{"id":69,"date":"2025-02-04T08:39:27","date_gmt":"2025-02-04T13:39:27","guid":{"rendered":"https:\/\/community.mis.temple.edu\/khassan\/blog\/points\/certified-in-cybersecurity-cc\/"},"modified":"2025-02-04T08:39:27","modified_gmt":"2025-02-04T13:39:27","slug":"certified-in-cybersecurity-cc","status":"publish","type":"points","link":"https:\/\/community.mis.temple.edu\/khassan\/points\/certified-in-cybersecurity-cc\/","title":{"rendered":"Certified in Cybersecurity (CC)"},"content":{"rendered":"<p>Covers Security Principles, Business Continuity (BC), Disaster Recovery (DR), Incident Response Concepts, Access Controls Concepts, Network Security, Security Operations<\/p>\n","protected":false},"author":28649,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-69","points","type-points","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/khassan\/wp-json\/wp\/v2\/points\/69","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/khassan\/wp-json\/wp\/v2\/points"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/khassan\/wp-json\/wp\/v2\/types\/points"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/khassan\/wp-json\/wp\/v2\/users\/28649"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/khassan\/wp-json\/wp\/v2\/comments?post=69"}],"version-history":[{"count":0,"href":"https:\/\/community.mis.temple.edu\/khassan\/wp-json\/wp\/v2\/points\/69\/revisions"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/khassan\/wp-json\/wp\/v2\/media?parent=69"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}