{"id":81508,"date":"2024-04-01T05:43:51","date_gmt":"2024-04-01T05:43:51","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81508"},"modified":"2024-04-04T10:36:28","modified_gmt":"2024-04-04T10:36:28","slug":"navigating-cyber-leadership-practical-learning","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/","title":{"rendered":"Empowering Tomorrow&#8217;s Cybersecurity Leaders: The Role of Practical Learning"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81508\" class=\"elementor elementor-81508\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e6423c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e6423c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-85c3202\" data-id=\"85c3202\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0ca97d2 elementor-widget elementor-widget-text-editor\" data-id=\"0ca97d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> March 28, 2024<br \/><strong>Time:<\/strong> 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST<br \/><strong>Topic:<\/strong> Empowering Tomorrow&#8217;s Cybersecurity Leaders: The Role of Practical Learning<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> Cybersecurity constantly evolves in the digital era, presenting complex security challenges and corresponding demand for skilled security professionals. The barrier to entering IT security is formidable, requiring timely responses to mitigate complex cyber threats targeting organizational infrastructure. Cybersecurity practitioners and aspirants must prioritize the cultivation of problem-solving, critical thinking, and collaboration skills alongside technical expertise. This highlights the crucial importance of integrating technical knowledge with practical experience, where hands-on learning becomes instrumental in preparing individuals to navigate the dynamic realm of cybersecurity effectively.<br \/>The webinar explores the significance of practical learning in grooming the next generation of cybersecurity leaders. It delves into how practical learning bridges the gap between academic knowledge and real-world application. The session offers participants an insight into the dynamic nature of cybersecurity threats and solutions through case studies, interactive simulations, and immersive exercises. This webinar further empowers attendees to embrace practical learning as a key element of their cybersecurity education and career advancement. It equips them with the tools and effective approaches to lead in safeguarding digital environments.<\/p><p>Key Takeaways:<br \/>\u2022 Essential skills for starting a career in cybersecurity<br \/>\u2022 Importance of hands-on learning for cultivating cybersecurity skills<br \/>\u2022 Mode to engaging in real-world scenarios for threat mitigation<br \/>\u2022 Strategies for integrating practical learning into cybersecurity education<\/p><p><strong>Speaker:<\/strong><\/p><p><strong><img decoding=\"async\" class=\" wp-image-81977 alignleft\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/Jacob-hal-1-4-225x300.png\" alt=\"\" width=\"152\" height=\"203\" \/><\/strong><br \/><strong>Jacob Hall,<\/strong> Cybersecurity Major, University of North Texas<\/p><p><strong>Bio:<\/strong> Jacob Hall is a senior at the University of North Texas, soon to graduate with a Bachelor of Science in Cybersecurity. He also interned in Fidelity\u2019s Security Operations Center during the summer of 2023, where he helped streamline the utilization of a memory acquisition tool for security investigations through automation. Jacob also gained exposure to Incident Response, Threat Detection, and Threat Hunting during his time in the SOC. He is an EC-Council Certified Cybersecurity Technician and ISC2 Certified in Cybersecurity. After graduating from UNT, Jacob will assume a position in Fidelity Investment\u2019s Systems Engineering LEAP Program before being assigned a permanent role at Fidelity.<br \/><br \/><\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/HB4OqD4JFjo?si=PUJ0Yzyn6794rniy\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: March 28, 2024Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM ISTTopic: Empowering Tomorrow&#8217;s Cybersecurity Leaders: The Role of Practical Learning Watch Now Abstract: Cybersecurity constantly evolves in the digital era, presenting complex security challenges and corresponding demand for skilled security professionals. The barrier to entering IT security is formidable, requiring timely&hellip;<\/p>\n","protected":false},"author":77,"featured_media":81509,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-81508","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Navigating Cyber Leadership through Practical Learning<\/title>\n<meta name=\"description\" content=\"Develop your cybersecurity leadership abilities with hands-on learning. Gain an understanding that successfully connects theory to real-world challenges.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Empowering Tomorrow&#039;s Cybersecurity Leaders: The Role of Practical Learning\" \/>\n<meta property=\"og:description\" content=\"Develop your cybersecurity leadership abilities with hands-on learning. Gain an understanding that successfully connects theory to real-world challenges.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-01T05:43:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-04T10:36:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-cyber-leadership-practical-learning\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-cyber-leadership-practical-learning\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\"},\"headline\":\"Empowering Tomorrow&#8217;s Cybersecurity Leaders: The Role of Practical Learning\",\"datePublished\":\"2024-04-01T05:43:51+00:00\",\"dateModified\":\"2024-04-04T10:36:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-cyber-leadership-practical-learning\\\/\"},\"wordCount\":376,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-cyber-leadership-practical-learning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-cyber-leadership-practical-learning\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-cyber-leadership-practical-learning\\\/\",\"name\":\"Navigating Cyber Leadership through Practical Learning\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-cyber-leadership-practical-learning\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-cyber-leadership-practical-learning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2-1.jpg\",\"datePublished\":\"2024-04-01T05:43:51+00:00\",\"dateModified\":\"2024-04-04T10:36:28+00:00\",\"description\":\"Develop your cybersecurity leadership abilities with hands-on learning. Gain an understanding that successfully connects theory to real-world challenges.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-cyber-leadership-practical-learning\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-cyber-leadership-practical-learning\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-cyber-leadership-practical-learning\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2-1.jpg\",\"width\":1938,\"height\":1292,\"caption\":\"Cyber Leadership through Practical Learning\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-cyber-leadership-practical-learning\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Empowering Tomorrow&#8217;s Cybersecurity Leaders: The Role of Practical Learning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Navigating Cyber Leadership through Practical Learning","description":"Develop your cybersecurity leadership abilities with hands-on learning. Gain an understanding that successfully connects theory to real-world challenges.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/","og_locale":"en_US","og_type":"article","og_title":"Empowering Tomorrow's Cybersecurity Leaders: The Role of Practical Learning","og_description":"Develop your cybersecurity leadership abilities with hands-on learning. Gain an understanding that successfully connects theory to real-world challenges.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-04-01T05:43:51+00:00","article_modified_time":"2024-04-04T10:36:28+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f"},"headline":"Empowering Tomorrow&#8217;s Cybersecurity Leaders: The Role of Practical Learning","datePublished":"2024-04-01T05:43:51+00:00","dateModified":"2024-04-04T10:36:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/"},"wordCount":376,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/","name":"Navigating Cyber Leadership through Practical Learning","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-1.jpg","datePublished":"2024-04-01T05:43:51+00:00","dateModified":"2024-04-04T10:36:28+00:00","description":"Develop your cybersecurity leadership abilities with hands-on learning. Gain an understanding that successfully connects theory to real-world challenges.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-1.jpg","width":1938,"height":1292,"caption":"Cyber Leadership through Practical Learning"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-cyber-leadership-practical-learning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Empowering Tomorrow&#8217;s Cybersecurity Leaders: The Role of Practical Learning"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81508"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81508\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81509"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}