{"id":79628,"date":"2023-08-21T14:09:52","date_gmt":"2023-08-21T14:09:52","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=79628"},"modified":"2025-11-10T10:57:52","modified_gmt":"2025-11-10T10:57:52","slug":"understanding-network-security-threats-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/","title":{"rendered":"Network Security Fundamentals: Understanding Threats and Vulnerabilities"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"79628\" class=\"elementor elementor-79628\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-023eff2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"023eff2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-da3d84f\" data-id=\"da3d84f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cabc07d elementor-widget elementor-widget-text-editor\" data-id=\"cabc07d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> August 18, 2023<br \/><strong>Time:<\/strong> 8:00 A.M. MDT | 7:30 P.M. IST | 9:00 A.M. CDT<br \/><strong>Topic:<\/strong> Network <a href=\"https:\/\/www.eccu.edu\/blog\/cybersecurity\/fundamentals-of-information-security\/\" target=\"_blank\" rel=\"noopener\">Security Fundamentals<\/a>: Understanding Threats and Vulnerabilities<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> Network security secures communications between users and assets and creates a shield that protects organizations from external and internet threats. It ensures that users have access to specific parts of the network and that their privileges can be authorized and revoked, depending on their online behaviors and activities. Securing the network landscape is a constant challenge since threat vectors are always evolving. To understand how network security evolves, we must first get an overview of the landscape and know what companies are doing proactively to monitor and defend against threats and vulnerabilities. This webinar serves as an introduction to the fundamentals of <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/network-security\/what-is-network-security\/\" target=\"_blank\" rel=\"noopener\">network security<\/a> and provides an overview of the best network security practices and vulnerability assessment techniques. It offers additional guidance on cyber awareness training for employees, along with recommendations for enhancing an organization&#8217;s security posture. Participants will also gain a fresh perspective on how to defend themselves from phishing, ransomware, malware, and other network security threats.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>an introduction to the network security landscape<\/li><li>the current state of attack surfaces, their expansion, and ongoing evolution<\/li><li>being aware of potential risks while interacting with threat vectors and responding to incidents<\/li><li>learning about common network security threats, vulnerabilities, security policies, and gaps<\/li><li>understanding how to improve cyber awareness in organizations and enhancing the overall security posture<\/li><li>discovering the latest network security practices, threat remediation platforms, and solutions<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Marlene.jpg.webp\" alt=\"Marlene\" width=\"200\" \/><strong>Marlene Veum<\/strong>, Independent Cybersecurity Executive Leader and Advisor, Enterprise and Emerging Web3 and Decentralized Technologies<\/p><p><strong>Bio:<\/strong> Marlene is a highly experienced cybersecurity leader with a successful career spanning over two decades. She has been instrumental in secure product development, enterprise and cloud operations, architecture, engineering, governance, risk and compliance, 24\u00d77 Security Operations Center (SoC), incident response, insider threats, and internal audits of various international companies and industries. Marlene also proudly served in the United States Air Force Reserves, where she retired from a space and cyber intelligence missions career focused on defending critical national assets.<\/p><p>As a cybersecurity expert, Marlene is helping organizations and industry influencers navigate digital transformation for trusted services in enterprise, cloud, and emerging technologies. Marlene is a Certified Information Systems Security Professional (CISSP), and Certified Cryptocurrency Security Standard Auditor (CCSSA), pursuing an MSc in Blockchain and Digital Currency.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/nR0ANEimO3w?si=E2ySXypBrkmgp4wF\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: August 18, 2023Time: 8:00 A.M. MDT | 7:30 P.M. IST | 9:00 A.M. CDTTopic: Network Security Fundamentals: Understanding Threats and Vulnerabilities Watch Now Abstract: Network security secures communications between users and assets and creates a shield that protects organizations from external and internet threats. It ensures that users have access to specific parts of&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79879,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-79628","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Understanding Threats and Vulnerabilities in Network Security<\/title>\n<meta name=\"description\" content=\"In this webinar, learn about network security fundamentals, current threats and vulnerabilities, how to be aware of potential risks and respond to them, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Security Fundamentals: Understanding Threats and Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"In this webinar, learn about network security fundamentals, current threats and vulnerabilities, how to be aware of potential risks and respond to them, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-21T14:09:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-10T10:57:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/465x310-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-network-security-threats-vulnerabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-network-security-threats-vulnerabilities\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Network Security Fundamentals: Understanding Threats and Vulnerabilities\",\"datePublished\":\"2023-08-21T14:09:52+00:00\",\"dateModified\":\"2025-11-10T10:57:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-network-security-threats-vulnerabilities\\\/\"},\"wordCount\":422,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-network-security-threats-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/465x310-2.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-network-security-threats-vulnerabilities\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-network-security-threats-vulnerabilities\\\/\",\"name\":\"Understanding Threats and Vulnerabilities in Network Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-network-security-threats-vulnerabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-network-security-threats-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/465x310-2.jpg\",\"datePublished\":\"2023-08-21T14:09:52+00:00\",\"dateModified\":\"2025-11-10T10:57:52+00:00\",\"description\":\"In this webinar, learn about network security fundamentals, current threats and vulnerabilities, how to be aware of potential risks and respond to them, and more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-network-security-threats-vulnerabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-network-security-threats-vulnerabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-network-security-threats-vulnerabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/465x310-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/465x310-2.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-network-security-threats-vulnerabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Network Security Fundamentals: Understanding Threats and Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding Threats and Vulnerabilities in Network Security","description":"In this webinar, learn about network security fundamentals, current threats and vulnerabilities, how to be aware of potential risks and respond to them, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Network Security Fundamentals: Understanding Threats and Vulnerabilities","og_description":"In this webinar, learn about network security fundamentals, current threats and vulnerabilities, how to be aware of potential risks and respond to them, and more.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-08-21T14:09:52+00:00","article_modified_time":"2025-11-10T10:57:52+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/465x310-2.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Network Security Fundamentals: Understanding Threats and Vulnerabilities","datePublished":"2023-08-21T14:09:52+00:00","dateModified":"2025-11-10T10:57:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/"},"wordCount":422,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/465x310-2.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/","name":"Understanding Threats and Vulnerabilities in Network Security","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/465x310-2.jpg","datePublished":"2023-08-21T14:09:52+00:00","dateModified":"2025-11-10T10:57:52+00:00","description":"In this webinar, learn about network security fundamentals, current threats and vulnerabilities, how to be aware of potential risks and respond to them, and more.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/465x310-2.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/465x310-2.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-network-security-threats-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Network Security Fundamentals: Understanding Threats and Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=79628"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79628\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79879"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=79628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=79628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=79628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}