{"id":84755,"date":"2026-03-19T04:51:43","date_gmt":"2026-03-19T04:51:43","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?page_id=84755"},"modified":"2026-03-19T04:52:40","modified_gmt":"2026-03-19T04:52:40","slug":"offensive-ai-security","status":"publish","type":"page","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/","title":{"rendered":"Offensive AI Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"84755\" class=\"elementor elementor-84755\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-49e6ded9 elementor-section-full_width elementor-section-height-min-height elementor-section-stretched elementor-section-height-default elementor-section-items-middle\" data-id=\"49e6ded9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e4a1ce6\" data-id=\"1e4a1ce6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-75e2dcb elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"75e2dcb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Offensive AI Security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45dadd77 elementor-widget elementor-widget-spacer\" data-id=\"45dadd77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b3f947c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6b3f947c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3303380c\" data-id=\"3303380c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17790715 elementor-widget elementor-widget-spacer\" data-id=\"17790715\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-713d89da elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"713d89da\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-172a904a\" data-id=\"172a904a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-531dbb38 img-align-mobile-top icon-box-vertical-align-top img-align-left image-vertical-align-start preserve-img-ratio-cover slide-h-position-left elementor-widget elementor-widget-the7-elements-simple-posts\" data-id=\"531dbb38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7-elements-simple-posts.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"the7-simple-widget-posts the7-elementor-widget the7-elements-simple-posts-531dbb38 jquery-filter widget-divider-on jquery-filter\" data-post-limit=\"-1\" data-pagination-mode=\"none\" data-scroll-offset=\"\" aria-live=\"assertive\">\t\t\t<div class=\"dt-css-grid custom-pagination-handler\" data-columns=\"{&quot;d&quot;:1,&quot;t&quot;:1,&quot;p&quot;:1,&quot;wd&quot;:&quot;&quot;}\">\n\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84804 type-post status-publish format-standard has-post-thumbnail category-offensive-ai-security\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/what-is-adversarial-ai-real-world-attacks-on-modern-ai-systems\/\"><img fetchpriority=\"high\" decoding=\"async\" width=\"628\" height=\"628\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20628%20628&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 628px) 100vw, 628px\" style=\"--ratio: 628 \/ 628;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/image-28.png\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/image-28.png 628w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/image-28-300x300.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/image-28-150x150.png 150w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h4 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/what-is-adversarial-ai-real-world-attacks-on-modern-ai-systems\/\" rel=\"bookmark\" title=\"What Is Adversarial AI? Real-World Attacks on Modern AI Systems\" class=\"post-title\">What Is Adversarial AI? Real-World Attacks on Modern AI Systems<\/a><\/h4><div class=\"entry-meta\"><span class=\"meta-item category-link\"><span>Offensive AI Security<\/span><\/span><span class=\"meta-item data-link\"><time class=\"entry-date updated\" datetime=\"2026-03-27T12:01:22+00:00\">March 27, 2026<\/time><\/span><\/div><p class=\"short-description\">What Is Adversarial AI? Real-World Attacks on Modern AI Systems Why Adversarial AI Matters Now Artificial intelligence (AI) has moved from an experimental technology to&hellip;<\/p><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/what-is-adversarial-ai-real-world-attacks-on-modern-ai-systems\/\" target=\"\" aria-label=\"Read more about What Is Adversarial AI? Real-World Attacks on Modern AI Systems\" class=\"box-button elementor-button elementor-size-md\">Read more<i aria-hidden=\"true\" class=\"elementor-button-icon dt-icon-the7-arrow-552\"><\/i><\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84747 type-post status-publish format-standard has-post-thumbnail category-offensive-ai-security\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/offensive-ai-security-the-critical-skills-offensive-security-professionals-are-missing\/\"><img decoding=\"async\" width=\"628\" height=\"628\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20628%20628&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 628px) 100vw, 628px\" style=\"--ratio: 628 \/ 628;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/Offensive-AI-Security.jpg\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/Offensive-AI-Security.jpg 628w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/Offensive-AI-Security-300x300.jpg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/Offensive-AI-Security-150x150.jpg 150w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h4 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/offensive-ai-security-the-critical-skills-offensive-security-professionals-are-missing\/\" rel=\"bookmark\" title=\"Offensive AI Security: The Critical Skills Offensive Security Professionals Are Missing\" class=\"post-title\">Offensive AI Security: The Critical Skills Offensive Security Professionals Are Missing<\/a><\/h4><div class=\"entry-meta\"><span class=\"meta-item category-link\"><span>Offensive AI Security<\/span><\/span><span class=\"meta-item data-link\"><time class=\"entry-date updated\" datetime=\"2026-03-19T04:34:44+00:00\">March 19, 2026<\/time><\/span><\/div><p class=\"short-description\">Offensive AI Security: The Critical Skills Offensive Security Professionals Are Missing Offensive security has always been about staying ahead of defenders by understanding systems better&hellip;<\/p><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/offensive-ai-security-the-critical-skills-offensive-security-professionals-are-missing\/\" target=\"\" aria-label=\"Read more about Offensive AI Security: The Critical Skills Offensive Security Professionals Are Missing\" class=\"box-button elementor-button elementor-size-md\">Read more<i aria-hidden=\"true\" class=\"elementor-button-icon dt-icon-the7-arrow-552\"><\/i><\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1bd66b29 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1bd66b29\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7cfab184\" data-id=\"7cfab184\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Offensive AI Security: The Critical Skills Offensive Security Professionals Are Missing Offensive AI SecurityMarch 19, 2026 Offensive AI Security: The Critical Skills Offensive Security Professionals Are Missing Offensive security has always been about staying ahead of defenders by understanding systems better&hellip; Read more<\/p>\n","protected":false},"author":105,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"class_list":["post-84755","page","type-page","status-publish"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Offensive AI Security - Cybersecurity Exchange<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Offensive AI Security\" \/>\n<meta property=\"og:description\" content=\"Offensive AI Security: The Critical Skills Offensive Security Professionals Are Missing Offensive AI SecurityMarch 19, 2026 Offensive AI Security: The Critical Skills Offensive Security Professionals Are Missing Offensive security has always been about staying ahead of defenders by understanding systems better&hellip; Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-19T04:52:40+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/offensive-ai-security\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/offensive-ai-security\\\/\",\"name\":\"Offensive AI Security - Cybersecurity Exchange\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"datePublished\":\"2026-03-19T04:51:43+00:00\",\"dateModified\":\"2026-03-19T04:52:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/offensive-ai-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/offensive-ai-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/offensive-ai-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Offensive AI Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Offensive AI Security - Cybersecurity Exchange","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/","og_locale":"en_US","og_type":"article","og_title":"Offensive AI Security","og_description":"Offensive AI Security: The Critical Skills Offensive Security Professionals Are Missing Offensive AI SecurityMarch 19, 2026 Offensive AI Security: The Critical Skills Offensive Security Professionals Are Missing Offensive security has always been about staying ahead of defenders by understanding systems better&hellip; Read more","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/","og_site_name":"Cybersecurity Exchange","article_modified_time":"2026-03-19T04:52:40+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/","name":"Offensive AI Security - Cybersecurity Exchange","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"datePublished":"2026-03-19T04:51:43+00:00","dateModified":"2026-03-19T04:52:40+00:00","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Offensive AI Security"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/pages\/84755","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/105"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84755"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/pages\/84755\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}