{"id":24812,"date":"2019-04-09T11:54:16","date_gmt":"2019-04-09T11:54:16","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=24812"},"modified":"2023-06-05T07:27:21","modified_gmt":"2023-06-05T07:27:21","slug":"denial-of-service-dos","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/","title":{"rendered":"Denial of Service (DOS)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24812\" class=\"elementor elementor-24812\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f286d5c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f286d5c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-15d8cf8f\" data-id=\"15d8cf8f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1fca00e1 elementor-widget elementor-widget-text-editor\" data-id=\"1fca00e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft\" title=\"Shreyans Khanna\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/SK_Master-Class.jpg.webp\" alt=\"Shreyans Khanna\" width=\"200\" height=\"263\"><\/p>\n<p><strong>Name:<\/strong> Shreyans Khanna<br>\n<strong>Designation:<\/strong> : Senior Corporate Trainer,<br>\n<strong>Topic:<\/strong> Denial of Service (DOS)<br>\n<strong>Date of Webinar:<\/strong> 19<sup>th<\/sup> Nov, 2019<br>\n<strong>Time and Location:<\/strong> 4:30pm IST\/ 2:00pm Qatar Time\/ 3:00pm Dubai Time<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#register\" target=\"_self\">Watch Now<\/a><br>\n<strong><br><\/strong><\/p><p><strong><br><\/strong><\/p><p><strong>Media Partner:<\/strong><br>\n<a href=\"https:\/\/www.cisomag.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"alignleft size-full wp-image-24792\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/cisomag-web-logo-01.png.webp\" alt=\"\" width=\"80\"><\/a><\/p>\n<p><strong><br><\/strong><\/p><p><strong><br><\/strong><\/p><p><strong><br><\/strong><\/p><p><strong>Speaker Bio:<\/strong> Mr. Shreyans Khanna is a Senior Corporate Trainer currently working with Koenig Solutions Ltd. He specializes in delivering quality training on IOS, Android and Xamarin technologies to corporate clients, delivering webinars and seminars on new technologies and defining structured training plans, goals and timelines for clients. Mr. Shreyans Khanna is also engaged with EC-Council to facilitate the C|EH training program \u2013 brining experience of first-hand knowledge to the participants.<\/p>\n<p><strong>Topic Abstract:<\/strong> In a DoS attack an attempt is made to make a machine or network resource unavailable to its actual users. It is done to temporarily or indefinitely interrupt or suspend services of the target host connected to the Internet.<\/p>\n<p>The mitigation of a DOS attach is high on the priority list for any enterprise security teams. Although the information security and defending techniques are becoming sophisticated, so are hackers.<br>\nIn this webinar you will learn in depth about the DOS attack and also the ways to mitigating this kind of attack.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"register\"><\/a><br>\n<iframe src=\"https:\/\/www.youtube.com\/embed\/4tKIUhb90lo\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Name: Shreyans Khanna Designation: : Senior Corporate Trainer, Topic: Denial of Service (DOS) Date of Webinar: 19th Nov, 2019 Time and Location: 4:30pm IST\/ 2:00pm Qatar Time\/ 3:00pm Dubai Time Watch Now Media Partner: Speaker Bio: Mr. Shreyans Khanna is a Senior Corporate Trainer currently working with Koenig Solutions Ltd. He specializes in delivering quality&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79506,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-24812","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DoS Attack - Introduction and Mitigation | Shreyans Khanna<\/title>\n<meta name=\"description\" content=\"DoS Attack - Introduction and Mitigation explained by the Shreyans Khanna Senior Corporate Trainer through ECCU.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Denial of Service (DOS)\" \/>\n<meta property=\"og:description\" content=\"DoS Attack - Introduction and Mitigation explained by the Shreyans Khanna Senior Corporate Trainer through ECCU.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-09T11:54:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:27:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Shreyans-Khanna.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/denial-of-service-dos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/denial-of-service-dos\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Denial of Service (DOS)\",\"datePublished\":\"2019-04-09T11:54:16+00:00\",\"dateModified\":\"2023-06-05T07:27:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/denial-of-service-dos\\\/\"},\"wordCount\":221,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/denial-of-service-dos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Shreyans-Khanna.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/denial-of-service-dos\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/denial-of-service-dos\\\/\",\"name\":\"DoS Attack - Introduction and Mitigation | Shreyans Khanna\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/denial-of-service-dos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/denial-of-service-dos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Shreyans-Khanna.jpg\",\"datePublished\":\"2019-04-09T11:54:16+00:00\",\"dateModified\":\"2023-06-05T07:27:21+00:00\",\"description\":\"DoS Attack - Introduction and Mitigation explained by the Shreyans Khanna Senior Corporate Trainer through ECCU.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/denial-of-service-dos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/denial-of-service-dos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/denial-of-service-dos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Shreyans-Khanna.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Shreyans-Khanna.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/denial-of-service-dos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Denial of Service (DOS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DoS Attack - Introduction and Mitigation | Shreyans Khanna","description":"DoS Attack - Introduction and Mitigation explained by the Shreyans Khanna Senior Corporate Trainer through ECCU.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/","og_locale":"en_US","og_type":"article","og_title":"Denial of Service (DOS)","og_description":"DoS Attack - Introduction and Mitigation explained by the Shreyans Khanna Senior Corporate Trainer through ECCU.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-04-09T11:54:16+00:00","article_modified_time":"2023-06-05T07:27:21+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Shreyans-Khanna.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Denial of Service (DOS)","datePublished":"2019-04-09T11:54:16+00:00","dateModified":"2023-06-05T07:27:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/"},"wordCount":221,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Shreyans-Khanna.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/","name":"DoS Attack - Introduction and Mitigation | Shreyans Khanna","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Shreyans-Khanna.jpg","datePublished":"2019-04-09T11:54:16+00:00","dateModified":"2023-06-05T07:27:21+00:00","description":"DoS Attack - Introduction and Mitigation explained by the Shreyans Khanna Senior Corporate Trainer through ECCU.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Shreyans-Khanna.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Shreyans-Khanna.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/denial-of-service-dos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Denial of Service (DOS)"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=24812"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24812\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79506"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=24812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=24812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=24812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}