{"id":1844,"date":"2024-10-01T21:49:19","date_gmt":"2024-10-01T21:49:19","guid":{"rendered":"https:\/\/eiecentre.com\/Excellence\/?post_type=courses&#038;p=1844"},"modified":"2024-10-04T16:46:07","modified_gmt":"2024-10-04T16:46:07","slug":"cloud-management-information-technology-it-security-course","status":"publish","type":"courses","link":"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/","title":{"rendered":"Cloud Management &#038; Information Technology IT Security Course"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Cloud technologies have grown significantly over the past few years. Assessing commercial appetite and developing a business case for cloud migration is just the start of a long and complicated process to achieve some of its perceived benefits. How we approach the secure migration process for our existing applications and infrastructure presents a new dilemma.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">This cloud management and information technology IT security course can entail the internal policies we may need to update and enforce, risk appraisal, and legal contract management of cloud vendor partners. Furthermore, how do we protect our corporate and sensitive data against our legal obligations and engineer an appropriate security solution? These are just a few of the challenges with cloud management and security.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Transitioning to the cloud means migrating to an environment where a third party will deliver part of the security function. Given the benefits of cloud technologies, our internal risk management and security expertise must be appraised to determine the best options available from commencement. This cloud management and information technology (IT) security course aims to provide security and management specialists with the critical methods of assessing risk with cloud technologies and solutions.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Moreover, auditing, network, and legal professionals will benefit as we examine the latest technologies for securing cloud-based solutions while ensuring that policy, practice, and procedure cover the relevant governance and compliance considerations required with such a significant transformation.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">This cloud management and information technology (IT) security course will provide a practitioner approach to information security management and teach how to address commercial risks and realities with current best practice guidance in line with international standards. It will detail how to be proactive in your defense solutions and have countermeasures to deal with any appropriate security breach.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Course Objectives:<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">At the end of this cloud management and information technology (IT) security course, the participants will be able to:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Understand and design a risk-based assessment program for cloud providers&#8217; security solutions.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Appreciate current threat and trend analysis for cybercrime and IT security breaches.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Understand, identify, and respond to an information security breach.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Be appraised of crucial risk areas in cloud vendor contracts.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Understand the layers of cloud technologies.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Review and understand vulnerability assessments for cloud environments.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Consider cloud security within Information Security Management.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Understand the approach for Crisis Management and Disaster Recovery for cloud environments.<\/span><\/li>\n<\/ul>\n<h2><span data-preserver-spaces=\"true\">Targeted Competencies:<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">By the end of this cloud management and information technology (IT) security course, the participant&#8217;s competencies will be able to:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Benefits and Pitfalls of Cloud Services.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">An Overview of Information Security.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Risk Appraisal of Electronic and Physical Data Risk.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Cloud Vendor Service Contracts.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Security of Corporate Data in the Cloud.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Selecting the Appropriate Tools to Achieve the Best from Data Analytics.<\/span><\/li>\n<\/ul>\n<h2><span data-preserver-spaces=\"true\">Cloud Management and Information Technology (IT) Security:<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">The cloud management and information technology (IT) security course is designed to equip participants with comprehensive knowledge and skills in information technology security, focusing on cloud management security.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">This program covers essential aspects of IT security, preparing individuals for a career in this field. Students who complete this course earn a recognized IT security certificate, demonstrating their cloud management and IT security expertise.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">This cloud management and information technology (IT) security program offers foundational and advanced IT security training, including cloud security management. It is an ideal choice for those seeking to enter or advance in the IT security sector.