
{"id":25134,"date":"2025-06-02T12:25:48","date_gmt":"2025-06-02T12:25:48","guid":{"rendered":"https:\/\/stage.cloudthat.com\/training\/?post_type=stm-courses&#038;p=25134"},"modified":"2025-08-19T08:56:00","modified_gmt":"2025-08-19T08:56:00","slug":"sc-401-information-security-administrator-associate","status":"publish","type":"stm-courses","link":"https:\/\/stage.cloudthat.com\/training\/microsoft-security\/sc-401-information-security-administrator-associate","title":{"rendered":"SC-401: Information Security Administrator Associate"},"content":{"rendered":"<p><span class=\"TextRun SCXW152082957 BCX8\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW152082957 BCX8\">As an Information Security Administrator, you safeguard sensitive data using Microsoft Purview and related services. Your role involves mitigating risks within Microsoft 365 collaboration environments and AI services, implementing data protection, loss prevention, retention, and insider risk management. You manage security alerts and activities, working with governance, data, and security roles to develop policies that meet organizational security goals. Collaboration with workload administrators, business application owners, and governance stakeholders is key to implementing necessary policies and controls. Familiarity with Microsoft 365 services, PowerShell, Microsoft Entra, the Microsoft Defender portal, and Microsoft Defender for Cloud Apps is essential.<\/span><\/span><span class=\"EOP SCXW152082957 BCX8\" data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As an Information Security Administrator, you safeguard sensitive data using Microsoft Purview and related services. Your role involves mitigating risks within Microsoft 365 collaboration environments and AI services, implementing data protection, loss prevention, retention, and insider risk management. You manage security alerts and activities, working with governance, data, and security roles to develop policies that [&hellip;]<\/p>\n","protected":false},"author":1508,"featured_media":13772,"template":"","meta":{"footnotes":""},"stm_lms_course_taxonomy":[64],"metadata":{"stm_lms_product_id":["25135"],"_edit_lock":["1755594418:5091"],"_edit_last":["5091"],"permalink_customizer":["microsoft-security\/sc-401-information-security-administrator-associate"],"permalink_customizer_regenerate_status":["1"],"popular_course":["0"],"_popular_course":["field_64253688bc2e5"],"course_banner_image":[""],"_course_banner_image":["field_63c69a6b81cf1"],"mobile_banner_image":[""],"_mobile_banner_image":["field_63cf93896d207"],"banner_link":[""],"_banner_link":["field_63c69a9681cf2"],"banner_image":[""],"_banner_image":["field_621873548f922"],"banner_description":["This course equips you with the skills to manage, detect threats, and implement security controls, ensuring robust protection for your organization\u2019s data and assets. "],"_banner_description":["field_612c733ed3564"],"overview_section_heading":["Course Overview"],"_overview_section_heading":["field_64538867ffdd0"],"after_completing_course_heading":["After completing this course, participants will be able to:  "],"_after_completing_course_heading":["field_645c78ade3f50"],"after_completing_course_0_desciption":["Implement information protection strategies using Microsoft Purview. \r\n\r\n"],"_after_completing_course_0_desciption":["field_6103ad2f9f5b2"],"after_completing_course_1_desciption":["Configure and manage data loss prevention policies. \r\n\r\n"],"_after_completing_course_1_desciption":["field_6103ad2f9f5b2"],"after_completing_course_2_desciption":["Apply data retention and deletion policies to meet compliance requirements. \r\n\r\n"],"_after_completing_course_2_desciption":["field_6103ad2f9f5b2"],"after_completing_course_3_desciption":["Mitigate insider risks and manage insider threat activities. \r\n\r\n"],"_after_completing_course_3_desciption":["field_6103ad2f9f5b2"],"after_completing_course_4_desciption":["Respond to and manage information security alerts and incidents. \r\n\r\n"],"_after_completing_course_4_desciption":["field_6103ad2f9f5b2"],"after_completing_course_5_desciption":["Collaborate with governance, data, and security roles to develop and enforce security policies. \r\n\r\n"],"_after_completing_course_5_desciption":["field_6103ad2f9f5b2"],"after_completing_course_6_desciption":["Utilize Microsoft 365 services, PowerShell, Microsoft Entra, and Microsoft Defender tools effectively. \r\n\r\n"],"_after_completing_course_6_desciption":["field_6103ad2f9f5b2"],"after_completing_course_7_desciption":["Protect data within AI services and collaboration