{"id":3349,"date":"2024-09-12T09:33:55","date_gmt":"2024-09-12T09:33:55","guid":{"rendered":"https:\/\/apexes.ac\/?post_type=courses&#038;p=3349"},"modified":"2025-08-04T17:31:04","modified_gmt":"2025-08-04T17:31:04","slug":"bachelor-of-cyber-security","status":"publish","type":"courses","link":"https:\/\/apexes.ac\/fr\/courses\/bachelor-of-cyber-security\/","title":{"rendered":"Baccalaur\u00e9at en cybers\u00e9curit\u00e9"},"content":{"rendered":"","protected":false},"featured_media":2317,"parent":0,"menu_order":0,"template":"page-course-template.php","categories":[273],"tags":[291,311,290,310,338,318,339,322,317],"class_list":["post-3349","courses","type-courses","status-publish","has-post-thumbnail","hentry","category-information-technology-under-graduate-courses-programs-al-muhibbah-open-university","tag-computer-science","tag-cyber-security","tag-information-system","tag-security","tag-software","tag-318","tag-339","tag-322","tag-317"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/courses\/3349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/types\/courses"}],"version-history":[{"count":1,"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/courses\/3349\/revisions"}],"predecessor-version":[{"id":3496,"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/courses\/3349\/revisions\/3496"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/media\/2317"}],"wp:attachment":[{"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/media?parent=3349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/categories?post=3349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/apexes.ac\/fr\/wp-json\/wp\/v2\/tags?post=3349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}