
{"id":20293,"date":"2024-03-15T13:49:31","date_gmt":"2024-03-15T13:49:31","guid":{"rendered":"https:\/\/stage.cloudthat.com\/training\/?post_type=stm-courses&#038;p=20293"},"modified":"2025-04-01T13:07:51","modified_gmt":"2025-04-01T13:07:51","slug":"aws-security-best-practices","status":"publish","type":"stm-courses","link":"https:\/\/stage.cloudthat.com\/training\/aws\/aws-security-best-practices","title":{"rendered":"AWS Security Best Practices"},"content":{"rendered":"<p>This intermediate-level 1-day course covers security best practices on AWS Cloud. This course covers AWS Shared Security responsibility model, Compliance in AWS. Considering the customer challenges, the course introduces learners to various Frameworks and standards to be used to establish best practices. Learners will also understand how to secure network infrastructure in AWS, EC2 compute hardening and Monitoring and Alerting concepts in AWS. This course also helps you in AWS Certified Security &#8211; Specialty exam preparation.<\/p>\n<p><span style=\"color: #ff0000;\"><strong>Note: This course has expired. Please contact us to explore alternative courses that best fit your learning needs or browse our website for a comprehensive list of available courses.<\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This intermediate-level 1-day course covers security best practices on AWS Cloud. This course covers AWS Shared Security responsibility model, Compliance in AWS. Considering the customer challenges, the course introduces learners to various Frameworks and standards to be used to establish best practices. Learners will also understand how to secure network infrastructure in AWS, EC2 compute [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":13808,"template":"","meta":{"footnotes":""},"stm_lms_course_taxonomy":[59],"metadata":{"stm_lms_product_id":["20294"],"_edit_lock":["1743515743:1508"],"_edit_last":["1508"],"permalink_customizer":["aws\/aws-security-best-practices"],"permalink_customizer_regenerate_status":["1"],"_wp_page_template":["default"],"price":["19900"],"wpdocs-meta-bdt":["19900"],"wpdocs-meta-gbp":["649"],"wpdocs-meta-usd":["799"],"_yoast_wpseo_estimated-reading-time-minutes":["1"],"_yoast_wpseo_wordproof_timestamp":[""],"popular_course":["0"],"_popular_course":["field_64253688bc2e5"],"educational_schema":[""],"_educational_schema":["field_652fbbf6f589a"],"course_banner_image":[""],"_course_banner_image":["field_63c69a6b81cf1"],"mobile_banner_image":[""],"_mobile_banner_image":["field_63cf93896d207"],"banner_link":[""],"_banner_link":["field_63c69a9681cf2"],"banner_image":[""],"_banner_image":["field_621873548f922"],"banner_description":["AWS Security Best Practices enables learners to design and implement safe and secure workloads. You will learn how to secure your network infrastructure, tighten the security of compute resources and also respond to suspicious events quickly. Hands-on lab provides practical exposure to configure the security best practices using various tools."],"_banner_description":["field_612c733ed3564"],"overview_section_heading":["AWS Security Best Practices Course Overview:"],"_overview_section_heading":["field_64538867ffdd0"],"after_completing_course_heading":["After Completing the course AWS Security Best Practices, students will be able to:"],"_after_completing_course_heading":["field_645c78ade3f50"],"after_completing_course_0_desciption":["Explain the AWS Shared Security Responsibility model and Compliance in AWS"],"_after_completing_course_0_desciption":["field_6103ad2f9f5b2"],"after_completing_course_1_desciption":["Describe the various Frameworks and standards used to implement security"],"_after_completing_course_1_desciption":["field_6103ad2f9f5b2"],"after_completing_course_2_desciption":["Design and implement a secure network infrastructure"],"_after_completing_course_2_desciption":["field_6103ad2f9f5b2"],"after_completing_course_3_desciption":["Design and implement compute hardening"],"_after_completing_course_3_desciption":["field_6103ad2f9f5b2"],"after_completing_course_4_desciption":["Design and implement a logging solution for monitoring and alerting"],"_after_completing_course_4_desciption":["field_6103ad2f9f5b2"],"after_completing_course":["5"],"_after_completing_course":["field_6103aae828228"],"key_features_heading":["AWS Security Best Practices Key Features: "],"_key_features_heading":["field_645388ceffdd1"],"key_features_0_lists":["Accelerate their preparation for AWS Certified Security - Specialty exam"],"_key_features_0_lists":["field_6103ad559f5b3"],"key_features":["5"],"_key_features":["field_6103aaff28229"],"who_should_attend_heading":["Who can participate in the training AWS Security Best