{"id":251458,"date":"2023-12-23T19:20:19","date_gmt":"2023-12-23T15:20:19","guid":{"rendered":"https:\/\/www.infosec4tc.com\/product\/cyber-security-specialist-hat\/"},"modified":"2024-10-09T00:52:44","modified_gmt":"2024-10-08T20:52:44","slug":"cyber-security-specialist-hat","status":"publish","type":"product","link":"https:\/\/www.infosec4tc.com\/ar\/product\/cyber-security-specialist-hat\/","title":{"rendered":"\u0642\u0628\u0639\u0629 \u0623\u062e\u0635\u0627\u0626\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a"},"content":{"rendered":"<p><strong>\u0642\u0628\u0639\u0627\u062a \u0627\u0644\u0623\u0628 \u0627\u0644\u0634\u062e\u0635\u064a\u0629<\/strong> \u062a\u0623\u062a\u064a \u0628\u062a\u0635\u0645\u064a\u0645 \u0631\u0627\u0626\u0639\u060c \u0645\u0639 \u0633\u062a\u0629 \u0623\u0644\u0648\u0627\u062d\u060c \u0648\u0642\u0645\u0629 \u0645\u0646\u062e\u0641\u0636\u0629\u060c \u0648\u0634\u0641\u0627\u0647 \u0645\u0642\u0648\u0633\u0629 \u0645\u0633\u0628\u0642\u064b\u0627 \u0644\u0625\u0637\u0644\u0627\u0644\u0629 \u0645\u0645\u064a\u0632\u0629. \u0643\u0644 \u0642\u0628\u0639\u0629 \u0645\u0635\u0646\u0648\u0639\u0629 \u0645\u0646 100% \u0642\u0637\u0646 \u062a\u0634\u064a\u0646\u0648 \u0645\u0639\u0627\u0644\u062c \u062d\u064a\u0648\u064a\u064b\u0627\u060c \u0648\u062a\u062a\u0645\u064a\u0632 \u0628\u0625\u063a\u0644\u0627\u0642 \u0645\u0646 \u0627\u0644\u0642\u0645\u0627\u0634 \u0628\u0646\u0641\u0633\u0647 \u0645\u0639 \u0645\u0634\u0628\u0643 \u062b\u0644\u0627\u062b\u064a \u0627\u0644\u0627\u0646\u0632\u0644\u0627\u0642 \u0645\u0646 \u0627\u0644\u0646\u062d\u0627\u0633 \u0627\u0644\u0642\u062f\u064a\u0645 &#8211; \u0648\u0647\u0648 \u062a\u0641\u0635\u064a\u0644 \u064a\u0642\u062f\u0631\u0647 \u0623\u064a \u0623\u0628.<\/p>\n<ul>\n<li><strong>\u0627\u0644\u0645\u0648\u0627\u062f:<\/strong> 100% \u0642\u0637\u0646 \u062a\u0634\u064a\u0646\u0648 \u0645\u0639\u0627\u0644\u062c \u062d\u064a\u0648\u064a\u064b\u0627 (\u0627\u0644\u0642\u0628\u0639\u0629)\u060c 100% \u062c\u0644\u062f \u0635\u0646\u0627\u0639\u064a (\u0627\u0644\u0631\u0642\u0639\u0629)<\/li>\n<li><strong>\u062a\u0635\u0645\u064a\u0645 \u063a\u064a\u0631 \u0645\u0646\u0638\u0645\u060c \u0633\u062a\u0629 \u0623\u0644\u0648\u0627\u062d\u060c \u0642\u0645\u0629 \u0645\u0646\u062e\u0641\u0636\u0629<\/strong><\/li>\n<li><strong>\u0634\u0641\u0627\u0647 \u0645\u0642\u0648\u0633\u0629 \u0645\u0633\u0628\u0642\u064b\u0627<\/strong><\/li>\n<li><strong>\u0645\u0635\u062f\u0631 \u062e\u0627\u0644\u064a \u0645\u0646 \u0627\u0644\u0639\u0644\u0627\u0645\u0627\u062a \u0645\u0646 \u0628\u0646\u063a\u0644\u0627\u062f\u064a\u0634<\/strong><\/li>\n<li><strong>\u0645\u0644\u0635\u0642 \u0645\u062e\u064a\u0637<\/strong><\/li>\n<li><strong>\u0645\u0644\u0627\u062d\u0638\u0629:<\/strong> \u064a\u063a\u0633\u0644 \u064a\u062f\u0648\u064a\u064b\u0627 \u0641\u0642\u0637<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p><strong>\u0642\u0628\u0639\u0629 \u0634\u062e\u0635\u064a\u0629 \u0644\u0644\u0623\u0628<\/strong> \u062a\u062a\u0645\u064a\u0632 \u0628\u062a\u0635\u0645\u064a\u0645 \u063a\u064a\u0631 \u0645\u0646\u0638\u0645\u060c \u0645\u0639 \u0633\u062a\u0629 \u0623\u0644\u0648\u0627\u062d \u0648\u0642\u0645\u0629 \u0645\u0646\u062e\u0641\u0636\u0629 \u0648\u0634\u0641\u0627\u0647 \u0645\u0642\u0648\u0633\u0629 \u0645\u0633\u0628\u0642\u064b\u0627. \u0645\u0635\u0646\u0648\u0639\u0629 \u0645\u0646 100% \u0642\u0637\u0646 \u062a\u0634\u064a\u0646\u0648 \u0645\u0639\u0627\u0644\u062c \u062d\u064a\u0648\u064a\u064b\u0627\u060c \u0648\u062a\u062d\u062a\u0648\u064a \u0639\u0644\u0649 \u0625\u063a\u0644\u0627\u0642 \u0645\u0646 \u0627\u0644\u0642\u0645\u0627\u0634 \u0628\u0646\u0641\u0633\u0647 \u0645\u0639 \u0645\u0634\u0628\u0643 \u062b\u0644\u0627\u062b\u064a \u0627\u0644\u0627\u0646\u0632\u0644\u0627\u0642 \u0648\u062a\u0641\u0627\u0635\u064a\u0644 \u0645\u0646 \u0627\u0644\u0646\u062d\u0627\u0633 \u0627\u0644\u0642\u062f\u064a\u0645. \u0627\u0644\u0631\u0642\u0639\u0629 \u0645\u0635\u0646\u0648\u0639\u0629 \u0645\u0646 100% \u062c\u0644\u062f \u0635\u0646\u0627\u0639\u064a\u060c \u0648\u0627\u0644\u0642\u0628\u0639\u0629 \u0645\u0635\u062f\u0631\u0647\u0627 \u0628\u0646\u063a\u0644\u0627\u062f\u064a\u0634. \u064a\u064f\u063a\u0633\u0644 \u064a\u062f\u0648\u064a\u064b\u0627 \u0641\u0642\u0637.