environments. \r\n\r\n"],"_after_completing_course_7_desciption":["field_6103ad2f9f5b2"],"after_completing_course_8_desciption":["Evaluate and implement technology solutions to support organizational security goals. \r\n\r\n"],"_after_completing_course_8_desciption":["field_6103ad2f9f5b2"],"after_completing_course_9_desciption":["Conduct regular security assessments and audits to ensure ongoing protection. "],"_after_completing_course_9_desciption":["field_6103ad2f9f5b2"],"after_completing_course":["10"],"_after_completing_course":["field_6103aae828228"],"key_features_heading":["Key Features:-"],"_key_features_heading":["field_645388ceffdd1"],"key_features_0_lists":["<span data-contrast=\"none\">Hands-on Experience: 50% to 60% of the training focuses on practical lab sessions to enhance critical thinking and application of concepts.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span>"],"_key_features_0_lists":["field_6103ad559f5b3"],"key_features_1_lists":["<span data-contrast=\"none\">Dynamic Learning Approach: The program combines virtual and in-person classes, designed to foster problem-solving through interactive, real-time scenarios.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span>"],"_key_features_1_lists":["field_6103ad559f5b3"],"key_features_2_lists":["<span data-contrast=\"none\">Expert-Led Instruction: Delivered by Microsoft-certified trainers who provide mentorship, ensuring competency development through structured learning.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span>"],"_key_features_2_lists":["field_6103ad559f5b3"],"key_features_3_lists":["<span data-contrast=\"none\">Real-World Simulations: Participants engage with realistic use cases that mirror the challenges faced in professional environments, ensuring relevant skill development.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span>"],"_key_features_3_lists":["field_6103ad559f5b3"],"key_features_4_lists":["<span data-contrast=\"none\">Integrated Learning Platforms: Access to the Learning Management System (LMS) offering ongoing support and tailored study resources.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span>"],"_key_features_4_lists":["field_6103ad559f5b3"],"key_features_5_lists":["<span data-contrast=\"none\">Comprehensive Study Materials: Learners receive extensive materials that cover all aspects of exam preparation, from foundational knowledge to advanced topics.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span>"],"_key_features_5_lists":["field_6103ad559f5b3"],"key_features_6_lists":["<span data-contrast=\"none\">Curriculum Aligned with Industry Standards: As a Microsoft Learning Partner, we provide a syllabus designed to meet the latest industry requirements and best practices.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span>"],"_key_features_6_lists":["field_6103ad559f5b3"],"key_features":["7"],"_key_features":["field_6103aaff28229"],"who_should_attend_heading":["Who Should Attend?"],"_who_should_attend_heading":["field_645388faffdd2"],"who_should_attend_0_attend_lists":["Security Administrators & Analysts "],"_who_should_attend_0_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_1_attend_lists":["IT Administrators & Compliance Officers "],"_who_should_attend_1_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_2_attend_lists":["Microsoft 365 Administrators "],"_who_should_attend_2_attend_lists":["field_6103adfb3f3e4"],"who_should_attend":["3"],"_who_should_attend":["field_6103ab0d2822a"],"prerequisites_heading":["What are the prerequisites for the training?"],"_prerequisites_heading":["field_64538a51ffdd3"],"prerequisites_text":["<p>Basic Understanding of Microsoft 365 Security <\/p>\r\n\r\n<p>Fundamental Cybersecurity Knowledge <\/p>\r\n\r\n<p>General IT Administration Skills <\/p>"],"_prerequisites_text":["field_612c7498c4b84"],"question_sets_details_heading":[""],"_question_sets_details_heading":["field_65d303841f38d"],"question_sets_details_description":[""],"_question_sets_details_description":["field_65d303841f38e"],"question_sets_details_button_text":[""],"_question_sets_details_button_text":["field_65d303841f38f"],"question_sets_details_question_sets":[""],"_question_sets_details_question_sets":["field_65d303841f390"],"question_sets_details":[""],"_question_sets_details":["field_65d303841f38c"],"category_features_heading":[""],"_category_features_heading":["field_644b8ff35049c"],"category_features_features":[""],"_category_features_features":["field_644b90025049d"],"category_features_cta_text":[""],"_category_features_cta_text":["field_644b90285049f"],"category_features_cta_link":[""],"_category_features_cta_link":["field_644b902d504a0"],"category_features":[""],"_category_features":["field_644b8fe15049b"],"course_features_0_heading":["Learning