{"id":7425,"date":"2017-07-24T13:26:15","date_gmt":"2017-07-24T18:26:15","guid":{"rendered":"https:\/\/hml.iticollege.edu\/?p=7425"},"modified":"2017-07-24T13:26:15","modified_gmt":"2017-07-24T18:26:15","slug":"information-technology-security","status":"publish","type":"post","link":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/","title":{"rendered":"Information Technology Security: Does LINUX Do It Better?"},"content":{"rendered":"<p class=\"alignnone\" title=\"Information Technology Security\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright wp-image-5978\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/05\/IMG_1015-1.jpg\" alt=\"Information Technology Security Program\" width=\"348\" height=\"232\" srcset=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/05\/IMG_1015-1.jpg 1177w, https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/05\/IMG_1015-1-300x200.jpg 300w, https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/05\/IMG_1015-1-1024x683.jpg 1024w, https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/05\/IMG_1015-1-768x512.jpg 768w\" sizes=\"(max-width: 348px) 100vw, 348px\" \/>With the new digital age upon us, information security remains an important aspect of any new or existing business. From protecting crucial and discrete data to stopping breaches and hacks, there are so many things a person can do with an information security degree. In fact, ITI College offers Computer &amp; Information Security Technology Training for all students. This prepares them for an enriching and rewarding career in information security (Infosec). As an essential way to manage processes, tools, and policies, Infosec can truly counter all forms of digital threats and foreign intrusion. With hands-on training and real-time applications for real-world situations, we prepare you to tackle the world of IST with true knowledge and expertise.<\/p>\n<p>With <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/information-security-training\/\">information technology security certification<\/a>, you will have the essential skills and tools for the following:<\/p>\n<p>* Managing all information processing, tools, and policies for leading companies and clients.<\/p>\n<p>* Setting up businesses process that will protect and defend crucial data from being breached or attacked. This includes client correspondences, digital assets, payroll, and discreet documents pertaining to clients, customers, and staff.<\/p>\n<p>* Ensuring maximum protection and security for all data that is transmitted for business purposes. Formatting data to prevent viruses, malware, adware, hacks, breaches, and intrusions.<\/p>\n<h2>LINUX and ITS<\/h2>\n<p>At ITI Technical College, we feature a full range of information security classes for students. This includes LINUX OS and information security courses, which are taught by industry professionals and experienced instructors. In fact, students get to learn how and why so many businesses are switching to LINUX. The latter is not just an operating system but an open-source platform with many features and benefits. LINUX is also known for its compatibility with a myriad of apps, along with hardware, software, cloud, and mobile-based platforms and technologies. In addition, this system which is based on UNIX \u2013 is the preferred mode of security for countless clients and businesses across the world.<\/p>\n<p>If you are looking to secure an <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/what-jobs-call-for-information-security\/\">information security degree<\/a>, we have the top classes and courses that will propel you to new heights in IST. With leading advisors and job placement professionals, we also help students and graduates to prepare for gainful employment after graduation. In fact, here are some industries and sectors that are always demanding the best IT information security experts and specialists:<\/p>\n<p>* Web Development, design, and SEO.<\/p>\n<p>* Product Development and Marketing Research.<\/p>\n<p>* Healthcare \u2013 Medical \u2013 Insurance.<\/p>\n<p>* Commercial \u2013 Retail \u2013 industrial\/manufacturing \u2013 oil and gas \u2013 petrochemicals.<\/p>\n<p>* Sports \u2013 HR \u2013 HRM \u2013 Hospitality \u2013 Education \u2013 Entertainment.<\/p>\n<p>* International Business &#8211; Relations \u2013 Government \u2013 Biotech \u2013 Medical Research.<\/p>\n<p>From LINUX to other information technologies, you get the best skills needed to compete in this challenging and fascinating industry. In fact, information security technologies are always fast-paced and can change at a moment\u2019s notice. With this in mind, we prepare you to tackle anything and everything that comes your way in this growing and expanding industry.<\/p>\n<h2>Information Security Technologies<\/h2>\n<p class=\"alignnone\" title=\"ITI Technical College\"><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2014\/03\/footer-logo-1.png\" alt=\"\" width=\"144\" height=\"150\" \/>As an information security professional, you also learn how to diagnose and assess computer problems. This includes hardware or software issues due to malware and <a href=\"https:\/\/digitalguardian.com\/blog\/what-phishing-attack-defining-and-identifying-different-types-phishing-attacks\" target=\"_blank\" rel=\"noopener\">phishing attacks<\/a>. ITS specialists even learn how to combat identity theft, along with ransomware. Your learned skills will help deter attackers and intruders across vast digital networks and platforms. Similarly, you will learn how to salvage servers, computers, and everything involved with IT for any company or firm. This gives you a competitive edge in the market; especially relating to defense strategies and tools.<\/p>\n<p>For more information, contact <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/\">ITI Technical College<\/a> today and start your journey to a profitable and rewarding career in IT Security Technologies. We are always here to answer questions about course schedules, IST degree programs, and certification for all interested students.