{"id":25298,"date":"2019-05-17T11:30:10","date_gmt":"2019-05-17T11:30:10","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=25298"},"modified":"2023-06-05T07:23:13","modified_gmt":"2023-06-05T07:23:13","slug":"what-can-you-do-with-a-masters-degree-in-cyber-security","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/","title":{"rendered":"What can you do with a master&#8217;s degree in cyber security?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"25298\" class=\"elementor elementor-25298\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-795a8c8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"795a8c8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5a3e4b0\" data-id=\"5a3e4b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-564d2a0 elementor-widget elementor-widget-text-editor\" data-id=\"564d2a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Shawn-P.-Murray.jpg.webp\" alt=\"Dr. Shawn P. Murray\" width=\"200\"><\/p>\n<p><strong>Speaker<\/strong> Dr. Shawn P. Murray,<br><strong>Designation:<\/strong> President &amp; Chief Academic Officer at Murray Security Services and the Chief Operation Officer at ISSA International<br><strong>Topic:<\/strong> What can you do with a master&#8217;s degree in cyber security?<br><strong>Date of Webinar:<\/strong> 21<sup>st<\/sup> May, 2020<br><strong>Time and Location:<\/strong> 7.30 am MST\/ 7 pm IST\/ 1.30 pm GMT<br><a class=\"watch_now_btn elementor-button\" href=\"#watch\" target=\"_self\">Watch Now<\/a><\/p>\n<p><strong><br><\/strong><\/p>\n<p><strong><br><\/strong><\/p><p><strong>Speaker Bio:<\/strong><br>Shawn Murray is President and Chief Academic Officer at Murray Security Services and is assigned to the United States Missile Defense Agency. He is assigned as a Senior Cyber Security Professional and is an officer in the US Civil Air Patrol. His previous assignments include work with the US Army Cyber Command in Europe, US Air Force and with Commercial Industry in various roles in Information Assurance and Cyber Security.<\/p>\n<p>Dr. Murray has worked with NSA, FBI, CIA and the US Defense and State Departments on various Cyber initiatives and has over 20 years of IT, communications, and cybersecurity experience. He has presented as a featured or keynote speaker for numerous conferences and enjoys teaching and presenting as a guest lecturer at his Cyber Academy and for several universities. He holds several degrees to include an Applied Doctorate in Computer Science with a concentration in Enterprise Information Systems.<\/p>\n<p><strong>Topic Abstract: <\/strong><br>In many fields of work, a master\u2019s degree is considered an entry-level requirement for leadership. But in the cybersecurity industry, professionals with an average of 4+ years of experience prefer a master&#8217;s degree to attain specialized knowledge and rise faster in their careers.<\/p>\n<p>However, the avenues to attain an accredited master\u2019s degree in cybersecurity is limited, much of the existing workforce is made up of certificate holders or undergrads with a certificate. The industry is facing a huge gap between workforce supply and demand, especially for senior positions where candidates are expected to demonstrate special on-ground experience and team handling capability.<\/p>\n<p>In this webinar, Dr. Shawn P. Murray will focus on three key points that will take your career to new heights.<\/p>\n<ol>\n<li>How a master\u2019s degree will help your career<\/li>\n<li>Present scenario of the cybersecurity market<\/li>\n<li>Learn what the job market has in store for you<\/li>\n<\/ol>\n<p><strong>Who can attend this:<\/strong><\/p>\n<ul>\n<li>Undergrad Students<\/li>\n<li>Working Professionals<\/li>\n<li>Cybersecurity aspirants<\/li>\n<\/ul>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"watch\"><\/a><br><iframe src=\"https:\/\/www.youtube.com\/embed\/9oymLJ7BwFM\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker Dr. Shawn P. Murray, Designation: President &amp; Chief Academic Officer at Murray Security Services and the Chief Operation Officer at ISSA International Topic: What can you do with a master&#8217;s degree in cyber security? Date of Webinar: 21st May, 2020 Time and Location: 7.30 am MST\/ 7 pm IST\/ 1.30 pm GMT Watch Now&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79428,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-25298","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why Should You Pursue a Master&#039;s Degree in Cybersecurity?<\/title>\n<meta name=\"description\" content=\"Why Should You Pursue a Master&#039;s Degree in Cybersecurity? explained by the Dr. Shawn P. Murray, President &amp; Chief Academic Officer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What can you do with a master&#039;s degree in cyber security?\" \/>\n<meta property=\"og:description\" content=\"Why Should You Pursue a Master&#039;s Degree in Cybersecurity? explained by the Dr. Shawn P. Murray, President &amp; Chief Academic Officer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-17T11:30:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:23:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Shawn-P.-Murray.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-can-you-do-with-a-masters-degree-in-cyber-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-can-you-do-with-a-masters-degree-in-cyber-security\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"What can you do with a master&#8217;s degree in cyber security?\",\"datePublished\":\"2019-05-17T11:30:10+00:00\",\"dateModified\":\"2023-06-05T07:23:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-can-you-do-with-a-masters-degree-in-cyber-security\\\/\"},\"wordCount\":395,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-can-you-do-with-a-masters-degree-in-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Dr.-Shawn-P.-Murray.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-can-you-do-with-a-masters-degree-in-cyber-security\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-can-you-do-with-a-masters-degree-in-cyber-security\\\/\",\"name\":\"Why Should You Pursue a Master's Degree in Cybersecurity?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-can-you-do-with-a-masters-degree-in-cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-can-you-do-with-a-masters-degree-in-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Dr.-Shawn-P.-Murray.jpg\",\"datePublished\":\"2019-05-17T11:30:10+00:00\",\"dateModified\":\"2023-06-05T07:23:13+00:00\",\"description\":\"Why Should You Pursue a Master's Degree in Cybersecurity? explained by the Dr. Shawn P. Murray, President & Chief Academic Officer.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-can-you-do-with-a-masters-degree-in-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-can-you-do-with-a-masters-degree-in-cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-can-you-do-with-a-masters-degree-in-cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Dr.-Shawn-P.-Murray.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Dr.-Shawn-P.-Murray.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-can-you-do-with-a-masters-degree-in-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"What can you do with a master&#8217;s degree in cyber security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why Should You Pursue a Master's Degree in Cybersecurity?","description":"Why Should You Pursue a Master's Degree in Cybersecurity? explained by the Dr. Shawn P. Murray, President & Chief Academic Officer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"What can you do with a master's degree in cyber security?","og_description":"Why Should You Pursue a Master's Degree in Cybersecurity? explained by the Dr. Shawn P. Murray, President & Chief Academic Officer.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-05-17T11:30:10+00:00","article_modified_time":"2023-06-05T07:23:13+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Shawn-P.-Murray.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"What can you do with a master&#8217;s degree in cyber security?","datePublished":"2019-05-17T11:30:10+00:00","dateModified":"2023-06-05T07:23:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/"},"wordCount":395,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Shawn-P.-Murray.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/","name":"Why Should You Pursue a Master's Degree in Cybersecurity?","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Shawn-P.-Murray.jpg","datePublished":"2019-05-17T11:30:10+00:00","dateModified":"2023-06-05T07:23:13+00:00","description":"Why Should You Pursue a Master's Degree in Cybersecurity? explained by the Dr. Shawn P. Murray, President & Chief Academic Officer.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Shawn-P.-Murray.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Shawn-P.-Murray.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-can-you-do-with-a-masters-degree-in-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"What can you do with a master&#8217;s degree in cyber security?"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=25298"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25298\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79428"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=25298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=25298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=25298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}