{"id":80376,"date":"2023-11-06T04:30:39","date_gmt":"2023-11-06T04:30:39","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=80376"},"modified":"2025-09-04T14:25:35","modified_gmt":"2025-09-04T14:25:35","slug":"digital-forensics-best-practices","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/","title":{"rendered":"Digital Forensics Best Practices: From Data Acquisition to Analysis"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"80376\" class=\"elementor elementor-80376\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-327c917 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"327c917\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e15d958\" data-id=\"e15d958\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a195f32 elementor-widget elementor-widget-text-editor\" data-id=\"a195f32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> November 3, 2023<br \/><strong>Time:<\/strong> 9:30 AM EDT | 2:30 PM CET | 7:00 PM IST<br \/><strong>Topic:<\/strong> Digital Forensics Best Practices: From Data Acquisition to Analysis<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><br \/><strong>Abstract:<\/strong> Best practices in digital forensics encompass a meticulous process from data acquisition to analysis. Identifying, collecting, and analyzing appropriate data lies at the core of digital forensic analysis, which outlines the evidence of the cyber crime and digital incidents. It requires advanced skills, technologies, and protocols to extract and examine data, while ensuring the preservation of digital evidence&#8217;s integrity. A holistic approach that examines not only files but other components of the device or network to uncover hidden clues is required by the forensic examiner. The current webinar provides a comprehensive overview of the essential principles and techniques to conduct successful digital investigations. The webinar will delve into the entire <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/what-is-digital-forensics\/\">digital forensics<\/a> process, from data acquisition to analysis, emphasizing the critical role of preserving data integrity. Participants will gain insights into the latest tools and methodologies for collecting and examining digital evidence, focusing on real-world applications.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>the importance of digital forensics<\/li><li>best practices for acquiring digital evidence<\/li><li>the framework and TTPs necessary for maintaining data integrity<\/li><li>exploring advanced analysis techniques<\/li><li>understanding legal and ethical considerations<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/staging.eccu.edu\/wp-content\/uploads\/2023\/10\/Dr.Luis_.jpg\" alt=\"VINOD-BABU\" width=\"200\" \/><strong>Dr. Luis O. Noguerol<\/strong> Information System Security Officer, US Department of Commerce, NOAA Fisheries<\/p><p><strong>Bio:<\/strong> Dr. Luis O. Noguerol is the Information System Security Officer (ISSO) for the US Department of Commerce, NOAA, where he oversees the cybersecurity operation for six states in the Southeast Region. Dr. Noguerol is also the President &amp; CEO of the Advanced Division of Informatics and Technology, Inc. (ADITusa, Inc.), a company that focuses on data recovery, digital forensics, and penetration. He is a world-renowned expert in data recovery, digital forensics, and penetration testing.<\/p><p>Dr. Noguerol holds multiple globally recognized information technology and <a href=\"https:\/\/www.eccouncil.org\/train-certify\/\" target=\"_blank\" rel=\"noopener\">cybersecurity certifications<\/a> and accreditations and is the recipient of multiple awards in technology, cybersecurity, and mathematics. He currently serves pro-bono as an editorial board member\/reviewer of the American Journal of Information Science and Technology and is a member of the prestigious High Technology Crime Investigation Association. Since 2003, Dr. Luis O. Noguerol has served as an adjunct professor for undergraduate and graduate programs at multiple universities in the US and as a reviewer for the doctoral program at the University of Karachi in Pakistan. He is the author of multiple cybersecurity publications and articles, including &#8220;Cybersecurity Issues in Blockchain: Challenges and Possible Solutions,&#8221; and he is one of the co-authors and reviewers of the worldwide acclaimed book Intrusion Detection Guide.<\/p><p>Prior to obtaining his doctoral degree in Information Systems and Technologies from the University of Phoenix, Dr. Noguerol earned a Bachelor in Sciences in Radiotechnical and<\/p><p>Electronic Engineering, a Bachelor in Science in Telecommunications and Networking, and a Master in Science in Mathematics and Computer Sciences.