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>For more information about graduation rates, the median debt of students who completed the program, and other important information, please visit our website: <\/strong><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the new digital age upon us, information security remains an important aspect of any new or existing business. From [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[92,93,94,97,98,99,100],"class_list":["post-7425","post","type-post","status-publish","format-standard","hentry","category-news","tag-computer-information-security-technology-training","tag-define-information-technology-security","tag-information-security-degree","tag-information-technology-homeland-security","tag-information-technology-security-careers","tag-information-technology-security-certification","tag-information-technology-security-officer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Technology Security Program | ITI Technical College<\/title>\n<meta name=\"description\" content=\"The world ofITI Technical College offers the top Information Technology Security courses for new and existing students. Contact us today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Technology Security Program | ITI Technical College\" \/>\n<meta property=\"og:description\" content=\"The world ofITI Technical College offers the top Information Technology Security courses for new and existing students. Contact us today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ITI College\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-24T18:26:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/05\/IMG_1015-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"headline\":\"Information Technology Security: Does LINUX Do It Better?\",\"datePublished\":\"2017-07-24T18:26:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/\"},\"wordCount\":644,\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/05\/IMG_1015-1.jpg\",\"keywords\":[\"Computer &amp; Information security Technology Training\",\"define information technology security\",\"information security degree\",\"information technology homeland security\",\"information technology security careers\",\"information technology security certification\",\"information technology security officer\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/\",\"name\":\"Information Technology Security Program | ITI Technical College\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/05\/IMG_1015-1.jpg\",\"datePublished\":\"2017-07-24T18:26:15+00:00\",\"author\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"description\":\"The world ofITI Technical College offers the top Information Technology Security courses for new and existing students. Contact us today.\",\"breadcrumb\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/#primaryimage\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/05\/IMG_1015-1.jpg\",\"contentUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/05\/IMG_1015-1.jpg\",\"width\":1177,\"height\":785},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Technology Security: Does LINUX Do It Better?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\",\"name\":\"ITI College\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\"],\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Technology Security Program | ITI Technical College","description":"The world ofITI Technical College offers the top Information Technology Security courses for new and existing students. Contact us today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/","og_locale":"en_US","og_type":"article","og_title":"Information Technology Security Program | ITI Technical College","og_description":"The world ofITI Technical College offers the top Information Technology Security courses for new and existing students. Contact us today.","og_url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/","og_site_name":"ITI College","article_published_time":"2017-07-24T18:26:15+00:00","og_image":[{"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/05\/IMG_1015-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/#article","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/"},"author":{"name":"admin","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"headline":"Information Technology Security: Does LINUX Do It Better?","datePublished":"2017-07-24T18:26:15+00:00","mainEntityOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/"},"wordCount":644,"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/05\/IMG_1015-1.jpg","keywords":["Computer &amp; Information security Technology Training","define information technology security","information security degree","information technology homeland security","information technology security careers","information technology security certification","information technology security officer"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/","name":"Information Technology Security Program | ITI Technical College","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website"},"primaryImageOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/#primaryimage"},"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/05\/IMG_1015-1.jpg","datePublished":"2017-07-24T18:26:15+00:00","author":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"description":"The world ofITI Technical College offers the top Information Technology Security courses for new and existing students. Contact us today.","breadcrumb":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/#primaryimage","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/05\/IMG_1015-1.jpg","contentUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/05\/IMG_1015-1.jpg","width":1177,"height":785},{"@type":"BreadcrumbList","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-technology-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/impactwindowswholesaler.com\/iticollege\/"},{"@type":"ListItem","position":2,"name":"Information Technology Security: Does LINUX Do It Better?"}]},{"@type":"WebSite","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/","name":"ITI College","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/impactwindowswholesaler.com\/iticollege"],"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/7425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/comments?post=7425"}],"version-history":[{"count":0,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/7425\/revisions"}],"wp:attachment":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/media?parent=7425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/categories?post=7425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/tags?post=7425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}