<\/p>\n","protected":false},"featured_media":248257,"comment_status":"open","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":""},"product_brand":[],"product_cat":[560,558],"product_tag":[],"class_list":{"0":"post-251458","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-cyber-caps-ar","7":"product_cat-cyber-wear-ar","9":"first","10":"instock","11":"shipping-taxable","12":"purchasable","13":"product-type-variable","14":"has-default-attributes"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u0642\u0628\u0639\u0629 \u0623\u062e\u0635\u0627\u0626\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a - InfoSec4TC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infosec4tc.com\/ar\/product\/cyber-security-specialist-hat\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u0642\u0628\u0639\u0629 \u0623\u062e\u0635\u0627\u0626\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a - InfoSec4TC\" \/>\n<meta property=\"og:description\" content=\"\u0642\u0628\u0639\u0629 \u0634\u062e\u0635\u064a\u0629 \u0644\u0644\u0623\u0628 \u062a\u062a\u0645\u064a\u0632 \u0628\u062a\u0635\u0645\u064a\u0645 \u063a\u064a\u0631 \u0645\u0646\u0638\u0645\u060c \u0645\u0639 \u0633\u062a\u0629 \u0623\u0644\u0648\u0627\u062d \u0648\u0642\u0645\u0629 \u0645\u0646\u062e\u0641\u0636\u0629 \u0648\u0634\u0641\u0627\u0647 \u0645\u0642\u0648\u0633\u0629 \u0645\u0633\u0628\u0642\u064b\u0627. \u0645\u0635\u0646\u0648\u0639\u0629 \u0645\u0646 100% \u0642\u0637\u0646 \u062a\u0634\u064a\u0646\u0648 \u0645\u0639\u0627\u0644\u062c \u062d\u064a\u0648\u064a\u064b\u0627\u060c \u0648\u062a\u062d\u062a\u0648\u064a \u0639\u0644\u0649 \u0625\u063a\u0644\u0627\u0642 \u0645\u0646 \u0627\u0644\u0642\u0645\u0627\u0634 \u0628\u0646\u0641\u0633\u0647 \u0645\u0639 \u0645\u0634\u0628\u0643 \u062b\u0644\u0627\u062b\u064a \u0627\u0644\u0627\u0646\u0632\u0644\u0627\u0642 \u0648\u062a\u0641\u0627\u0635\u064a\u0644 \u0645\u0646 \u0627\u0644\u0646\u062d\u0627\u0633 \u0627\u0644\u0642\u062f\u064a\u0645. \u0627\u0644\u0631\u0642\u0639\u0629 \u0645\u0635\u0646\u0648\u0639\u0629 \u0645\u0646 100% \u062c\u0644\u062f \u0635\u0646\u0627\u0639\u064a\u060c \u0648\u0627\u0644\u0642\u0628\u0639\u0629 \u0645\u0635\u062f\u0631\u0647\u0627 \u0628\u0646\u063a\u0644\u0627\u062f\u064a\u0634. \u064a\u064f\u063a\u0633\u0644 \u064a\u062f\u0648\u064a\u064b\u0627 \u0641\u0642\u0637.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infosec4tc.com\/ar\/product\/cyber-security-specialist-hat\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec4TC\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-08T20:52:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infosec4tc.com\/wp-content\/uploads\/2023\/12\/93584.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 \u062f\u0642\u064a\u0642\u0629\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/product\\\/cyber-security-specialist-hat\\\/\",\"url\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/product\\\/cyber-security-specialist-hat\\\/\",\"name\":\"\u0642\u0628\u0639\u0629 \u0623\u062e\u0635\u0627\u0626\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a - InfoSec4TC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/product\\\/cyber-security-specialist-hat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/product\\\/cyber-security-specialist-hat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infosec4tc.