{"id":6554,"date":"2016-12-29T15:08:36","date_gmt":"2016-12-29T21:08:36","guid":{"rendered":"https:\/\/hml.iticollege.edu\/?p=6554"},"modified":"2016-12-29T15:08:36","modified_gmt":"2016-12-29T21:08:36","slug":"learning-the-wep-encryption-with-information-security-degree","status":"publish","type":"post","link":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/","title":{"rendered":"Learning the Shortcomings of WEP Encryption with your Information Security Degree"},"content":{"rendered":"<h2>Information Security Degree<\/h2>\n<p>Since 2013, there have been more Wi-Fi capable devices than there are people on earth. While a fact like this says a lot about how technology in society has made massive strides, it also reinforces the fact that information security is now more important than ever before. One of the greatest challenges for professionals and anybody interested in <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/information-security-training\/\">information security classes<\/a>, is ensuring that these devices have adequate protection when connecting to the millions of available public access points and private Wi-Fi networks that are now ubiquitous in the United States.<\/p>\n<p>One thing that you can be sure of in 2016, is that the outdated WEP protocol is no longer sufficient to protect against unauthorized access and data snooping. Let\u2019s find out why\u2026<\/p>\n<h2>Why WEP No Longer Offers Adequate Security<\/h2>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter\" title=\"Information Security Degree\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg\" alt=\"Information Security Degree\" width=\"1580\" height=\"450\" \/><\/p>\n<p>As early as 2001, security researchers were already telling the world that WEP security was not enough. Fast forward to 2016 and it can be somewhat surprising, and very concerning, to learn that some businesses and households still rely on WEP to secure their private networks. While studying for an information security degree, you will learn the safest ways to protect wireless users, and knowing the reasons why older protocols are ineffective will help you to appreciate what protocols like WPA have to offer.<\/p>\n<p>Ten years ago, it was possible to break a <a href=\"http:\/\/kb.netgear.com\/1141\/What-is-WEP-wireless-encryption\" target=\"_blank\" rel=\"noopener\">WEP encryption<\/a> key in less than 5 seconds, using a relatively slow single core desktop processor. Today, cell phones, laptops, and other wireless devices can achieve the same in as little as three seconds, and it doesn\u2019t even require any particular skillset. Malicious parties can use simple software programs to analyze the packets on a WEP encrypted network, revealing the key which will give them access to the internet connection, data, and devices that are connected to that network. Businesses and home users with networks running WEP security are at risk of having intellectual property and other sensitive information compromised, computers could be infected with malware and viruses, and even identity theft could occur thanks to the limitations of this long outdated wireless security measure.<\/p>\n<p>After completing information security classes and obtaining your qualification, you will have the skills and knowledge to be able to provide invaluable advice to your employer and clients. One of the most important things you can do on a standard Wi-Fi connection, is ensure that it is protected by the newer WPA protocol.<\/p>\n<h2>The Advantages of WPA over WEP<\/h2>\n<p><img decoding=\"async\" class=\"alignleft\" title=\"information security training\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/09\/drafting-small-1.jpg\" alt=\"information security training\" width=\"350\" height=\"208\" \/>WPA has become the standard for home and commercial Wi-Fi networks, and when you take a look at the benefits, it\u2019s not hard to understand why.<\/p>\n<p>The biggest advantage of WPA is that it doesn\u2019t rely on static encryption keys. As data is continually transferred between a WPA enabled Wi-Fi router and the devices connected to it, the encryption key is also being changed. This happens on a per-frame basis, which makes it extremely difficult for an unauthorized party to gain access to the network. Compare this to the static keys on WEP that can be cracked in seconds, and it\u2019s not difficult to understand why professionals with <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/corporate-jobs-you-can-look-forward-to-once-you-take-information-security-training\/\">information security training<\/a>\u00a0will always recommend a form of WPA over the older WEP protocol.<\/p>\n<p>Encryption key changes don\u2019t affect end users on connected and authorized devices, because the router broadcasts the new keys in secure transmissions. This means that WPA is also incredibly user friendly, and there is no additional configuration for users to make after they have connected to a WPA network using a password. WPA also uses a more advanced type of user authentication, which goes beyond the simple MAC address authentication that WEP uses.<\/p>\n<h2>Information Technology Security Careers Begin with Comprehensive Training<\/h2>\n<p>Wi-Fi security is just one important aspect of information security, and you will learn much more when studying at the <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/\">ITI Technical College in Louisiana<\/a>. An information security specialization can lead to a career in network security, corporate IT security, or even roles with government organizations like the Department of Homeland Security.<\/p>\n<p>Contact us today to learn more about available courses, and prepare yourself for an exciting career in an industry that is always changing with the latest advancements in computer and networking technology.