{"id":2,"date":"2024-03-11T12:12:32","date_gmt":"2024-03-11T12:12:32","guid":{"rendered":"https:\/\/www.lepide.com\/cyber-learning\/?page_id=2"},"modified":"2024-03-14T10:28:04","modified_gmt":"2024-03-14T10:28:04","slug":"home","status":"publish","type":"page","link":"https:\/\/www.lepide.com\/cyber-learning\/","title":{"rendered":"Home"},"content":{"rendered":"\n<p>This is an example page. It&#8217;s different from a blog post because it will stay in one place and will show up in your site navigation (in most themes). Most people start with an About page that introduces them to potential site visitors. It might say something like this:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Hi there! I&#8217;m a bike messenger by day, aspiring actor by night, and this is my website. I live in Los Angeles, have a great dog named Jack, and I like pi&#241;a coladas. (And gettin&#8217; caught in the rain.)<\/p><\/blockquote>\n\n\n\n<p>&#8230;or something like this:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>The XYZ Doohickey Company was founded in 1971, and has been providing quality doohickeys to the public ever since. Located in Gotham City, XYZ employs over 2,000 people and does all kinds of awesome things for the Gotham community.<\/p><\/blockquote>\n\n\n\n<p>As a new WordPress user, you should go to <a href=\"https:\/\/www.lepide.com\/cyber-learning\/wp-admin\/\">your dashboard<\/a> to delete this page and create new pages for your content. Have fun!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is an example page. It&#8217;s different from a blog post because it will stay in one place and will show up in your site navigation (in most themes). Most people start with an About page that introduces them to potential site visitors. It might say something like this: Hi there! I&#8217;m a bike messenger [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/home.php","meta":{"footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Home - Cyber Learning With Lepide<\/title>\n<meta name=\"description\" content=\"A glossary of educational resources focused on providing explanations, examples, and best practices for a wide range of cybersecurity and compliance related topics.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lepide.com\/cyber-learning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Home - Cyber Learning With Lepide\" \/>\n<meta property=\"og:description\" content=\"A glossary of educational resources focused on providing explanations, examples, and best practices for a wide range of cybersecurity and compliance related topics.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lepide.com\/cyber-learning\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Learning With Lepide\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-14T10:28:04+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Home - Cyber Learning With Lepide","description":"A glossary of educational resources focused on providing explanations, examples, and best practices for a wide range of cybersecurity and compliance related topics.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lepide.com\/cyber-learning\/","og_locale":"en_US","og_type":"article","og_title":"Home - Cyber Learning With Lepide","og_description":"A glossary of educational resources focused on providing explanations, examples, and best practices for a wide range of cybersecurity and compliance related topics.","og_url":"https:\/\/www.lepide.com\/cyber-learning\/","og_site_name":"Cyber Learning With Lepide","article_modified_time":"2024-03-14T10:28:04+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.lepide.com\/cyber-learning\/","url":"https:\/\/www.lepide.com\/cyber-learning\/","name":"Home - Cyber Learning With Lepide","isPartOf":{"@id":"https:\/\/www.lepide.com\/cyber-learning\/#website"},"datePublished":"2024-03-11T12:12:32+00:00","dateModified":"2024-03-14T10:28:04+00:00","description":"A glossary of educational resources focused on providing explanations, examples, and best practices for a wide range of cybersecurity and compliance related topics.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lepide.com\/cyber-learning\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.lepide.com\/cyber-learning\/#website","url":"https:\/\/www.lepide.com\/cyber-learning\/","name":"Cyber Learning With Lepide","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lepide.com\/cyber-learning\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.lepide.com\/cyber-learning\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lepide.com\/cyber-learning\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.lepide.com\/cyber-learning\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.lepide.com\/cyber-learning\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lepide.com\/cyber-learning\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":1,"href":"https:\/\/www.lepide.com\/cyber-learning\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":6,"href":"https:\/\/www.lepide.com\/cyber-learning\/wp-json\/wp\/v2\/pages\/2\/revisions\/6"}],"wp:attachment":[{"href":"https:\/\/www.lepide.com\/cyber-learning\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}