{"id":95,"date":"2025-07-20T07:59:49","date_gmt":"2025-07-20T07:59:49","guid":{"rendered":"https:\/\/www.foqhawi.com\/?p=95"},"modified":"2025-07-20T08:14:33","modified_gmt":"2025-07-20T08:14:33","slug":"certificate-ethical-hackers","status":"publish","type":"post","link":"https:\/\/www.foqhawi.com\/?p=95","title":{"rendered":"Certificate Ethical Hackers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"95\" class=\"elementor elementor-95\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed1e088 e-flex e-con-boxed e-con e-parent\" data-id=\"ed1e088\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b788554 elementor-widget elementor-widget-text-editor\" data-id=\"b788554\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3 data-start=\"200\" data-end=\"260\">\u00a0<\/h3><hr data-start=\"262\" data-end=\"265\" \/><h3 data-start=\"267\" data-end=\"317\"><strong data-start=\"271\" data-end=\"317\">Module 01: Introduction to Ethical Hacking<\/strong><\/h3><ul><li data-start=\"320\" data-end=\"349\">Information Security Overview<\/li><li data-start=\"352\" data-end=\"384\">Hacking Concepts, Phases &amp; Types<\/li><li data-start=\"387\" data-end=\"419\">Legal Aspects of Ethical Hacking<\/li><li data-start=\"422\" data-end=\"460\">Penetration Testing vs Ethical Hacking<\/li><\/ul><hr data-start=\"462\" data-end=\"465\" \/><h3 data-start=\"467\" data-end=\"517\"><strong data-start=\"471\" data-end=\"517\">Module 02: Footprinting and Reconnaissance<\/strong><\/h3><ul><li data-start=\"520\" data-end=\"559\">Footprinting Concepts and Methodologies<\/li><li data-start=\"562\" data-end=\"584\">Tools for Footprinting<\/li><li data-start=\"587\" data-end=\"611\">Competitive Intelligence<\/li><li data-start=\"614\" data-end=\"638\">DNS Footprinting &amp; WHOIS<\/li><li data-start=\"641\" data-end=\"682\">Email, Social Media, Website Footprinting<\/li><\/ul><hr data-start=\"684\" data-end=\"687\" \/><h3 data-start=\"689\" data-end=\"725\"><strong data-start=\"693\" data-end=\"725\">Module 03: Scanning Networks<\/strong><\/h3><ul><li data-start=\"728\" data-end=\"755\">Network Scanning Techniques<\/li><li data-start=\"758\" data-end=\"789\">Port Scanning &amp; Banner Grabbing<\/li><li data-start=\"792\" data-end=\"814\">Vulnerability Scanning<\/li><li data-start=\"817\" data-end=\"843\">Tools: Nmap, NetScan, etc.<\/li><\/ul><hr data-start=\"845\" data-end=\"848\" \/><h3 data-start=\"850\" data-end=\"880\"><strong data-start=\"854\" data-end=\"880\">Module 04: Enumeration<\/strong><\/h3><ul><li data-start=\"883\" data-end=\"915\">Enumeration Techniques and Tools<\/li><li data-start=\"918\" data-end=\"959\">NetBIOS, SNMP, LDAP, NFS, SMB Enumeration<\/li><li data-start=\"962\" data-end=\"990\">Active Directory Enumeration<\/li><\/ul><hr data-start=\"992\" data-end=\"995\" \/><h3 data-start=\"997\" data-end=\"1038\"><strong data-start=\"1001\" data-end=\"1038\">Module 05: Vulnerability Analysis<\/strong><\/h3><ul><li data-start=\"1041\" data-end=\"1077\">Understanding Vulnerability Concepts<\/li><li data-start=\"1080\" data-end=\"1110\">Vulnerability Assessment Types<\/li><li data-start=\"1113\" data-end=\"1150\">Tools: Nessus, OpenVAS, Nexpose, etc.