{"id":1830,"date":"2024-10-01T21:44:30","date_gmt":"2024-10-01T21:44:30","guid":{"rendered":"https:\/\/eiecentre.com\/Excellence\/?post_type=courses&#038;p=1830"},"modified":"2024-10-04T16:47:43","modified_gmt":"2024-10-04T16:47:43","slug":"certified-information-security-manager-cism-course","status":"publish","type":"courses","link":"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/","title":{"rendered":"Certified Information Security Manager (CISM) Course"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Information is the lifeblood of all organizations; without it, they would be severely impacted and ultimately cease functioning. Information is knowledge, and knowledge is power. With an ever-changing climate of technology and threats (both technical and human), the need for trained security personnel to protect our information becomes an increasingly critical evolutionary task.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Information is at risk from many sources, including legal, electronic, physical, internal, and external sources, to mention a few. This certified information security manager (CISM) training ensures that security and related management personnel understand the risks, controls, and countermeasures available to secure information and technology within a practical management framework.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Furthermore, this certified information security manager (CISM) course, which utilizes countermeasures, best practices, and management techniques, will mitigate electronic and physical risks and enhance an organization&#8217;s protection.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Upon completing the Certified Information Security Manager (CISM) course, participants gain essential skills and knowledge required for the role of an information security manager. This certified training equips individuals with a deep understanding of the responsibilities and roles associated with information security management.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">An information security manager is crucial in safeguarding organizational data and assets from cyber threats and breaches. They oversee the development and implementation of security policies, procedures, and strategies to protect sensitive information.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">The Role of Information Security Manager:<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">This Certified Information Security Manager (CISM) course thoroughly examines the pivotal role of the information security manager. This role encapsulates a broad range of responsibilities, including defining the information security managers&#8217; roles and responsibilities, detailing the skills required to manage information security effectively, and outlining the paths one might embark upon to become an information security manager.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Students in this certified information security manager (CISM) training will explore the techniques and strategies an information security manager utilizes to safeguard information assets and ensure confidentiality, integrity, and availability.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Course Objectives:<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">At the end of this certified information security manager (CISM) course, the participants will be able to:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Gain knowledge of the concepts relating to information security management (confidentiality, integrity, availability, vulnerability, threats, risks, and countermeasures).<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Understand the current legislation and regulations that impact information security management.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Be aware of current national and international standards, such as ISO 27002, frameworks, and organizations facilitating information security management.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Understand the current business and everyday technical environments in which information security management has to operate.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Know the categorization, operation, and effectiveness of controls of different types and characteristics.<\/span><\/li>\n<\/ul>\n<h2><span data-preserver-spaces=\"true\">Targeted Competencies:<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">At the end of this certified information security manager (CISM) course, the participant&#8217;s competencies will be able to:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Information security management.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Vulnerability assessment and management.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Apply cybersecurity solutions.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Develop IT policies and procedures.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Data Integrity.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Risk management.<\/span><\/li>\n<\/ul>\n<h2><span data-preserver-spaces=\"true\">Course Content:<\/span><\/h2>\n<h3><strong><span data-preserver-spaces=\"true\">Unit 1: Overview of Information Security:<\/span><\/strong><\/h3>\n<ul>\n<li><span data-preserver-spaces=\"true\">What is Information Security?<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Examples of Information Security Incidents.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">What is Information Security Management?<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Human Aspect of Information Security.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Social Engineering.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Unit 2: Information Security for Server Systems:<\/span><\/strong><\/h3>\n<ul>\n<li><span data-preserver-spaces=\"true\">Attacks on Personal Computers and Smartphones and Countermeasures.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Information Security Risk Management as a Practice.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">What is the Risk Management process?<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Identifying Information Assets.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Identifying Security Risks and Evaluation.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Risk Treatment.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Unit 3: Security Risk Management as an Organization:<\/span><\/strong><\/h3>\n<ul>\n<li><span data-preserver-spaces=\"true\">Information Security Governance.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Information Security Management System (ISMS).<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Information Security Policy, Standards, and Procedures.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Information Security Evaluation.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Security Incident Response.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Unit 4: Information Security and Cryptography:<\/span><\/strong><\/h3>\n<ul>\n<li><span data-preserver-spaces=\"true\">Requirements for Secure Communication.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">What is Cryptography?<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Classic and Modern Cryptography.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Common Key Cryptography algorithms: DES, Triple DES, AES.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Problems of Key Distribution for Common Key Cryptography.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Unit 5: Data Integrity and Digital Signature:<\/span><\/strong><\/h3>\n<ul>\n<li><span data-preserver-spaces=\"true\">Integrity of Data.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Hash Function.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Digital Signature.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Public Key Certificate and Public Key Infrastructure (PKI).<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Certificate Authority.<\/span><\/li>\n<\/ul>\n<h2><span data-preserver-spaces=\"true\">Conclusion:<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">The CISM course covers various topics, including risk management, incident response, compliance, and governance. Participants learn how to assess and mitigate risks, respond effectively to security incidents, and ensure compliance with regulatory standards. Additionally, they acquire the necessary skills to manage security teams and communicate effectively with stakeholders at all levels of the organization.