{"id":18423,"date":"2020-02-16T12:23:28","date_gmt":"2020-02-16T09:23:28","guid":{"rendered":"http:\/\/training.alkhaleej.com.sa\/all-you-need-to-know-bug-bounty-programs\/"},"modified":"2020-02-16T12:26:33","modified_gmt":"2020-02-16T09:26:33","slug":"all-you-need-to-know-bug-bounty-programs","status":"publish","type":"post","link":"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/","title":{"rendered":"All you need to know Bug bounty programs"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]It&#8217;s such a big world, all you know about it is just small peels, that world where the information, data, and Programming Languages are the Kings, and this infinit digital world, as many worlds has good and bad sides. A bad side like Hackers, dangerous viruses, and vulnerabilities. and a good side is Whoever devotes all his time and effort to fire as well on the sites and networks..<\/p>\n<p>On our topic today, we will talk about bug hunters, and what it is<\/p>\n<h4><strong>A bug bounty is:<\/strong><\/h4>\n<p>A deal offered by many of big software companies, that the individuals receive rewards and for haunting \u00a0bugs or software vulnerabilities.<\/p>\n<p>These deals enable developers to discover and resolve vulnerabilities before the company knows about them, which helps to avoid abuse, and on top of those companies are Microsoft, Google, and Apple.<\/p>\n<h4><strong>\u00a0Beginnings ..<\/strong><\/h4>\n<p>The first technology companies to offer rewards for security vulnerabilities that discovered in their systems were the companies of web browser developments, they announced financial and moral rewards for those programmers who find weaknesses in programming code, and the beginning was from Netscape in 1995 and Mozilla did the same In the year 2004.<\/p>\n<h4><strong><img decoding=\"async\" class=\"aligncenter wp-image-18408 size-full\" src=\"https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/Cyber-security-01.png\" alt=\"\" width=\"500\" height=\"500\" srcset=\"https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/Cyber-security-01.png 500w, https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/Cyber-security-01-300x300.png 300w, https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/Cyber-security-01-100x100.png 100w, https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/Cyber-security-01-150x150.png 150w, https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/Cyber-security-01-320x320.png 320w, https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/Cyber-security-01-360x360.png 360w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/strong><\/h4>\n<h4><strong>Cybersecurity<\/strong><\/h4>\n<p>Before we get into the definition of bug hunters, let us present to you the science of cybersecurity or computer security which is a branch of technology known as information security, and it aims to protect information and property from theft, corruption, or accidents.<\/p>\n<h4><strong>Who is the bug hunter?<\/strong><\/h4>\n<p>Known as an ethical hacker, or a white-hatted hacker, who practices what is known as \u201cethical hacking\u201d The term used in the IT world for a person whose values \u200b\u200boppose violating other intellectual property.<\/p>\n<p>An ethical hacker focuses on protecting systems, unlike a black hat hacker who tries to crack them, and he is also authorized to use prohibited means to address the security risks of computers and networks.<\/p>\n<h4><strong>Types of vulnerabilities detection<\/strong><\/h4>\n<p>discovering vulnerability is split into two parts, the first is through programs and annual competitions launched by the companies themselves, and the other part is from regular users who do this at any time.<\/p>\n<p>But in the second case, you must know the law and what is the punishment for any matter you will do. In the United Kingdom, under the Computer Misuse Act, unauthorized access is a crime even if the door is wide open, so hackers and talented people in this field must understand the law and to what How extent risky.<\/p>\n<h4><strong><img decoding=\"async\" class=\"aligncenter wp-image-18412 size-full\" src=\"https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/B.jpg\" alt=\"\" width=\"500\" height=\"500\" srcset=\"https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/B.jpg 500w, https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/B-300x300.jpg 300w, https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/B-100x100.jpg 100w, https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/B-150x150.jpg 150w, https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/B-320x320.jpg 320w, https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/B-360x360.jpg 360w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/strong><\/h4>\n<h4><strong>Big numbers for Bug bounties<\/strong><\/h4>\n<p>In April 2018, the company known as Oath Inc gave 400,000 \u00a0USD to 40 \u00a0participants in the H1-415 event organized by <a href=\"https:\/\/www.hackerone.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">HackerOne<\/a> and Oath \/ Verizon Media, which owns Yahoo and AOL, allocated another\u00a0 400,000 \u00a0USD at a separate event in November 2018 for programmers who identified 159 critical security vulnerabilities.<\/p>\n<p>After the success of the events, the company created a bug bonus program, through which5 \u00a0million USD was paid in 2018 to hackers and researchers who found errors from various threat levels across multiple platforms.