{"id":83816,"date":"2025-11-21T14:00:00","date_gmt":"2025-11-21T14:00:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83816"},"modified":"2026-02-24T13:31:53","modified_gmt":"2026-02-24T13:31:53","slug":"zero-trust-by-design-a-walkthrough-of-ztnas-technical-components","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/","title":{"rendered":"Zero Trust by Design: A Walkthrough of ZTNA\u2019s Technical Components\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83816\" class=\"elementor elementor-83816\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d18a62f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d18a62f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-da05a21\" data-id=\"da05a21\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-48702e3 elementor-widget elementor-widget-text-editor\" data-id=\"48702e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: November 21, 2025<\/div>\n<div><strong>Time<\/strong>: 7:30 AM CST | 8:30 AM EST | 7:00 PM IST<\/div>\n<div>\n<p><strong>Topic: <\/strong> Zero Trust by Design: A Walkthrough of ZTNA\u2019s Technical Components<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p>\n<p><strong>Abstract: <\/strong> True Zero Trust security begins with thoughtful design and precise implementation. As part of our series on ZTNA enables cybersecurity, the current webinar delivers a deep technical walkthrough of ZTNA\u2019s core components, offering practical insight into how Zero Trust functions at the protocol, policy, and platform levels. The webinar covers the trust evaluation lifecycle, real-time decision-making mechanisms, and the interconnectivity between user identity, endpoint posture, and application sensitivity. Join us to gain insight into operational depth of ZTNA architecture.<\/p>\n<p><strong>Key Takeaways:\u00a0<\/strong><\/p>\n<ul>\n<li>Recap of ZTNA\u2019s core technical components.<\/li>\n<li>Leveraging behavioural analytics and risk scoring in real time.<\/li>\n<li>How Zero Trust differs in enforcement at different layers of OSI.<\/li>\n<li>Understanding how trust decisions are made, monitored, and adjusted continuously.<\/li>\n<li>Insights into integrating ZTNA with identity governance and continuous authentication.<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Tejas-Shroff.jpg.webp\" width=\"192\" height=\"256\" \/><strong> Tejas Shroff,<\/strong> Senior Director of Managed Security Services, NTT DATA<\/p>\n<p><strong>Bio:\u00a0<\/strong> \u202fTejas Shroff is the Senior Director of Managed Security Services at NTT DATA, where he leads the identity and access management practice. He is also an adjunct professor at the University of Texas at Dallas (UTD), where he teaches various cybersecurity courses to graduate students at the Jindal School of Management. Tejas is a board member of the FBI-affiliated non-profit InfraGard National,\u202fserves\u202fon the advisory board for Collin College\u2019s cybersecurity program, and mentors the UTD Cybersecurity Club.\u202f<\/p>\n<\/div>\n<div id=\"attend\">\u00a0<\/div>\n<iframe width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/QJlpfjfJYDY?si=wI_zQ7yXxUzey9Tz\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: November 21, 2025 Time: 7:30 AM CST | 8:30 AM EST | 7:00 PM IST Topic: Zero Trust by Design: A Walkthrough of ZTNA\u2019s Technical Components Watch Now Abstract: True Zero Trust security begins with thoughtful design and precise implementation. As part of our series on ZTNA enables cybersecurity, the current webinar delivers a&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83880,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83816","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Zero Trust by Design: ZTNA Technical Deep Dive<\/title>\n<meta name=\"description\" content=\"Explore Zero Trust by Design with a technical walkthrough of ZTNA components, architecture, and best practices to protect users, devices, and data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust by Design: A Walkthrough of ZTNA\u2019s Technical Components\u00a0\" \/>\n<meta property=\"og:description\" content=\"Explore Zero Trust by Design with a technical walkthrough of ZTNA components, architecture, and best practices to protect users, devices, and data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-21T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-24T13:31:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/14-Nov_465x310-Without-RN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Zero Trust by Design: A Walkthrough of ZTNA\u2019s Technical Components\u00a0\",\"datePublished\":\"2025-11-21T14:00:00+00:00\",\"dateModified\":\"2026-02-24T13:31:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\\\/\"},\"wordCount\":255,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/14-Nov_465x310-Without-RN.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\\\/\",\"name\":\"Zero Trust by Design: ZTNA Technical Deep Dive\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/14-Nov_465x310-Without-RN.jpg\",\"datePublished\":\"2025-11-21T14:00:00+00:00\",\"dateModified\":\"2026-02-24T13:31:53+00:00\",\"description\":\"Explore Zero Trust by Design with a technical walkthrough of ZTNA components, architecture, and best practices to protect users, devices, and data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/14-Nov_465x310-Without-RN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/14-Nov_465x310-Without-RN.jpg\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Zero Trust by Design: A Walkthrough of ZTNA\u2019s Technical Components\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zero Trust by Design: ZTNA Technical Deep Dive","description":"Explore Zero Trust by Design with a technical walkthrough of ZTNA components, architecture, and best practices to protect users, devices, and data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust by Design: A Walkthrough of ZTNA\u2019s Technical Components\u00a0","og_description":"Explore Zero Trust by Design with a technical walkthrough of ZTNA components, architecture, and best practices to protect users, devices, and data.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-11-21T14:00:00+00:00","article_modified_time":"2026-02-24T13:31:53+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/14-Nov_465x310-Without-RN.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Zero Trust by Design: A Walkthrough of ZTNA\u2019s Technical Components\u00a0","datePublished":"2025-11-21T14:00:00+00:00","dateModified":"2026-02-24T13:31:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/"},"wordCount":255,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/14-Nov_465x310-Without-RN.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/","name":"Zero Trust by Design: ZTNA Technical Deep Dive","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/14-Nov_465x310-Without-RN.jpg","datePublished":"2025-11-21T14:00:00+00:00","dateModified":"2026-02-24T13:31:53+00:00","description":"Explore Zero Trust by Design with a technical walkthrough of ZTNA components, architecture, and best practices to protect users, devices, and data.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/14-Nov_465x310-Without-RN.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/14-Nov_465x310-Without-RN.jpg","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/zero-trust-by-design-a-walkthrough-of-ztnas-technical-components\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Zero Trust by Design: A Walkthrough of ZTNA\u2019s Technical Components\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83816"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83816\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83880"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}