{"id":58006,"date":"2023-02-02T10:00:01","date_gmt":"2023-02-02T10:00:01","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=58006"},"modified":"2023-07-20T05:53:26","modified_gmt":"2023-07-20T05:53:26","slug":"essential-cybersecurity-skills-professionals-today","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/","title":{"rendered":"Essential Skills for Cybersecurity Professionals Today"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"58006\" class=\"elementor elementor-58006\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4955b056 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4955b056\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7a895b60\" data-id=\"7a895b60\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41ed780f elementor-widget elementor-widget-text-editor\" data-id=\"41ed780f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> February 2, 2023<br>\n<strong>Time:<\/strong> 1.30 p.m. GMT\/8.30 a.m. EST\/7 p.m. IST<br>\n<strong>Topic:<\/strong> Essential Skills for Cybersecurity Professionals Today<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p>\n<p><strong>Abstract:<\/strong> With the threat frontier evolving every couple of years or decades, each aspect of this domain remains a topic of discussion and study. In recent times, the introduction of new technologies, such as cloud computing, Blockchain, IoT, etc., has altered the threat techniques and shifted the security posture of businesses. While the concept of hacking remains the same, the mode has changed with the emergence of newer technologies. Hence, cybersecurity aspirants must understand the state of data and devices in these platforms and how the access or transfer of information takes place in these technologies. While some technologies limit the need for understanding only up to storage and transfer, others might require cybersecurity professionals to understand the underlying framework and programming language. The current webinar aims to guide cybersecurity professionals on the new technological trends in the field and the associated skills needed to secure the digital infrastructure from harm.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>What are some of the prominent technical and non-technical cybersecurity skills (e.g., cloud security, ethical hacking\/penetration testing, digital forensics, security management, information governance, security awareness, etc.)?<\/li>\n<li>What are the associated skill sets that cybersecurity practitioners will benefit from?<\/li>\n<li>How can relevant skills be understood and recognized in practice?<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Steven-Furnell-200x200-1.jpg.webp\" alt=\"Steven Furnell\" width=\"200\"><strong>Steven Furnell<\/strong>, Professor of Cybersecurity, University of Nottingham<\/p>\n<p><strong>Bio:<\/strong> Steve is a professor of cybersecurity at the University of Nottingham, an adjunct professor at Edith Cowan University in Western Australia, and an honorary professor at Nelson Mandela University in South Africa. His research interests include the usability of security technology, security management, culture, and user authentication and intrusion detection technologies. He has authored over 350 articles in international journals and conference proceedings and various books, book chapters, and industry reports. Steve is also the editor of the journal Information &amp; Computer Security, the UK representative to Technical Committee 11 (Security and Privacy Protection) within the International Federation for Information Processing, and a board member and academic partnership committee chair for the Chartered Institute of Information Security.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/no03Sr9gvdw\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: February 2, 2023 Time: 1.30 p.m. GMT\/8.30 a.m. EST\/7 p.m. IST Topic: Essential Skills for Cybersecurity Professionals Today Watch Now Abstract: With the threat frontier evolving every couple of years or decades, each aspect of this domain remains a topic of discussion and study. In recent times, the introduction of new technologies, such as&hellip;<\/p>\n","protected":false},"author":32,"featured_media":78971,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-58006","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Must-have Cybersecurity Skills for Professionals Today<\/title>\n<meta name=\"description\" content=\"The new technological trend has shifted the security posture of businesses. What skills must security professionals have to tackle the new hacking techniques?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Essential Skills for Cybersecurity Professionals Today\" \/>\n<meta property=\"og:description\" content=\"The new technological trend has shifted the security posture of businesses. What skills must security professionals have to tackle the new hacking techniques?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-02T10:00:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-20T05:53:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/Must-have-Cybersecurity-Skills-for-Professionals-Today-ECCU.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals-today\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals-today\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Essential Skills for Cybersecurity Professionals Today\",\"datePublished\":\"2023-02-02T10:00:01+00:00\",\"dateModified\":\"2023-07-20T05:53:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals-today\\\/\"},\"wordCount\":376,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals-today\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Must-have-Cybersecurity-Skills-for-Professionals-Today-ECCU.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals-today\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals-today\\\/\",\"name\":\"Must-have Cybersecurity Skills for Professionals Today\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals-today\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals-today\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Must-have-Cybersecurity-Skills-for-Professionals-Today-ECCU.jpg\",\"datePublished\":\"2023-02-02T10:00:01+00:00\",\"dateModified\":\"2023-07-20T05:53:26+00:00\",\"description\":\"The new technological trend has shifted the security posture of businesses. What skills must security professionals have to tackle the new hacking techniques?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals-today\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals-today\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals-today\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Must-have-Cybersecurity-Skills-for-Professionals-Today-ECCU.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Must-have-Cybersecurity-Skills-for-Professionals-Today-ECCU.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals-today\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Essential Skills for Cybersecurity Professionals Today\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Must-have Cybersecurity Skills for Professionals Today","description":"The new technological trend has shifted the security posture of businesses. What skills must security professionals have to tackle the new hacking techniques?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/","og_locale":"en_US","og_type":"article","og_title":"Essential Skills for Cybersecurity Professionals Today","og_description":"The new technological trend has shifted the security posture of businesses. What skills must security professionals have to tackle the new hacking techniques?","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-02-02T10:00:01+00:00","article_modified_time":"2023-07-20T05:53:26+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/Must-have-Cybersecurity-Skills-for-Professionals-Today-ECCU.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Essential Skills for Cybersecurity Professionals Today","datePublished":"2023-02-02T10:00:01+00:00","dateModified":"2023-07-20T05:53:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/"},"wordCount":376,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/Must-have-Cybersecurity-Skills-for-Professionals-Today-ECCU.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/","name":"Must-have Cybersecurity Skills for Professionals Today","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/Must-have-Cybersecurity-Skills-for-Professionals-Today-ECCU.jpg","datePublished":"2023-02-02T10:00:01+00:00","dateModified":"2023-07-20T05:53:26+00:00","description":"The new technological trend has shifted the security posture of businesses. What skills must security professionals have to tackle the new hacking techniques?","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/Must-have-Cybersecurity-Skills-for-Professionals-Today-ECCU.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/Must-have-Cybersecurity-Skills-for-Professionals-Today-ECCU.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals-today\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Essential Skills for Cybersecurity Professionals Today"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/58006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=58006"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/58006\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/78971"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=58006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=58006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=58006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}