Practices? "],"_who_should_attend_heading":["field_645388faffdd2"],"who_should_attend":["4"],"_who_should_attend":["field_6103ab0d2822a"],"prerequisites_heading":["What are the prerequisites for the training?"],"_prerequisites_heading":["field_64538a51ffdd3"],"prerequisites_text":["<ul>Participants of this course must have completed the following courses:<\/ul>\r\n<li>AWS Security Fundamentals <\/li>\r\n<li>AWS Security Essentials <\/li>\r\n"],"_prerequisites_text":["field_612c7498c4b84"],"question_sets_details_heading":[""],"_question_sets_details_heading":["field_65d303841f38d"],"question_sets_details_description":[""],"_question_sets_details_description":["field_65d303841f38e"],"question_sets_details_button_text":[""],"_question_sets_details_button_text":["field_65d303841f38f"],"question_sets_details_question_sets":[""],"_question_sets_details_question_sets":["field_65d303841f390"],"question_sets_details":[""],"_question_sets_details":["field_65d303841f38c"],"category_features_heading":[""],"_category_features_heading":["field_644b8ff35049c"],"category_features_features":[""],"_category_features_features":["field_644b90025049d"],"category_features_cta_text":[""],"_category_features_cta_text":["field_644b90285049f"],"category_features_cta_link":[""],"_category_features_cta_link":["field_644b902d504a0"],"category_features":[""],"_category_features":["field_644b8fe15049b"],"course_features_0_heading":["Why choose CloudThat as your training partner? "],"_course_features_0_heading":["field_644a0fae0e67e"],"course_features_0_features_list":["7"],"_course_features_0_features_list":["field_644a0fb70e67f"],"course_features_0_background_color":["a:1:{i:0;s:4:\"blue\";}"],"_course_features_0_background_color":["field_644a0fde0e681"],"course_features":["2"],"_course_features":["field_644a0fa10e67d"],"certification_heading":["Certification Details: "],"_certification_heading":["field_64538bffffdd5"],"certification":["1"],"_certification":["field_6103ab1a2822b"],"about_trainer":[""],"_about_trainer":["field_6103ab6c2822f"],"course_fee_heading":[""],"_course_fee_heading":["field_64538c1cffdd6"],"course_fee_list":[""],"_course_fee_list":["field_6103abb728234"],"brochure_pdf":[""],"_brochure_pdf":["field_61232e258f89b"],"trainer":[""],"_trainer":["field_6124990e13784"],"course_outline_heading":["Modules Covered:"],"_course_outline_heading":["field_64538a8effdd4"],"course_section":["4"],"_course_section":["field_612f4f27b0276"],"note_section":["Note: This course has expired. Please contact us to explore alternative courses that best fit your learning needs or browse our website for a comprehensive list of available courses."],"_note_section":["field_616d3ed46bbd2"],"popular_sort":[""],"_popular_sort":["field_6172496402af3"],"related_courses":["a:3:{i:0;s:5:\"20142\";i:1;s:5:\"20156\";i:2;s:4:\"8560\";}"],"_related_courses":["field_61c453ca6b2dd"],"reviews_heading":[""],"_reviews_heading":["field_64538c39ffdd7"],"review_rating":[""],"_review_rating":["field_62a813a92bee6"],"total_review_count":["2140"],"_total_review_count":["field_62b002d8d2de5"],"average_review_count":["5.5"],"_average_review_count":["field_62b00367d2de6"],"faq_heading":[""],"_faq_heading":["field_64538c59ffdd8"],"curriculum":[""],"featured":[""],"views":["2722"],"level":["intermediate"],"current_students":["0"],"duration_info":["1 Day"],"video_duration":[""],"status":[""],"status_dates":[""],"not_single_sale":[""],"sale_price":[""],"sale_price_dates":[""],"enterprise_price":[""],"not_membership":[""],"affiliate_course":[""],"affiliate_course_text":[""],"affiliate_course_link":[""],"expiration_course":[""],"end_time":[""],"drip_content":[""],"prerequisites":[""],"prerequisite_passing_level":[""],"announcement":[""],"faq":["[{\"question\":\"What is AWS Security Best Practices training for?\",\"answer\":\"The AWS Security Essentials training provides a deep dive on essential topics, best practices, and hands-on labs related to security aspects and security-oriented services within the Amazon Web Services (AWS) cloud environment.\"},{\"question\":\"What will this training enable the learners?\",\"answer\":\"It will enable learners to enable security of network infrastructure, compute hardening and implementing logging solutions on AWS with the knowledge and skills acquired in this training.\"},{\"question\":\"What is the duration of this training?\",\"answer\":\"This is a 1-day training.\"},{\"question\":\"Where to get started with AWS Training and Certification Security learning path?\",\"answer\":\"AWS Security Essentials and AWS Security Best Practices courses where you learn fundamental AWS Cloud security concepts.