<\/p>\n<h4><strong><img decoding=\"async\" class=\"aligncenter wp-image-18414 size-full\" src=\"https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/C.jpg\" alt=\"\" width=\"500\" height=\"500\" srcset=\"https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/C.jpg 500w, https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/C-300x300.jpg 300w, https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/C-100x100.jpg 100w, https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/C-150x150.jpg 150w, https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/C-320x320.jpg 320w, https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/C-360x360.jpg 360w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/strong><\/h4>\n<h4><strong>The most famous companies<\/strong><\/h4>\n<p>Many companies around the world offer events to discover security vulnerabilities in their systems. For example, Microsoft has provided financial rewards for the discovery of security vulnerabilities for two million dollars in 2018.<\/p>\n<p>And Google has its vulnerabilities bonus program since 2010, more than $ 15 million has been paid out, of which $ 3.4 million was awarded in 2018 \u00a01.7 million USD of which focused on error detection in the Android operating system and the Chrome browser).<\/p>\n<p>And Facebook paying for the bug bounty program on thier social network since its creation in 2011, it has paid more than 7.5 million USD.<\/p>\n<p>Finally, Tesla joined to the marathon to and programmers and hunters and promised if someone breaks into its electric cars will get a car and a million USD.<\/p>\n<h4><strong>The most famous Arab bug hunters<\/strong><\/h4>\n<p>The Egyptian security expert, Mohamed Ramadan, is one of the honor list of the most prominent ethical hackers who discovered software errors or gaps in Facebook, as well as the Moroccan Amin Al Sharai, the Egyptian Mohamed Abdel Baset Al-Nubi, and finally, the Palestinian programmer Khalil Shreteh, who was could writing on the wall of Mark Zuckerberg, the founder of Facebook To prove to the site management that there is a security vulnerability that enables it to be discovered, allowing any social network user to write on the wall of any other user without his consent.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]It&#8217;s such a big world, all you know about it is just small peels, that world where the information, data, and Programming Languages are the Kings, and this infinit digital world, as many worlds has good and bad sides. A bad side like Hackers, dangerous viruses, and vulnerabilities. and a good side is Whoever devotes [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":18410,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[31],"tags":[],"class_list":["post-18423","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>All you need to know Bug bounty programs - AlKhaleej Training<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"All you need to know Bug bounty programs - AlKhaleej Training\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_column_text]It&#8217;s such a big world, all you know about it is just small peels, that world where the information, data, and Programming Languages are the Kings, and this infinit digital world, as many worlds has good and bad sides. A bad side like Hackers, dangerous viruses, and vulnerabilities. and a good side is Whoever devotes [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/\" \/>\n<meta property=\"og:site_name\" content=\"AlKhaleej Training\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-16T09:23:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-16T09:26:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/thumbnail_Main-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wessam\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"wessam\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/en\\\/all-you-need-to-know-bug-bounty-programs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/en\\\/all-you-need-to-know-bug-bounty-programs\\\/\"},\"author\":{\"name\":\"wessam\",\"@id\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/#\\\/schema\\\/person\\\/dc79881f4c09244426487c00e9d60051\"},\"headline\":\"All you need to know Bug bounty programs\",\"datePublished\":\"2020-02-16T09:23:28+00:00\",\"dateModified\":\"2020-02-16T09:26:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/en\\\/all-you-need-to-know-bug-bounty-programs\\\/\"},\"wordCount\":757,\"image\":{\"@id\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/en\\\/all-you-need-to-know-bug-bounty-programs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/thumbnail_Main-image.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/en\\\/all-you-need-to-know-bug-bounty-programs\\\/\",\"url\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/en\\\/all-you-need-to-know-bug-bounty-programs\\\/\",\"name\":\"All you need to know Bug bounty programs - AlKhaleej Training\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/en\\\/all-you-need-to-know-bug-bounty-programs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/en\\\/all-you-need-to-know-bug-bounty-programs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/thumbnail_Main-image.jpg\",\"datePublished\":\"2020-02-16T09:23:28+00:00\",\"dateModified\":\"2020-02-16T09:26:33+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/#\\\/schema\\\/person\\\/dc79881f4c09244426487c00e9d60051\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/en\\\/all-you-need-to-know-bug-bounty-programs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/training.alkhaleej.com.sa\\\/en\\\/all-you-need-to-know-bug-bounty-programs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/en\\\/all-you-need-to-know-bug-bounty-programs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/thumbnail_Main-image.jpg\",\"contentUrl\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/thumbnail_Main-image.jpg\",\"width\":1280,\"height\":960},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/en\\\/all-you-need-to-know-bug-bounty-programs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"All you need to know Bug bounty programs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/#website\",\"url\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/\",\"name\":\"AlKhaleej Training\",\"description\":\"Global knowledge.. local focus..