{"id":4720,"date":"2025-09-17T09:09:34","date_gmt":"2025-09-17T13:09:34","guid":{"rendered":"https:\/\/www.marshall.edu\/uc\/?post_type=academic_map&#038;p=4720"},"modified":"2025-09-17T09:09:34","modified_gmt":"2025-09-17T13:09:34","slug":"cyber-forensics-and-security-5","status":"publish","type":"academic_map","link":"https:\/\/www.marshall.edu\/uc\/academic-maps\/cyber-forensics-and-security-5\/","title":{"rendered":"Cyber Forensics and Security"},"menu_order":0,"template":"","meta":{"_acf_changed":false},"class_list":["post-4720","academic_map","type-academic_map","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.marshall.edu\/uc\/wp-json\/wp\/v2\/academic_map\/4720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marshall.edu\/uc\/wp-json\/wp\/v2\/academic_map"}],"about":[{"href":"https:\/\/www.marshall.edu\/uc\/wp-json\/wp\/v2\/types\/academic_map"}],"version-history":[{"count":1,"href":"https:\/\/www.marshall.edu\/uc\/wp-json\/wp\/v2\/academic_map\/4720\/revisions"}],"predecessor-version":[{"id":4727,"href":"https:\/\/www.marshall.edu\/uc\/wp-json\/wp\/v2\/academic_map\/4720\/revisions\/4727"}],"wp:attachment":[{"href":"https:\/\/www.marshall.edu\/uc\/wp-json\/wp\/v2\/media?parent=4720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}