\"}]"],"course_files_pack":[""],"course_certificate":[""],"type":[""],"video_type":[""],"presto_player_idx":[""],"lesson_video":[""],"lesson_video_poster":[""],"lesson_video_width":[""],"lesson_shortcode":[""],"lesson_embed_ctx":[""],"lesson_youtube_url":[""],"lesson_stream_url":[""],"lesson_vimeo_url":[""],"lesson_ext_link_url":[""],"duration":[""],"preview":[""],"lesson_excerpt":[""],"lesson_files_pack":[""],"questions":[""],"quiz_style":[""],"duration_measure":[""],"correct_answer":[""],"passing_grade":[""],"re_take_cut":[""],"random_questions":[""],"answers":[""],"question_explanation":[""],"question_view_type":[""],"review_course":[""],"review_user":[""],"review_mark":[""],"order":[""],"absolute":[""],"sticky":[""],"sticky_threshold":[""],"sticky_threshold_color":[""],"stm_agenda":[""],"stm_host":[""],"stm_select_approved_denied":[""],"stm_multiselect_approved":[""],"stm_multiselect_denied":[""],"stm_date":[""],"stm_time":[""],"stm_timezone":[""],"stm_duration":[""],"stm_password":[""],"stm_waiting_room":[""],"stm_join_before_host":[""],"stm_host_join_start":[""],"stm_start_after_participants":[""],"stm_mute_participants":[""],"stm_enforce_login":[""],"stm_alternative_hosts":[""],"author_id":[""],"emails":[""],"_yoast_wpseo_primary_stm_lms_course_taxonomy":["59"],"key_features_1_lists":["Analyse customer challenges in ensuring security at different levels"],"_key_features_1_lists":["field_6103ad559f5b3"],"key_features_2_lists":["Understand AWS Shared Security Responsibility model"],"_key_features_2_lists":["field_6103ad559f5b3"],"key_features_3_lists":["Be aware of various Frameworks and standards used in security best practices"],"_key_features_3_lists":["field_6103ad559f5b3"],"key_features_4_lists":["Design and implement security for your AWS network infrastructure, Compute resources and logging solution with the help of hands-on labs."],"_key_features_4_lists":["field_6103ad559f5b3"],"who_should_attend_0_attend_lists":["Solutions architects"],"_who_should_attend_0_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_1_attend_lists":["Cloud engineers, including security engineers"],"_who_should_attend_1_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_2_attend_lists":["Delivery and implementation engineers"],"_who_should_attend_2_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_3_attend_lists":["AWS or Security Aspirant Students or job seekers"],"_who_should_attend_3_attend_lists":["field_6103adfb3f3e4"],"course_features_0_features_list_0_list":["CloudThat has a strong reputation and a proven track record of delivering high-quality training programs that always exceeds clients\u2019 expectations."],"_course_features_0_features_list_0_list":["field_644a0fc80e680"],"course_features_0_features_list_1_list":["CloudThat has expertise and specialization in multi cloud domains and always ensure they have experience in delivering training programs relevant to your industry, field, or specific learning objectives."],"_course_features_0_features_list_1_list":["field_644a0fc80e680"],"course_features_0_features_list_2_list":["CloudThat has qualified trainers with industry experience who provide valuable insights and practical knowledge in their training deliveries facilitating a great learning."],"_course_features_0_features_list_2_list":["field_644a0fc80e680"],"course_features_0_features_list_3_list":["CloudThat has ability to customize programs to meet your specific needs and objectives. Flexibility in delivery formats, such as on-site, online, blended, weekend learning programs."],"_course_features_0_features_list_3_list":["field_644a0fc80e680"],"course_features_0_features_list_4_list":["CloudThat adopts innovative and engaging learning methods to ensure effective knowledge transfer and skill development including certification preparation assistance, post-training support, labs, case studies, experiential learning and assessments."],"_course_features_0_features_list_4_list":["field_644a0fc80e680"],"course_features_0_features_list_5_list":["CloudThat offers well-designed materials that can enhance the learning experience and serve as valuable resources for participants."],"_course_features_0_features_list_5_list":["field_644a0fc80e680"],"course_features_0_features_list_6_list":["CloudThat offers its trainings at affordable prices to ensure customers get the best learning experience at a best price and Value for their Money."],"_course_features_0_features_list_6_list":["field_644a0fc80e680"],"course_features_1_heading":["Learning objective of course :"],"_course_features_1_heading":["field_644a0fae0e67e"],"course_features_1_features_list_0_list":["Explain the AWS Shared Security Responsibility model and Compliance in AWS"],"_course_features_1_features_list_0_list":["field_644a0fc80e680"],"course_features_1_features_list_1_list":["Describe the various Frameworks and standards used to implement security"],"_course_features_1_features_list_1_list":["field_644a0fc80e680"],"course_features_1_features_list_2_list":["Design