objective of course"],"_course_features_0_heading":["field_644a0fae0e67e"],"course_features_0_features_list_0_list":["By earning the SC-401 certification, helping you plan, implement, and manage identity governance in Microsoft Entra ID, including entitlements, access reviews, and privileged access. Their hands-on labs and industry credibility make them a great choice for mastering Microsoft security. "],"_course_features_0_features_list_0_list":["field_644a0fc80e680"],"course_features_0_features_list":["1"],"_course_features_0_features_list":["field_644a0fb70e67f"],"course_features_0_background_color":["a:1:{i:0;s:4:\"blue\";}"],"_course_features_0_background_color":["field_644a0fde0e681"],"course_features":["1"],"_course_features":["field_644a0fa10e67d"],"certification_heading":[""],"_certification_heading":["field_64538bffffdd5"],"certification":[""],"_certification":["field_6103ab1a2822b"],"about_trainer":[""],"_about_trainer":["field_6103ab6c2822f"],"course_fee_heading":[""],"_course_fee_heading":["field_64538c1cffdd6"],"course_fee_list":[""],"_course_fee_list":["field_6103abb728234"],"brochure_pdf":["25820"],"_brochure_pdf":["field_61232e258f89b"],"trainer":[""],"_trainer":["field_6124990e13784"],"course_outline_heading":["Course Outline:-"],"_course_outline_heading":["field_64538a8effdd4"],"course_section_0_module_title":["Implement Microsoft Purview Information Protection "],"_course_section_0_module_title":["field_612f5535940c3"],"course_section_0_module_description":[""],"_course_section_0_module_description":["field_612f564c921af"],"course_section_0_section_0_title":[""],"_course_section_0_section_0_title":["field_612f5233b0278"],"course_section_0_section_0_lesson_list_0_lession_title":["Protect sensitive data in a digital world "],"_course_section_0_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_1_lession_title":["Classify data for protection and governance "],"_course_section_0_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_2_lession_title":["Review and analyze data classification and protection "],"_course_section_0_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_3_lession_title":["Create and manage sensitive information types "],"_course_section_0_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_4_lession_title":["Create and configure sensitivity labels with Microsoft Purview "],"_course_section_0_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_5_lession_title":["Apply sensitivity labels for data protection "],"_course_section_0_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_6_lession_title":["Classify and protect on-premises data with Microsoft Purview "],"_course_section_0_section_0_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_7_lession_title":["Understand Microsoft 365 encryption "],"_course_section_0_section_0_lesson_list_7_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_8_lession_title":["Protect email with Microsoft Purview Message Encryption "],"_course_section_0_section_0_lesson_list_8_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list":["9"],"_course_section_0_section_0_lesson_list":["field_612f530a0ac40"],"course_section_0_section":["1"],"_course_section_0_section":["field_612f51e6b0277"],"course_section_1_module_title":["Implement and manage Microsoft Purview Data Loss Prevention "],"_course_section_1_module_title":["field_612f5535940c3"],"course_section_1_module_description":[""],"_course_section_1_module_description":["field_612f564c921af"],"course_section_1_section_0_title":[""],"_course_section_1_section_0_title":["field_612f5233b0278"],"course_section_1_section_0_lesson_list_0_lession_title":["Prevent data loss in Microsoft Purview "],"_course_section_1_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_1_lession_title":["Implement endpoint data loss prevention (DLP) with Microsoft Purview "],"_course_section_1_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_2_lession_title":["Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform "],"_course_section_1_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_3_lession_title":["Investigate and respond to Microsoft Purview Data Loss Prevention Alerts "],"_course_section_1_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list":["4"],"_course_section_1_section_0_lesson_list":["field_612f530a0ac40"],"course_section_1_section":["1"],"_course_section_1_section":["field_612f51e6b0277"],"course_section_2_module_title":[" Implement