\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/#\\\/schema\\\/person\\\/dc79881f4c09244426487c00e9d60051\",\"name\":\"wessam\",\"url\":\"https:\\\/\\\/training.alkhaleej.com.sa\\\/en\\\/author\\\/wessam\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"All you need to know Bug bounty programs - AlKhaleej Training","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/","og_locale":"en_US","og_type":"article","og_title":"All you need to know Bug bounty programs - AlKhaleej Training","og_description":"[vc_row][vc_column][vc_column_text]It&#8217;s such a big world, all you know about it is just small peels, that world where the information, data, and Programming Languages are the Kings, and this infinit digital world, as many worlds has good and bad sides. A bad side like Hackers, dangerous viruses, and vulnerabilities. and a good side is Whoever devotes [&hellip;]","og_url":"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/","og_site_name":"AlKhaleej Training","article_published_time":"2020-02-16T09:23:28+00:00","article_modified_time":"2020-02-16T09:26:33+00:00","og_image":[{"width":1280,"height":960,"url":"https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/thumbnail_Main-image.jpg","type":"image\/jpeg"}],"author":"wessam","twitter_card":"summary_large_image","twitter_misc":{"Written by":"wessam","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/#article","isPartOf":{"@id":"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/"},"author":{"name":"wessam","@id":"https:\/\/training.alkhaleej.com.sa\/#\/schema\/person\/dc79881f4c09244426487c00e9d60051"},"headline":"All you need to know Bug bounty programs","datePublished":"2020-02-16T09:23:28+00:00","dateModified":"2020-02-16T09:26:33+00:00","mainEntityOfPage":{"@id":"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/"},"wordCount":757,"image":{"@id":"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/#primaryimage"},"thumbnailUrl":"https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/thumbnail_Main-image.jpg","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/","url":"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/","name":"All you need to know Bug bounty programs - AlKhaleej Training","isPartOf":{"@id":"https:\/\/training.alkhaleej.com.sa\/#website"},"primaryImageOfPage":{"@id":"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/#primaryimage"},"image":{"@id":"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/#primaryimage"},"thumbnailUrl":"https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/thumbnail_Main-image.jpg","datePublished":"2020-02-16T09:23:28+00:00","dateModified":"2020-02-16T09:26:33+00:00","author":{"@id":"https:\/\/training.alkhaleej.com.sa\/#\/schema\/person\/dc79881f4c09244426487c00e9d60051"},"breadcrumb":{"@id":"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/#primaryimage","url":"https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/thumbnail_Main-image.jpg","contentUrl":"https:\/\/training.alkhaleej.com.sa\/wp-content\/uploads\/2020\/02\/thumbnail_Main-image.jpg","width":1280,"height":960},{"@type":"BreadcrumbList","@id":"https:\/\/training.alkhaleej.com.sa\/en\/all-you-need-to-know-bug-bounty-programs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/training.alkhaleej.com.sa\/en\/"},{"@type":"ListItem","position":2,"name":"All you need to know Bug bounty programs"}]},{"@type":"WebSite","@id":"https:\/\/training.alkhaleej.com.sa\/#website","url":"https:\/\/training.alkhaleej.com.sa\/","name":"AlKhaleej Training","description":"Global knowledge.. local focus..","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/training.alkhaleej.com.sa\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/training.alkhaleej.com.sa\/#\/schema\/person\/dc79881f4c09244426487c00e9d60051","name":"wessam","url":"https:\/\/training.alkhaleej.com.sa\/en\/author\/wessam\/"}]}},"_links":{"self":[{"href":"https:\/\/training.alkhaleej.com.sa\/en\/wp-json\/wp\/v2\/posts\/18423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/training.alkhaleej.com.sa\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/training.alkhaleej.com.sa\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/training.alkhaleej.com.sa\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/training.alkhaleej.com.sa\/en\/wp-json\/wp\/v2\/comments?post=18423"}],"version-history":[{"count":3,"href":"https:\/\/training.alkhaleej.com.sa\/en\/wp-json\/wp\/v2\/posts\/18423\/revisions"}],"predecessor-version":[{"id":18426,"href":"https:\/\/training.alkhaleej.com.sa\/en\/wp-json\/wp\/v2\/posts\/18423\/revisions\/18426"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/training.alkhaleej.com.sa\/en\/wp-json\/wp\/v2\/media\/18410"}],"wp:attachment":[{"href":"https:\/\/training.alkhaleej.com.sa\/en\/wp-json\/wp\/v2\/media?parent=18423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/training.alkhaleej.com.sa\/en\/wp-json\/wp\/v2\/categories?post=18423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/training.alkhaleej.com.sa\/en\/wp-json\/wp\/v2\/tags?post=18423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}