{"id":267536,"date":"2025-01-16T19:10:52","date_gmt":"2025-01-16T19:10:52","guid":{"rendered":"https:\/\/imarticus.org\/blog\/?p=267536"},"modified":"2025-01-16T19:10:52","modified_gmt":"2025-01-16T19:10:52","slug":"top-cybersecurity-skills-that-you-need-to-excel","status":"publish","type":"post","link":"https:\/\/imarticus.org\/blog\/top-cybersecurity-skills-that-you-need-to-excel\/","title":{"rendered":"Top Cybersecurity Skills That You Need to Excel"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Do you wonder how you can keep up with the growing skills in Cybersecurity? Chances are that there are many out there who have set out on this journey, while some are stepping into it.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">The global cybersecurity market was valued at $219 billion in 2023 and is projected to reach $578.2 billion by 2033. <\/span><\/i><span style=\"font-weight: 400;\">(Source: Allied Market Research)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organisations that focused on the traditional aspects of cybersecurity earlier are now starting to take it very seriously. Why? Cyberattacks and associated events continue to rise. Thus, the need for skilled cybersecurity professionals has skyrocketed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You would have questions like:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span> <i><span style=\"font-weight: 400;\">What skills does cybersecurity require?<\/span><\/i><i><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/i> <i><span style=\"font-weight: 400;\">Is coding necessary for cybersecurity?<\/span><\/i><i><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/i> <i><span style=\"font-weight: 400;\">What are the 5 elements of cybersecurity?<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">For an aspiring specialist or a seasoned IT professional looking to move forward, the right skills make all the difference when it comes to the domain of cybersecurity. Join us as we discuss all that you would require about cybersecurity skills. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Curious to know about Cybersecurity? Our recent video explores the critical aspects of cybersecurity, including core competencies required, common career paths, and essential tools and technologies:<\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/Xvo34AqeMU8?rel=0\" width=\"900\" height=\"500\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<h2><b>Roles and Responsibilities in Cybersecurity<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The role of <\/span><b>cybersecurity analysts and information security analysts<\/b><span style=\"font-weight: 400;\"> has been very critical in organisations that are increasingly faced with an ever-growing number of security threats. The demand for these professionals is extremely high, where they identify vulnerabilities, prevent security breaches, and respond to incidents when they happen.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They must have a solid understanding of operating systems, computer systems, and system and network configurations, coupled with advanced technical skills to mitigate risks effectively. Therefore, their efforts promote secure systems maintenance that protects sensitive information away from unscrupulous individuals. In addition to technical knowledge, these experts need good communication skills.<\/span><\/p>\n<p><b>Cybersecurity professionals<\/b><span style=\"font-weight: 400;\"> commonly work in teams of software developers and IT administrators to buttress defences, prevent security incidents, and even in digital forensics, trace the origins of a breach and buttress the integrity of systems. Cybersecurity professionals play a role in protecting modern digital ecosystems and thus ensuring that people&#8217;s trust in the connection is stable enough.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A cybersecurity professional safeguards the digital assets of an organisation by focusing on threats and vulnerabilities. Be it managing an incident with an effective incident response strategy or creating strong security architectures, the scope of their work stretches across many areas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Roles include <\/span><b>security architects<\/b><span style=\"font-weight: 400;\"> focusing on secure system creation, as well as providing advisory services by way of security consulting to enable proper management of security across applications and infrastructure. They also manage application security protocols and apply project management skills to implement integrated security measures that are in line with business objectives.<\/span><\/p>\n<h2><b>Risk Assessment and Management<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Risk Assessment and Management in cybersecurity can be described as the ability to identify and mitigate risks effectively using established frameworks. Risk management is fundamental to cybersecurity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mastery of frameworks like ISO 27001, NIST, and CIS could seriously improve your ability to effectively handle risk management in an organisational structure.<\/span><\/p>\n<p><b>Core competencies include:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identifying vulnerabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Assessing the probability and possible effects of threats.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Developing strategies that will mitigate risks.<\/span><\/li>\n<\/ul>\n<p><b>Recommended reads:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;Risk Management Framework: A Lab-Based Approach to Securing Information Systems&#8221; by James Broad, Syngress.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;ISO 27001: 2022 Implementation Handbook&#8221; by Alan Calder, IT Governance Publishing.<\/span><\/li>\n<\/ul>\n<h2><b>Network Security<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Network security demands expertise in protecting data in transit. It is also important to prevent unauthorised network access. It is vital to have a full understanding of networks to secure data in transit.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Certifications such as CISCO Certified CyberOps Professional validate expertise in this domain.<\/span><\/p>\n<p><b>Core competencies include:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Configuring firewalls, VPNs, and IDS\/IPS systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Monitoring network traffic to identify anomalies.