{"id":6395,"date":"2016-09-26T10:38:01","date_gmt":"2016-09-26T15:38:01","guid":{"rendered":"https:\/\/hml.iticollege.edu\/?p=6395"},"modified":"2016-09-26T10:38:01","modified_gmt":"2016-09-26T15:38:01","slug":"information-technology-security-and-homeland-security","status":"publish","type":"post","link":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/","title":{"rendered":"Information Technology Security and Homeland Security"},"content":{"rendered":"<p>You hear often the terms \u201cInformation Technology\u201d and \u201cHomeland Security\u201d, but do you often think of them as going hand and hand? Likely not, although you should! Consider the amount of sensitive information our government houses online and over computer networks. This type of information, if it were released into the wrong hands, would be detrimental to the safety of our country.<\/p>\n<p>Cyber attacks and file hacking are very real, imminent threats \u2013 ones which the most brilliant Information Technology Security minds work hard to protect against. It&#8217;s not difficult to see how or why one could make a stable career from such an important facet of the Information Technology industry. Perhaps you&#8217;re interested, but you&#8217;d like a little more information before you jump right into a pursuit of Information Technology Homeland Security training from ITI Technical College.<\/p>\n<h2>What Exactly Is Homeland Security?<\/h2>\n<p><em><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright\" title=\"Information Technology Security\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg\" alt=\"Information Technology Security\" width=\"413\" height=\"270\" \/><\/em>Simply put, Homeland Security is an umbrella term for America&#8217;s national effort to ensure a homeland that is safe, secure and resilient against terrorism and other hazards. Most hear \u201chomeland security\u201d and think about physical security efforts to prevent terrorism, manage borders, ensure resilience to disasters&#8230; all actual material problems that would arise without the sacrifice and expertise of people like Military soldiers, officers, purposeful government agencies, first responders, political leaders of our country, and <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/the-growing-need-for-computer-information-security-technology-training\/\">IT Professionals<\/a>. At first glance, you may find that last people group strange, but when you consider that one of the responsibilities of America&#8217;s Department of Homeland Security is to Safeguard and Secure Cyberspace, it makes sense.<\/p>\n<p>The role of the <a href=\"https:\/\/www.dhs.gov\/\" target=\"_blank\" rel=\"noopener\">Department of Homeland Security<\/a> as it pertains to cyberspace is to analyze and reduce cyber threats and vulnerabilities, distribute threat warnings, and coordinate the response to cyber incidents to ensure that our computers, networks and cyber systems remain safe. They do this by working with a broad range of industry and state, local, tribal and territorial governments to secure critical infrastructure and information systems.<\/p>\n<h2>So, What is Information Technology Security?<\/h2>\n<p>With the context of Homeland Security in mind, it&#8217;s now easy to see what one might mean by using the phrase, \u201cInformation Technology Security\u201d. In the wide realm of Information Technology, it&#8217;s completely feasible to form a stable, thriving, exciting career as an <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/three-of-the-best-information-technology-security-careers\/\" target=\"_blank\" rel=\"noopener\">Information Technology Security officer<\/a>: where you&#8217;ll play a pivotal role in implementing processes, protocols, and other measures designed to safeguard important information.<\/p>\n<p>IT Security is implemented for everything from use on a personal level to a business level, protecting things like data, conversations via voice and text, pictures, and videos from unauthorized access. Also, as previously mentioned, IT Security is a vital part of protecting our Homeland, the United States of America.<\/p>\n<p>Perhaps you feel great pride towards our country, and you&#8217;d love to be a part of the bigger picture in safeguarding the freedoms and opportunities we have. Perhaps you&#8217;re a wiz on the computer, and you thoroughly enjoy learning how things work, though you don&#8217;t have any official IT training as of yet. If you are interested in an exciting career in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Information_security\" target=\"_blank\" rel=\"noopener\">IT Security<\/a>, look no further than ITI Technical College to provide a great education that will lead you towards success.<\/p>\n<h2>Why Study at ITI Technical College?<\/h2>\n<p><strong><img decoding=\"async\" class=\"alignleft\" title=\"ITI Technical College\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2014\/03\/iti-img.jpg\" alt=\"ITI Technical College\" width=\"290\" height=\"200\" \/><\/strong>If you&#8217;re considering an <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/information-security-training\/\">Information Technology Security training<\/a>, \u00a0there&#8217;s no better choice than the IT Program you&#8217;ll find at ITI Technical College.. Since our founding in 1973, we have provided the best of the best in training programs that exist based on the needs of the time and of the business and industrial community; for decades, our focus has been on training personnel to meet job requirements of the technical age.<\/p>\n<p>Our teaching staff are experts in their fields and are completely dedicated to making the experience a positive one for you that only ends in success. Whether your goal is to work for America&#8217;s Department of Homeland Security, or simply contribute to protecting some other aspect of cyberspace for a company or corporation, <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/\">ITI Technical College<\/a> is the school for you. Don&#8217;t hesitate to check our Web site or give us a call for more information on how you can secure a thriving career in Information Technology Security.