{"id":3773,"date":"2016-10-26T19:23:22","date_gmt":"2016-10-26T23:23:22","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3773"},"modified":"2016-10-26T19:29:08","modified_gmt":"2016-10-26T23:29:08","slug":"nessus-vulnerability-pen-test","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/10\/26\/nessus-vulnerability-pen-test\/","title":{"rendered":"Nessus Vulnerability &#8220;Pen&#8221; Test"},"content":{"rendered":"<p>Attached is my Nessus Vulnerability &#8220;Pen&#8221; Test&#8217;s analysis report, PowerPoint and video presentation. Feedback and comments are welcomed. Thank you!<\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/10\/26\/nessus-vulnerability-pen-test\/mis-5211-analysis-report-2-3\/\" rel=\"attachment wp-att-3778\">mis-5211-analysis-report-2<\/a><\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/10\/26\/nessus-vulnerability-pen-test\/mis-5211-analysis-report-2-pp-3\/\" rel=\"attachment wp-att-3777\">mis-5211-analysis-report-2-pp<\/a><\/p>\n<div style=\"width: 1364px;\" class=\"wp-video\"><!--[if lt IE 9]><script>document.createElement('video');<\/script><![endif]-->\n<video class=\"wp-video-shortcode\" id=\"video-3773-1\" width=\"1364\" height=\"768\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/community.mis.temple.edu\/itacs5211fall16\/files\/2016\/10\/MIS5211-Scan-Pen-Test-Presentation-2.mp4?_=1\" \/><a href=\"http:\/\/community.mis.temple.edu\/itacs5211fall16\/files\/2016\/10\/MIS5211-Scan-Pen-Test-Presentation-2.mp4\">http:\/\/community.mis.temple.edu\/itacs5211fall16\/files\/2016\/10\/MIS5211-Scan-Pen-Test-Presentation-2.mp4<\/a><\/video><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Attached is my Nessus Vulnerability &#8220;Pen&#8221; Test&#8217;s analysis report, PowerPoint and video presentation. Feedback and comments are welcomed. Thank you! mis-5211-analysis-report-2 mis-5211-analysis-report-2-pp<\/p>\n","protected":false},"author":11666,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[716552],"tags":[],"class_list":{"0":"post-3773","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-09-it-outsourcing-cloud-computing","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/11666"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3773"}],"version-history":[{"count":4,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3773\/revisions"}],"predecessor-version":[{"id":3786,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3773\/revisions\/3786"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3773"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3773"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}