{"id":79,"date":"2018-08-01T14:35:28","date_gmt":"2018-08-01T18:35:28","guid":{"rendered":"https:\/\/fs.wp.odu.edu\/ckirkpat\/?page_id=79"},"modified":"2018-08-01T14:52:20","modified_gmt":"2018-08-01T18:52:20","slug":"cyse-200","status":"publish","type":"page","link":"https:\/\/fs.wp.odu.edu\/ckirkpat\/cyse-200\/","title":{"rendered":"CYSE-200"},"content":{"rendered":"<p>Cyber Security 200 Posts and other notices<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security 200 Posts and other notices<\/p>\n","protected":false},"author":704,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-blog.php","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/pages\/79"}],"collection":[{"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/users\/704"}],"replies":[{"embeddable":true,"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/comments?post=79"}],"version-history":[{"count":1,"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/pages\/79\/revisions"}],"predecessor-version":[{"id":80,"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/pages\/79\/revisions\/80"}],"wp:attachment":[{"href":"https:\/\/fs.wp.odu.edu\/ckirkpat\/wp-json\/wp\/v2\/media?parent=79"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}