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>For more information about graduation rates, the median debt of students who completed the program, and other important information, please visit our website:\u00a0<\/strong><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/\" target=\"_blank\" rel=\"noopener\">https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security Degree Since 2013, there have been more Wi-Fi capable devices than there are people on earth. While a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[92,93,105,94,106,107,96,97,98,99,100],"class_list":["post-6554","post","type-post","status-publish","format-standard","hentry","category-news","tag-computer-information-security-technology-training","tag-define-information-technology-security","tag-information-security-classes","tag-information-security-degree","tag-information-security-training","tag-information-systems-security-school","tag-information-technology-credits","tag-information-technology-homeland-security","tag-information-technology-security-careers","tag-information-technology-security-certification","tag-information-technology-security-officer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Learning the WEP Encryption with Information Security Degree<\/title>\n<meta name=\"description\" content=\"The WEP security protocol is long outdated, and is outright dangerous on modern networks. Learn why and discover a better alternative in the form of WPA.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Learning the WEP Encryption with Information Security Degree\" \/>\n<meta property=\"og:description\" content=\"The WEP security protocol is long outdated, and is outright dangerous on modern networks. Learn why and discover a better alternative in the form of WPA.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/\" \/>\n<meta property=\"og:site_name\" content=\"ITI College\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-29T21:08:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"headline\":\"Learning the Shortcomings of WEP Encryption with your Information Security Degree\",\"datePublished\":\"2016-12-29T21:08:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/\"},\"wordCount\":740,\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg\",\"keywords\":[\"Computer &amp; Information security Technology Training\",\"define information technology security\",\"information security classes\",\"information security degree\",\"information security training\",\"information systems security school\",\"information technology credits\",\"information technology homeland security\",\"information technology security careers\",\"information technology security certification\",\"information technology security officer\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/\",\"name\":\"Learning the WEP Encryption with Information Security Degree\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg\",\"datePublished\":\"2016-12-29T21:08:36+00:00\",\"author\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"description\":\"The WEP security protocol is long outdated, and is outright dangerous on modern networks. Learn why and discover a better alternative in the form of WPA.\",\"breadcrumb\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Learning the Shortcomings of WEP Encryption with your Information Security Degree\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\",\"name\":\"ITI College\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\"],\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Learning the WEP Encryption with Information Security Degree","description":"The WEP security protocol is long outdated, and is outright dangerous on modern networks. Learn why and discover a better alternative in the form of WPA.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/","og_locale":"en_US","og_type":"article","og_title":"Learning the WEP Encryption with Information Security Degree","og_description":"The WEP security protocol is long outdated, and is outright dangerous on modern networks. Learn why and discover a better alternative in the form of WPA.","og_url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/","og_site_name":"ITI College","article_published_time":"2016-12-29T21:08:36+00:00","og_image":[{"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/#article","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/"},"author":{"name":"admin","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"headline":"Learning the Shortcomings of WEP Encryption with your Information Security Degree","datePublished":"2016-12-29T21:08:36+00:00","mainEntityOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/"},"wordCount":740,"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg","keywords":["Computer &amp; Information security Technology Training","define information technology security","information security classes","information security degree","information security training","information systems security school","information technology credits","information technology homeland security","information technology security careers","information technology security certification","information technology security officer"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/","name":"Learning the WEP Encryption with Information Security Degree","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website"},"primaryImageOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/#primaryimage"},"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg","datePublished":"2016-12-29T21:08:36+00:00","author":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"description":"The WEP security protocol is long outdated, and is outright dangerous on modern networks. Learn why and discover a better alternative in the form of WPA.","breadcrumb":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/learning-the-wep-encryption-with-information-security-degree\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/impactwindowswholesaler.com\/iticollege\/"},{"@type":"ListItem","position":2,"name":"Learning the Shortcomings of WEP Encryption with your Information Security Degree"}]},{"@type":"WebSite","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/","name":"ITI College","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/impactwindowswholesaler.com\/iticollege"],"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/6554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/comments?post=6554"}],"version-history":[{"count":0,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/6554\/revisions"}],"wp:attachment":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/media?parent=6554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/categories?post=6554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/tags?post=6554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}