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/zeuTo0eFLts\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: November 3, 2023Time: 9:30 AM EDT | 2:30 PM CET | 7:00 PM ISTTopic: Digital Forensics Best Practices: From Data Acquisition to Analysis Watch NowAbstract: Best practices in digital forensics encompass a meticulous process from data acquisition to analysis. Identifying, collecting, and analyzing appropriate data lies at the core of digital forensic analysis, which&hellip;<\/p>\n","protected":false},"author":32,"featured_media":80377,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-80376","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Most Effective Techniques in Digital Forensics<\/title>\n<meta name=\"description\" content=\"Learn the fundamentals of digital forensics, get an understanding of the complete digital forensics process, become acquainted with cutting-edge tools and approaches, and much more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Forensics Best Practices: From Data Acquisition to Analysis\" \/>\n<meta property=\"og:description\" content=\"Learn the fundamentals of digital forensics, get an understanding of the complete digital forensics process, become acquainted with cutting-edge tools and approaches, and much more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-06T04:30:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-04T14:25:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/Digital-Forensics-Best-Practices.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/digital-forensics-best-practices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/digital-forensics-best-practices\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Digital Forensics Best Practices: From Data Acquisition to Analysis\",\"datePublished\":\"2023-11-06T04:30:39+00:00\",\"dateModified\":\"2025-09-04T14:25:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/digital-forensics-best-practices\\\/\"},\"wordCount\":495,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/digital-forensics-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Digital-Forensics-Best-Practices.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/digital-forensics-best-practices\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/digital-forensics-best-practices\\\/\",\"name\":\"The Most Effective Techniques in Digital Forensics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/digital-forensics-best-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/digital-forensics-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Digital-Forensics-Best-Practices.jpg\",\"datePublished\":\"2023-11-06T04:30:39+00:00\",\"dateModified\":\"2025-09-04T14:25:35+00:00\",\"description\":\"Learn the fundamentals of digital forensics, get an understanding of the complete digital forensics process, become acquainted with cutting-edge tools and approaches, and much more!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/digital-forensics-best-practices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/digital-forensics-best-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/digital-forensics-best-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Digital-Forensics-Best-Practices.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Digital-Forensics-Best-Practices.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/digital-forensics-best-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Digital Forensics Best Practices: From Data Acquisition to Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Most Effective Techniques in Digital Forensics","description":"Learn the fundamentals of digital forensics, get an understanding of the complete digital forensics process, become acquainted with cutting-edge tools and approaches, and much more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"Digital Forensics Best Practices: From Data Acquisition to Analysis","og_description":"Learn the fundamentals of digital forensics, get an understanding of the complete digital forensics process, become acquainted with cutting-edge tools and approaches, and much more!","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-11-06T04:30:39+00:00","article_modified_time":"2025-09-04T14:25:35+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/Digital-Forensics-Best-Practices.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Digital Forensics Best Practices: From Data Acquisition to Analysis","datePublished":"2023-11-06T04:30:39+00:00","dateModified":"2025-09-04T14:25:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/"},"wordCount":495,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/Digital-Forensics-Best-Practices.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/","name":"The Most Effective Techniques in Digital Forensics","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/Digital-Forensics-Best-Practices.jpg","datePublished":"2023-11-06T04:30:39+00:00","dateModified":"2025-09-04T14:25:35+00:00","description":"Learn the fundamentals of digital forensics, get an understanding of the complete digital forensics process, become acquainted with cutting-edge tools and approaches, and much more!","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/Digital-Forensics-Best-Practices.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/Digital-Forensics-Best-Practices.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/digital-forensics-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Digital Forensics Best Practices: From Data Acquisition to Analysis"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=80376"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80376\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80377"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=80376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=80376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=80376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}