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/93584.jpg\",\"datePublished\":\"2023-12-23T15:20:19+00:00\",\"dateModified\":\"2024-10-08T20:52:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/product\\\/cyber-security-specialist-hat\\\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/product\\\/cyber-security-specialist-hat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/product\\\/cyber-security-specialist-hat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infosec4tc.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/93584.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infosec4tc.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/93584.jpg\",\"width\":1200,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/product\\\/cyber-security-specialist-hat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0627\u0644\u0645\u062a\u062c\u0631\",\"item\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/shop-2\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u0642\u0628\u0639\u0629 \u0623\u062e\u0635\u0627\u0626\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/#website\",\"url\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/\",\"name\":\"InfoSec4TC\",\"description\":\"Cyber Security Career Courses\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/#organization\",\"name\":\"InfoSec4TC\",\"url\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.infosec4tc.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/LOGON22.png?fit=200%2C60&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.infosec4tc.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/LOGON22.png?fit=200%2C60&ssl=1\",\"width\":200,\"height\":60,\"caption\":\"InfoSec4TC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infosec4tc.com\\\/ar\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u0642\u0628\u0639\u0629 \u0623\u062e\u0635\u0627\u0626\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a - InfoSec4TC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infosec4tc.com\/ar\/product\/cyber-security-specialist-hat\/","og_locale":"ar_AR","og_type":"article","og_title":"\u0642\u0628\u0639\u0629 \u0623\u062e\u0635\u0627\u0626\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a - InfoSec4TC","og_description":"\u0642\u0628\u0639\u0629 \u0634\u062e\u0635\u064a\u0629 \u0644\u0644\u0623\u0628 \u062a\u062a\u0645\u064a\u0632 \u0628\u062a\u0635\u0645\u064a\u0645 \u063a\u064a\u0631 \u0645\u0646\u0638\u0645\u060c \u0645\u0639 \u0633\u062a\u0629 \u0623\u0644\u0648\u0627\u062d \u0648\u0642\u0645\u0629 \u0645\u0646\u062e\u0641\u0636\u0629 \u0648\u0634\u0641\u0627\u0647 \u0645\u0642\u0648\u0633\u0629 \u0645\u0633\u0628\u0642\u064b\u0627. \u0645\u0635\u0646\u0648\u0639\u0629 \u0645\u0646 100% \u0642\u0637\u0646 \u062a\u0634\u064a\u0646\u0648 \u0645\u0639\u0627\u0644\u062c \u062d\u064a\u0648\u064a\u064b\u0627\u060c \u0648\u062a\u062d\u062a\u0648\u064a \u0639\u0644\u0649 \u0625\u063a\u0644\u0627\u0642 \u0645\u0646 \u0627\u0644\u0642\u0645\u0627\u0634 \u0628\u0646\u0641\u0633\u0647 \u0645\u0639 \u0645\u0634\u0628\u0643 \u062b\u0644\u0627\u062b\u064a \u0627\u0644\u0627\u0646\u0632\u0644\u0627\u0642 \u0648\u062a\u0641\u0627\u0635\u064a\u0644 \u0645\u0646 \u0627\u0644\u0646\u062d\u0627\u0633 \u0627\u0644\u0642\u062f\u064a\u0645. \u0627\u0644\u0631\u0642\u0639\u0629 \u0645\u0635\u0646\u0648\u0639\u0629 \u0645\u0646 100% \u062c\u0644\u062f \u0635\u0646\u0627\u0639\u064a\u060c \u0648\u0627\u0644\u0642\u0628\u0639\u0629 \u0645\u0635\u062f\u0631\u0647\u0627 \u0628\u0646\u063a\u0644\u0627\u062f\u064a\u0634. \u064a\u064f\u063a\u0633\u0644 \u064a\u062f\u0648\u064a\u064b\u0627 \u0641\u0642\u0637.","og_url":"https:\/\/www.infosec4tc.com\/ar\/product\/cyber-security-specialist-hat\/","og_site_name":"InfoSec4TC","article_modified_time":"2024-10-08T20:52:44+00:00","og_image":[{"width":1200,"height":1200,"url":"https:\/\/www.infosec4tc.com\/wp-content\/uploads\/2023\/12\/93584.