{"id":6621,"date":"2014-09-02T14:49:51","date_gmt":"2014-09-02T14:49:51","guid":{"rendered":"http:\/\/www.acemygrades.com\/?post_type=product&p=6621"},"modified":"2014-09-02T14:49:51","modified_gmt":"2014-09-02T14:49:51","slug":"cis-333-week-4-assignment-1-identifying-potential-malicious-attacks-threats-and-vulnerabilities","status":"publish","type":"product","link":"https:\/\/www.acemygrades.com\/product\/cis-333-week-4-assignment-1-identifying-potential-malicious-attacks-threats-and-vulnerabilities\/","title":{"rendered":"CIS 333 | Week 4 Assignment 1 – Identifying Potential Malicious Attacks, Threats, and Vulnerabilities"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":4938,"comment_status":"open","ping_status":"closed","template":"","meta":[],"product_cat":[45],"product_tag":[],"_links":{"self":[{"href":"https:\/\/www.acemygrades.com\/wp-json\/wp\/v2\/product\/6621"}],"collection":[{"href":"https:\/\/www.acemygrades.com\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.acemygrades.com\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/www.acemygrades.com\/wp-json\/wp\/v2\/comments?post=6621"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.acemygrades.com\/wp-json\/wp\/v2\/media\/4938"}],"wp:attachment":[{"href":"https:\/\/www.acemygrades.com\/wp-json\/wp\/v2\/media?parent=6621"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.acemygrades.com\/wp-json\/wp\/v2\/product_cat?post=6621"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.acemygrades.com\/wp-json\/wp\/v2\/product_tag?post=6621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}