{"id":7557,"date":"2017-09-09T21:07:29","date_gmt":"2017-09-10T02:07:29","guid":{"rendered":"https:\/\/hml.iticollege.edu\/?p=7557"},"modified":"2017-09-09T21:07:29","modified_gmt":"2017-09-10T02:07:29","slug":"three-hacking-myths-busted","status":"publish","type":"post","link":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/","title":{"rendered":"Three Hacking Myths Busted"},"content":{"rendered":"<p>If you love the challenge of discovering security vulnerabilities, and if you have a talent for coding and deep analysis, then information security classes could be the stepping stone that you need to obtain a career in information security.<\/p>\n<p>The industry is constantly evolving, and always provides a challenge, and the salary packages are amongst the best that you\u2019ll find in <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/enroll-in-information-technology-school-to-secure-your-future\/\">information technology<\/a>. If you\u2019re thinking about furthering your education, you can start by learning some of the most common hacking myths and misconceptions.<\/p>\n<h2><strong>Myth 1: Hacking is Only Used for Illegal Purposes<\/strong><\/h2>\n<p>In your information security classes, you\u2019ll discover that hacking is not only used for illegal purposes. While the media often portrays hacking as a way to steal data for disruptive purposes or even for financial gain, the truth is that a lot of companies pay money to information security training graduates to perform what is known as white hat hacking.<\/p>\n<p>This type of hacking is intended to test security solutions and expose vulnerabilities. One of the most common terms used for this type of hacking is penetration testing.<\/p>\n<p>By exposing the vulnerabilities in a server, a website, or any type of computer system, an internet security professional will then be able to develop robust solutions to protect against similar hacks. If you like the challenge of finding the vulnerabilities in software, but you want to use your skills for positive outcomes, then an <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/help-protect-the-future-with-an-information-security-degree\/\">information security degree<\/a> could be what you need to start your dream career.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-6725 size-full\" title=\"information security degree\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg\" alt=\"Hacking Myths Busted \" width=\"1580\" height=\"450\" srcset=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg 1580w, https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1-300x85.jpg 300w, https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1-1024x292.jpg 1024w, https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1-768x219.jpg 768w, https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1-1536x437.jpg 1536w\" sizes=\"(max-width: 1580px) 100vw, 1580px\" \/><\/p>\n<h2><strong>Myth 2: Hacking Uses High Tech Software That the Average Person Wouldn\u2019t Understand<\/strong><\/h2>\n<p>Watch any movie that features hacking as a plot element, and you\u2019ll see that the process of hacking is glamorized with the use of advanced-looking applications, cryptic symbols, and the infamous \u2018uploading virus\u2019 graphic that is often used.<\/p>\n<p>The reality is that much of the white hat hacking performed today is done through simple web applications or other software that doesn\u2019t look much different from any other office software. The most \u2018advanced\u2019 looking hacking you might see, is when a command line interface is used to hack a computer or network.<\/p>\n<p>What people stereotypically see as hacking could simply be a person using telnet to access a remote system, they could be taking logs from a server or a network device, or they could simply use a command line interface to run network connectivity tests.<\/p>\n<p>The reality of hacking is much different from what Hollywood makes it out to be, and you can safely assume that a glance at a hacker\u2019s screen wouldn\u2019t reveal anything that stands out as being suspicious.<\/p>\n<h2><strong>Myth 3: An Interest in Hacking Will Not Lead to a Career<\/strong><\/h2>\n<p>This has to be one of the biggest myths of all. People that enjoy hacking are usually technically minded people who like the challenge of identifying security flaws and exploiting them. For the majority of people, a passion for hacking is not related to malicious behavior, and there are countless legitimate hacking conventions held around the world every year. Leading security companies hire the best hackers in the world, because they are among the few people who have the experience and analytical skills to identify the deepest security risks, and they can develop solutions that are specifically intended to repel hackers.<\/p>\n<p>If you\u2019re someone with an interest in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_programming\" target=\"_blank\" rel=\"noopener\">computer coding<\/a>, networking, and hacking to discover security flaws, then information security classes can help you to further develop your talent and put it towards a legitimate, respectable, and highly compensated career.<\/p>\n<h2><strong>Get Your Information Technology Security Certification at ITI Technical College<\/strong><\/h2>\n<p>It\u2019s time to take a step towards one of the most rewarding careers available. Put your skills and knowledge to use as a security specialist by studying for your <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/information-security-training\/\">information security degree<\/a> at ITI Technical College.