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Designing secure architectures to thwart unauthorised access.<\/span><\/li>\n<\/ul>\n<p><b>Recommended reads:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;Network Security Essentials: Applications and Standards&#8221; by William Stallings, Pearson.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;Hacking Exposed: Network Security Secrets &amp; Solutions&#8221; by Stuart McClure, McGraw-Hill Education.<\/span><\/li>\n<\/ul>\n<h2><b>Incident Response and Forensics<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Incident Response and Forensics are important in cybersecurity. Effective incident response is critical in cases of breaches. One is expected to be proficient with tools such as Wireshark, EnCase, and Splunk. In cybersecurity, the skills to detect, contain, and analyse cyber incidents for effective recovery are deemed invaluable.<\/span><\/p>\n<p><b>Core competencies of cybersecurity professionals include:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Detecting, analysing, and containing incidents.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Restoring systems to minimise downtime.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conducting forensic analysis to understand the attack methods and strengthen the defences.<\/span><\/li>\n<\/ul>\n<p><b>Recommended reads:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;Incident Response &amp; Computer Forensics&#8221; by Jason T. Luttgens, McGraw-Hill Education.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;The Art of Memory Forensics&#8221; by Michael Hale Ligh, Wiley.<\/span><\/li>\n<\/ul>\n<h2><b>Ethical Hacking and Penetration Testing<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">When it comes to Ethical Hacking and Penetration Testing, offence security skills are as relevant as defence skills. It largely demands proficiency in identifying and addressing vulnerabilities through controlled attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ethical Hacker (CEH) or Offensive Security Certified Professional (OSCP) Certifications are highly regarded in the field of cybersecurity..<\/span><\/p>\n<p><b>Core competencies of ethical hackers include:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identifying and exploiting system vulnerabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Evaluating the strength of security measures.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Providing actionable recommendations to improve defences.<\/span><\/li>\n<\/ul>\n<p><b>Recommended reads:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;The Web Application Hacker&#8217;s Handbook&#8221; by Dafydd Stuttard, Wiley.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;Penetration Testing: A Hands-On Introduction to Hacking&#8221; by Georgia Weidman, No Starch Press.<\/span><\/li>\n<\/ul>\n<h2><b>Programming and Scripting<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">For automation, analysis, and system security, expertise in programming is essential. One must know coding languages to automate tasks and secure systems as well.<\/span><\/p>\n<p><b>Key programming languages:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Python: For automation and scripting.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">JavaScript: Vulnerability finding in web applications.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">C\/C++: For understanding system-level weaknesses.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SQL: For securing databases.<\/span><\/li>\n<\/ul>\n<p><b>Core competencies of programmers include:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Proficiency in programming languages like Python, Java, and C++.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Strong problem-solving skills and technical expertise in cybersecurity.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Technical knowledge of data structures, algorithms, system design, etc.<\/span><\/li>\n<\/ul>\n<p><b>Recommended reads:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;Automate the Boring Stuff with Python&#8221; by Al Sweigart, No Starch Press.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;Python for Cybersecurity: Using Python for Cyber Offense and Defense&#8221; by Howard E. Poston, Wiley.<\/span><\/li>\n<\/ul>\n<h2><b>Cloud Security<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">As more companies are moving towards the cloud, the importance of securing a cloud environment is rapidly growing. As a result, the demand to secure all this data is a growing concern.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One can enhance their cloud security credentials by including AWS Certified Security Specialty or Microsoft Certified: Azure Security Engineer Associate.<\/span><\/p>\n<p><b>Core Competencies of Cloud Security Professionals Include:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Expertise in securing cloud platforms &#8211; like AWS, Azure, and Google Cloud.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Knowledge of Identity and Access Management (IAM).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Knowledge of various encryption techniques.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Skills in threat detection and incident response.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compliance with regulations like GDPR.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Competence in safeguarding cloud environments and managing access controls.<\/span><\/li>\n<\/ul>\n<p><b>Recommended reads:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;Practical Cloud Security: A Guide for Secure Design and Deployment&#8221; by Chris Dotson, O&#8217;Reilly Media.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;AWS Certified Security Study Guide&#8221; by Marc Crandall, Wiley.<\/span><\/li>\n<\/ul>\n<h2><b>Understanding Cybersecurity Laws and Compliance<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Security strategies should align with the legal requirements and best practices &#8211; compliance with Cybersecurity laws ensures that. Adoption of upcoming policies, and amendments based on geology, country, etc. are on the rise.<\/span><\/p>\n<p><b>Core Competencies of Cybersecurity Professionals Include:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Knowledge of regulations like GDPR, HIPAA, and CCPA.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Familiarity with industry compliance standards.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">International policies and their effects on business operations.