and manage Microsoft Purview Insider Risk Management "],"_course_section_2_module_title":["field_612f5535940c3"],"course_section_2_module_description":[""],"_course_section_2_module_description":["field_612f564c921af"],"course_section_2_section_0_title":[""],"_course_section_2_section_0_title":["field_612f5233b0278"],"course_section_2_section_0_lesson_list_0_lession_title":["Understand Microsoft Purview Insider Risk Management "],"_course_section_2_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_1_lession_title":["Prepare for Microsoft Purview Insider Risk Management "],"_course_section_2_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_2_lession_title":["Create and manage Insider Risk Management policies "],"_course_section_2_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_3_lession_title":["Investigate insider risk alerts and related activity "],"_course_section_2_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_4_lession_title":["Implement Adaptive Protection in Insider Risk Management "],"_course_section_2_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list":["5"],"_course_section_2_section_0_lesson_list":["field_612f530a0ac40"],"course_section_2_section":["1"],"_course_section_2_section":["field_612f51e6b0277"],"course_section_3_module_title":[" Protect data in AI environments with Microsoft Purview "],"_course_section_3_module_title":["field_612f5535940c3"],"course_section_3_module_description":[""],"_course_section_3_module_description":["field_612f564c921af"],"course_section_3_section_0_title":[""],"_course_section_3_section_0_title":["field_612f5233b0278"],"course_section_3_section_0_lesson_list_0_lession_title":["Discover AI interactions with Microsoft Purview "],"_course_section_3_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_1_lession_title":["Protect sensitive data from AI-related risks "],"_course_section_3_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_2_lession_title":["Govern AI usage with Microsoft Purview "],"_course_section_3_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_3_lession_title":["Assess and mitigate AI risks with Microsoft Purview "],"_course_section_3_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list":["4"],"_course_section_3_section_0_lesson_list":["field_612f530a0ac40"],"course_section_3_section":["1"],"_course_section_3_section":["field_612f51e6b0277"],"course_section_4_module_title":[" Implement and manage retention and recovery in Microsoft Purview "],"_course_section_4_module_title":["field_612f5535940c3"],"course_section_4_module_description":[""],"_course_section_4_module_description":["field_612f564c921af"],"course_section_4_section_0_title":[""],"_course_section_4_section_0_title":["field_612f5233b0278"],"course_section_4_section_0_lesson_list_0_lession_title":["Understand retention in Microsoft Purview "],"_course_section_4_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_1_lession_title":["Implement and manage retention and recovery in Microsoft Purview "],"_course_section_4_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list":["2"],"_course_section_4_section_0_lesson_list":["field_612f530a0ac40"],"course_section_4_section":["1"],"_course_section_4_section":["field_612f51e6b0277"],"course_section_5_module_title":["Audit and search activity in Microsoft Purview "],"_course_section_5_module_title":["field_612f5535940c3"],"course_section_5_module_description":[""],"_course_section_5_module_description":["field_612f564c921af"],"course_section_5_section_0_title":[""],"_course_section_5_section_0_title":["field_612f5233b0278"],"course_section_5_section_0_lesson_list_0_lession_title":["Search and investigate with Microsoft Purview Audit "],"_course_section_5_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_1_lession_title":["Search for content with Microsoft Purview eDiscovery "],"_course_section_5_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list":["2"],"_course_section_5_section_0_lesson_list":["field_612f530a0ac40"],"course_section_5_section":["1"],"_course_section_5_section":["field_612f51e6b0277"],"course_section":["6"],"_course_section":["field_612f4f27b0276"],"note_section":[""],"_note_section":["field_616d3ed46bbd2"],"popular_sort":[""],"_popular_sort":["field_6172496402af3"],"related_courses":[""],"_related_courses":["field_61c453ca6b2dd"],"reviews_heading":[""],"_reviews_heading":["field_64538c39ffdd7"],"review_rating":[""],"_review_rating":["field_62a813a92bee6"],"total_review_count":[""],"_total_review_count":["field_62b002d8d2de5"],"average_review_count":[""],"_average_review_count":["field_62b00367d2de6"],"faq_heading":[""],"_faq_heading":["field_64538c59ffdd8"],"educational_schema":[""],"_educational_schema":["field_652fbbf6f589a"],"sale_price_dates_start":[""],"sale_price_dates_end":[""],"curriculum":[""],"featured":[""],"views":["1194"],"level":["intermediate"],"current_students":["0"],"duration_info":["4 