{"id":47250,"date":"2022-06-24T15:00:00","date_gmt":"2022-06-24T15:00:00","guid":{"rendered":"http:\/\/7bd7cb33-1b7e-4562-a358-f87a478bc923"},"modified":"2022-06-24T15:00:00","modified_gmt":"2022-06-24T15:00:00","slug":"7-best-cybersecurity-certifications-of-2022","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/","title":{"rendered":"7 best cybersecurity certifications of 2022"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/5d11649b732f09f5cab9072302ca57baf7a47772\/2022\/04\/20\/82451d6f-094b-42ba-94a8-a74617af6c9e\/gettyimages-1076658510.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\" class=\"ff-og-image-inserted\"><\/div>\n<p>Cybrary is an excellent online resource for video-based courses in cybersecurity, suiting a range of skill levels and existing qualifications.&nbsp;<\/p>\n<p>You can enroll in courses that explain the fundamentals of particular career paths, whether as a system administrator or as a network engineer \u2014 and if you can ignore the cheesy thumbnails used to tout some of the courses, the actual content is valuable. The courses also come with an estimated time to completion and difficulty rating.&nbsp;<\/p>\n<p>You might want to explore some of these courses as introductory prep for other formal qualifications, such as the EC-Council&#8217;s Certified Ethical Hacking (CEH) and CISSP. Virtual labs for tools including Wireshark and practice tests for qualifications including CompTIA Security+, CISM, and others are also available.&nbsp;<\/p>\n<p>However, it should be noted that the resources on offer, such as <a href=\"https:\/\/www.zdnet.com\/article\/best-ethical-hacking-certification\/\" rel=\"follow\">for the CEH<\/a>, are not official courseware or lab sessions.<\/p>\n<p>Also of note is that Coursera offers suggested &#8220;paths&#8221; toward professional qualifications in line with industry standards, such as those managed by NIST. Courses can also be completed at your own pace, and some do result in formal qualifications after you pass.<\/p>\n<p>Some courses are free, while others require an enrollment or test fee.&nbsp;<\/p>\n<p><strong>Pros<\/strong><\/p>\n<ul>\n<li>Excellent online resource for video-based courses in cybersecurity<\/li>\n<li>Learn the fundamentals of a career as a system administrator or a network engineer<\/li>\n<li>Some courses are free<\/li>\n<\/ul>\n<p><strong>Cons<\/strong><\/p>\n<ul>\n<li>Some courses require an enrollment or test fee<\/li>\n<\/ul>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/education\/computers-tech\/best-cybersecurity-certification\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is the best cybersecurity certification? Cybrary is our top choice because it&#8217;s an excellent online resource for free and paid video-based courses in cybersecurity. Cybersecurity certifications can help you stand out in a fast-growing industry.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-47250","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>7 best cybersecurity certifications of 2022 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 best cybersecurity certifications of 2022 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-24T15:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/5d11649b732f09f5cab9072302ca57baf7a47772\/2022\/04\/20\/82451d6f-094b-42ba-94a8-a74617af6c9e\/gettyimages-1076658510.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/7-best-cybersecurity-certifications-of-2022\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/7-best-cybersecurity-certifications-of-2022\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"7 best cybersecurity certifications of 2022\",\"datePublished\":\"2022-06-24T15:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/7-best-cybersecurity-certifications-of-2022\\\/\"},\"wordCount\":246,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/7-best-cybersecurity-certifications-of-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5d11649b732f09f5cab9072302ca57baf7a47772\\\/2022\\\/04\\\/20\\\/82451d6f-094b-42ba-94a8-a74617af6c9e\\\/gettyimages-1076658510.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/7-best-cybersecurity-certifications-of-2022\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/7-best-cybersecurity-certifications-of-2022\\\/\",\"name\":\"7 best cybersecurity certifications of 2022 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/7-best-cybersecurity-certifications-of-2022\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/7-best-cybersecurity-certifications-of-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5d11649b732f09f5cab9072302ca57baf7a47772\\\/2022\\\/04\\\/20\\\/82451d6f-094b-42ba-94a8-a74617af6c9e\\\/gettyimages-1076658510.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\",\"datePublished\":\"2022-06-24T15:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/7-best-cybersecurity-certifications-of-2022\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/7-best-cybersecurity-certifications-of-2022\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/7-best-cybersecurity-certifications-of-2022\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5d11649b732f09f5cab9072302ca57baf7a47772\\\/2022\\\/04\\\/20\\\/82451d6f-094b-42ba-94a8-a74617af6c9e\\\/gettyimages-1076658510.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5d11649b732f09f5cab9072302ca57baf7a47772\\\/2022\\\/04\\\/20\\\/82451d6f-094b-42ba-94a8-a74617af6c9e\\\/gettyimages-1076658510.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/7-best-cybersecurity-certifications-of-2022\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 best cybersecurity certifications of 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 best cybersecurity certifications of 2022 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/","og_locale":"en_US","og_type":"article","og_title":"7 best cybersecurity certifications of 2022 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-06-24T15:00:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/5d11649b732f09f5cab9072302ca57baf7a47772\/2022\/04\/20\/82451d6f-094b-42ba-94a8-a74617af6c9e\/gettyimages-1076658510.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"7 best cybersecurity certifications of 2022","datePublished":"2022-06-24T15:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/"},"wordCount":246,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5d11649b732f09f5cab9072302ca57baf7a47772\/2022\/04\/20\/82451d6f-094b-42ba-94a8-a74617af6c9e\/gettyimages-1076658510.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/","url":"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/","name":"7 best cybersecurity certifications of 2022 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5d11649b732f09f5cab9072302ca57baf7a47772\/2022\/04\/20\/82451d6f-094b-42ba-94a8-a74617af6c9e\/gettyimages-1076658510.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","datePublished":"2022-06-24T15:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/5d11649b732f09f5cab9072302ca57baf7a47772\/2022\/04\/20\/82451d6f-094b-42ba-94a8-a74617af6c9e\/gettyimages-1076658510.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5d11649b732f09f5cab9072302ca57baf7a47772\/2022\/04\/20\/82451d6f-094b-42ba-94a8-a74617af6c9e\/gettyimages-1076658510.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/7-best-cybersecurity-certifications-of-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"7 best cybersecurity certifications of 2022"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47250"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47250\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}