{"id":3355,"date":"2023-10-03T17:06:26","date_gmt":"2023-10-03T21:06:26","guid":{"rendered":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/?page_id=3355"},"modified":"2023-10-20T18:01:35","modified_gmt":"2023-10-20T22:01:35","slug":"professional-communities","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/professional-communities\/","title":{"rendered":"Professional Communities"},"content":{"rendered":"<table style=\"border-collapse: collapse;width: 59.16%;height: 319px\">\n<tbody>\n<tr style=\"height: 127px\">\n<td style=\"width: 32.7116%;height: 127px\"><strong>SANS Institute <a href=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/Screenshot-2023-10-04-at-13.01.12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3371 alignleft\" src=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/Screenshot-2023-10-04-at-13.01.12.png\" alt=\"\" width=\"129\" height=\"96\" \/><\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.sans.org\/mlp\/online-cybersecurity-training-community\/?hide-footer=1&amp;utm_medium=CPC&amp;utm_source=Google&amp;utm_term=Online&amp;utm_content=RSA1%20Online%20Comm&amp;utm_campaign=NA%20Cybersec%20Training%20Community\" target=\"_blank\" rel=\"noopener\">SANS Insititute Free Training<\/a><\/td>\n<td style=\"width: 26.4484%;height: 127px\"><a href=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/ISACA_logo_RGB.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3396 alignleft\" src=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/ISACA_logo_RGB-300x130.jpg\" alt=\"\" width=\"247\" height=\"107\" srcset=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/ISACA_logo_RGB-300x130.jpg 300w, https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/ISACA_logo_RGB-1024x445.jpg 1024w, https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/ISACA_logo_RGB-768x334.jpg 768w, https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/ISACA_logo_RGB-1536x668.jpg 1536w, https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/ISACA_logo_RGB-2048x891.jpg 2048w\" sizes=\"auto, (max-width: 247px) 100vw, 247px\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 192px\">\n<td style=\"width: 32.7116%;height: 192px\">&nbsp;<\/p>\n<p><a href=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/ISC_2-logo-DA7AB4833F-seeklogo.com_.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3398\" src=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2023\/10\/ISC_2-logo-DA7AB4833F-seeklogo.com_.png\" alt=\"\" width=\"199\" height=\"120\" \/><\/a><\/p>\n<p>&nbsp;<\/td>\n<td style=\"width: 26.4484%;height: 192px\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SANS Institute SANS Insititute Free Training &nbsp; &nbsp; &nbsp;<\/p>\n","protected":false},"author":29750,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"footnotes":""},"class_list":{"0":"post-3355","1":"page","2":"type-page","3":"status-publish","5":"entry"},"jetpack_sharing_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/P2CTMC-S7","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/3355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/users\/29750"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/comments?post=3355"}],"version-history":[{"count":6,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/3355\/revisions"}],"predecessor-version":[{"id":3715,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/3355\/revisions\/3715"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/media?parent=3355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}