<\/li><\/ul><hr data-start=\"1152\" data-end=\"1155\" \/><h3 data-start=\"1157\" data-end=\"1190\"><strong data-start=\"1161\" data-end=\"1190\">Module 06: System Hacking<\/strong><\/h3><ul><li data-start=\"1193\" data-end=\"1221\">Password Cracking Techniques<\/li><li data-start=\"1224\" data-end=\"1244\">Privilege Escalation<\/li><li data-start=\"1247\" data-end=\"1272\">Malware Hiding Techniques<\/li><li data-start=\"1275\" data-end=\"1308\">Keylogging, Spyware, and Rootkits<\/li><li data-start=\"1311\" data-end=\"1343\">Steganography and Anti-Forensics<\/li><\/ul><hr data-start=\"1345\" data-end=\"1348\" \/><h3 data-start=\"1350\" data-end=\"1384\"><strong data-start=\"1354\" data-end=\"1384\">Module 07: Malware Threats<\/strong><\/h3><ul><li data-start=\"1387\" data-end=\"1410\">Viruses, Worms, Trojans<\/li><li data-start=\"1413\" data-end=\"1435\">Ransomware &amp; Backdoors<\/li><li data-start=\"1438\" data-end=\"1465\">Malware Analysis Techniques<\/li><li data-start=\"1468\" data-end=\"1483\">Countermeasures<\/li><\/ul><hr data-start=\"1485\" data-end=\"1488\" \/><h3 data-start=\"1490\" data-end=\"1517\"><strong data-start=\"1494\" data-end=\"1517\">Module 08: Sniffing<\/strong><\/h3><ul><li data-start=\"1520\" data-end=\"1544\">Packet Sniffing Concepts<\/li><li data-start=\"1547\" data-end=\"1576\">ARP Spoofing and MAC Flooding<\/li><li data-start=\"1579\" data-end=\"1591\">DHCP Attacks<\/li><li data-start=\"1594\" data-end=\"1622\">Wireshark and Sniffing Tools<\/li><\/ul><hr data-start=\"1624\" data-end=\"1627\" \/><h3 data-start=\"1629\" data-end=\"1666\"><strong data-start=\"1633\" data-end=\"1666\">Module 09: Social Engineering<\/strong><\/h3><ul><li data-start=\"1669\" data-end=\"1698\">Social Engineering Techniques<\/li><li data-start=\"1701\" data-end=\"1733\">Phishing, Vishing, Impersonation<\/li><li data-start=\"1736\" data-end=\"1751\">Insider Threats<\/li><li data-start=\"1754\" data-end=\"1769\">Countermeasures<\/li><\/ul><hr data-start=\"1771\" data-end=\"1774\" \/><h3 data-start=\"1776\" data-end=\"1818\"><strong data-start=\"1780\" data-end=\"1818\">Module 10: Denial-of-Service (DoS)<\/strong><\/h3><ul><li data-start=\"1821\" data-end=\"1847\">DoS\/DDoS Attack Techniques<\/li><li data-start=\"1850\" data-end=\"1869\">Botnets and Zombies<\/li><li data-start=\"1872\" data-end=\"1901\">Tools: LOIC, HOIC, HULK, etc.<\/li><li data-start=\"1904\" data-end=\"1939\">Detection and Mitigation Techniques<\/li><\/ul><hr data-start=\"1941\" data-end=\"1944\" \/><h3 data-start=\"1946\" data-end=\"1982\"><strong data-start=\"1950\" data-end=\"1982\">Module 11: Session Hijacking<\/strong><\/h3><ul><li data-start=\"1985\" data-end=\"2013\">Session Hijacking Techniques<\/li><li data-start=\"2016\" data-end=\"2060\">TCP\/IP Hijacking, Cross-Site Request Forgery<\/li><li data-start=\"2063\" data-end=\"2078\">Countermeasures<\/li><\/ul><hr data-start=\"2080\" data-end=\"2083\" \/><h3 data-start=\"2085\" data-end=\"2141\"><strong data-start=\"2089\" data-end=\"2141\">Module 12: Evading IDS, Firewalls, and Honeypots<\/strong><\/h3><ul><li data-start=\"2144\" data-end=\"2179\">IDS\/IPS\/Firewall Evasion Techniques<\/li><li data-start=\"2182\" data-end=\"2207\">Tools: Nmap, Hping, Scapy<\/li><li data-start=\"2210\" data-end=\"2226\">Honeypot Evasion<\/li><\/ul><hr data-start=\"2228\" data-end=\"2231\" \/><h3 data-start=\"2233\" data-end=\"2271\"><strong data-start=\"2237\" data-end=\"2271\">Module 13: Hacking Web Servers<\/strong><\/h3><ul><li data-start=\"2274\" data-end=\"2300\">Web Server Vulnerabilities<\/li><li data-start=\"2303\" data-end=\"2331\">Misconfigurations &amp; Exploits<\/li><li data-start=\"2334\" data-end=\"2367\">Attacks on Apache, IIS, and Nginx<\/li><\/ul><hr data-start=\"2369\" data-end=\"2372\" \/><h3 data-start=\"2374\" data-end=\"2417\"><strong data-start=\"2378\" data-end=\"2417\">Module 14: Hacking Web Applications<\/strong><\/h3><ul><li data-start=\"2420\" data-end=\"2432\">OWASP Top 10<\/li><li