and implement a secure network infrastructure"],"_course_features_1_features_list_2_list":["field_644a0fc80e680"],"course_features_1_features_list_3_list":["Design and implement compute hardening"],"_course_features_1_features_list_3_list":["field_644a0fc80e680"],"course_features_1_features_list_4_list":["Design and implement a logging solution for monitoring and alerting"],"_course_features_1_features_list_4_list":["field_644a0fc80e680"],"course_features_1_features_list":["5"],"_course_features_1_features_list":["field_644a0fb70e67f"],"course_features_1_background_color":["a:1:{i:0;s:5:\"white\";}"],"_course_features_1_background_color":["field_644a0fde0e681"],"certification_0_short_description":[""],"_certification_0_short_description":["field_6103ab2f2822c"],"certification_0_list_content":[""],"_certification_0_list_content":["field_6103ab4a2822d"],"certification_0_image":["17714"],"_certification_0_image":["field_6103ab5b2822e"],"course_section_0_module_title":["AWS Security Overview"],"_course_section_0_module_title":["field_612f5535940c3"],"course_section_0_module_description":[""],"_course_section_0_module_description":["field_612f564c921af"],"course_section_0_section_0_title":[""],"_course_section_0_section_0_title":["field_612f5233b0278"],"course_section_0_section_0_lesson_list_0_lession_title":["Shared responsibility model"],"_course_section_0_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_1_lession_title":["Customer challenges"],"_course_section_0_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_2_lession_title":["Frameworks and standards"],"_course_section_0_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_3_lession_title":["Establishing best practices"],"_course_section_0_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_4_lession_title":["Compliance in AWS"],"_course_section_0_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list":["5"],"_course_section_0_section_0_lesson_list":["field_612f530a0ac40"],"course_section_0_section":["1"],"_course_section_0_section":["field_612f51e6b0277"],"course_section_1_module_title":["Securing the Network"],"_course_section_1_module_title":["field_612f5535940c3"],"course_section_1_module_description":[""],"_course_section_1_module_description":["field_612f564c921af"],"course_section_1_section_0_title":[""],"_course_section_1_section_0_title":["field_612f5233b0278"],"course_section_1_section_0_lesson_list_0_lession_title":["Flexible and secure"],"_course_section_1_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_1_lession_title":["Security inside the Amazon Virtual Private Cloud (Amazon VPC)"],"_course_section_1_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_2_lession_title":["Security services"],"_course_section_1_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_3_lession_title":["Third-party security solutions"],"_course_section_1_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list":["4"],"_course_section_1_section_0_lesson_list":["field_612f530a0ac40"],"course_section_1_section_1_title":["Lab 1: Controlling the Network"],"_course_section_1_section_1_title":["field_612f5233b0278"],"course_section_1_section_1_lesson_list_0_lession_title":["Create a three-security zone network infrastructure."],"_course_section_1_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_1_lession_title":["Implement network segmentation using security groups, Network Access Control Lists (NACLs), and public and private subnets."],"_course_section_1_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list_2_lession_title":["Monitor network traffic to Amazon Elastic Compute Cloud (EC2) instances using VPC flow logs. "],"_course_section_1_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list":["3"],"_course_section_1_section_1_lesson_list":["field_612f530a0ac40"],"course_section_1_section":["2"],"_course_section_1_section":["field_612f51e6b0277"],"course_section_2_module_title":["Amazon EC2 Security"],"_course_section_2_module_title":["field_612f5535940c3"],"course_section_2_module_description":[""],"_course_section_2_module_description":["field_612f564c921af"],"course_section_2_section_0_title":[""],"_course_section_2_section_0_title":["field_612f5233b0278"],"course_section_2_section_0_lesson_list_0_lession_title":["Compute hardening"],"_course_section_2_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_1_lession_title":["Amazon Elastic Block Store (EBS) encryption"],"_course_section_2_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_2_lession_title":["Secure management and maintenance"],"_course_section_2_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_3_lession_title":["Detecting vulnerabilities"],"_course_section_2_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_4_lession_title":["Using AWS