<\/span><\/li>\n<\/ul>\n<p><b>Recommended reads:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;Cybersecurity Law&#8221; by Jeff Kosseff, Wiley.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;GDPR: Fix it Fast&#8221; by Patrick O&#8217;Kane, Goodfellow Publishers.<\/span><\/li>\n<\/ul>\n<h2><b>Communication and Collaboration Skills<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Cybersecurity experts often work with multiple teams and stakeholders. Thus, there is a need to have better communication to clearly convey technical concepts and work with diverse teams.<\/span><\/p>\n<p><b>Good communication is important for:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Explaining technical issues in simple terms.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conducting training sessions for employees.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Partnering with departments to improve security.<\/span><\/li>\n<\/ul>\n<p><b>Recommended reads:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;Crucial Conversations: Tools for Talking When Stakes Are High&#8221; by Kerry Patterson, McGraw-Hill Education.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;The Art of Communicating&#8221; by Thich Nhat Hanh, HarperOne.<\/span><\/li>\n<\/ul>\n<h2><b>Analytical Thinking and Problem-Solving<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Continuous learning and adaptability are key when it comes to analytical thinking and problem-solving in cybersecurity. It is required that one devises solutions for emerging cyber threats with strong critical thinking.<\/span><\/p>\n<p><b>Professionals must:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Quickly analyse complex scenarios.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Devise creative solutions to emerging threats.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Stay updated on the latest attack techniques and defence strategies.<\/span><\/li>\n<\/ul>\n<p><b>Recommended reads:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;Thinking, Fast and Slow&#8221; by Daniel Kahneman, Farrar, Straus and Giroux.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;The Art of Thinking Clearly&#8221; by Rolf Dobelli, Harper.<\/span><\/li>\n<\/ul>\n<h2><b>Continuous Learning and Adaptability<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The landscape of cybersecurity is fast-changing and one must be committed to staying updated with trends and adapting to evolving challenges.<\/span><\/p>\n<p><b>The experts should:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Keep up with the latest technologies and trends.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pursue certifications and advanced training to keep pace with the industry.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Innovate through strategies on new threats.<\/span><\/li>\n<\/ul>\n<p><b>Recommended reads:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;The Fifth Discipline: The Art &amp; Practice of The Learning Organization&#8221; by Peter M. Senge, Crown Business.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;Lifelong Learning: How to Continuously Build Skills in an Ever-Changing World&#8221; by Michelle Weise, Wiley.<\/span><\/li>\n<\/ul>\n<h3><b>Conclusion<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Excelling in cybersecurity means mastering technical skills in cybersecurity, using analytical thinking, and developing a proactive attitude. This will catapult you to one of the most dynamic and critical sectors of the digital age. Whatever the level of experience &#8211; from newcomer to advancement-investment in these areas will propel you as an invaluable asset in combating cyber threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Learning how to become a cybersecurity expert requires a strong foundation in security concepts, practical experience, and industry-recognized qualifications. All these can only be achieved and learned through quality <a href=\"https:\/\/imarticus.org\/post-graduate-program-in-cybersecurity\/\">cybersecurity courses<\/a>.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you too wish to pursue cybersecurity training, to learn incident handling, ethical hacking, cloud security, application security and network security through practical application, the best method would be to opt for this <\/span><span style=\"font-weight: 400;\">postgraduate programme in cybersecurity<\/span><span style=\"font-weight: 400;\">. A 6-month multimodal course with a multitude of features, it helps you dive into the world of Cybersecurity with 100% job assurance. Learning is a cornerstone for anyone targeting a successful cybersecurity career in the near future. Enrol now!<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you wonder how you can keep up with the growing skills in Cybersecurity? Chances are that there are many out there who have set out on this journey, while some are stepping into it. The global cybersecurity market was valued at $219 billion in 2023 and is projected to reach $578.2 billion by 2033. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":267538,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_mo_disable_npp":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[22],"tags":[5074],"class_list":["post-267536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-finance","tag-skills-cybersecurity"],"acf":[],"aioseo_notices":[],"modified_by":"Imarticus Learning","_links":{"self":[{"href":"https:\/\/imarticus.org\/blog\/wp-json\/wp\/v2\/posts\/267536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/imarticus.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/imarticus.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/imarticus.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/imarticus.org\/blog\/wp-json\/wp\/v2\/comments?post=267536"}],"version-history":[{"count":1,"href":"https:\/\/imarticus.org\/blog\/wp-json\/wp\/v2\/posts\/267536\/revisions"}],"predecessor-version":[{"id":267539,"href":"https:\/\/imarticus.org\/blog\/wp-json\/wp\/v2\/posts\/267536\/revisions\/267539"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/imarticus.org\/blog\/wp-json\/wp\/v2\/media\/267538"}],"wp:attachment":[{"href":"https:\/\/imarticus.org\/blog\/wp-json\/wp\/v2\/media?parent=267536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/imarticus.org\/blog\/wp-json\/wp\/v2\/categories?post=267536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/imarticus.org\/blog\/wp-json\/wp\/v2\/tags?post=267536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}