{"id":82471,"date":"2024-11-21T12:33:00","date_gmt":"2024-11-21T12:33:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82471"},"modified":"2025-09-04T17:36:47","modified_gmt":"2025-09-04T17:36:47","slug":"cloud-forensics-investigations-a-practical-guide-to-digital-forensics","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/","title":{"rendered":"Cloud Forensics Investigations: A Practical Guide to Digital Forensics\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82471\" class=\"elementor elementor-82471\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-acb9db7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"acb9db7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3949195\" data-id=\"3949195\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1dd5df1 elementor-widget elementor-widget-text-editor\" data-id=\"1dd5df1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date: <\/strong>November 21, 2024<br \/><strong>Time:<\/strong> 8:30 AM EST | 7:30 AM CST | 7:00 PM IST<br \/><strong>Topic:<\/strong> Cloud Forensics Investigations: A Practical Guide to Digital Forensics<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p><p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> As organizations continue migrating their operations to the cloud, it has become crucial for security teams to understand the forensic investigation process in these environments. Unlike traditional forensics, the forensics of cloud environments differs significantly, making traditional tools and techniques insufficient for the process. Due to the distributed nature of the cloud data in terms of geolocation, the scope and approach to extraction is significantly impacted. Forensic investigation for cloud infrastructure is also unique in aspects such as shared responsibility, dynamic scaling, etc., further complicating the approach. This webinar aims to address forensic challenges associated with the cloud environment and explore aspects such as necessary tools and tactics for identifying, collecting, analyzing, and preserving evidence in compliance with legal and regulatory requirements unique to a cloud environment. Attendees will gain insights on conducting forensic investigations in the cloud, ensuring data integrity and effective incident response.<\/span><\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Understanding the fundamentals of cloud forensics<\/li><li>Understanding SLAs for cloud forensics<\/li><li>Best practices for investigating in IaaS, PaaS, and SaaS environments<\/li><li>Practical guidance on gathering volatile data and logs from cloud assets<\/li><li>Need for collaboration with CSPs for forensic investigations<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/Bennie-Cleveland.jpg\" alt=\" bennie=\" width=\"200\" \/><strong>Bennie L. Cleveland Jr.<\/strong>, AVP, Cyber Incident Management<\/p><p><strong>Bio:<\/strong> Bennie L. Cleveland Jr. is a distinguished cybersecurity leader with over two decades of experience in cyber incident management, enterprise security, and risk management. Holding certifications such as the C|HFI, C|CISO, CISM, CISA, CRISC, and CIPM, Bennie has demonstrated exemplary leadership in incident response, forensics, and threat intelligence. His strategic oversight ensures robust compliance and comprehensive security measures.\u202fCurrently serving as AVP of Cyber Incident Management at Chubb, he specializes in identifying high-risk vulnerabilities and mitigating ransomware. Bennie has a proven track record of accelerating incident resolution and enhancing business continuity. He is also a cybersecurity adjunct at Valley Forge Military Academy &amp; College, where he teaches <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/what-is-digital-forensics\/\">digital forensics<\/a>.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/c3RReMlo7Jc?si=muuJ35co49ENGigp\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: November 21, 2024Time: 8:30 AM EST | 7:30 AM CST | 7:00 PM ISTTopic: Cloud Forensics Investigations: A Practical Guide to Digital Forensics Watch Now Abstract: As organizations continue migrating their operations to the cloud, it has become crucial for security teams to understand the forensic investigation process in these environments. Unlike traditional forensics,&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82472,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82471","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A Hands-On Approach to Cloud Digital Forensics<\/title>\n<meta name=\"description\" content=\"Explore essential cloud forensics techniques in this expert-led webinar, equipping security teams with skills to investigate, analyze, and preserve cloud-based evidence effectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Forensics Investigations: A Practical Guide to Digital Forensics\u00a0\" \/>\n<meta property=\"og:description\" content=\"Explore essential cloud forensics techniques in this expert-led webinar, equipping security teams with skills to investigate, analyze, and preserve cloud-based evidence effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-21T12:33:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-04T17:36:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-31.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1396\" \/>\n\t<meta property=\"og:image:height\" content=\"930\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"Cloud Forensics Investigations: A Practical Guide to Digital Forensics\u00a0\",\"datePublished\":\"2024-11-21T12:33:00+00:00\",\"dateModified\":\"2025-09-04T17:36:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\\\/\"},\"wordCount\":360,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/465-310-1-31.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\\\/\",\"name\":\"A Hands-On Approach to Cloud Digital Forensics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/465-310-1-31.png\",\"datePublished\":\"2024-11-21T12:33:00+00:00\",\"dateModified\":\"2025-09-04T17:36:47+00:00\",\"description\":\"Explore essential cloud forensics techniques in this expert-led webinar, equipping security teams with skills to investigate, analyze, and preserve cloud-based evidence effectively.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/465-310-1-31.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/465-310-1-31.png\",\"width\":1396,\"height\":930},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cloud Forensics Investigations: A Practical Guide to Digital Forensics\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Hands-On Approach to Cloud Digital Forensics","description":"Explore essential cloud forensics techniques in this expert-led webinar, equipping security teams with skills to investigate, analyze, and preserve cloud-based evidence effectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Forensics Investigations: A Practical Guide to Digital Forensics\u00a0","og_description":"Explore essential cloud forensics techniques in this expert-led webinar, equipping security teams with skills to investigate, analyze, and preserve cloud-based evidence effectively.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-11-21T12:33:00+00:00","article_modified_time":"2025-09-04T17:36:47+00:00","og_image":[{"width":1396,"height":930,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-31.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"Cloud Forensics Investigations: A Practical Guide to Digital Forensics\u00a0","datePublished":"2024-11-21T12:33:00+00:00","dateModified":"2025-09-04T17:36:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/"},"wordCount":360,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-31.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/","name":"A Hands-On Approach to Cloud Digital Forensics","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-31.png","datePublished":"2024-11-21T12:33:00+00:00","dateModified":"2025-09-04T17:36:47+00:00","description":"Explore essential cloud forensics techniques in this expert-led webinar, equipping security teams with skills to investigate, analyze, and preserve cloud-based evidence effectively.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-31.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-31.png","width":1396,"height":930},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-forensics-investigations-a-practical-guide-to-digital-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Cloud Forensics Investigations: A Practical Guide to Digital Forensics\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82471"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82471\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82472"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}