{"id":6523,"date":"2016-12-08T09:17:01","date_gmt":"2016-12-08T15:17:01","guid":{"rendered":"https:\/\/hml.iticollege.edu\/?p=6523"},"modified":"2016-12-08T09:17:01","modified_gmt":"2016-12-08T15:17:01","slug":"information-security-training-for-ddos-attacks","status":"publish","type":"post","link":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/","title":{"rendered":"Information Security Training for DDoS Attacks"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg\" alt=\"\" width=\"474\" height=\"310\" \/>According to statistics from one of the world\u2019s leading internet security companies, there were more than half a billion data breaches in 2015 that resulted in the theft or loss of personal information. The same company found that more than 75% of websites feature critical vulnerabilities that could easily be exploited by malicious parties. What these figures tell us is that security should be a major concern in the digital age, and anybody studying at an <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/information-security-training\/\">information systems security school<\/a> will be well placed to face the future challenges of cyber threats in the United States and around the world.<\/p>\n<p>If you\u2019re interested in information security classes, then you\u2019re going to be learning about the data breaches and potential threats that exist. When you begin your studies, you will learn about some of the most common attacks made on computer systems, and a distributed denial of service attack (DDoS) will be one of the first ones that you look at.<\/p>\n<h2>What is a DDoS Attack?<\/h2>\n<p>A DDoS attack is a relatively unsophisticated attack where a malicious party attempts to disrupt or completely incapacitate a network or internet resources. This could mean that an attacker stops a website from functioning, or they could even attempt to go for specific critical services such as payment gateways, email servers, file servers, or other resources.<\/p>\n<p>The attacks can be described as \u2018flooding\u2019 a resource. The unrelenting flood of requests sent from the attacker will work to overload the available resources on a targeted server. The result is that the server is no longer able to service legitimate requests, and in some cases the server may shut down.<\/p>\n<p>Attacks are not made from a single machine or network resource, but instead come from multiple machines (sometimes numbering in the hundreds or thousands), making it notoriously difficult to isolate the originating attacker. Disruptive packets can be targeted at HTTP, cross site scripting, or may come in the form of SQL statements.<\/p>\n<h2>Learning How to Prevent DDoS Attacks in Information Security Training School<\/h2>\n<p><img decoding=\"async\" class=\"alignleft\" title=\"information security classes\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2014\/03\/iti-img.jpg\" alt=\"information security classes\" width=\"290\" height=\"200\" \/>There are a number of strategies that can be used to prevent malicious traffic from reaching a website or other resource. Because DoS attacks are distributed across many unique IP addresses and ISPs, simple blacklisting is ineffective. One of the most important ways that modern businesses protect their online resources is with specialized hardware.<\/p>\n<p>An application front-end can be used and implemented in the network layer before webservers, and this type of hardware will analyze traffic to identify DDoS attacks before they reach their target. In this way, legitimate data can be prioritized, while malicious packets can be dropped. A similar process can be achieved through software, which is known as upstream filtering.<\/p>\n<p>You will learn in your <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/learn-to-manage-systems-of-all-types-at-information-security-school\/\">information security classes<\/a> that upstream filtering is a complex process where incoming traffic is passed through a number of channels before reaching a server. Proxies and tunnels can be used, and if the system is designed correctly, only legitimate traffic will be handed over to the web server at the end of the filtering process.<\/p>\n<p>Many commercial internet security providers offer <a href=\"https:\/\/en.wikipedia.org\/wiki\/DDoS_mitigation\" target=\"_blank\" rel=\"noopener\">DDoS protection<\/a> by using a combination of application front-end filtering and upstream filtering.<\/p>\n<h2>Develop The Skills to Serve a Growing Need<\/h2>\n<p><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/our-programs\/information-technology\/\">Information technology security certification<\/a> will provide you with the knowledge and skills that you need to begin a rewarding career in IT. Security experts are some of the highest paid professionals in the tech industry, and there is a growing and continuous need for their presence. If you want to ensure that you\u2019re ready for the challenges of today and the future, then you\u2019ll need the right training to get you there.<\/p>\n<p><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/\">ITI Technical College<\/a> in Louisiana offers IT training that is focused on the real needs and demands of industries across America. Contact us today for enrolment details, and we\u2019ll help you to find the right course of study that will allow you to meet your goals in IT.