{"id":210,"date":"2025-08-23T02:30:21","date_gmt":"2025-08-23T02:30:21","guid":{"rendered":"https:\/\/faculty.tarleton.edu\/schuessler\/?page_id=210"},"modified":"2025-08-23T02:30:21","modified_gmt":"2025-08-23T02:30:21","slug":"bcis-4342-ethical-hacking","status":"publish","type":"page","link":"https:\/\/faculty.tarleton.edu\/schuessler\/bcis-4342-ethical-hacking\/","title":{"rendered":"BCIS 4342-Ethical Hacking"},"content":{"rendered":"\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"BCIS 4342 | Ethical Hacking &amp; Network Defense \u2013 Cybersecurity, Penetration Testing, and Security Skills\" width=\"660\" height=\"371\" src=\"https:\/\/www.youtube.com\/embed\/videoseries?list=PLRU5YMNncPaqUbrPJXlS1t1YIOOIbwwCm\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":130,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"class_list":["post-210","page","type-page","status-publish","hentry"],"coauthors":[],"author_meta":{"author_link":"https:\/\/faculty.tarleton.edu\/schuessler\/author\/schuessler\/","display_name":"schuessler"},"relative_dates":{"created":"Posted 8 months ago","modified":"Updated 8 months ago"},"absolute_dates":{"created":"Posted on August 23, 2025","modified":"Updated on August 23, 2025"},"absolute_dates_time":{"created":"Posted on August 23, 2025 2:30 am","modified":"Updated on August 23, 2025 2:30 am"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/faculty.tarleton.edu\/schuessler\/wp-json\/wp\/v2\/pages\/210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.tarleton.edu\/schuessler\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.tarleton.edu\/schuessler\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.tarleton.edu\/schuessler\/wp-json\/wp\/v2\/users\/130"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.tarleton.edu\/schuessler\/wp-json\/wp\/v2\/comments?post=210"}],"version-history":[{"count":1,"href":"https:\/\/faculty.tarleton.edu\/schuessler\/wp-json\/wp\/v2\/pages\/210\/revisions"}],"predecessor-version":[{"id":212,"href":"https:\/\/faculty.tarleton.edu\/schuessler\/wp-json\/wp\/v2\/pages\/210\/revisions\/212"}],"wp:attachment":[{"href":"https:\/\/faculty.tarleton.edu\/schuessler\/wp-json\/wp\/v2\/media?parent=210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}