{"id":56841,"date":"2022-03-07T10:09:32","date_gmt":"2022-03-07T10:09:32","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=56841"},"modified":"2026-01-23T06:25:44","modified_gmt":"2026-01-23T06:25:44","slug":"core-digital-forensics-skills-investigating-cyber-incidents","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/","title":{"rendered":"Core Digital Forensics Skills for Investigating Cyber Incidents"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"56841\" class=\"elementor elementor-56841\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-150455d1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"150455d1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41b6fef1\" data-id=\"41b6fef1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f93118b elementor-widget elementor-widget-text-editor\" data-id=\"5f93118b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> May 13, 2022<br \/><strong>Time:<\/strong> 10:30 a.m. EDT\/3:30 p.m. BST\/8 p.m. IST<br \/><strong>Topic:<\/strong> Core Digital Forensics Skills for Investigating Cyber Incidents<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong><br \/>Digital advances have enabled malicious actors to penetrate networks even in secure environments. Law enforcement agencies and other organizations use <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/what-is-digital-forensics\/\">digital forensics<\/a> to trace the path of a cyberattack by analyzing vast amounts of data and evidence. The role of a digital forensics investigator has evolved as organizations incorporate modern technologies into their operations, and security professionals must update their digital forensics skills and rethink their investigative approaches accordingly.<\/p><p>New technologies like cloud storage and the Internet of Things, together with the growth of the dark web, have created new and complicated challenges for digital investigators. Despite policy frameworks such as service-level agreements and Forensics-as-a-Service (FaaS) solutions, various problems still hinder cyber investigations. This webinar will shed light on the role of digital forensic experts in emerging virtual environments, discuss current digital forensics challenges and solutions, and offer digital forensics career advice for cybersecurity beginners.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Current trends and challenges in digital forensics, including FaaS<\/li><li>How to fill the skills gap in the digital forensics market<\/li><li>How forensic investigators can address the increased scope of cybersecurity<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Square-Sandline.jpg.webp\" alt=\"Robert Fried\" width=\"200\" \/><strong>Robert Fried, <\/strong>Senior Vice President and Global Head of Forensics and Investigations, Sandline<\/p><p><strong>Bio: <\/strong> Robert Fried is a seasoned expert and industry thought leader with over 20 years of experience in data collection and forensic investigations. As Senior Vice President and Global Head of Sandline\u2019s Forensics and Investigations practice, he leads day-to-day operations and oversees the forensic services offered to clients, including data collection, forensic analysis, expert testimony, and forensic consultation. Previously, he has held senior-level positions in digital forensic practices at global professional services firms and worked as a computer crime specialist at the National White Collar Crime Center. He has developed and instructed computer forensics and investigative training courses for federal, state, and local law enforcement agencies.<\/p><p>Robert holds a BS and MS in Forensic Science and certificates in Law Enforcement Science, Computer Forensic Investigation, and Information Protection and Security from the University of New Haven. He serves on the Board of Advisors for the Master\u2019s in Investigations program at the University of New Haven and the Global Advisory Board for EC-Council\u2019s <a href=\"https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\" target=\"_blank\" rel=\"noopener\">Computer Hacking Forensic Investigator (C|HFI) certification<\/a>.<\/p><p>Robert is a licensed professional investigator in Michigan and a licensed private investigator in New York. He is a frequent speaker at industry events, has been a guest on industry podcasts, and has been published in several professional publications. He has also authored the book Forensic Data Collections 2.0: The Guide for Defensible &amp; Efficient Processes and contributes to PI Magazine, where he created the CyberSleuthing department and shares insightful content on topics relating to digital forensics, eDiscovery, data privacy, and cybersecurity.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><\/p><p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/Hi4zc4VaxT0\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 13, 2022Time: 10:30 a.m. EDT\/3:30 p.m. BST\/8 p.m. ISTTopic: Core Digital Forensics Skills for Investigating Cyber Incidents Watch Now Abstract: Digital advances have enabled malicious actors to penetrate networks even in secure environments. Law enforcement agencies and other organizations use digital forensics to trace the path of a cyberattack by analyzing vast amounts&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79043,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-56841","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Core Digital Forensics Skills for Cyber Investigations<\/title>\n<meta name=\"description\" content=\"Learn why cybersecurity experts need to upgrade their investigative skills and techniques to meet contemporary digital forensics challenges.