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>For more information about graduation rates, the median debt of students who completed the program, and other important information, please visit our website:\u00a0<\/strong><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/\" target=\"_blank\" rel=\"noopener\">https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to statistics from one of the world\u2019s leading internet security companies, there were more than half a billion data [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[92,93,105,94,106,107,96,97,98,99,100],"class_list":["post-6523","post","type-post","status-publish","format-standard","hentry","category-news","tag-computer-information-security-technology-training","tag-define-information-technology-security","tag-information-security-classes","tag-information-security-degree","tag-information-security-training","tag-information-systems-security-school","tag-information-technology-credits","tag-information-technology-homeland-security","tag-information-technology-security-careers","tag-information-technology-security-certification","tag-information-technology-security-officer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security Training for DDoS Attacks<\/title>\n<meta name=\"description\" content=\"Information security training is critical in the digital age. Prepare for your IT career by studying the methods that protect against DDoS attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Training for DDoS Attacks\" \/>\n<meta property=\"og:description\" content=\"Information security training is critical in the digital age. Prepare for your IT career by studying the methods that protect against DDoS attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ITI College\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-08T15:17:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"headline\":\"Information Security Training for DDoS Attacks\",\"datePublished\":\"2016-12-08T15:17:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/\"},\"wordCount\":696,\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg\",\"keywords\":[\"Computer &amp; Information security Technology Training\",\"define information technology security\",\"information security classes\",\"information security degree\",\"information security training\",\"information systems security school\",\"information technology credits\",\"information technology homeland security\",\"information technology security careers\",\"information technology security certification\",\"information technology security officer\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/\",\"name\":\"Information Security Training for DDoS Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg\",\"datePublished\":\"2016-12-08T15:17:01+00:00\",\"author\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"description\":\"Information security training is critical in the digital age. Prepare for your IT career by studying the methods that protect against DDoS attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/#primaryimage\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg\",\"contentUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security Training for DDoS Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\",\"name\":\"ITI College\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\"],\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Training for DDoS Attacks","description":"Information security training is critical in the digital age. Prepare for your IT career by studying the methods that protect against DDoS attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Training for DDoS Attacks","og_description":"Information security training is critical in the digital age. Prepare for your IT career by studying the methods that protect against DDoS attacks.","og_url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/","og_site_name":"ITI College","article_published_time":"2016-12-08T15:17:01+00:00","og_image":[{"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/#article","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/"},"author":{"name":"admin","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"headline":"Information Security Training for DDoS Attacks","datePublished":"2016-12-08T15:17:01+00:00","mainEntityOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/"},"wordCount":696,"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg","keywords":["Computer &amp; Information security Technology Training","define information technology security","information security classes","information security degree","information security training","information systems security school","information technology credits","information technology homeland security","information technology security careers","information technology security certification","information technology security officer"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/","name":"Information Security Training for DDoS Attacks","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website"},"primaryImageOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/#primaryimage"},"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg","datePublished":"2016-12-08T15:17:01+00:00","author":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"description":"Information security training is critical in the digital age. Prepare for your IT career by studying the methods that protect against DDoS attacks.","breadcrumb":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/#primaryimage","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg","contentUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/04\/ITsupport1.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-for-ddos-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/impactwindowswholesaler.com\/iticollege\/"},{"@type":"ListItem","position":2,"name":"Information Security Training for DDoS Attacks"}]},{"@type":"WebSite","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/","name":"ITI College","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/impactwindowswholesaler.com\/iticollege"],"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/6523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/comments?post=6523"}],"version-history":[{"count":0,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/6523\/revisions"}],"wp:attachment":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/media?parent=6523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/categories?post=6523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/tags?post=6523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}