonomy": "sik_course_category", "description": "", "parent": "0", "count": "1" }, { "term_id": "23", "name": "Business", "slug": "business", "term_group": "0", "taxonomy": "sik_course_tag", "description": "", "parent": "0", "count": "1" } ], "meta": [ { "meta_id": "253", "post_id": "72", "meta_key": "sikshya_course_duration", "meta_value": "" }, { "meta_id": "254", "post_id": "72", "meta_key": "sikshya_course_duration_time", "meta_value": "minute" }, { "meta_id": "255", "post_id": "72", "meta_key": "sikshya_course_level", "meta_value": "all" }, { "meta_id": "256", "post_id": "72", "meta_key": "sikshya_instructor", "meta_value": "1" }, { "meta_id": "257", "post_id": "72", "meta_key": "sikshya_course_requirements", "meta_value": "a:1:{i:0;s:0:\"\";}" }, { "meta_id": "258", "post_id": "72", "meta_key": "sikshya_course_outcomes", "meta_value": "a:1:{i:0;s:0:\"\";}" }, { "meta_id": "259", "post_id": "72", "meta_key": "sikshya_course_video_source", "meta_value": "youtube" }, { "meta_id": "260", "post_id": "72", "meta_key": "sikshya_course_youtube_video_url", "meta_value": "" }, { "meta_id": "261", "post_id": "72", "meta_key": "sikshya_course_regular_price", "meta_value": "" }, { "meta_id": "262", "post_id": "72", "meta_key": "sikshya_course_discounted_price", "meta_value": "" }, { "meta_id": "263", "post_id": "72", "meta_key": "sikshya_course_active_tab", "meta_value": "curriculum" }, { "meta_id": "282", "post_id": "72", "meta_key": "_thumbnail_id", "meta_value": "75" } ], "image_attributes": [ "https:\/\/demo.mantrabrain.com\/pragyan\/wp-content\/uploads\/sites\/18\/2020\/09\/stock-1863880_12801.jpg", 1280, 853, false ] }, { "ID": "73", "post_date": "2020-09-23 02:58:05", "post_date_gmt": "2020-09-23 02:58:05", "post_content": "Ethical hacking is the process of attempting to penetrate computer systems and networks with the intention of locating weaknesses and vulnerabilities (real and potential) that could be exploited by malicious hackers. Any information uncovered is then used to improve the system\u2019s security and plug loopholes. Sound interesting? Then an online ethical hacking course is for you.\r\n\r\nEthical hacking is sometimes referred to as penetration testing, intrusion testing, or red teaming. There are many types of hackers, and ethical hackers are usually referred to as white hat hackers. This skill is in high demand and a white hat hacking course can jumpstart your cybersecurity career.\r\n\r\n ", "post_title": "Learn Ethical Hacking From Scratch", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "learn-ethical-hacking-from-scratch", "to_ping": "", "post_modified": "2020-09-23 17:15:43", "post_modified_gmt": "2020-09-23 17:15:43", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_courses", "post_mime_type": "", "term_taxonomy": [ { "term_id": "7", "name": "Software Development", "slug": "software-development", "term_group": "0", "taxonomy": "sik_course_category", "description": "", "parent": "0", "count": "3" }, { "term_id": "18", "name": "Hacking", "slug": "hacking", "term_group": "0", "taxonomy": "sik_course_tag", "description": "", "parent": "0", "count": "1" }, { "term_id": "19", "name": "Ethical Hacking", "slug": "ethical-hacking", "term_group": "0", "taxonomy": "sik_course_tag", "description": "", "parent": "0", "count": "1" }, { "term_id": "20", "name": "Cyber Security", "slug": "cyber-security", "term_group": "0", "taxonomy": "sik_course_category", "description": "", "parent": "0", "count": "1" } ], "meta": [ { "meta_id": "265", "post_id": "73", "meta_key": "sikshya_course_duration", "meta_value": "300" }, { "meta_id": "266", "post_id": "73", "meta_key": "sikshya_course_duration_time", "meta_value": "minute" }, { "meta_id": "267", "post_id": "73", "meta_key": "sikshya_course_level", "meta_value": "beginner" }, { "meta_id": "268", "post_id": "73", "meta_key": "sikshya_instructor", "meta_value": "1" }, { "meta_id": "269", "post_id": "73", "meta_key": "sikshya_course_requirements", "meta_value": "a:1:{i:0;s:19:\"Basic Computer Idea\";}" }, { "meta_id": "270", "post_id": "73", "meta_key": "sikshya_course_outcomes", "meta_value": "a:1:{i:0;s:0:\"\";}" }, { "meta_id": "271", "post_id": "73", "meta_key": "sikshya_course_video_source", "meta_value": "youtube" }, { "meta_id": "272", "post_id": "73", "meta_key": "sikshya_course_youtube_video_url", "meta_value": "" }, { "meta_id": "273", "post_id": "73", "meta_key": "sikshya_course_regular_price", "meta_value": "" }, { "meta_id": "274", "post_id": "73", "meta_key": "sikshya_course_discounted_price", "meta_value": "" }, { "meta_id": "275", "post_id": "73", "meta_key": "sikshya_course_active_tab", "meta_value": "requirements" }, { "meta_id": "279", "post_id": "73", "meta_key": "_thumbnail_id", "meta_value": "74" } ], "image_attributes": [ "https:\/\/demo.mantrabrain.com\/pragyan\/wp-content\/uploads\/sites\/18\/2020\/09\/programming-1873854_12801.png", 1280, 703, false ] }, { "ID": "93", "post_date": "2020-09-23 17:13:21", "post_date_gmt": "2020-09-23 17:13:21", "post_content": "", "post_title": "Introduction to Hacking", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "introduction-to-hacking", "to_ping": "", "post_modified": "2020-09-23 17:13:21", "post_modified_gmt": "2020-09-23 17:13:21", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "350", "post_id": "93", "meta_key": "course_id", "meta_value": "73" }, { "meta_id": "351", "post_id": "93", "meta_key": "section_order", "meta_value": "1" } ], "image_attributes": false }, { "ID": "94", "post_date": "2020-09-23 17:13:54", "post_date_gmt": "2020-09-23 17:13:54", "post_content": "", "post_title": "Hacker Introductions", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "hacker-introductions", "to_ping": "", "post_modified": "2020-09-23 17:13:54", "post_modified_gmt": "2020-09-23 17:13:54", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "356", "post_id": "94", "meta_key": "section_id", "meta_value": "93" }, { "meta_id": "357", "post_id": "94", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "95", "post_date": "2020-09-23 17:14:01", "post_date_gmt": "2020-09-23 17:14:01", "post_content": "", "post_title": "Types of Hacker", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "types-of-hacker", "to_ping": "", "post_modified": "2020-09-23 17:14:01", "post_modified_gmt": "2020-09-23 17:14:01", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "358", "post_id": "95", "meta_key": "section_id", "meta_value": "93" }, { "meta_id": "359", "post_id": "95", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "96", "post_date": "2020-09-23 17:14:12", "post_date_gmt": "2020-09-23 17:14:12", "post_content": "", "post_title": "Network Hacking", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "network-hacking", "to_ping": "", "post_modified": "2020-09-23 17:14:12", "post_modified_gmt": "2020-09-23 17:14:12", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "352", "post_id": "96", "meta_key": "course_id", "meta_value": "73" }, { "meta_id": "353", "post_id": "96", "meta_key": "section_order", "meta_value": "2" } ], "image_attributes": false }, { "ID": "97", "post_date": "2020-09-23 17:14:25", "post_date_gmt": "2020-09-23 17:14:25", "post_content": "", "post_title": "TCP\/IP Address", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "tcp-ip-address", "to_ping": "", "post_modified": "2020-09-23 17:14:25", "post_modified_gmt": "2020-09-23 17:14:25", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "360", "post_id": "97", "meta_key": "section_id", "meta_value": "96" }, { "meta_id": "361", "post_id": "97", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "98", "post_date": "2020-09-23 17:14:34", "post_date_gmt": "2020-09-23 17:14:34", "post_content": "", "post_title": "Kali Linux & Tools", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "kali-linux-tools", "to_ping": "", "post_modified": "2020-09-23 17:14:34", "post_modified_gmt": "2020-09-23 17:14:34", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "362", "post_id": "98", "meta_key": "section_id", "meta_value": "96" }, { "meta_id": "363", "post_id": "98", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "99", "post_date": "2020-09-23 17:14:44", "post_date_gmt": "2020-09-23 17:14:44", "post_content": "", "post_title": "Mobile Hacking", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "mobile-hacking", "to_ping": "", "post_modified": "2020-09-23 17:14:44", "post_modified_gmt": "2020-09-23 17:14:44", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "354", "post_id": "99", "meta_key": "course_id", "meta_value": "73" }, { "meta_id": "355", "post_id": "99", "meta_key": "section_order", "meta_value": "3" } ], "image_attributes": false }, { "ID": "100", "post_date": "2020-09-23 17:14:58", "post_date_gmt": "2020-09-23 17:14:58", "post_content": "", "post_title": "Different Types of mobile hacking", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "different-types-of-mobile-hacking", "to_ping": "", "post_modified": "2020-09-23 17:14:58", "post_modified_gmt": "2020-09-23 