{"id":22672,"date":"2023-07-02T18:13:02","date_gmt":"2023-07-02T15:13:02","guid":{"rendered":"http:\/\/test"},"modified":"2023-09-28T13:14:13","modified_gmt":"2023-09-28T10:14:13","slug":"workshop-threat-hunting-fundamentals-ja","status":"publish","type":"resource","link":"https:\/\/www.kelacyber.com\/ja\/resources\/webinar-ja\/workshop-threat-hunting-fundamentals-ja\/","title":{"rendered":"\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\uff1a\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\uff08\u30d9\u30fc\u30b7\u30c3\u30af\u7de8\uff09"},"content":{"rendered":"","protected":false},"featured_media":22889,"template":"","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"_uag_custom_page_level_css":"","_links_to":"","_links_to_target":""},"resource_type":[57],"class_list":["post-22672","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource_type-webinar-ja"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706.jpg",310,110,false],"thumbnail":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706-150x110.jpg",150,110,true],"medium":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706-300x106.jpg",300,106,true],"medium_large":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706.jpg",310,110,false],"large":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706.jpg",310,110,false],"1536x1536":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706.jpg",310,110,false],"2048x2048":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706.jpg",310,110,false],"blogimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706.jpg",310,110,false],"teamimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706-301x110.jpg",301,110,true],"pressimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706.jpg",310,110,false],"blogthumb":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706.jpg",310,110,false],"bloghimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706.jpg",310,110,false],"bloghvid":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706.jpg",310,110,false],"bloginner":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706.jpg",310,110,false],"blogrelated":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706-225x110.jpg",225,110,true],"product-icon":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706-50x50.jpg",50,50,true],"alm-thumbnail":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/workshop-small-0706-150x110.jpg",150,110,true]},"uagb_author_info":{"display_name":"Sudarshan","author_link":"https:\/\/www.kelacyber.com\/ja\/blog\/author\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/resource\/22672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":8,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/resource\/22672\/revisions"}],"predecessor-version":[{"id":24607,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/resource\/22672\/revisions\/24607"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media\/22889"}],"wp:attachment":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media?parent=22672"}],"wp:term":[{"taxonomy":"resource_type","embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/resource_type?post=22672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}