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"1 \u062f\u0642\u064a\u0642\u0629"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.infosec4tc.com\/ar\/product\/cyber-security-specialist-hat\/","url":"https:\/\/www.infosec4tc.com\/ar\/product\/cyber-security-specialist-hat\/","name":"\u0642\u0628\u0639\u0629 \u0623\u062e\u0635\u0627\u0626\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a - InfoSec4TC","isPartOf":{"@id":"https:\/\/www.infosec4tc.com\/ar\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infosec4tc.com\/ar\/product\/cyber-security-specialist-hat\/#primaryimage"},"image":{"@id":"https:\/\/www.infosec4tc.com\/ar\/product\/cyber-security-specialist-hat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infosec4tc.com\/wp-content\/uploads\/2023\/12\/93584.jpg","datePublished":"2023-12-23T15:20:19+00:00","dateModified":"2024-10-08T20:52:44+00:00","breadcrumb":{"@id":"https:\/\/www.infosec4tc.com\/ar\/product\/cyber-security-specialist-hat\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infosec4tc.com\/ar\/product\/cyber-security-specialist-hat\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/www.infosec4tc.com\/ar\/product\/cyber-security-specialist-hat\/#primaryimage","url":"https:\/\/www.infosec4tc.com\/wp-content\/uploads\/2023\/12\/93584.jpg","contentUrl":"https:\/\/www.infosec4tc.com\/wp-content\/uploads\/2023\/12\/93584.jpg","width":1200,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/www.infosec4tc.com\/ar\/product\/cyber-security-specialist-hat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infosec4tc.com\/ar\/"},{"@type":"ListItem","position":2,"name":"\u0627\u0644\u0645\u062a\u062c\u0631","item":"https:\/\/www.infosec4tc.com\/ar\/shop-2\/"},{"@type":"ListItem","position":3,"name":"\u0642\u0628\u0639\u0629 \u0623\u062e\u0635\u0627\u0626\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a"}]},{"@type":"WebSite","@id":"https:\/\/www.infosec4tc.com\/ar\/#website","url":"https:\/\/www.infosec4tc.com\/ar\/","name":"InfoSec4TC","description":"Cyber Security Career Courses","publisher":{"@id":"https:\/\/www.infosec4tc.com\/ar\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infosec4tc.com\/ar\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/www.infosec4tc.com\/ar\/#organization","name":"InfoSec4TC","url":"https:\/\/www.infosec4tc.com\/ar\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/www.infosec4tc.com\/ar\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.infosec4tc.com\/wp-content\/uploads\/2022\/12\/LOGON22.png?fit=200%2C60&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.infosec4tc.com\/wp-content\/uploads\/2022\/12\/LOGON22.png?fit=200%2C60&ssl=1","width":200,"height":60,"caption":"InfoSec4TC"},"image":{"@id":"https:\/\/www.infosec4tc.com\/ar\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.infosec4tc.com\/ar\/wp-json\/wp\/v2\/product\/251458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infosec4tc.com\/ar\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.infosec4tc.com\/ar\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infosec4tc.com\/ar\/wp-json\/wp\/v2\/comments?post=251458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infosec4tc.com\/ar\/wp-json\/wp\/v2\/media\/248257"}],"wp:attachment":[{"href":"https:\/\/www.infosec4tc.com\/ar\/wp-json\/wp\/v2\/media?parent=251458"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.infosec4tc.com\/ar\/wp-json\/wp\/v2\/product_brand?post=251458"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.infosec4tc.com\/ar\/wp-json\/wp\/v2\/product_cat?post=251458"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.infosec4tc.com\/ar\/wp-json\/wp\/v2\/product_tag?post=251458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}