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Becoming an information security manager requires education, experience, and certification. The CISM certification is highly regarded and demonstrates proficiency in information security management. Individuals interested in this career path typically pursue CISM training to enhance their qualifications and advance their professional development.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">The CISM course prepares individuals to excel as information security managers by providing them with the expertise and certification needed to navigate the complex landscape of information security management. This certification validates their skills and knowledge, enabling them to effectively fulfill the responsibilities of an information security manager and contribute to robust information security management within organizations.<\/span><\/p>\n<p><a class=\"course-btn\" href=\"https:\/\/eiecentre.com\/Excellence\/en\/fill-form\/\"> Enroll Now <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information is the lifeblood of all organizations; without it, they would be severely impacted and ultimately cease functioning. Information is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1832,"template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"course-category":[224],"course-tag":[],"class_list":["post-1830","courses","type-courses","status-publish","has-post-thumbnail","hentry","course-category-strategic-business-and-planning-deployment-and-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Certified Information Security Manager (CISM) Course - Excellence<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Certified Information Security Manager (CISM) Course - Excellence\" \/>\n<meta property=\"og:description\" content=\"Information is the lifeblood of all organizations; without it, they would be severely impacted and ultimately cease functioning. Information is [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/\" \/>\n<meta property=\"og:site_name\" content=\"Excellence\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-04T16:47:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/business-women-creating-a-plan-in-coworking-space.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/\",\"url\":\"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/\",\"name\":\"Certified Information Security Manager (CISM) Course - Excellence\",\"isPartOf\":{\"@id\":\"https:\/\/eiecentre.com\/Excellence\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/business-women-creating-a-plan-in-coworking-space.jpg\",\"datePublished\":\"2024-10-01T21:44:30+00:00\",\"dateModified\":\"2024-10-04T16:47:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/#primaryimage\",\"url\":\"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/business-women-creating-a-plan-in-coworking-space.jpg\",\"contentUrl\":\"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/business-women-creating-a-plan-in-coworking-space.jpg\",\"width\":2000,\"height\":1333,\"caption\":\"Business women creating a plan in coworking space\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/eiecentre.com\/Excellence\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Courses\",\"item\":\"https:\/\/eiecentre.com\/Excellence\/courses\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Certified Information Security Manager (CISM) Course\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/eiecentre.com\/Excellence\/#website\",\"url\":\"https:\/\/eiecentre.com\/Excellence\/\",\"name\":\"EIE Excellence center\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/eiecentre.com\/Excellence\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/eiecentre.com\/Excellence\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/eiecentre.com\/Excellence\/#organization\",\"name\":\"EIE Excellence center\",\"url\":\"https:\/\/eiecentre.com\/Excellence\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eiecentre.com\/Excellence\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2025\/01\/cropped-Happy_E-Book__6_-removebg-preview-1.png\",\"contentUrl\":\"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2025\/01\/cropped-Happy_E-Book__6_-removebg-preview-1.png\",\"width\":347,\"height\":274,\"caption\":\"EIE Excellence center\"},\"image\":{\"@id\":\"https:\/\/eiecentre.com\/Excellence\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Certified Information Security Manager (CISM) Course - Excellence","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/","og_locale":"en_US","og_type":"article","og_title":"Certified Information Security Manager (CISM) Course - Excellence","og_description":"Information is the lifeblood of all organizations; without it, they would be severely impacted and ultimately cease functioning. Information is [&hellip;]","og_url":"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/","og_site_name":"Excellence","article_modified_time":"2024-10-04T16:47:43+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/business-women-creating-a-plan-in-coworking-space.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/","url":"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/","name":"Certified Information Security Manager (CISM) Course - Excellence","isPartOf":{"@id":"https:\/\/eiecentre.com\/Excellence\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/#primaryimage"},"image":{"@id":"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/#primaryimage"},"thumbnailUrl":"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/business-women-creating-a-plan-in-coworking-space.jpg","datePublished":"2024-10-01T21:44:30+00:00","dateModified":"2024-10-04T16:47:43+00:00","breadcrumb":{"@id":"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/#primaryimage","url":"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/business-women-creating-a-plan-in-coworking-space.jpg","contentUrl":"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/business-women-creating-a-plan-in-coworking-space.jpg","width":2000,"height":1333,"caption":"Business women creating a plan in coworking space"},{"@type":"BreadcrumbList","@id":"https:\/\/eiecentre.com\/Excellence\/courses\/certified-information-security-manager-cism-course\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eiecentre.com\/Excellence\/"},{"@type":"ListItem","position":2,"name":"Courses","item":"https:\/\/eiecentre.com\/Excellence\/courses\/"},{"@type":"ListItem","position":3,"name":"Certified Information Security Manager (CISM) Course"}]},{"@type":"WebSite","@id":"https:\/\/eiecentre.com\/Excellence\/#website","url":"https:\/\/eiecentre.com\/Excellence\/","name":"EIE Excellence center","description":"","publisher":{"@id":"https:\/\/eiecentre.com\/Excellence\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eiecentre.com\/Excellence\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eiecentre.com\/Excellence\/#organization","name":"EIE Excellence center","url":"https:\/\/eiecentre.com\/Excellence\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eiecentre.com\/Excellence\/#\/schema\/logo\/image\/","url":"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2025\/01\/cropped-Happy_E-Book__6_-removebg-preview-1.png","contentUrl":"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2025\/01\/cropped-Happy_E-Book__6_-removebg-preview-1.png","width":347,"height":274,"caption":"EIE Excellence center"},"image":{"@id":"https:\/\/eiecentre.com\/Excellence\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/courses\/1830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/types\/courses"}],"author":[{"embeddable":true,"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":2,"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/courses\/1830\/revisions"}],"predecessor-version":[{"id":2159,"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/courses\/1830\/revisions\/2159"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/media\/1832"}],"wp:attachment":[{"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/media?parent=1830"}],"wp:term":[{"taxonomy":"course-category","embeddable":true,"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/course-category?post=1830"},{"taxonomy":"course-tag","embeddable":true,"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/course-tag?post=1830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}