{"id":84870,"date":"2026-01-21T09:52:13","date_gmt":"2026-01-21T09:52:13","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=84870"},"modified":"2026-04-07T07:06:12","modified_gmt":"2026-04-07T07:06:12","slug":"the-power-of-osint-intelligence-from-publicly-available-data","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/","title":{"rendered":"The Power of OSINT: Intelligence from Publicly Available Data"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84870\" class=\"elementor elementor-84870\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-826ef4e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"826ef4e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ec99dc7\" data-id=\"ec99dc7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f00d1fe elementor-widget elementor-widget-text-editor\" data-id=\"f00d1fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: April 23, 2026<\/div>\n<div><strong>Time<\/strong>: 2:30 PM WEST | 9:30 AM EDT | 7:00 PM IST<\/div>\n<div>\n<p><strong>Topic: <\/strong> The Power of OSINT: Intelligence from Publicly Available Data<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"https:\/\/attendee.gotowebinar.com\/register\/2117570788416353629?source=ECC+webpage\" target=\"_blank\" rel=\"noopener\">Register Now<\/a><\/p>\n<p><strong>Abstract: <\/strong> In today\u2019s digitally connected world, vast amounts of information are openly accessible, often more than individuals and organizations realize. From social media activity and leaked credentials to exposed IoT devices and public databases, open-source intelligence (OSINT) has become a powerful capability for both security professionals and threat actors.<\/p>\n<p>This webinar provides a comprehensive introduction to OSINT and demonstrates how publicly available data can be systematically collected, analyzed, and operationalized. It explores how unintentional information sharing, such as vacation photos, metadata, or background details in images, can expose sensitive personal and organizational data. It also examines practical OSINT techniques, including advanced search techniques (Google Dorking), social media intelligence gathering, breach data analysis, and the use of specialized platforms such as Shodan and WiGLE.<\/p>\n<p>The session also demonstrates defensive strategies, including privacy hardening, secure research practices, and the safe use of anonymous research identities (\u201csock puppets\u201d) for investigative activities. Attendees also gain insights into the power and risks of OSINT and how to responsibly leverage it while protecting their digital footprints.<br>\n<strong>Key Takeaways:&nbsp;<\/strong><\/p>\n<ul>\n<li>Understanding how unintentional information sharing can be transformed into exploitable intelligence<\/li>\n<li>Applying practical OSINT techniques, including advanced web search techniques and social media analysis<\/li>\n<li>Using platforms such as Shodan to identify exposed IoT assets<\/li>\n<li>Mapping wireless network exposure through tools such as WiGLE<\/li>\n<li>Assessing the security impact of data breaches and credential leaks<\/li>\n<li>Protecting personal and organizational digital footprints<\/li>\n<li>Adopting safe investigative practices, including the use of anonymous research identities<\/li>\n<li>Identifying key resources, tools, and learning paths for developing OSINT expertise<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"https:\/\/eccweb.s3.ap-south-1.amazonaws.com\/wp-content\/uploads\/2026\/03\/31123235\/Pedro.jpeg\" width=\"192\" height=\"256\"><strong> Pedro Vieira,<\/strong> Cyber Security Engineer<\/p>\n<p><strong>Bio:&nbsp;<\/strong> Pedro is an experienced security researcher with broad expertise across multiple cybersecurity disciplines, including OSINT, vulnerability management, and penetration testing, as well as software development. He is passionate about raising awareness of cybersecurity best practices and empowering individuals and organizations to proactively defend against evolving digital threats. In his free time, Pedro enjoys sharing his knowledge with aspiring cybersecurity professionals through mentoring, coaching, and contributing to online forums and communities. He is committed to making a positive impact on the cybersecurity landscape and ensuring a safer, more secure digital future for all.<\/p>\n<\/div>\n<div id=\"attend\"><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: April 23, 2026 Time: 2:30 PM WEST | 9:30 AM EDT | 7:00 PM IST Topic: The Power of OSINT: Intelligence from Publicly Available Data Register Now Abstract: In today\u2019s digitally connected world, vast amounts of information are openly accessible, often more than individuals and organizations realize. From social media activity and leaked credentials&hellip;<\/p>\n","protected":false},"author":32,"featured_media":84871,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12483],"tags":[],"class_list":{"0":"post-84870","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-upcoming-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Introduction to OSINT: Tools, Techniques, and Digital Footprint Protection<\/title>\n<meta name=\"description\" content=\"Explore