data-start=\"2435\" data-end=\"2468\">SQL Injection, XSS, CSRF, RFI\/LFI<\/li><li data-start=\"2471\" data-end=\"2509\">Web Application Vulnerability Scanners<\/li><\/ul><hr data-start=\"2511\" data-end=\"2514\" \/><h3 data-start=\"2516\" data-end=\"2548\"><strong data-start=\"2520\" data-end=\"2548\">Module 15: SQL Injection<\/strong><\/h3><ul><li data-start=\"2551\" data-end=\"2575\">SQL Injection Techniques<\/li><li data-start=\"2578\" data-end=\"2599\">Database Exploitation<\/li><li data-start=\"2602\" data-end=\"2617\">Countermeasures<\/li><\/ul><hr data-start=\"2619\" data-end=\"2622\" \/><h3 data-start=\"2624\" data-end=\"2668\"><strong data-start=\"2628\" data-end=\"2668\">Module 16: Hacking Wireless Networks<\/strong><\/h3><ul><li data-start=\"2671\" data-end=\"2710\">Wireless Encryption (WEP\/WPA\/WPA2\/WPA3)<\/li><li data-start=\"2713\" data-end=\"2734\">Rogue APs, Evil Twins<\/li><li data-start=\"2737\" data-end=\"2782\">Wireless Sniffing Tools (Aircrack-ng, Kismet)<\/li><\/ul><hr data-start=\"2784\" data-end=\"2787\" \/><h3 data-start=\"2789\" data-end=\"2832\"><strong data-start=\"2793\" data-end=\"2832\">Module 17: Hacking Mobile Platforms<\/strong><\/h3><ul><li data-start=\"2835\" data-end=\"2858\">Android and iOS Threats<\/li><li data-start=\"2861\" data-end=\"2880\">Mobile App Security<\/li><li data-start=\"2883\" data-end=\"2913\">Mobile Device Management (MDM)<\/li><\/ul><hr data-start=\"2915\" data-end=\"2918\" \/><h3 data-start=\"2920\" data-end=\"2957\"><strong data-start=\"2924\" data-end=\"2957\">Module 18: IoT and OT Hacking<\/strong><\/h3><ul><li data-start=\"2960\" data-end=\"2988\">IoT Architecture and Threats<\/li><li data-start=\"2991\" data-end=\"3008\">SCADA\/ICS Hacking<\/li><li data-start=\"3011\" data-end=\"3037\">Security Challenges in IoT<\/li><\/ul><hr data-start=\"3039\" data-end=\"3042\" \/><h3 data-start=\"3044\" data-end=\"3078\"><strong data-start=\"3048\" data-end=\"3078\">Module 19: Cloud Computing<\/strong><\/h3><ul><li data-start=\"3081\" data-end=\"3101\">Cloud Service Models<\/li><li data-start=\"3104\" data-end=\"3129\">Cloud Threats and Attacks<\/li><li data-start=\"3132\" data-end=\"3159\">Security in AWS, Azure, GCP<\/li><\/ul><hr data-start=\"3161\" data-end=\"3164\" \/><h3 data-start=\"3166\" data-end=\"3197\"><strong data-start=\"3170\" data-end=\"3197\">Module 20: Cryptography<\/strong><\/h3><ul><li data-start=\"3200\" data-end=\"3236\">Cryptographic Algorithms and Attacks<\/li><li data-start=\"3239\" data-end=\"3270\">Public Key Infrastructure (PKI)<\/li><li data-start=\"3273\" data-end=\"3300\">Hashing, Digital Signatures<\/li><li data-start=\"3303\" data-end=\"3316\">Steganography<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00a0 Module 01: Introduction to Ethical Hacking Information Security Overview Hacking Concepts, Phases &amp; Types Legal Aspects of Ethical Hacking Penetration Testing vs Ethical Hacking Module 02: Footprinting and Reconnaissance Footprinting Concepts and Methodologies Tools for Footprinting Competitive Intelligence DNS Footprinting &amp; WHOIS Email, Social Media, Website Footprinting Module 03: Scanning Networks Network Scanning Techniques [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":97,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-95","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cources"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Certificate Ethical Hackers - Foqhawi Academy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.foqhawi.com\/?p=95\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Certificate