{"id":82166,"date":"2024-08-09T14:15:00","date_gmt":"2024-08-09T14:15:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82166"},"modified":"2024-08-20T12:40:59","modified_gmt":"2024-08-20T12:40:59","slug":"ai-powered-threat-hunting-for-ethical-hacking","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/","title":{"rendered":"AI-Powered Threat Hunting for Ethical Hacking\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82166\" class=\"elementor elementor-82166\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b89334 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6b89334\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-101700a\" data-id=\"101700a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-99de6bc elementor-widget elementor-widget-text-editor\" data-id=\"99de6bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date: <\/strong>August 8, 2024<\/p>\n<p><strong>Time:<\/strong> 2:30 PM WEST | 9:30 AM EDT | 7:00 PM IST<br>\n<strong>Topic:<\/strong> AI-Powered Threat Hunting for Ethical Hacking<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong>&nbsp;<\/strong><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> In the rapidly evolving threat landscape, the traditional methods for detection and response to threats struggle in the face of sophisticated cyberattacks. Hence, security experts weigh the benefits of adopting AI-driven threat hunting and security intelligence for data protection. The first episode of this webinar series delves into understanding the cutting-edge capabilities of AI-powered threat hunting and the significance of advanced tools leveraging AI competencies for effective security operations. AI-powered threat-hunting tools enhance accuracy and enable proactive risk detection and faster responses. These tools, equipped with machine learning capabilities, not only automate ethical hacking tasks but also learn from existing data sets to identify potential vulnerabilities and threats. Join us as we explore the revolution of artificial intelligence and how security teams can protect their organizations with the help of AI.<\/span><\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Need for AI in threat hunting and ethical hacking,<\/li>\n<li>Role of AI and ML in improving threat detection and response,<\/li>\n<li>Benefits of leveraging AI in threat hunting and ethical hacking,<\/li>\n<li>Best practices for integrating AI tools into your security strategy.<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/06\/Sergey-Chubarov.png\" alt=\"Sergey Chubarov\" width=\"200\"><strong>Sergey Chubarov<\/strong>, Security Expert<\/p>\n<p><strong>Bio:<\/strong> Sergey Chubarov is a Security and Cloud Expert, and Instructor with more than 15 years of experience in Microsoft Technologies.\u202fHis day-to-day job is to help companies securely embrace cloud technologies. He has certifications and recognitions such as Microsoft MVP: Security, OSCP, OSEP, eCPPT, eCPTX, Microsoft Certified Trainer, MCT Regional Lead, EC-Council&#8217;s C|EH, C|PENT, L|PT, C|CSE, C|EI, CREST C|PSA, C|RT and more.\u202fSergey often speaks at local and international conferences like Global Azure, DEF CON, Black Hat Europe, Wild West Hackin&#8217; Fest, Security BSides, Workplace Ninja, Midwest Management Summit, Hack in the Box, etc.<\/p>\n<p>This is the first webinar of the C|EH webinar series with Sergey Chubarov.<\/p>\n<p>Stay tuned for the 17th September webinar, the next webinar of the series.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><\/p>\n<a name=\"attend\"><\/a>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/hF_g_eNuMbA?si=F6V7ioIfE-xxNU2_\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: August 8, 2024 Time: 2:30 PM WEST | 9:30 AM EDT | 7:00 PM IST Topic: AI-Powered Threat Hunting for Ethical Hacking Watch Now &nbsp;Abstract: In the rapidly evolving threat landscape, the traditional methods for detection and response to threats struggle in the face of sophisticated cyberattacks. Hence, security experts weigh the benefits of&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82167,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82166","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Leveraging AI for Threat Hunting \u202f<\/title>\n<meta name=\"description\" content=\"Explore the cutting-edge capabilities of AI-powered threat hunting and security intelligence in this webinar and strengthen your security strategy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI-Powered Threat Hunting for Ethical Hacking\u00a0\" \/>\n<meta property=\"og:description\" content=\"Explore the cutting-edge capabilities of AI-powered threat hunting and security intelligence in this webinar and strengthen your security strategy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-09T14:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-20T12:40:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-4-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1396\" \/>\n\t<meta property=\"og:image:height\" content=\"930\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-threat-hunting-for-ethical-hacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-threat-hunting-for-ethical-hacking\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"AI-Powered Threat Hunting for Ethical Hacking\u00a0\",\"datePublished\":\"2024-08-09T14:15:00+00:00\",\"dateModified\":\"2024-08-20T12:40:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-threat-hunting-for-ethical-hacking\\\/\"},\"wordCount\":354,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-threat-hunting-for-ethical-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/465-310-1-4-1.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-threat-hunting-for-ethical-hacking\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-threat-hunting-for-ethical-hacking\\\/\",\"name\":\"Leveraging AI for Threat Hunting \u202f\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-threat-hunting-for-ethical-hacking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-threat-hunting-for-ethical-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/465-310-1-4-1.png\",\"datePublished\":\"2024-08-09T14:15:00+00:00\",\"dateModified\":\"2024-08-20T12:40:59+00:00\",\"description\":\"Explore the cutting-edge capabilities of AI-powered threat hunting and security intelligence in this webinar and strengthen your security strategy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-threat-hunting-for-ethical-hacking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-threat-hunting-for-ethical-hacking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-threat-hunting-for-ethical-hacking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/465-310-1-4-1.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/465-310-1-4-1.png\",\"width\":1396,\"height\":930,\"caption\":\"AI-Powered Threat Hunting\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-threat-hunting-for-ethical-hacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"AI-Powered Threat Hunting for Ethical Hacking\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Leveraging AI for Threat Hunting \u202f","description":"Explore the cutting-edge capabilities of AI-powered threat hunting and security intelligence in this webinar and strengthen your security strategy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/","og_locale":"en_US","og_type":"article","og_title":"AI-Powered Threat Hunting for Ethical Hacking\u00a0","og_description":"Explore the cutting-edge capabilities of AI-powered threat hunting and security intelligence in this webinar and strengthen your security strategy.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-08-09T14:15:00+00:00","article_modified_time":"2024-08-20T12:40:59+00:00","og_image":[{"width":1396,"height":930,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-4-1.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"AI-Powered Threat Hunting for Ethical Hacking\u00a0","datePublished":"2024-08-09T14:15:00+00:00","dateModified":"2024-08-20T12:40:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/"},"wordCount":354,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-4-1.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/","name":"Leveraging AI for Threat Hunting \u202f","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-4-1.png","datePublished":"2024-08-09T14:15:00+00:00","dateModified":"2024-08-20T12:40:59+00:00","description":"Explore the cutting-edge capabilities of AI-powered threat hunting and security intelligence in this webinar and strengthen your security strategy.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-4-1.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-4-1.png","width":1396,"height":930,"caption":"AI-Powered Threat Hunting"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-threat-hunting-for-ethical-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"AI-Powered Threat Hunting for Ethical Hacking\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82166"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82166\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82167"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}