{"id":2291,"date":"2024-09-04T09:21:56","date_gmt":"2024-09-04T09:21:56","guid":{"rendered":"https:\/\/apexes.ac\/?post_type=courses&#038;p=2291"},"modified":"2025-08-04T17:06:02","modified_gmt":"2025-08-04T17:06:02","slug":"b-sc-cyber-security","status":"publish","type":"courses","link":"https:\/\/apexes.ac\/fr\/courses\/b-sc-cyber-security\/","title":{"rendered":"B.Sc. Cyber Security"},"content":{"rendered":"","protected":false},"featured_media":2315,"parent":0,"menu_order":0,"template":"page-course-template.php","categories":[266],"tags":[291,311,290,310,338,318,339,317,300],"class_list":["post-2291","courses","type-courses","status-publish","has-post-thumbnail","hentry","category-information-technology","tag-computer-science","tag-cyber-security","tag-information-system","tag-security","tag-software","tag-318","tag-339","tag-317","tag-300"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/courses\/2291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/types\/courses"}],"version-history":[{"count":1,"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/courses\/2291\/revisions"}],"predecessor-version":[{"id":3698,"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/courses\/2291\/revisions\/3698"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/media\/2315"}],"wp:attachment":[{"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/media?parent=2291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/categories?post=2291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/tags?post=2291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}