Days"],"video_duration":[""],"status":[""],"status_dates":[""],"not_single_sale":[""],"price":["29900"],"sale_price":[""],"sale_price_dates":[""],"enterprise_price":[""],"not_membership":[""],"affiliate_course":[""],"affiliate_course_text":[""],"affiliate_course_link":[""],"expiration_course":[""],"end_time":[""],"drip_content":[""],"prerequisites":[""],"prerequisite_passing_level":[""],"announcement":[""],"faq":["[{\"question\":\"What is the SC-401 certification? \",\"answer\":\"The SC-401 certification, also known as Administering Information Security in Microsoft 365, validates your ability to plan and implement information security using Microsoft Purview and related services. \"},{\"question\":\"How is the exam structured? \",\"answer\":\"The exam assesses your skills in implementing information protection, data loss prevention, retention, insider risk management, and managing information security alerts and activities. \"},{\"question\":\"How do I schedule the exam? \",\"answer\":\"You can schedule the exam through the Microsoft Learn platform. It is recommended to register with a personal MSA account to avoid losing your exam records if you change organizations. \"},{\"question\":\"What is the passing score for SC-401? \",\"answer\":\"A minimum score of 700 is required to pass the exam. \"},{\"question\":\"How long is the SC-401 certification valid? \",\"answer\":\"Microsoft certifications expire annually, and renewal requires passing a free online assessment. \"},{\"question\":\"What are the prerequisites for SC-401? \",\"answer\":\"There are no formal prerequisites, but familiarity with Microsoft 365 security, PowerShell, and Microsoft Defender is recommended. \"},{\"question\":\"How can I prepare for the SC-401 exam? \",\"answer\":\"Microsoft offers official study guides, practice tests, and training courses to help candidates prepare. \"}]"],"course_files_pack":[""],"course_certificate":[""],"type":[""],"video_type":[""],"presto_player_idx":[""],"lesson_video":[""],"lesson_video_poster":[""],"lesson_video_width":[""],"lesson_shortcode":[""],"lesson_embed_ctx":[""],"lesson_youtube_url":[""],"lesson_stream_url":[""],"lesson_vimeo_url":[""],"lesson_ext_link_url":[""],"duration":[""],"preview":[""],"lesson_excerpt":[""],"lesson_files_pack":[""],"questions":[""],"quiz_style":[""],"duration_measure":[""],"correct_answer":[""],"passing_grade":[""],"re_take_cut":[""],"random_questions":[""],"answers":[""],"question_explanation":[""],"question_view_type":[""],"review_course":[""],"review_user":[""],"review_mark":[""],"order":[""],"absolute":[""],"sticky":[""],"sticky_threshold":[""],"sticky_threshold_color":[""],"stm_agenda":[""],"stm_host":[""],"stm_select_approved_denied":[""],"stm_multiselect_approved":[""],"stm_multiselect_denied":[""],"stm_date":[""],"stm_time":[""],"stm_timezone":[""],"stm_duration":[""],"stm_password":[""],"stm_waiting_room":[""],"stm_join_before_host":[""],"stm_host_join_start":[""],"stm_start_after_participants":[""],"stm_mute_participants":[""],"stm_enforce_login":[""],"stm_alternative_hosts":[""],"author_id":[""],"emails":[""],"wpdocs-meta-bdt":["29900"],"wpdocs-meta-gbp":["1399"],"wpdocs-meta-usd":["1599"],"_yoast_wpseo_primary_stm_lms_course_taxonomy":["64"],"_yoast_wpseo_content_score":["90"],"_yoast_wpseo_estimated-reading-time-minutes":["1"],"wpdocs-meta-rand":["7850"],"wpdocs-meta-aed":["4695"],"_thumbnail_id":["13772"]},"acf":[],"_links":{"self":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/25134"}],"collection":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses"}],"about":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/types\/stm-courses"}],"author":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/users\/1508"}],"version-history":[{"count":1,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/25134\/revisions"}],"predecessor-version":[{"id":25821,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/25134\/revisions\/25821"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media\/13772"}],"wp:attachment":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media?parent=25134"}],"wp:term":[{"taxonomy":"stm_lms_course_taxonomy","embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm_lms_course_taxonomy?post=25134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}