17:14:58", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "364", "post_id": "100", "meta_key": "section_id", "meta_value": "99" }, { "meta_id": "365", "post_id": "100", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "101", "post_date": "2020-09-23 17:15:18", "post_date_gmt": "2020-09-23 17:15:18", "post_content": "", "post_title": "Android & IOS", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "android-ios", "to_ping": "", "post_modified": "2020-09-23 17:15:18", "post_modified_gmt": "2020-09-23 17:15:18", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "366", "post_id": "101", "meta_key": "section_id", "meta_value": "99" }, { "meta_id": "367", "post_id": "101", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "102", "post_date": "2020-09-23 17:16:15", "post_date_gmt": "2020-09-23 17:16:15", "post_content": "", "post_title": "General Introduction to Data Science", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "general-introduction-to-data-science", "to_ping": "", "post_modified": "2020-09-23 17:16:15", "post_modified_gmt": "2020-09-23 17:16:15", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "368", "post_id": "102", "meta_key": "course_id", "meta_value": "69" }, { "meta_id": "369", "post_id": "102", "meta_key": "section_order", "meta_value": "1" } ], "image_attributes": false }, { "ID": "103", "post_date": "2020-09-23 17:16:31", "post_date_gmt": "2020-09-23 17:16:31", "post_content": "", "post_title": "Big Data", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "big-data", "to_ping": "", "post_modified": "2020-09-23 17:16:31", "post_modified_gmt": "2020-09-23 17:16:31", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "370", "post_id": "103", "meta_key": "course_id", "meta_value": "69" }, { "meta_id": "371", "post_id": "103", "meta_key": "section_order", "meta_value": "2" } ], "image_attributes": false }, { "ID": "104", "post_date": "2020-09-23 17:16:40", "post_date_gmt": "2020-09-23 17:16:40", "post_content": "", "post_title": "History of Data Science", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "history-of-data-science", "to_ping": "", "post_modified": "2020-09-23 17:16:40", "post_modified_gmt": "2020-09-23 17:16:40", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "372", "post_id": "104", "meta_key": "course_id", "meta_value": "69" }, { "meta_id": "373", "post_id": "104", "meta_key": "section_order", "meta_value": "3" } ], "image_attributes": false }, { "ID": "105", "post_date": "2020-09-23 17:16:53", "post_date_gmt": "2020-09-23 17:16:53", "post_content": "", "post_title": "Why Data Science ?", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "why-data-science", "to_ping": "", "post_modified": "2020-09-23 17:16:53", "post_modified_gmt": "2020-09-23 17:16:53", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "374", "post_id": "105", "meta_key": "section_id", "meta_value": "102" }, { "meta_id": "375", "post_id": "105", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "106", "post_date": "2020-09-23 17:17:13", "post_date_gmt": "2020-09-23 17:17:13", "post_content": "", "post_title": "Corporate Data Analysis", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "corporate-data-analysis", "to_ping": "", "post_modified": "2020-09-23 17:17:13", "post_modified_gmt": "2020-09-23 17:17:13", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "376", "post_id": "106", "meta_key": "section_id", "meta_value": "102" }, { "meta_id": "377", "post_id": "106", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "107", "post_date": "2020-09-23 17:17:37", "post_date_gmt": "2020-09-23 17:17:37", "post_content": "", "post_title": "Hadoop Introduction", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "hadoop-introduction", "to_ping": "", "post_modified": "2020-09-23 17:17:37", "post_modified_gmt": "2020-09-23 17:17:37", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "378", "post_id": "107", "meta_key": "section_id", "meta_value": "103" }, { "meta_id": "379", "post_id": "107", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "108", "post_date": "2020-09-23 17:17:46", "post_date_gmt": "2020-09-23 17:17:46", "post_content": "", "post_title": "Scalability of hadoop", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "scalability-of-hadoop", "to_ping": "", "post_modified": "2020-09-23 17:17:46", "post_modified_gmt": "2020-09-23 17:17:46", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "380", "post_id": "108", "meta_key": "section_id", "meta_value": "103" }, { "meta_id": "381", "post_id": "108", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "109", "post_date": "2020-09-23 