Ethical Hackers - Foqhawi Academy\" \/>\n<meta property=\"og:description\" content=\"\u00a0 Module 01: Introduction to Ethical Hacking Information Security Overview Hacking Concepts, Phases &amp; Types Legal Aspects of Ethical Hacking Penetration Testing vs Ethical Hacking Module 02: Footprinting and Reconnaissance Footprinting Concepts and Methodologies Tools for Footprinting Competitive Intelligence DNS Footprinting &amp; WHOIS Email, Social Media, Website Footprinting Module 03: Scanning Networks Network Scanning Techniques [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.foqhawi.com\/?p=95\" \/>\n<meta property=\"og:site_name\" content=\"Foqhawi Academy\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-20T07:59:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-20T08:14:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.foqhawi.com\/wp-content\/uploads\/2025\/07\/CEH.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.foqhawi.com\/?p=95\",\"url\":\"https:\/\/www.foqhawi.com\/?p=95\",\"name\":\"Certificate Ethical Hackers - Foqhawi Academy\",\"isPartOf\":{\"@id\":\"https:\/\/www.foqhawi.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.foqhawi.com\/?p=95#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.foqhawi.com\/?p=95#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.foqhawi.com\/wp-content\/uploads\/2025\/07\/CEH.jpg\",\"datePublished\":\"2025-07-20T07:59:49+00:00\",\"dateModified\":\"2025-07-20T08:14:33+00:00\",\"author\":{\"@id\":\"https:\/\/www.foqhawi.com\/#\/schema\/person\/5e925aa9a4949c95676a83081cd7ea3d\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.foqhawi.com\/?p=95#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.foqhawi.com\/?p=95\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.foqhawi.com\/?p=95#primaryimage\",\"url\":\"https:\/\/www.foqhawi.com\/wp-content\/uploads\/2025\/07\/CEH.jpg\",\"contentUrl\":\"https:\/\/www.foqhawi.com\/wp-content\/uploads\/2025\/07\/CEH.jpg\",\"width\":1400,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.foqhawi.com\/?p=95#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.foqhawi.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Certificate Ethical Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.foqhawi.com\/#website\",\"url\":\"https:\/\/www.foqhawi.com\/\",\"name\":\"Foqhawi Academy\",\"description\":\"Foqhawi For Training And Cosultation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.foqhawi.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.foqhawi.com\/#\/schema\/person\/5e925aa9a4949c95676a83081cd7ea3d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.foqhawi.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7321f685b5a02ab92339e707c4e0b3482f0b674f02504ccc07932b38e37217a5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7321f685b5a02ab92339e707c4e0b3482f0b674f02504ccc07932b38e37217a5?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/foqhawi.com\"],\"url\":\"https:\/\/www.foqhawi.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Certificate Ethical Hackers - Foqhawi Academy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.foqhawi.com\/?p=95","og_locale":"en_US","og_type":"article","og_title":"Certificate Ethical Hackers - Foqhawi Academy","og_description":"\u00a0 Module 01: Introduction to Ethical Hacking Information Security Overview Hacking Concepts, Phases &amp; Types Legal Aspects of Ethical Hacking Penetration Testing vs Ethical Hacking Module 02: Footprinting and Reconnaissance Footprinting Concepts and Methodologies Tools for Footprinting Competitive Intelligence DNS Footprinting &amp; WHOIS Email, Social Media, Website Footprinting Module 03: Scanning Networks Network Scanning Techniques [&hellip;]","og_url":"https:\/\/www.foqhawi.com\/?p=95","og_site_name":"Foqhawi Academy","article_published_time":"2025-07-20T07:59:49+00:00","article_modified_time":"2025-07-20T08:14:33+00:00","og_image":[{"width":1400,"height":1000,"url":"https:\/\/www.foqhawi.com\/wp-content\/uploads\/2025\/07\/CEH.