{"id":1763,"date":"2025-02-11T21:32:21","date_gmt":"2025-02-11T18:32:21","guid":{"rendered":"https:\/\/www.unixlab.am\/?p=1763"},"modified":"2025-02-13T13:06:51","modified_gmt":"2025-02-13T10:06:51","slug":"certified-information-systems-security-professional","status":"publish","type":"post","link":"https:\/\/www.unixlab.am\/hy\/courses\/certified-information-systems-security-professional\/","title":{"rendered":"Certified Information Systems Security Professional"},"content":{"rendered":"<p><\/p>\n<p>\u0531\u0580\u0561\u0563\u0561\u0581\u0580\u0565\u0584 \u0571\u0565\u0580 \u056f\u056b\u0562\u0565\u0580\u0561\u0576\u057e\u057f\u0561\u0576\u0563\u0578\u0582\u0569\u0575\u0561\u0576 \u056f\u0561\u0580\u056b\u0565\u0580\u0561\u0576 CISSP \u057d\u0565\u0580\u057f\u056b\u0586\u056b\u056f\u0561\u0581\u0574\u0561\u0574\u0562: CISSP \u057e\u0561\u057d\u057f\u0561\u056f\u0565\u056c\u0568 \u0581\u0578\u0582\u0575\u0581 \u0567 \u057f\u0561\u056c\u056b\u057d, \u0578\u0580 \u0564\u0578\u0582\u0584 \u0578\u0582\u0576\u0565\u0584 \u0561\u0575\u0576, \u056b\u0576\u0579 \u0561\u0576\u0570\u0580\u0561\u056a\u0565\u0577\u057f \u0567 \u0561\u0580\u0564\u0575\u0578\u0582\u0576\u0561\u057e\u0565\u057f\u0578\u0580\u0565\u0576 \u0576\u0561\u056d\u0561\u0563\u056e\u0565\u056c\u0578\u0582, \u056b\u0580\u0561\u056f\u0561\u0576\u0561\u0581\u0576\u0565\u056c\u0578\u0582 \u0587 \u056f\u0561\u057c\u0561\u057e\u0561\u0580\u0565\u056c\u0578\u0582 \u056c\u0561\u057e\u0561\u0563\u0578\u0582\u0575\u0576 \u056f\u056b\u0562\u0565\u0580\u0561\u0576\u057e\u057f\u0561\u0576\u0563\u0578\u0582\u0569\u0575\u0561\u0576 \u056e\u0580\u0561\u0563\u056b\u0580\u0568:<\/p>\n<p>CISSP-\u056b \u0574\u056b\u057b\u0578\u0581\u0578\u057e \u0564\u0578\u0582\u0584 \u0570\u0561\u057d\u057f\u0561\u057f\u0578\u0582\u0574 \u0565\u0584 \u0571\u0565\u0580 \u0583\u0578\u0580\u0571\u0568 \u0587 \u0564\u0561\u057c\u0576\u0578\u0582\u0574 ISC2-\u056b \u0561\u0576\u0564\u0561\u0574\u055d \u0562\u0561\u0581\u0565\u056c\u0578\u057e \u0562\u0561\u0581\u0561\u057c\u056b\u056f \u057c\u0565\u057d\u0578\u0582\u0580\u057d\u0576\u0565\u0580\u056b, \u056f\u0580\u0569\u0561\u056f\u0561\u0576 \u0563\u0578\u0580\u056e\u056b\u0584\u0576\u0565\u0580\u056b \u0587 \u0563\u0578\u0580\u056e\u0568\u0576\u056f\u0565\u0580\u0576\u0565\u0580\u056b \u0574\u056b\u057b\u0587 \u0581\u0561\u0576\u0581\u0561\u0575\u056b\u0576 \u0570\u0576\u0561\u0580\u0561\u057e\u0578\u0580\u0578\u0582\u0569\u0575\u0578\u0582\u0576\u0576\u0565\u0580\u056b \u056c\u0561\u0575\u0576 \u057f\u0565\u057d\u0561\u056f\u0561\u0576\u056b:<\/p>\n<p>\u0531\u057a\u0561\u0581\u0578\u0582\u0581\u0565\u0584 \u0571\u0565\u0580 \u0570\u0574\u057f\u0578\u0582\u0569\u0575\u0578\u0582\u0576\u0576\u0565\u0580\u0568, \u0561\u057c\u0561\u057b \u0574\u0572\u0565\u0584 \u0571\u0565\u0580 \u056f\u0561\u0580\u056b\u0565\u0580\u0561\u0576, \u0585\u0563\u0576\u0565\u0584 \u057e\u0561\u057d\u057f\u0561\u056f\u0565\u056c \u0571\u0565\u0580 \u0578\u0582\u0566\u0561\u056e \u0561\u0577\u056d\u0561\u057f\u0561\u057e\u0561\u0580\u0571\u0568 \u0587 \u0571\u0565\u057c\u0584 \u0562\u0565\u0580\u0565\u0584 \u056f\u056b\u0562\u0565\u0580\u0561\u0576\u057e\u057f\u0561\u0576\u0563\u0578\u0582\u0569\u0575\u0561\u0576 \u0561\u057c\u0561\u057b\u0576\u0578\u0580\u0564\u0576\u0565\u0580\u056b \u0570\u0561\u0574\u0561\u0575\u0576\u0584\u056b \u0561\u057b\u0561\u056f\u0581\u0578\u0582\u0569\u0575\u0578\u0582\u0576\u0576 \u0561\u0575\u057d\u057f\u0565\u0572\u055d \u0571\u0565\u0566 \u0561\u057b\u0561\u056f\u0581\u0565\u056c\u0578\u0582 \u0571\u0565\u0580 \u0578\u0572\u057b \u056f\u0561\u0580\u056b\u0565\u0580\u0561\u0575\u056b \u0568\u0576\u0569\u0561\u0581\u0584\u0578\u0582\u0574:<\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>\u0531\u0580\u0561\u0563\u0561\u0581\u0580\u0565\u0584 \u0571\u0565\u0580 \u056f\u056b\u0562\u0565\u0580\u0561\u0576\u057e\u057f\u0561\u0576\u0563\u0578\u0582\u0569\u0575\u0561\u0576 \u056f\u0561\u0580\u056b\u0565\u0580\u0561\u0576 CISSP \u057d\u0565\u0580\u057f\u056b\u0586\u056b\u056f\u0561\u0581\u0574\u0561\u0574\u0562: CISSP \u057e\u0561\u057d\u057f\u0561\u056f\u0565\u056c\u0568 \u0581\u0578\u0582\u0575\u0581 \u0567 \u057f\u0561\u056c\u056b\u057d, \u0578\u0580 \u0564\u0578\u0582\u0584 \u0578\u0582\u0576\u0565\u0584 \u0561\u0575\u0576, \u056b\u0576\u0579 \u0561\u0576\u0570\u0580\u0561\u056a\u0565\u0577\u057f \u0567 \u0561\u0580\u0564\u0575\u0578\u0582\u0576\u0561\u057e\u0565\u057f\u0578\u0580\u0565\u0576 \u0576\u0561\u056d\u0561\u0563\u056e\u0565\u056c\u0578\u0582, \u056b\u0580\u0561\u056f\u0561\u0576\u0561\u0581\u0576\u0565\u056c\u0578\u0582 \u0587 \u056f\u0561\u057c\u0561\u057e\u0561\u0580\u0565\u056c\u0578\u0582 \u056c\u0561\u057e\u0561\u0563\u0578\u0582\u0575\u0576 \u056f\u056b\u0562\u0565\u0580\u0561\u0576\u057e\u057f\u0561\u0576\u0563\u0578\u0582\u0569\u0575\u0561\u0576 \u056e\u0580\u0561\u0563\u056b\u0580\u0568: CISSP-\u056b \u0574\u056b\u057b\u0578\u0581\u0578\u057e \u0564\u0578\u0582\u0584 \u0570\u0561\u057d\u057f\u0561\u057f\u0578\u0582\u0574 \u0565\u0584 \u0571\u0565\u0580 \u0583\u0578\u0580\u0571\u0568 \u0587 \u0564\u0561\u057c\u0576\u0578\u0582\u0574 ISC2-\u056b \u0561\u0576\u0564\u0561\u0574\u055d \u0562\u0561\u0581\u0565\u056c\u0578\u057e \u0562\u0561\u0581\u0561\u057c\u056b\u056f \u057c\u0565\u057d\u0578\u0582\u0580\u057d\u0576\u0565\u0580\u056b, \u056f\u0580\u0569\u0561\u056f\u0561\u0576 \u0563\u0578\u0580\u056e\u056b\u0584\u0576\u0565\u0580\u056b \u0587 \u0563\u0578\u0580\u056e\u0568\u0576\u056f\u0565\u0580\u0576\u0565\u0580\u056b \u0574\u056b\u057b\u0587 \u0581\u0561\u0576\u0581\u0561\u0575\u056b\u0576 \u0570\u0576\u0561\u0580\u0561\u057e\u0578\u0580\u0578\u0582\u0569\u0575\u0578\u0582\u0576\u0576\u0565\u0580\u056b \u056c\u0561\u0575\u0576 \u057f\u0565\u057d\u0561\u056f\u0561\u0576\u056b: \u0531\u057a\u0561\u0581\u0578\u0582\u0581\u0565\u0584 \u0571\u0565\u0580 \u0570\u0574\u057f\u0578\u0582\u0569\u0575\u0578\u0582\u0576\u0576\u0565\u0580\u0568, \u0561\u057c\u0561\u057b \u0574\u0572\u0565\u0584 \u0571\u0565\u0580 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35,42],"tags":[],"class_list":["post-1763","post","type-post","status-publish","format-standard","hentry","category-courses","category-i-sec"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Certified Information Systems Security Professional - UnixLab<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.unixlab.am\/courses\/certified-information-systems-security-professional\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Certified Information Systems Security