how open-source intelligence reveals data breaches, IoT exposure, and hidden digital footprint risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Power of OSINT: Intelligence from Publicly Available Data\" \/>\n<meta property=\"og:description\" content=\"Explore how open-source intelligence reveals data breaches, IoT exposure, and hidden digital footprint risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-21T09:52:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T07:06:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/23-april_465x310-Without-RN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-power-of-osint-intelligence-from-publicly-available-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-power-of-osint-intelligence-from-publicly-available-data\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"The Power of OSINT: Intelligence from Publicly Available Data\",\"datePublished\":\"2026-01-21T09:52:13+00:00\",\"dateModified\":\"2026-04-07T07:06:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-power-of-osint-intelligence-from-publicly-available-data\\\/\"},\"wordCount\":385,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-power-of-osint-intelligence-from-publicly-available-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/23-april_465x310-Without-RN.png\",\"articleSection\":[\"Cyber Talks\",\"Upcoming Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-power-of-osint-intelligence-from-publicly-available-data\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-power-of-osint-intelligence-from-publicly-available-data\\\/\",\"name\":\"Introduction to OSINT: Tools, Techniques, and Digital Footprint Protection\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-power-of-osint-intelligence-from-publicly-available-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-power-of-osint-intelligence-from-publicly-available-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/23-april_465x310-Without-RN.png\",\"datePublished\":\"2026-01-21T09:52:13+00:00\",\"dateModified\":\"2026-04-07T07:06:12+00:00\",\"description\":\"Explore how open-source intelligence reveals data breaches, IoT exposure, and hidden digital footprint risks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-power-of-osint-intelligence-from-publicly-available-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-power-of-osint-intelligence-from-publicly-available-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-power-of-osint-intelligence-from-publicly-available-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/23-april_465x310-Without-RN.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/23-april_465x310-Without-RN.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-power-of-osint-intelligence-from-publicly-available-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The Power of OSINT: Intelligence from Publicly Available Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Introduction to OSINT: Tools, Techniques, and Digital Footprint Protection","description":"Explore how open-source intelligence reveals data breaches, IoT exposure, and hidden digital footprint risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/","og_locale":"en_US","og_type":"article","og_title":"The Power of OSINT: Intelligence from Publicly Available Data","og_description":"Explore how open-source intelligence reveals data breaches, IoT exposure, and hidden digital footprint risks.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-21T09:52:13+00:00","article_modified_time":"2026-04-07T07:06:12+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/23-april_465x310-Without-RN.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"The Power of OSINT: Intelligence from Publicly Available Data","datePublished":"2026-01-21T09:52:13+00:00","dateModified":"2026-04-07T07:06:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/"},"wordCount":385,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/23-april_465x310-Without-RN.png","articleSection":["Cyber Talks","Upcoming Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/","name":"Introduction to OSINT: Tools, Techniques, and Digital Footprint Protection","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/23-april_465x310-Without-RN.png","datePublished":"2026-01-21T09:52:13+00:00","dateModified":"2026-04-07T07:06:12+00:00","description":"Explore how open-source intelligence reveals data breaches, IoT exposure, and hidden digital footprint risks.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/23-april_465x310-Without-RN.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/23-april_465x310-Without-RN.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-power-of-osint-intelligence-from-publicly-available-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"The Power of OSINT: Intelligence from Publicly Available Data"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84870"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84870\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/84871"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=84870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=84870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}