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.foqhawi.com\/?p=95","url":"https:\/\/www.foqhawi.com\/?p=95","name":"Certificate Ethical Hackers - Foqhawi Academy","isPartOf":{"@id":"https:\/\/www.foqhawi.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.foqhawi.com\/?p=95#primaryimage"},"image":{"@id":"https:\/\/www.foqhawi.com\/?p=95#primaryimage"},"thumbnailUrl":"https:\/\/www.foqhawi.com\/wp-content\/uploads\/2025\/07\/CEH.jpg","datePublished":"2025-07-20T07:59:49+00:00","dateModified":"2025-07-20T08:14:33+00:00","author":{"@id":"https:\/\/www.foqhawi.com\/#\/schema\/person\/5e925aa9a4949c95676a83081cd7ea3d"},"breadcrumb":{"@id":"https:\/\/www.foqhawi.com\/?p=95#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.foqhawi.com\/?p=95"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.foqhawi.com\/?p=95#primaryimage","url":"https:\/\/www.foqhawi.com\/wp-content\/uploads\/2025\/07\/CEH.jpg","contentUrl":"https:\/\/www.foqhawi.com\/wp-content\/uploads\/2025\/07\/CEH.jpg","width":1400,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/www.foqhawi.com\/?p=95#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.foqhawi.com\/"},{"@type":"ListItem","position":2,"name":"Certificate Ethical Hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.foqhawi.com\/#website","url":"https:\/\/www.foqhawi.com\/","name":"Foqhawi Academy","description":"Foqhawi For Training And Cosultation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.foqhawi.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.foqhawi.com\/#\/schema\/person\/5e925aa9a4949c95676a83081cd7ea3d","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.foqhawi.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7321f685b5a02ab92339e707c4e0b3482f0b674f02504ccc07932b38e37217a5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7321f685b5a02ab92339e707c4e0b3482f0b674f02504ccc07932b38e37217a5?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/foqhawi.com"],"url":"https:\/\/www.foqhawi.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/www.foqhawi.com\/index.php?rest_route=\/wp\/v2\/posts\/95","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.foqhawi.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.foqhawi.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.foqhawi.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.foqhawi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=95"}],"version-history":[{"count":10,"href":"https:\/\/www.foqhawi.com\/index.php?rest_route=\/wp\/v2\/posts\/95\/revisions"}],"predecessor-version":[{"id":110,"href":"https:\/\/www.foqhawi.com\/index.php?rest_route=\/wp\/v2\/posts\/95\/revisions\/110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.foqhawi.com\/index.php?rest_route=\/wp\/v2\/media\/97"}],"wp:attachment":[{"href":"https:\/\/www.foqhawi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=95"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.foqhawi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=95"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.foqhawi.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=95"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}