Professional - UnixLab\" \/>\n<meta property=\"og:description\" content=\"\u0531\u0580\u0561\u0563\u0561\u0581\u0580\u0565\u0584 \u0571\u0565\u0580 \u056f\u056b\u0562\u0565\u0580\u0561\u0576\u057e\u057f\u0561\u0576\u0563\u0578\u0582\u0569\u0575\u0561\u0576 \u056f\u0561\u0580\u056b\u0565\u0580\u0561\u0576 CISSP \u057d\u0565\u0580\u057f\u056b\u0586\u056b\u056f\u0561\u0581\u0574\u0561\u0574\u0562: CISSP \u057e\u0561\u057d\u057f\u0561\u056f\u0565\u056c\u0568 \u0581\u0578\u0582\u0575\u0581 \u0567 \u057f\u0561\u056c\u056b\u057d, \u0578\u0580 \u0564\u0578\u0582\u0584 \u0578\u0582\u0576\u0565\u0584 \u0561\u0575\u0576, \u056b\u0576\u0579 \u0561\u0576\u0570\u0580\u0561\u056a\u0565\u0577\u057f \u0567 \u0561\u0580\u0564\u0575\u0578\u0582\u0576\u0561\u057e\u0565\u057f\u0578\u0580\u0565\u0576 \u0576\u0561\u056d\u0561\u0563\u056e\u0565\u056c\u0578\u0582, \u056b\u0580\u0561\u056f\u0561\u0576\u0561\u0581\u0576\u0565\u056c\u0578\u0582 \u0587 \u056f\u0561\u057c\u0561\u057e\u0561\u0580\u0565\u056c\u0578\u0582 \u056c\u0561\u057e\u0561\u0563\u0578\u0582\u0575\u0576 \u056f\u056b\u0562\u0565\u0580\u0561\u0576\u057e\u057f\u0561\u0576\u0563\u0578\u0582\u0569\u0575\u0561\u0576 \u056e\u0580\u0561\u0563\u056b\u0580\u0568: CISSP-\u056b \u0574\u056b\u057b\u0578\u0581\u0578\u057e \u0564\u0578\u0582\u0584 \u0570\u0561\u057d\u057f\u0561\u057f\u0578\u0582\u0574 \u0565\u0584 \u0571\u0565\u0580 \u0583\u0578\u0580\u0571\u0568 \u0587 \u0564\u0561\u057c\u0576\u0578\u0582\u0574 ISC2-\u056b \u0561\u0576\u0564\u0561\u0574\u055d \u0562\u0561\u0581\u0565\u056c\u0578\u057e \u0562\u0561\u0581\u0561\u057c\u056b\u056f \u057c\u0565\u057d\u0578\u0582\u0580\u057d\u0576\u0565\u0580\u056b, \u056f\u0580\u0569\u0561\u056f\u0561\u0576 \u0563\u0578\u0580\u056e\u056b\u0584\u0576\u0565\u0580\u056b \u0587 \u0563\u0578\u0580\u056e\u0568\u0576\u056f\u0565\u0580\u0576\u0565\u0580\u056b \u0574\u056b\u057b\u0587 \u0581\u0561\u0576\u0581\u0561\u0575\u056b\u0576 \u0570\u0576\u0561\u0580\u0561\u057e\u0578\u0580\u0578\u0582\u0569\u0575\u0578\u0582\u0576\u0576\u0565\u0580\u056b \u056c\u0561\u0575\u0576 \u057f\u0565\u057d\u0561\u056f\u0561\u0576\u056b: \u0531\u057a\u0561\u0581\u0578\u0582\u0581\u0565\u0584 \u0571\u0565\u0580 \u0570\u0574\u057f\u0578\u0582\u0569\u0575\u0578\u0582\u0576\u0576\u0565\u0580\u0568, \u0561\u057c\u0561\u057b \u0574\u0572\u0565\u0584 \u0571\u0565\u0580 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.unixlab.am\/courses\/certified-information-systems-security-professional\/\" \/>\n<meta property=\"og:site_name\" content=\"UnixLab\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-11T18:32:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-13T10:06:51+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.unixlab.am\/courses\/certified-information-systems-security-professional\/\",\"url\":\"https:\/\/www.unixlab.am\/courses\/certified-information-systems-security-professional\/\",\"name\":\"Certified Information Systems Security Professional - UnixLab\",\"isPartOf\":{\"@id\":\"https:\/\/www.unixlab.am\/#website\"},\"datePublished\":\"2025-02-11T18:32:21+00:00\",\"dateModified\":\"2025-02-13T10:06:51+00:00\",\"author\":{\"@id\":\"https:\/\/www.unixlab.am\/#\/schema\/person\/9d81163273365766421e772bc2209a7c\"},\"inLanguage\":\"hy-HY\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.unixlab.am\/courses\/certified-information-systems-security-professional\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.unixlab.am\/#website\",\"url\":\"https:\/\/www.unixlab.am\/\",\"name\":\"UnixLab\",\"description\":\"\u0415\u0449\u0451 \u043e\u0434\u0438\u043d \u0441\u0430\u0439\u0442 \u043d\u0430 WordPress\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.unixlab.am\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"hy-HY\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.unixlab.am\/#\/schema\/person\/9d81163273365766421e772bc2209a7c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hy-HY\",\"@id\":\"https:\/\/www.unixlab.am\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93e7bd6e0bb431ee45a773e8e1b450248bac25a1df21bc6c1c6fa0cadfb572ea?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93e7bd6e0bb431ee45a773e8e1b450248bac25a1df21bc6c1c6fa0cadfb572ea?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/www.unixedu.ru\"],\"url\":\"https:\/\/www.unixlab.am\/hy\/courses\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Certified Information Systems Security Professional - UnixLab","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.unixlab.am\/courses\/certified-information-systems-security-professional\/","og_locale":"en_US","og_type":"article","og_title":"Certified Information Systems Security Professional - UnixLab","og_description":"\u0531\u0580\u0561\u0563\u0561\u0581\u0580\u0565\u0584 \u0571\u0565\u0580 \u056f\u056b\u0562\u0565\u0580\u0561\u0576\u057e\u057f\u0561\u0576\u0563\u0578\u0582\u0569\u0575\u0561\u0576 \u056f\u0561\u0580\u056b\u0565\u0580\u0561\u0576 CISSP \u057d\u0565\u0580\u057f\u056b\u0586\u056b\u056f\u0561\u0581\u0574\u0561\u0574\u0562: CISSP \u057e\u0561\u057d\u057f\u0561\u056f\u0565\u056c\u0568 \u0581\u0578\u0582\u0575\u0581 \u0567 \u057f\u0561\u056c\u056b\u057d, \u0578\u0580 \u0564\u0578\u0582\u0584 \u0578\u0582\u0576\u0565\u0584 \u0561\u0575\u0576, \u056b\u0576\u0579 \u0561\u0576\u0570\u0580\u0561\u056a\u0565\u0577\u057f \u0567 \u0561\u0580\u0564\u0575\u0578\u0582\u0576\u0561\u057e\u0565\u057f\u0578\u0580\u0565\u0576 \u0576\u0561\u056d\u0561\u0563\u056e\u0565\u056c\u0578\u0582, \u056b\u0580\u0561\u056f\u0561\u0576\u0561\u0581\u0576\u0565\u056c\u0578\u0582 \u0587 \u056f\u0561\u057c\u0561\u057e\u0561\u0580\u0565\u056c\u0578\u0582 \u056c\u0561\u057e\u0561\u0563\u0578\u0582\u0575\u0576 \u056f\u056b\u0562\u0565\u0580\u0561\u0576\u057e\u057f\u0561\u0576\u0563\u0578\u0582\u0569\u0575\u0561\u0576 \u056e\u0580\u0561\u0563\u056b\u0580\u0568: CISSP-\u056b \u0574\u056b\u057b\u0578\u0581\u0578\u057e \u0564\u0578\u0582\u0584 \u0570\u0561\u057d\u057f\u0561\u057f\u0578\u0582\u0574 \u0565\u0584 \u0571\u0565\u0580 \u0583\u0578\u0580\u0571\u0568 \u0587 \u0564\u0561\u057c\u0576\u0578\u0582\u0574 ISC2-\u056b \u0561\u0576\u0564\u0561\u0574\u055d \u0562\u0561\u0581\u0565\u056c\u0578\u057e \u0562\u0561\u0581\u0561\u057c\u056b\u056f \u057c\u0565\u057d\u0578\u0582\u0580\u057d\u0576\u0565\u0580\u056b, \u056f\u0580\u0569\u0561\u056f\u0561\u0576 \u0563\u0578\u0580\u056e\u056b\u0584\u0576\u0565\u0580\u056b \u0587 \u0563\u0578\u0580\u056e\u0568\u0576\u056f\u0565\u0580\u0576\u0565\u0580\u056b \u0574\u056b\u057b\u0587 \u0581\u0561\u0576\u0581\u0561\u0575\u056b\u0576 \u0570\u0576\u0561\u0580\u0561\u057e\u0578\u0580\u0578\u0582\u0569\u0575\u0578\u0582\u0576\u0576\u0565\u0580\u056b \u056c\u0561\u0575\u0576 \u057f\u0565\u057d\u0561\u056f\u0561\u0576\u056b: \u0531\u057a\u0561\u0581\u0578\u0582\u0581\u0565\u0584 \u0571\u0565\u0580 \u0570\u0574\u057f\u0578\u0582\u0569\u0575\u0578\u0582\u0576\u0576\u0565\u0580\u0568, \u0561\u057c\u0561\u057b \u0574\u0572\u0565\u0584 \u0571\u0565\u0580 [&hellip;]","og_url":"https:\/\/www.unixlab.am\/courses\/certified-information-systems-security-professional\/","og_site_name":"UnixLab","article_published_time":"2025-02-11T18:32:21+00:00","article_modified_time":"2025-02-13T10:06:51+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.unixlab.am\/courses\/certified-information-systems-security-professional\/","url":"https:\/\/www.unixlab.am\/courses\/certified-information-systems-security-professional\/","name":"Certified Information Systems Security Professional - UnixLab","isPartOf":{"@id":"https:\/\/www.unixlab.am\/#website"},"datePublished":"2025-02-11T18:32:21+00:00","dateModified":"2025-02-13T10:06:51+00:00","author":{"@id":"https:\/\/www.unixlab.am\/#\/schema\/person\/9d81163273365766421e772bc2209a7c"},"inLanguage":"hy-HY","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.unixlab.am\/courses\/certified-information-systems-security-professional\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.unixlab.am\/#website","url":"https:\/\/www.unixlab.am\/","name":"UnixLab","description":"\u0415\u0449\u0451 \u043e\u0434\u0438\u043d \u0441\u0430\u0439\u0442 \u043d\u0430 WordPress","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.unixlab.am\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"hy-HY"},{"@type":"Person","@id":"https:\/\/www.unixlab.am\/#\/schema\/person\/9d81163273365766421e772bc2209a7c","name":"admin","image":{"@type":"ImageObject","inLanguage":"hy-HY","@id":"https:\/\/www.unixlab.am\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/93e7bd6e0bb431ee45a773e8e1b450248bac25a1df21bc6c1c6fa0cadfb572ea?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93e7bd6e0bb431ee45a773e8e1b450248bac25a1df21bc6c1c6fa0cadfb572ea?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/www.unixedu.ru"],"url":"https:\/\/www.unixlab.am\/hy\/courses\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.unixlab.am\/hy\/wp-json\/wp\/v2\/posts\/1763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.unixlab.am\/hy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.unixlab.am\/hy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.unixlab.am\/hy\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.unixlab.am\/hy\/wp-json\/wp\/v2\/comments?post=1763"}],"version-history":[{"count":5,"href":"https:\/\/www.unixlab.am\/hy\/wp-json\/wp\/v2\/posts\/1763\/revisions"}],"predecessor-version":[{"id":1786,"href":"https:\/\/www.unixlab.am\/hy\/wp-json\/wp\/v2\/posts\/1763\/revisions\/1786"}],"wp:attachment":[{"href":"https:\/\/www.unixlab.am\/hy\/wp-json\/wp\/v2\/media?parent=1763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.unixlab.am\/hy\/wp-json\/wp\/v2\/categories?post=1763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.unixlab.am\/hy\/wp-json\/wp\/v2\/tags?post=1763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}