{"id":80256,"date":"2023-11-01T13:59:27","date_gmt":"2023-11-01T13:59:27","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=80256"},"modified":"2026-01-27T07:40:48","modified_gmt":"2026-01-27T07:40:48","slug":"the-fundamentals-of-cyber-security-building-a-strong-knowledge-base","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/","title":{"rendered":"The Fundamentals of Cyber Security: Building a Strong Knowledge Base"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"80256\" class=\"elementor elementor-80256\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-918940b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"918940b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-440c82b\" data-id=\"440c82b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0419175 elementor-widget elementor-widget-text-editor\" data-id=\"0419175\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> October 31, 2023<br \/><strong>Time:<\/strong> 9:00 AM MDT| 10:00 AM CDT| 8:30 PM IST<br \/><strong>Topic:<\/strong> The Fundamentals of Cyber Security: Building a Strong knowledge Base<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> Amidst the rapid advancement of digital and information technologies, the digital presence of individuals and organizations has reached new heights. However, the growing dependence on digital technologies has also led to an onslaught from cyber criminals exploiting vulnerabilities for monetary gain or system compromise. As a result, the necessity for cyber security experts has grown exponentially. Aspiring IT professionals are increasingly pursuing careers in cyber security, emphasizing the high demand for career-focused education that imparts cyber <a href=\"https:\/\/www.eccu.edu\/blog\/cybersecurity\/fundamentals-of-information-security\/\" target=\"_blank\" rel=\"noopener\">security fundamentals.<\/a> Grasping these basics is the first step in defending against cyber threats. In an environment fraught with evolving cyber risks, these fundamentals provide a vital shield, fostering a safer digital realm. The current webinar aims to explain how a solid comprehension of security basics helps aspiring information security professionals build a robust knowledge base for their careers. This understanding is crucial in establishing resilient systems and ensuring sensitive information&#8217;s confidentiality, integrity, and availability.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>the importance of cyber security fundamentals<\/li><li>key cyber security concepts and terminologies<\/li><li>understanding threats and mitigations<\/li><li>understanding threats and mitigations<\/li><li>choosing the right career pathway<\/li><\/ul><p><strong>Speaker:<\/strong><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/juneheadshots-19-scaled.jpg.webp\" alt=\"Ricoh\" width=\"200\" \/><br \/><strong>Ricoh Danielson,<\/strong> CISO<br \/><strong>Bio:<\/strong> Ricoh Danielson has extensive experience in handling <a href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\/\">cyber incident response<\/a>, cyber security, information security, privacy, and compliance, and he has helped major retail, financial and health care organizations mitigate threats and risks. He is a digital forensics expert for criminal and civil cases and has handled cyber incidents for major world-renowned healthcare, financial, and retail firms. Ricoh is a graduate of the Thomas Jefferson School of Law, UCLA, and the University of Arizona. He is also a US Army combat veteran.<\/p><p><strong>Incident Response:<\/strong> 10 years of incident response for major new worthy breaches<br \/><strong>Digital Forensics:<\/strong> 15 years of digital forensics expertise for criminal and civil cases<br \/><strong>Legal:<\/strong> 15 years representing digital evidence in courts<br \/><strong>Media: <\/strong> 5 years as a cyber security media expert consultant<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/raYPPeHe66w\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: October 31, 2023Time: 9:00 AM MDT| 10:00 AM CDT| 8:30 PM ISTTopic: The Fundamentals of Cyber Security: Building a Strong knowledge Base Watch Now Abstract: Amidst the rapid advancement of digital and information technologies, the digital presence of individuals and organizations has reached new heights. However, the growing dependence on digital technologies has also&hellip;<\/p>\n","protected":false},"author":33,"featured_media":80258,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-80256","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Strengthening Your Cyber Security Fundamentals<\/title>\n<meta name=\"description\" content=\"Learn how a strong grasp of cyber security fundamentals can help you grow your information security career in this webinar.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Fundamentals of Cyber Security: Building a Strong Knowledge Base\" \/>\n<meta property=\"og:description\" content=\"Learn how a strong grasp of cyber security fundamentals can help you grow your information security career in this webinar.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-01T13:59:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-27T07:40:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Cybersecurity-Fundamentals-768x512-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"The Fundamentals of Cyber Security: Building a Strong Knowledge Base\",\"datePublished\":\"2023-11-01T13:59:27+00:00\",\"dateModified\":\"2026-01-27T07:40:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\\\/\"},\"wordCount\":358,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Cybersecurity-Fundamentals-768x512-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\\\/\",\"name\":\"Strengthening Your Cyber Security Fundamentals\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Cybersecurity-Fundamentals-768x512-1.jpg\",\"datePublished\":\"2023-11-01T13:59:27+00:00\",\"dateModified\":\"2026-01-27T07:40:48+00:00\",\"description\":\"Learn how a strong grasp of cyber security fundamentals can help you grow your information security career in this webinar.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Cybersecurity-Fundamentals-768x512-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Cybersecurity-Fundamentals-768x512-1.jpg\",\"width\":768,\"height\":512,\"caption\":\"Cybersecurity-Fundamentals\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The Fundamentals of Cyber Security: Building a Strong Knowledge Base\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Strengthening Your Cyber Security Fundamentals","description":"Learn how a strong grasp of cyber security fundamentals can help you grow your information security career in this webinar.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/","og_locale":"en_US","og_type":"article","og_title":"The Fundamentals of Cyber Security: Building a Strong Knowledge Base","og_description":"Learn how a strong grasp of cyber security fundamentals can help you grow your information security career in this webinar.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-11-01T13:59:27+00:00","article_modified_time":"2026-01-27T07:40:48+00:00","og_image":[{"width":768,"height":512,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Cybersecurity-Fundamentals-768x512-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"The Fundamentals of Cyber Security: Building a Strong Knowledge Base","datePublished":"2023-11-01T13:59:27+00:00","dateModified":"2026-01-27T07:40:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/"},"wordCount":358,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Cybersecurity-Fundamentals-768x512-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/","name":"Strengthening Your Cyber Security Fundamentals","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Cybersecurity-Fundamentals-768x512-1.jpg","datePublished":"2023-11-01T13:59:27+00:00","dateModified":"2026-01-27T07:40:48+00:00","description":"Learn how a strong grasp of cyber security fundamentals can help you grow your information security career in this webinar.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Cybersecurity-Fundamentals-768x512-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Cybersecurity-Fundamentals-768x512-1.jpg","width":768,"height":512,"caption":"Cybersecurity-Fundamentals"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-fundamentals-of-cyber-security-building-a-strong-knowledge-base\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"The Fundamentals of Cyber Security: Building a Strong Knowledge Base"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=80256"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80256\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80258"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=80256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=80256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=80256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}