{"id":4152,"date":"2024-05-17T15:11:25","date_gmt":"2024-05-17T19:11:25","guid":{"rendered":"https:\/\/www.marshall.edu\/uc\/?post_type=academic_map&#038;p=4152"},"modified":"2024-05-17T15:11:25","modified_gmt":"2024-05-17T19:11:25","slug":"cyber-forensics-and-security-4","status":"publish","type":"academic_map","link":"https:\/\/www.marshall.edu\/uc\/academic-maps\/cyber-forensics-and-security-4\/","title":{"rendered":"Cyber Forensics and Security\u00a0"},"menu_order":0,"template":"","meta":{"_acf_changed":false},"class_list":["post-4152","academic_map","type-academic_map","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.marshall.edu\/uc\/wp-json\/wp\/v2\/academic_map\/4152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marshall.edu\/uc\/wp-json\/wp\/v2\/academic_map"}],"about":[{"href":"https:\/\/www.marshall.edu\/uc\/wp-json\/wp\/v2\/types\/academic_map"}],"version-history":[{"count":1,"href":"https:\/\/www.marshall.edu\/uc\/wp-json\/wp\/v2\/academic_map\/4152\/revisions"}],"predecessor-version":[{"id":4153,"href":"https:\/\/www.marshall.edu\/uc\/wp-json\/wp\/v2\/academic_map\/4152\/revisions\/4153"}],"wp:attachment":[{"href":"https:\/\/www.marshall.edu\/uc\/wp-json\/wp\/v2\/media?parent=4152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}