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Core Digital Forensics Skills for Investigating Cyber Incidents\" \/>\n<meta property=\"og:description\" content=\"Learn why cybersecurity experts need to upgrade their investigative skills and techniques to meet contemporary digital forensics challenges.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-07T10:09:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-23T06:25:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Core-Digital-Forensics-Skills-for-Cyber-Investigations.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/core-digital-forensics-skills-investigating-cyber-incidents\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/core-digital-forensics-skills-investigating-cyber-incidents\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Core Digital Forensics Skills for Investigating Cyber Incidents\",\"datePublished\":\"2022-03-07T10:09:32+00:00\",\"dateModified\":\"2026-01-23T06:25:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/core-digital-forensics-skills-investigating-cyber-incidents\\\/\"},\"wordCount\":495,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/core-digital-forensics-skills-investigating-cyber-incidents\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Core-Digital-Forensics-Skills-for-Cyber-Investigations.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/core-digital-forensics-skills-investigating-cyber-incidents\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/core-digital-forensics-skills-investigating-cyber-incidents\\\/\",\"name\":\"Core Digital Forensics Skills for Cyber Investigations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/core-digital-forensics-skills-investigating-cyber-incidents\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/core-digital-forensics-skills-investigating-cyber-incidents\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Core-Digital-Forensics-Skills-for-Cyber-Investigations.jpg\",\"datePublished\":\"2022-03-07T10:09:32+00:00\",\"dateModified\":\"2026-01-23T06:25:44+00:00\",\"description\":\"Learn why cybersecurity experts need to upgrade their investigative skills and techniques to meet contemporary digital forensics challenges.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/core-digital-forensics-skills-investigating-cyber-incidents\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/core-digital-forensics-skills-investigating-cyber-incidents\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/core-digital-forensics-skills-investigating-cyber-incidents\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Core-Digital-Forensics-Skills-for-Cyber-Investigations.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Core-Digital-Forensics-Skills-for-Cyber-Investigations.jpg\",\"width\":1938,\"height\":1292,\"caption\":\"Core Digital Forensics Skills for Cyber Investigations\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/core-digital-forensics-skills-investigating-cyber-incidents\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Core Digital Forensics Skills for Investigating Cyber Incidents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Core Digital Forensics Skills for Cyber Investigations","description":"Learn why cybersecurity experts need to upgrade their investigative skills and techniques to meet contemporary digital forensics challenges.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/","og_locale":"en_US","og_type":"article","og_title":"Core Digital Forensics Skills for Investigating Cyber Incidents","og_description":"Learn why cybersecurity experts need to upgrade their investigative skills and techniques to meet contemporary digital forensics challenges.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-03-07T10:09:32+00:00","article_modified_time":"2026-01-23T06:25:44+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Core-Digital-Forensics-Skills-for-Cyber-Investigations.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Core Digital Forensics Skills for Investigating Cyber Incidents","datePublished":"2022-03-07T10:09:32+00:00","dateModified":"2026-01-23T06:25:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/"},"wordCount":495,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Core-Digital-Forensics-Skills-for-Cyber-Investigations.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/","name":"Core Digital Forensics Skills for Cyber Investigations","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Core-Digital-Forensics-Skills-for-Cyber-Investigations.jpg","datePublished":"2022-03-07T10:09:32+00:00","dateModified":"2026-01-23T06:25:44+00:00","description":"Learn why cybersecurity experts need to upgrade their investigative skills and techniques to meet contemporary digital forensics challenges.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Core-Digital-Forensics-Skills-for-Cyber-Investigations.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Core-Digital-Forensics-Skills-for-Cyber-Investigations.jpg","width":1938,"height":1292,"caption":"Core Digital Forensics Skills for Cyber Investigations"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/core-digital-forensics-skills-investigating-cyber-incidents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Core Digital Forensics Skills for Investigating Cyber Incidents"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=56841"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56841\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79043"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=56841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=56841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=56841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}