<\/p>\n<p>Call us today to discuss enrollment requirements and learn more about our <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/our-programs\/information-technology\/\">Information Technology Associate of Occupational Studies (AOS) Degree program<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>For more information about graduation rates, the median debt of students who completed the program, and other important information, please visit our website:\u00a0<\/strong><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you love the challenge of discovering security vulnerabilities, and if you have a talent for coding and deep analysis, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[92,93,97,98,99,100],"class_list":["post-7557","post","type-post","status-publish","format-standard","hentry","category-news","tag-computer-information-security-technology-training","tag-define-information-technology-security","tag-information-technology-homeland-security","tag-information-technology-security-careers","tag-information-technology-security-certification","tag-information-technology-security-officer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Three Hacking Myths Busted<\/title>\n<meta name=\"description\" content=\"What Are The Myths About Hacking A Website? Learn More With An Information Security Degree College In Baton Rouge, Louisiana.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three Hacking Myths Busted\" \/>\n<meta property=\"og:description\" content=\"What Are The Myths About Hacking A Website? Learn More With An Information Security Degree College In Baton Rouge, Louisiana.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/\" \/>\n<meta property=\"og:site_name\" content=\"ITI College\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-10T02:07:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"headline\":\"Three Hacking Myths Busted\",\"datePublished\":\"2017-09-10T02:07:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/\"},\"wordCount\":693,\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg\",\"keywords\":[\"Computer &amp; Information security Technology Training\",\"define information technology security\",\"information technology homeland security\",\"information technology security careers\",\"information technology security certification\",\"information technology security officer\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/\",\"name\":\"Three Hacking Myths Busted\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg\",\"datePublished\":\"2017-09-10T02:07:29+00:00\",\"author\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"description\":\"What Are The Myths About Hacking A Website? Learn More With An Information Security Degree College In Baton Rouge, Louisiana.\",\"breadcrumb\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Three Hacking Myths Busted\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\",\"name\":\"ITI College\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\"],\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three Hacking Myths Busted","description":"What Are The Myths About Hacking A Website? Learn More With An Information Security Degree College In Baton Rouge, Louisiana.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/","og_locale":"en_US","og_type":"article","og_title":"Three Hacking Myths Busted","og_description":"What Are The Myths About Hacking A Website? Learn More With An Information Security Degree College In Baton Rouge, Louisiana.","og_url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/","og_site_name":"ITI College","article_published_time":"2017-09-10T02:07:29+00:00","og_image":[{"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/#article","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/"},"author":{"name":"admin","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"headline":"Three Hacking Myths Busted","datePublished":"2017-09-10T02:07:29+00:00","mainEntityOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/"},"wordCount":693,"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg","keywords":["Computer &amp; Information security Technology Training","define information technology security","information technology homeland security","information technology security careers","information technology security certification","information technology security officer"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/","name":"Three Hacking Myths Busted","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website"},"primaryImageOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/#primaryimage"},"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg","datePublished":"2017-09-10T02:07:29+00:00","author":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"description":"What Are The Myths About Hacking A Website? Learn More With An Information Security Degree College In Baton Rouge, Louisiana.","breadcrumb":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/three-hacking-myths-busted\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/impactwindowswholesaler.com\/iticollege\/"},{"@type":"ListItem","position":2,"name":"Three Hacking Myths Busted"}]},{"@type":"WebSite","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/","name":"ITI College","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/impactwindowswholesaler.com\/iticollege"],"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/7557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/comments?post=7557"}],"version-history":[{"count":0,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/7557\/revisions"}],"wp:attachment":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/media?parent=7557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/categories?post=7557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/tags?post=7557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}