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>For more information about graduation rates, the median debt of students who completed the program, and other important information, please visit our website:\u00a0<\/strong><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/\" target=\"_blank\" rel=\"noopener\">https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You hear often the terms \u201cInformation Technology\u201d and \u201cHomeland Security\u201d, but do you often think of them as going hand [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[92,93,105,94,106,107,96,97,98,99,100],"class_list":["post-6395","post","type-post","status-publish","format-standard","hentry","category-news","tag-computer-information-security-technology-training","tag-define-information-technology-security","tag-information-security-classes","tag-information-security-degree","tag-information-security-training","tag-information-systems-security-school","tag-information-technology-credits","tag-information-technology-homeland-security","tag-information-technology-security-careers","tag-information-technology-security-certification","tag-information-technology-security-officer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Technology Security and Homeland Security<\/title>\n<meta name=\"description\" content=\"When it comes to Homeland Security, Information Technology Security is vital. Learn how IT and DHS are related, and how you can form a career with IT Security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Technology Security and Homeland Security\" \/>\n<meta property=\"og:description\" content=\"When it comes to Homeland Security, Information Technology Security is vital. Learn how IT and DHS are related, and how you can form a career with IT Security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ITI College\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-26T15:38:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"headline\":\"Information Technology Security and Homeland Security\",\"datePublished\":\"2016-09-26T15:38:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/\"},\"wordCount\":741,\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg\",\"keywords\":[\"Computer &amp; Information security Technology Training\",\"define information technology security\",\"information security classes\",\"information security degree\",\"information security training\",\"information systems security school\",\"information technology credits\",\"information technology homeland security\",\"information technology security careers\",\"information technology security certification\",\"information technology security officer\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/\",\"name\":\"Information Technology Security and Homeland Security\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg\",\"datePublished\":\"2016-09-26T15:38:01+00:00\",\"author\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"description\":\"When it comes to Homeland Security, Information Technology Security is vital. Learn how IT and DHS are related, and how you can form a career with IT Security.\",\"breadcrumb\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/#primaryimage\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg\",\"contentUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Technology Security and Homeland Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\",\"name\":\"ITI College\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\"],\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Technology Security and Homeland Security","description":"When it comes to Homeland Security, Information Technology Security is vital. Learn how IT and DHS are related, and how you can form a career with IT Security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/","og_locale":"en_US","og_type":"article","og_title":"Information Technology Security and Homeland Security","og_description":"When it comes to Homeland Security, Information Technology Security is vital. Learn how IT and DHS are related, and how you can form a career with IT Security.","og_url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/","og_site_name":"ITI College","article_published_time":"2016-09-26T15:38:01+00:00","og_image":[{"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/#article","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/"},"author":{"name":"admin","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"headline":"Information Technology Security and Homeland Security","datePublished":"2016-09-26T15:38:01+00:00","mainEntityOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/"},"wordCount":741,"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg","keywords":["Computer &amp; Information security Technology Training","define information technology security","information security classes","information security degree","information security training","information systems security school","information technology credits","information technology homeland security","information technology security careers","information technology security certification","information technology security officer"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/","name":"Information Technology Security and Homeland Security","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website"},"primaryImageOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/#primaryimage"},"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg","datePublished":"2016-09-26T15:38:01+00:00","author":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"description":"When it comes to Homeland Security, Information Technology Security is vital. Learn how IT and DHS are related, and how you can form a career with IT Security.","breadcrumb":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/#primaryimage","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg","contentUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security-and-homeland-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/impactwindowswholesaler.com\/iticollege\/"},{"@type":"ListItem","position":2,"name":"Information Technology Security and Homeland Security"}]},{"@type":"WebSite","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/","name":"ITI College","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/impactwindowswholesaler.com\/iticollege"],"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/6395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/comments?post=6395"}],"version-history":[{"count":0,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/6395\/revisions"}],"wp:attachment":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/media?parent=6395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/categories?post=6395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/tags?post=6395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}