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Course Content:<\/span><\/h2>\n<h3><strong><span data-preserver-spaces=\"true\">Unit 1: Introduction to Cloud Computing:<\/span><\/strong><\/h3>\n<ul>\n<li><span data-preserver-spaces=\"true\">Benefits and commercial considerations of cloud Computing.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Delivery models: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS).<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Cloud types (Public, Private, Hybrid).<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Choosing a cloud service provider.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Unit 2: IT Security Evolution:<\/span><\/strong><\/h3>\n<ul>\n<li><span data-preserver-spaces=\"true\">Categorizing Physical and Electronic Risk.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Networking and Communication Technology.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Computer Systems Design.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Legal and Regulatory Considerations.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Current Threat and Trend Analysis.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Unit 3: Compliance and Legal Considerations:<\/span><\/strong><\/h3>\n<ul>\n<li><span data-preserver-spaces=\"true\">Compliance challenges for the cloud.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Privacy concerns.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Data Sovereignty.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Cloud Supplier Agreements.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Unit 4: Crisis Management and Approaching Risk Assessment:<\/span><\/strong><\/h3>\n<ul>\n<li><span data-preserver-spaces=\"true\">Approaching Risk Assessment for Cloud.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Internal and external assessment.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Data Security in the cloud.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Encryption Architectures and Key Management.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Data Life Cycle.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">\u00a0Unit 5: Identifying and Responding to Data Breaches:<\/span><\/strong><\/h3>\n<ul>\n<li><span data-preserver-spaces=\"true\">Key factors to identify a security breach.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Crisis Management Planning.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Dealing with the initial crisis and media management.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Forensic and Electronic investigations.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Responding to Business Continuity.<\/span><\/li>\n<\/ul>\n<h2><span data-preserver-spaces=\"true\">Conclusion:<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Upon completion of the Cloud Management and Information Technology (IT) Security course, participants gain a solid foundation in information technology security through comprehensive training. This program covers essential IT security principles and delves into cloud management security strategies.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Graduates earn a valuable IT security certificate attesting to their proficiency in IT security and cloud management. This training program focuses on practical skills and industry-relevant knowledge and equips individuals with the expertise needed to navigate the complexities of cloud security management.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">This cloud management and information technology (IT) security course offers basic and advanced training in cloud management and information security, paving the way for a successful career in IT security.<\/span><\/p>\n<p><a class=\"course-btn\" href=\"https:\/\/eiecentre.com\/Excellence\/en\/fill-form\/\"> Enroll Now <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud technologies have grown significantly over the past few years. Assessing commercial appetite and developing a business case for cloud [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1846,"template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"course-category":[224],"course-tag":[],"class_list":["post-1844","courses","type-courses","status-publish","has-post-thumbnail","hentry","course-category-strategic-business-and-planning-deployment-and-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Management &amp; Information Technology IT Security Course - Excellence<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Management &amp; Information Technology IT Security Course - Excellence\" \/>\n<meta property=\"og:description\" content=\"Cloud technologies have grown significantly over the past few years. Assessing commercial appetite and developing a business case for cloud [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/\" \/>\n<meta property=\"og:site_name\" content=\"Excellence\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-04T16:46:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/manager-planning-strategy-using-laptop-and-graphic-materials.