17:18:00", "post_date_gmt": "2020-09-23 17:18:00", "post_content": "", "post_title": "Final Thoughts", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "final-thoughts", "to_ping": "", "post_modified": "2020-09-23 17:18:00", "post_modified_gmt": "2020-09-23 17:18:00", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "382", "post_id": "109", "meta_key": "section_id", "meta_value": "104" }, { "meta_id": "383", "post_id": "109", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "110", "post_date": "2020-09-23 17:20:46", "post_date_gmt": "2020-09-23 17:20:46", "post_content": "", "post_title": "Section One", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "section-one", "to_ping": "", "post_modified": "2020-09-23 17:20:46", "post_modified_gmt": "2020-09-23 17:20:46", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "384", "post_id": "110", "meta_key": "course_id", "meta_value": "72" }, { "meta_id": "385", "post_id": "110", "meta_key": "section_order", "meta_value": "1" } ], "image_attributes": false }, { "ID": "112", "post_date": "2020-09-23 17:20:54", "post_date_gmt": "2020-09-23 17:20:54", "post_content": "", "post_title": "Lesson One for Section One", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "lesson-one-for-section-one", "to_ping": "", "post_modified": "2020-09-23 17:20:54", "post_modified_gmt": "2020-09-23 17:20:54", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "388", "post_id": "112", "meta_key": "section_id", "meta_value": "110" }, { "meta_id": "389", "post_id": "112", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "113", "post_date": "2020-09-23 17:21:01", "post_date_gmt": "2020-09-23 17:21:01", "post_content": "", "post_title": "Lesson Two for Section One", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "lesson-two-for-section-one", "to_ping": "", "post_modified": "2020-09-23 17:21:01", "post_modified_gmt": "2020-09-23 17:21:01", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "390", "post_id": "113", "meta_key": "section_id", "meta_value": "110" }, { "meta_id": "391", "post_id": "113", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "114", "post_date": "2020-09-23 17:21:07", "post_date_gmt": "2020-09-23 17:21:07", "post_content": "", "post_title": "Section Two", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "section-two", "to_ping": "", "post_modified": "2020-09-23 17:21:07", "post_modified_gmt": "2020-09-23 17:21:07", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "386", "post_id": "114", "meta_key": "course_id", "meta_value": "72" }, { "meta_id": "387", "post_id": "114", "meta_key": "section_order", "meta_value": "2" } ], "image_attributes": false }, { "ID": "115", "post_date": "2020-09-23 17:21:14", "post_date_gmt": "2020-09-23 17:21:14", "post_content": "", "post_title": "Lesson One for Section Two", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "lesson-one-for-section-two", "to_ping": "", "post_modified": "2020-09-23 17:21:14", "post_modified_gmt": "2020-09-23 17:21:14", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "392", "post_id": "115", "meta_key": "section_id", "meta_value": "114" }, { "meta_id": "393", "post_id": "115", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "116", "post_date": "2020-09-23 17:21:21", "post_date_gmt": "2020-09-23 17:21:21", "post_content": "", "post_title": "Lesson Two for Section Two", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "lesson-two-for-section-two", "to_ping": "", "post_modified": "2020-09-23 17:21:21", "post_modified_gmt": "2020-09-23 17:21:21", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "394", "post_id": "116", "meta_key": "section_id", "meta_value": "114" }, { "meta_id": "395", "post_id": "116", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "118", "post_date": "2020-09-23 17:22:17", "post_date_gmt": "2020-09-23 17:22:17", "post_content": "", "post_title": "Introduction", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "introduction", "to_ping": "", "post_modified": "2020-09-23 17:22:17", "post_modified_gmt": "2020-09-23 17:22:17", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "396", "post_id": "118", "meta_key": "course_id", "meta_value": "68" }, { "meta_id": "397", "post_id": "118", "meta_key": "section_order", "meta_value": "1" } ], "image_attributes": false }, { "ID": "119", "post_date": "2020-09-23 17:22:26", "post_date_gmt": "2020-09-23 17:22:26", "post_content": "", "post_title": "Camera & Light", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "camera-light", "to_ping": "", "post_modified": "2020-09-23 17:22:26", "post_modified_gmt": "2020-09-23 17:22:26", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "398", "post_id": "119", "meta_key": "course_id", "meta_value": "68" }, { "meta_id": "399", "post_id": "119", "meta_key": "section_order", "meta_value": "2" } ], "image_attributes": false }, { "ID": "120", "post_date": "2020-09-23 17:22:39", "post_date_gmt": "2020-09-23 17:22:39", "post_content": "", "post_title": "Different Types of Tools", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "different-types-of-tools", "to_ping": "", "post_modified": "2020-09-23 17:22:39", "post_modified_gmt": "2020-09-23 17:22:39", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_sections", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "400", "post_id": "120", "meta_key": "course_id", "meta_value": "68" }, { "meta_id": "401", "post_id": "120", "meta_key": "section_order", "meta_value": "3" } ], "image_attributes": false }, { "ID": "121", "post_date": "2020-09-23 17:22:48", "post_date_gmt": "2020-09-23 17:22:48", "post_content": "", "post_title": "What is Photography ?", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "what-is-photography", "to_ping": "", "post_modified": "2020-09-23 17:22:48", "post_modified_gmt": "2020-09-23 17:22:48", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "402", "post_id": "121", "meta_key": "section_id", "meta_value": "118" }, { "meta_id": "403", "post_id": "121", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "122", "post_date": "2020-09-23 17:23:10", "post_date_gmt": "2020-09-23 17:23:10", "post_content": "", "post_title": "Scope of Photography", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "scope-of-photography", "to_ping": "", "post_modified": "2020-09-23 17:23:10", "post_modified_gmt": "2020-09-23 17:23:10", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "404", "post_id": "122", "meta_key": "section_id", "meta_value": "118" }, { "meta_id": "405", "post_id": "122", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "123", "post_date": "2020-09-23 17:23:18", "post_date_gmt": "2020-09-23 17:23:18", "post_content": "", "post_title": "Different Type of Camera", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "different-type-of-camera", "to_ping": "", "post_modified": "2020-09-23 17:23:18", "post_modified_gmt": "2020-09-23 17:23:18", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "406", "post_id": "123", "meta_key": "section_id", "meta_value": "119" }, { "meta_id": "407", "post_id": "123", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "124", "post_date": "2020-09-23 17:23:25", "post_date_gmt": "2020-09-23 17:23:25", "post_content": "", "post_title": "Light and camera angle", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "light-and-camera-angle", "to_ping": "", "post_modified": "2020-09-23 17:23:25", "post_modified_gmt": "2020-09-23 17:23:25", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "408", "post_id": "124", "meta_key": "section_id", "meta_value": "119" }, { "meta_id": "409", "post_id": "124", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "125", "post_date": "2020-09-23 17:23:33", "post_date_gmt": "2020-09-23 17:23:33", "post_content": "", "post_title": "Online photo editing tools", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "online-photo-editing-tools", "to_ping": "", "post_modified": "2020-09-23 17:23:33", "post_modified_gmt": "2020-09-23 17:23:33", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "410", "post_id": "125", "meta_key": "section_id", "meta_value": "120" }, { "meta_id": "411", "post_id": "125", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false }, { "ID": "126", "post_date": "2020-09-23 17:23:47", "post_date_gmt": "2020-09-23 17:23:47", "post_content": "", "post_title": "Sell your photo online", "post_excerpt": "", "post_status": "publish", "comment_status": "closed", "ping_status": "closed", "post_password": "", "post_name": "sell-your-photo-online", "to_ping": "", "post_modified": "2020-09-23 17:23:47", "post_modified_gmt": "2020-09-23 17:23:47", "post_content_filtered": "", "post_parent": "0", "menu_order": "0", "post_type": "sik_lessons", "post_mime_type": "", "term_taxonomy": [], "meta": [ { "meta_id": "412", "post_id": "126", "meta_key": "section_id", "meta_value": "120" }, { "meta_id": "413", "post_id": "126", "meta_key": "sikshya_order_number", "meta_value": "0" } ], "image_attributes": false } ] }