{"id":50393,"date":"2020-08-18T09:00:40","date_gmt":"2020-08-18T09:00:40","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=50393"},"modified":"2023-06-05T07:17:02","modified_gmt":"2023-06-05T07:17:02","slug":"a-guide-to-cyber-and-electronic-warfare","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/","title":{"rendered":"A Guide to Cyber and Electronic Warfare"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"50393\" class=\"elementor elementor-50393\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2f686536 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2f686536\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-39ed07a7\" data-id=\"39ed07a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-526db411 elementor-widget elementor-widget-text-editor\" data-id=\"526db411\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft wp-image-2265 size-full\" title=\"Dr. Kamaruddin Abdul Ghani\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Kamaruddin-Abdul-Ghani.jpg\" alt=\"Dr. Kamaruddin Abdul Ghani\" width=\"200\" height=\"267\"><\/p>\n<p><strong>Speaker:<\/strong> Dr. Kamaruddin Abdul Ghani,<br><strong>Designation:<\/strong> Associate Professor, UPNM<br><strong>Topic:<\/strong> A Guide to Cyber and Electronic Warfare<br><strong>Date of Webinar:<\/strong> 12<sup>th<\/sup> jan, 2021<br><strong>Time and Location:<\/strong> 5:00 pm Malaysian time\/ 2:30 pm IST\/ 9:00 am GMT\/10:00 am CET<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p>\n<p><strong><br><\/strong><\/p><p><strong><br><\/strong><\/p><p><strong>Speaker Bio:<\/strong><\/p>\n<p>Dr. Kamaruddin Abdul Ghani is a retired Major with years of experience in Electronic Warfare (EW), where his work focused on communications and signal intelligence. After he left the military service, he worked as RF and R&amp;D Engineer. He earned his BSc in Electrical Engineering in 1987, Master of Electrical Engineering in 1995, and finally PhD in Electrical &amp; Electronic Engineering in 2017. He is a Professional Engineer with vast experience in RF communications.<\/p>\n<p>Currently, he is Associate Professor at the Department of Electrical Engineering, National Defence University of Malaysia (NDUM) with research interest in Electronic Intelligence and radar signal analysis. Most of his research works are<\/p>\n<p>related to RF communications and signal intelligence. He served as the Head of Department and Research Fellow at Cyber Security Centre, NDUM for 7 years and developed laboratories and a Command &amp; Control System for teaching and research in Electronic Warfare and Cyber-related operations.<\/p>\n<p><strong>Topic Abstract: <\/strong><\/p>\n<p>Electronic Warfare (EW) and Cyber Warfare (CW) are still two separate operational entities at most organizations despite both having a number of similarities, with the main one being that both use electromagnetic spectrum (EMS) in their day-to-day operations. This may lead to a number of redundancies where both domains could join as a team and complement each other.<\/p>\n<p>During the course of this webinar, some of the similarities in terms of threats and attacks faced by EW and CW are discussed. The similarities may allow EW and CW to complement each other in protecting their own domains, where EW tackles the wireless part of it and CW handles the wired and network systems. A common model for a command and control system is presented to explore the feasibilities of joint operations between both units so as to maximize available resources.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>What is the similarity between Cyber Warfare and Electronic Warfare?<\/li>\n<li>Any similar threats and attacks in Cyber-EW<\/li>\n<li>Possibility of joint operations in Cyber Warfare and Electronic Warfare.<\/li>\n<li>A common Command &amp; Control for Cyber-EW operational system.<\/li>\n<\/ul>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br><iframe src=\"https:\/\/www.youtube.com\/embed\/feMAaIFgmdc\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker: Dr. Kamaruddin Abdul Ghani,Designation: Associate Professor, UPNMTopic: A Guide to Cyber and Electronic WarfareDate of Webinar: 12th jan, 2021Time and Location: 5:00 pm Malaysian time\/ 2:30 pm IST\/ 9:00 am GMT\/10:00 am CET Watch Now Speaker Bio: Dr. Kamaruddin Abdul Ghani is a retired Major with years of experience in Electronic Warfare (EW), where&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79306,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-50393","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A Guide to Cyber and Electronic Warfare | EC-Council University<\/title>\n<meta name=\"description\" content=\"A Guide to Cyber and Electronic Warfare explained by the Dr. Kamaruddin Abdul Ghani through EC-Council University.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Guide to Cyber and Electronic Warfare\" \/>\n<meta property=\"og:description\" content=\"A Guide to Cyber and Electronic Warfare explained by the Dr. Kamaruddin Abdul Ghani through EC-Council University.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T09:00:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:17:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Kamaruddin-Abdul-Ghani.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-cyber-and-electronic-warfare\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-cyber-and-electronic-warfare\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"A Guide to Cyber and Electronic Warfare\",\"datePublished\":\"2020-08-18T09:00:40+00:00\",\"dateModified\":\"2023-06-05T07:17:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-cyber-and-electronic-warfare\\\/\"},\"wordCount\":395,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-cyber-and-electronic-warfare\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Dr.-Kamaruddin-Abdul-Ghani.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-cyber-and-electronic-warfare\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-cyber-and-electronic-warfare\\\/\",\"name\":\"A Guide to Cyber and Electronic Warfare | EC-Council University\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-cyber-and-electronic-warfare\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-cyber-and-electronic-warfare\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Dr.-Kamaruddin-Abdul-Ghani.jpg\",\"datePublished\":\"2020-08-18T09:00:40+00:00\",\"dateModified\":\"2023-06-05T07:17:02+00:00\",\"description\":\"A Guide to Cyber and Electronic Warfare explained by the Dr. Kamaruddin Abdul Ghani through EC-Council University.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-cyber-and-electronic-warfare\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-cyber-and-electronic-warfare\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-cyber-and-electronic-warfare\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Dr.-Kamaruddin-Abdul-Ghani.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Dr.-Kamaruddin-Abdul-Ghani.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-cyber-and-electronic-warfare\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"A Guide to Cyber and Electronic Warfare\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Guide to Cyber and Electronic Warfare | EC-Council University","description":"A Guide to Cyber and Electronic Warfare explained by the Dr. Kamaruddin Abdul Ghani through EC-Council University.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/","og_locale":"en_US","og_type":"article","og_title":"A Guide to Cyber and Electronic Warfare","og_description":"A Guide to Cyber and Electronic Warfare explained by the Dr. Kamaruddin Abdul Ghani through EC-Council University.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T09:00:40+00:00","article_modified_time":"2023-06-05T07:17:02+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Kamaruddin-Abdul-Ghani.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"A Guide to Cyber and Electronic Warfare","datePublished":"2020-08-18T09:00:40+00:00","dateModified":"2023-06-05T07:17:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/"},"wordCount":395,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Kamaruddin-Abdul-Ghani.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/","name":"A Guide to Cyber and Electronic Warfare | EC-Council University","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Kamaruddin-Abdul-Ghani.jpg","datePublished":"2020-08-18T09:00:40+00:00","dateModified":"2023-06-05T07:17:02+00:00","description":"A Guide to Cyber and Electronic Warfare explained by the Dr. Kamaruddin Abdul Ghani through EC-Council University.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Kamaruddin-Abdul-Ghani.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Kamaruddin-Abdul-Ghani.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-cyber-and-electronic-warfare\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"A Guide to Cyber and Electronic Warfare"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/50393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=50393"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/50393\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79306"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=50393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=50393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=50393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}