Marketplace"],"_course_section_2_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list":["5"],"_course_section_2_section_0_lesson_list":["field_612f530a0ac40"],"course_section_2_section_1_title":["Lab 2: Securing the starting point (EC2)"],"_course_section_2_section_1_title":["field_612f5233b0278"],"course_section_2_section_1_lesson_list_0_lession_title":["Create a custom Amazon Machine Image (AMI)."],"_course_section_2_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_1_lession_title":["Deploy a new EC2 instance from a custom AMI."],"_course_section_2_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_2_lession_title":["Patch an EC2 instance using AWS Systems Manager."],"_course_section_2_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_3_lession_title":["Encrypt an EBS volume."],"_course_section_2_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_4_lession_title":["Understand how EBS encryption works and how it impacts other operations."],"_course_section_2_section_1_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list_5_lession_title":["Use security groups to limit traffic between EC2 instances to only that which is encrypted."],"_course_section_2_section_1_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list":["6"],"_course_section_2_section_1_lesson_list":["field_612f530a0ac40"],"course_section_2_section":["2"],"_course_section_2_section":["field_612f51e6b0277"],"course_section_3_module_title":["Monitoring and Alerting"],"_course_section_3_module_title":["field_612f5535940c3"],"course_section_3_module_description":[""],"_course_section_3_module_description":["field_612f564c921af"],"course_section_3_section_0_title":[""],"_course_section_3_section_0_title":["field_612f5233b0278"],"course_section_3_section_0_lesson_list_0_lession_title":["Logging network traffic"],"_course_section_3_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_1_lession_title":["Logging user and Application Programming Interface (API) traffic"],"_course_section_3_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_2_lession_title":["Visibility with Amazon CloudWatch"],"_course_section_3_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_3_lession_title":["Enhancing monitoring and alerting"],"_course_section_3_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_4_lession_title":["Verifying your AWS environment"],"_course_section_3_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list":["5"],"_course_section_3_section_0_lesson_list":["field_612f530a0ac40"],"course_section_3_section_1_title":["Lab 3: Security Monitoring"],"_course_section_3_section_1_title":["field_612f5233b0278"],"course_section_3_section_1_lesson_list_0_lession_title":["Configure an Amazon Linux 2 instance to send log files to Amazon CloudWatch."],"_course_section_3_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list_1_lession_title":["Create Amazon CloudWatch alarms and notifications to monitor for failed login attempts."],"_course_section_3_section_1_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list_2_lession_title":["Create Amazon CloudWatch alarms to monitor network traffic through a Network Address "],"_course_section_3_section_1_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list_3_lession_title":["Translation (NAT) gateway"],"_course_section_3_section_1_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list":["4"],"_course_section_3_section_1_lesson_list":["field_612f530a0ac40"],"course_section_3_section":["2"],"_course_section_3_section":["field_612f51e6b0277"],"sale_price_dates_start":[""],"sale_price_dates_end":[""],"_thumbnail_id":["13808"],"_yoast_wpseo_title":["AWS Security Best Practices - CloudThat"],"_yoast_wpseo_metadesc":["Master AWS security with our comprehensive best practices guide. Elevate your security posture and safeguard your cloud environment against evolving threats. Start implementing effective measures today!"],"_regular_price_wmcp":["{\"USD\":\"799\",\"GBP\":\"649\",\"BDT\":\"19900\"}"],"_yoast_wpseo_content_score":["90"]},"acf":[],"_links":{"self":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/20293"}],"collection":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses"}],"about":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/types\/stm-courses"}],"author":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/users\/13"}],"version-history":[{"count":0,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/20293\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media\/13808"}],"wp:attachment":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media?parent=20293"}],"wp:term":[{"taxonomy":"stm_lms_course_taxonomy","embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm_lms_course_taxonomy?post=20293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}