{"id":81803,"date":"2024-04-03T05:51:00","date_gmt":"2024-04-03T05:51:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81803"},"modified":"2024-04-22T04:07:36","modified_gmt":"2024-04-22T04:07:36","slug":"navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/","title":{"rendered":"Navigating the Cybersecurity Landscape: Unlocking Basics for Beginners\u00a0\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81803\" class=\"elementor elementor-81803\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-85d4044 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"85d4044\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b01b3de\" data-id=\"b01b3de\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee11bc5 elementor-widget elementor-widget-text-editor\" data-id=\"ee11bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> April 16, 2024<br \/><strong>Time:<\/strong> 2:30 PM BST | 9:30 AM EDT | 7:00 PM IST<br \/><strong>Topic:<\/strong> Navigating the Cybersecurity Landscape: Unlocking Basics for Beginners<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> In today&#8217;s digital landscape, cybersecurity has become paramount. With the rise in the quality and quantity of cyber threats, the traditional approach for the active and passive defense of an organization&#8217;s networks and assets tends to fall short, making the need for offensive and proactive security eminent. Advanced security approaches, such as ethical hacking, penetration testing, threat intelligence, etc., have become a crucial aspect of cybersecurity in order to identify vulnerabilities in systems and networks before malicious hackers exploit them. The current webinar aims to understand the need for cybersecurity and how beginners interested in exploring this field can create a lucrative career out of it. Along with ethical considerations, tools, and tactics, the webinar also sheds light on learning paths that help beginners pursue their career journey in cybersecurity. Whether you&#8217;re a student considering a career in cybersecurity or a professional looking to expand your skillset and transition into this field, this webinar will provide you with foundational knowledge and practical insights to get started.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Understanding the need for proactive security<\/li><li>Introduction to security domains and technologies<\/li><li>Building your cybersecurity skills<\/li><li>Taking the first step toward a career in cybersecurity<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Adam-Jones-scaled.jpeg\" alt=\"Adam Jones\" width=\"200\" \/><strong>Adam Jones<\/strong>, Freelance Ethical Hacker<\/p><p><strong>Bio:<\/strong> Adam Jones is a freelance ethical hacker, cybersecurity educator, and web developer with 7+ years of experience. He focuses mostly on penetration testing of online assets, especially web apps, and holds the EC-Council Certified Cybersecurity Technician (C|CT) qualification.<\/p><p>Adam creates infosec video content, including walkthroughs for vulnerable labs and CTF (capture the flag) exercises, under the online handle z3nsh3ll. As a professional full-stack web developer, he has a strong understanding of core web technologies, including PHP and JavaScript.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/VDgYB9ufyAU?si=Gfi1u99YqqA9RVtP\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: April 16, 2024Time: 2:30 PM BST | 9:30 AM EDT | 7:00 PM ISTTopic: Navigating the Cybersecurity Landscape: Unlocking Basics for Beginners Watch Now Abstract: In today&#8217;s digital landscape, cybersecurity has become paramount. With the rise in the quality and quantity of cyber threats, the traditional approach for the active and passive defense of&hellip;<\/p>\n","protected":false},"author":32,"featured_media":81805,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-81803","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Getting Started with Cybersecurity: A Guide for Beginners<\/title>\n<meta name=\"description\" content=\"Explore the fundamentals of cybersecurity, covering essential concepts, tools, and career paths, in this webinar\u2014ideal for students and professionals looking to transition. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating the Cybersecurity Landscape: Unlocking Basics for Beginners\u00a0\u00a0\" \/>\n<meta property=\"og:description\" content=\"Explore the fundamentals of cybersecurity, covering essential concepts, tools, and career paths, in this webinar\u2014ideal for students and professionals looking to transition. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-03T05:51:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T04:07:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Cybersecurity-Guide-for-Beginners.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1943\" \/>\n\t<meta property=\"og:image:height\" content=\"1295\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Navigating the Cybersecurity Landscape: Unlocking Basics for Beginners\u00a0\u00a0\",\"datePublished\":\"2024-04-03T05:51:00+00:00\",\"dateModified\":\"2024-04-22T04:07:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\\\/\"},\"wordCount\":333,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Cybersecurity-Guide-for-Beginners.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\\\/\",\"name\":\"Getting Started with Cybersecurity: A Guide for Beginners\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Cybersecurity-Guide-for-Beginners.jpg\",\"datePublished\":\"2024-04-03T05:51:00+00:00\",\"dateModified\":\"2024-04-22T04:07:36+00:00\",\"description\":\"Explore the fundamentals of cybersecurity, covering essential concepts, tools, and career paths, in this webinar\u2014ideal for students and professionals looking to transition. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Cybersecurity-Guide-for-Beginners.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Cybersecurity-Guide-for-Beginners.jpg\",\"width\":1943,\"height\":1295},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Navigating the Cybersecurity Landscape: Unlocking Basics for Beginners\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Getting Started with Cybersecurity: A Guide for Beginners","description":"Explore the fundamentals of cybersecurity, covering essential concepts, tools, and career paths, in this webinar\u2014ideal for students and professionals looking to transition. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/","og_locale":"en_US","og_type":"article","og_title":"Navigating the Cybersecurity Landscape: Unlocking Basics for Beginners\u00a0\u00a0","og_description":"Explore the fundamentals of cybersecurity, covering essential concepts, tools, and career paths, in this webinar\u2014ideal for students and professionals looking to transition. Learn more.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-04-03T05:51:00+00:00","article_modified_time":"2024-04-22T04:07:36+00:00","og_image":[{"width":1943,"height":1295,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Cybersecurity-Guide-for-Beginners.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Navigating the Cybersecurity Landscape: Unlocking Basics for Beginners\u00a0\u00a0","datePublished":"2024-04-03T05:51:00+00:00","dateModified":"2024-04-22T04:07:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/"},"wordCount":333,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Cybersecurity-Guide-for-Beginners.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/","name":"Getting Started with Cybersecurity: A Guide for Beginners","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Cybersecurity-Guide-for-Beginners.jpg","datePublished":"2024-04-03T05:51:00+00:00","dateModified":"2024-04-22T04:07:36+00:00","description":"Explore the fundamentals of cybersecurity, covering essential concepts, tools, and career paths, in this webinar\u2014ideal for students and professionals looking to transition. Learn more.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Cybersecurity-Guide-for-Beginners.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Cybersecurity-Guide-for-Beginners.jpg","width":1943,"height":1295},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-the-cybersecurity-landscape-unlocking-basics-for-beginners\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Navigating the Cybersecurity Landscape: Unlocking Basics for Beginners\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81803"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81803\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81805"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}