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/\",\"url\":\"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/\",\"name\":\"Cloud Management & Information Technology IT Security Course - Excellence\",\"isPartOf\":{\"@id\":\"https:\/\/eiecentre.com\/Excellence\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/manager-planning-strategy-using-laptop-and-graphic-materials.jpg\",\"datePublished\":\"2024-10-01T21:49:19+00:00\",\"dateModified\":\"2024-10-04T16:46:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/#primaryimage\",\"url\":\"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/manager-planning-strategy-using-laptop-and-graphic-materials.jpg\",\"contentUrl\":\"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/manager-planning-strategy-using-laptop-and-graphic-materials.jpg\",\"width\":2000,\"height\":1333,\"caption\":\"Manager planning strategy using laptop and graphic materials\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/eiecentre.com\/Excellence\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Courses\",\"item\":\"https:\/\/eiecentre.com\/Excellence\/courses\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloud Management &#038; Information Technology IT Security Course\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/eiecentre.com\/Excellence\/#website\",\"url\":\"https:\/\/eiecentre.com\/Excellence\/\",\"name\":\"EIE Excellence center\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/eiecentre.com\/Excellence\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/eiecentre.com\/Excellence\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/eiecentre.com\/Excellence\/#organization\",\"name\":\"EIE Excellence center\",\"url\":\"https:\/\/eiecentre.com\/Excellence\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eiecentre.com\/Excellence\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2025\/01\/cropped-Happy_E-Book__6_-removebg-preview-1.png\",\"contentUrl\":\"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2025\/01\/cropped-Happy_E-Book__6_-removebg-preview-1.png\",\"width\":347,\"height\":274,\"caption\":\"EIE Excellence center\"},\"image\":{\"@id\":\"https:\/\/eiecentre.com\/Excellence\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Management & Information Technology IT Security Course - Excellence","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Management & Information Technology IT Security Course - Excellence","og_description":"Cloud technologies have grown significantly over the past few years. Assessing commercial appetite and developing a business case for cloud [&hellip;]","og_url":"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/","og_site_name":"Excellence","article_modified_time":"2024-10-04T16:46:07+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/manager-planning-strategy-using-laptop-and-graphic-materials.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/","url":"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/","name":"Cloud Management & Information Technology IT Security Course - Excellence","isPartOf":{"@id":"https:\/\/eiecentre.com\/Excellence\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/#primaryimage"},"image":{"@id":"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/#primaryimage"},"thumbnailUrl":"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/manager-planning-strategy-using-laptop-and-graphic-materials.jpg","datePublished":"2024-10-01T21:49:19+00:00","dateModified":"2024-10-04T16:46:07+00:00","breadcrumb":{"@id":"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/#primaryimage","url":"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/manager-planning-strategy-using-laptop-and-graphic-materials.jpg","contentUrl":"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2024\/10\/manager-planning-strategy-using-laptop-and-graphic-materials.jpg","width":2000,"height":1333,"caption":"Manager planning strategy using laptop and graphic materials"},{"@type":"BreadcrumbList","@id":"https:\/\/eiecentre.com\/Excellence\/courses\/cloud-management-information-technology-it-security-course\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eiecentre.com\/Excellence\/"},{"@type":"ListItem","position":2,"name":"Courses","item":"https:\/\/eiecentre.com\/Excellence\/courses\/"},{"@type":"ListItem","position":3,"name":"Cloud Management &#038; Information Technology IT Security Course"}]},{"@type":"WebSite","@id":"https:\/\/eiecentre.com\/Excellence\/#website","url":"https:\/\/eiecentre.com\/Excellence\/","name":"EIE Excellence center","description":"","publisher":{"@id":"https:\/\/eiecentre.com\/Excellence\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eiecentre.com\/Excellence\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eiecentre.com\/Excellence\/#organization","name":"EIE Excellence center","url":"https:\/\/eiecentre.com\/Excellence\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eiecentre.com\/Excellence\/#\/schema\/logo\/image\/","url":"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2025\/01\/cropped-Happy_E-Book__6_-removebg-preview-1.png","contentUrl":"https:\/\/eiecentre.com\/Excellence\/wp-content\/uploads\/2025\/01\/cropped-Happy_E-Book__6_-removebg-preview-1.png","width":347,"height":274,"caption":"EIE Excellence center"},"image":{"@id":"https:\/\/eiecentre.com\/Excellence\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/courses\/1844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/types\/courses"}],"author":[{"embeddable":true,"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":2,"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/courses\/1844\/revisions"}],"predecessor-version":[{"id":2157,"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/courses\/1844\/revisions\/2157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/media\/1846"}],"wp:attachment":[{"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/media?parent=1844"}],"wp:term":[{"taxonomy":"course-category","embeddable":true,"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/course-category?post=1844"},{"taxonomy":"course-tag","embeddable":true,"href":"https:\/\/eiecentre.com\/Excellence\/wp-json\/wp\/v2\/course-tag?post=1844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}