{"id":25484,"date":"2020-03-24T11:09:46","date_gmt":"2020-03-24T11:09:46","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=25484"},"modified":"2023-06-05T07:22:02","modified_gmt":"2023-06-05T07:22:02","slug":"soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/","title":{"rendered":"Soc Analyst to combat cyberattacks (New Approach Based on AI and ML)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"25484\" class=\"elementor elementor-25484\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c52a6ab elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c52a6ab\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-33e3b8df\" data-id=\"33e3b8df\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-32c725b7 elementor-widget elementor-widget-text-editor\" data-id=\"32c725b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Salman-Khawaja.jpg\" alt=\"Salman Khwaja\" width=\"200\"><\/p>\n<p><strong>Speaker<\/strong> Salman Khwaja,<br>\n<strong>Designation:<\/strong> Manager Application Security, TPS Pakistan Pvt. Limited. and Chapter Leader, OWASP Karachi.<br>\n<strong>Topic:<\/strong> Soc Analyst to combat cyberattacks (New Approach Based on AI and ML)<br>\n<strong>Date of Webinar:<\/strong> 1<sup>st<\/sup> July, 2020<br>\n<strong>Time and Location:<\/strong> 5:00 pm IST | 7:30 pm SGT | 11:00 am GMT<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#register\" target=\"_self\">Watch Now<\/a><br>\n<strong><br><\/strong><\/p><p><strong><br><\/strong><\/p><p><strong>Speaker Bio:<\/strong><br>\nMr. Salman Khwaja has over 13+ years of professional experience working in the software development arena in the capacity of technical writer, quality assurance professional, information system auditor, and is currently heading the application security team at TPS Pakistan Pvt. Limited.<\/p>\n<p><strong>Topic Abstract: <\/strong><br>\nMaintaining a SOC (Security Operations Center) is an important symbol for various organizations. Very few SOCs can actually counter and reduce cyberattacks and IT abuse due to the lack of a standard framework. Many organizations are still left wondering how to implement a SOC properly.<\/p>\n<p>In this webinar, we will dive into a research paper that highlights how a SOC can be institutionalized, operated, and maintained.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Identifying and defining new approaches based on artificial intelligence and machine learning (behavior analyzer)<\/li>\n<li>Future assessment of SOC<\/li>\n<li>How to draft a new design framework<\/li><\/ul>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"register\"><\/a><br>\n<iframe src=\"https:\/\/www.youtube.com\/embed\/BtHOuOv6lFI\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker Salman Khwaja, Designation: Manager Application Security, TPS Pakistan Pvt. Limited. and Chapter Leader, OWASP Karachi. Topic: Soc Analyst to combat cyberattacks (New Approach Based on AI and ML) Date of Webinar: 1st July, 2020 Time and Location: 5:00 pm IST | 7:30 pm SGT | 11:00 am GMT Watch Now Speaker Bio: Mr. Salman&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79520,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-25484","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI and ML Based Approach for SOC Analysts to Combat Cyberattacks<\/title>\n<meta name=\"description\" content=\"AI and ML Based Approach for SOC Analysts to Combat Cyberattacks explained by the Salman Khwaja, Manager Application Security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Soc Analyst to combat cyberattacks (New Approach Based on AI and ML)\" \/>\n<meta property=\"og:description\" content=\"AI and ML Based Approach for SOC Analysts to Combat Cyberattacks explained by the Salman Khwaja, Manager Application Security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-24T11:09:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:22:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Salman-Khwaja1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Soc Analyst to combat cyberattacks (New Approach Based on AI and ML)\",\"datePublished\":\"2020-03-24T11:09:46+00:00\",\"dateModified\":\"2023-06-05T07:22:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\\\/\"},\"wordCount\":215,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Salman-Khwaja1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\\\/\",\"name\":\"AI and ML Based Approach for SOC Analysts to Combat Cyberattacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Salman-Khwaja1.jpg\",\"datePublished\":\"2020-03-24T11:09:46+00:00\",\"dateModified\":\"2023-06-05T07:22:02+00:00\",\"description\":\"AI and ML Based Approach for SOC Analysts to Combat Cyberattacks explained by the Salman Khwaja, Manager Application Security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Salman-Khwaja1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Salman-Khwaja1.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Soc Analyst to combat cyberattacks (New Approach Based on AI and ML)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI and ML Based Approach for SOC Analysts to Combat Cyberattacks","description":"AI and ML Based Approach for SOC Analysts to Combat Cyberattacks explained by the Salman Khwaja, Manager Application Security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/","og_locale":"en_US","og_type":"article","og_title":"Soc Analyst to combat cyberattacks (New Approach Based on AI and ML)","og_description":"AI and ML Based Approach for SOC Analysts to Combat Cyberattacks explained by the Salman Khwaja, Manager Application Security.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-03-24T11:09:46+00:00","article_modified_time":"2023-06-05T07:22:02+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Salman-Khwaja1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Soc Analyst to combat cyberattacks (New Approach Based on AI and ML)","datePublished":"2020-03-24T11:09:46+00:00","dateModified":"2023-06-05T07:22:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/"},"wordCount":215,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Salman-Khwaja1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/","name":"AI and ML Based Approach for SOC Analysts to Combat Cyberattacks","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Salman-Khwaja1.jpg","datePublished":"2020-03-24T11:09:46+00:00","dateModified":"2023-06-05T07:22:02+00:00","description":"AI and ML Based Approach for SOC Analysts to Combat Cyberattacks explained by the Salman Khwaja, Manager Application Security.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Salman-Khwaja1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Salman-Khwaja1.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/soc-analyst-to-combat-cyberattacks-new-approach-based-on-ai-and-ml\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Soc Analyst to combat cyberattacks (New Approach Based on AI and ML)"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=25484"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25484\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79520"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=25484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=25484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=25484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}