{"id":3889,"date":"2023-03-17T11:17:24","date_gmt":"2023-03-17T06:17:24","guid":{"rendered":"https:\/\/dicecamp.com\/insights\/?p=3889"},"modified":"2023-03-17T11:40:35","modified_gmt":"2023-03-17T06:40:35","slug":"become-an-ethical-hacker","status":"publish","type":"post","link":"https:\/\/dicecamp.com\/insights\/become-an-ethical-hacker\/","title":{"rendered":"How to become an ethical hacker without an expensive degree?"},"content":{"rendered":"<p><span style=\"font-weight: 400\">There\u2019s an easy and simple way to become an ethical hacker without a degree in information security. It guarantees a secure job in the emerging market of cyber security.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Stay tuned as you&#8217;ll shortly read the best practices of becoming an ethical hacker without much.<\/span><\/p>\n<p><b>But first just a few words on who is an ethical hacker<\/b><\/p>\n<p><span style=\"font-weight: 400\">Ethical hackers are the good people whose job is to find weaknesses in IT systems and report their findings to business owners. This way they protect the systems.<\/span><\/p>\n<p><span style=\"font-weight: 400\">These personnel use a handful of technologies to do their job. Fortunately, these technologies are user-friendly and simple enough to learn in just a few days.<\/span><\/p>\n<h1><span style=\"font-weight: 400\">How to start learning ethical hacking directly?<\/span><\/h1>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3892 aligncenter\" src=\"https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-tima-miroshnichenko-5380665-300x200.webp\" alt=\"\" width=\"620\" height=\"413\" srcset=\"https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-tima-miroshnichenko-5380665-300x200.webp 300w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-tima-miroshnichenko-5380665-1024x683.webp 1024w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-tima-miroshnichenko-5380665-768x512.webp 768w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-tima-miroshnichenko-5380665-1536x1024.webp 1536w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-tima-miroshnichenko-5380665-2048x1365.webp 2048w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-tima-miroshnichenko-5380665-150x100.webp 150w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-tima-miroshnichenko-5380665-696x464.webp 696w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-tima-miroshnichenko-5380665-1068x712.webp 1068w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-tima-miroshnichenko-5380665-1920x1280.webp 1920w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/p>\n<p><span style=\"font-weight: 400\"><strong>Here&#8217;s the thing<\/strong>: A well-planned course on ethical hacking covers all the latest hacking techniques and technologies.<\/span><\/p>\n<p><span style=\"font-weight: 400\"><strong>How exactly<\/strong>: Fortunately you only need to learn a hand-ful of technologies to become an ethical hacker. No in-depth knowledge is required to perform using these tools. This is because they can automatically detect attacks.<\/span><\/p>\n<div id=\"read-more\"><\/div>\n<h3><strong>Start from web security.<\/strong><\/h3>\n<p><span style=\"font-weight: 400\">Most of the ethical hacking technologies are aimed at protecting websites. That&#8217;s why starting your learning with the understanding of web security is a smart start.\u00a0<\/span><\/p>\n<p><b>Examples<\/b><span style=\"font-weight: 400\"> of these technologies include sqlsmart, burp suite and invicti. Within just a couple of hours, a user can learn these friendly tools and scan websites for weaknesses.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Alongside practicing on the above tools, you can obtain theoretical knowledge on basic and easy information security concepts\u2013 such as the <\/span><b>cyber kill chain<\/b><span style=\"font-weight: 400\"> framework which is a step by step process of protecting digital networks.<\/span><\/p>\n<h3><b>The next steps:<\/b><\/h3>\n<h4>Network Security<\/h4>\n<p><span style=\"font-weight: 400\">Once you develop a base on web security, and feel passionate about it, the next step is to move to network security. It\u2019s a slightly advanced skill of ethical hacking and is highly demanded in the information security market.<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u00a0<\/span><span style=\"font-weight: 400\">You need a basic understanding of network working to understand how attacks on networks are carried out. For example, to perform an <\/span><b>ARP spoofing<\/b><span style=\"font-weight: 400\"> attack you should understand the concept of IP address and its equivalent MAC address. This allows you to use ARP requests to deceive a machine to assign you the <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/IP_address\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400\">IP address<\/span><\/a><span style=\"font-weight: 400\"> of a user thus diverting user traffic to you.<\/span><\/p>\n<h4>Common cyber attacks<\/h4>\n<p><span style=\"font-weight: 400\">Next, gain know-how on other common cyber attacks such as using malware attack, OS command injection and SQL injection attacks. For these, you have to acquire knowledge of malwares, operating system working and database language (SQL). <\/span><\/p>\n<p><span style=\"font-weight: 400\">Though difficult it sounds, these concepts are only understood on the basic level and are easy to digest.<\/span><\/p>\n<h4>Social Engineering<\/h4>\n<p><span style=\"font-weight: 400\">An interesting, rather non-technical cyber security is <\/span><b>social engineering<\/b><span style=\"font-weight: 400\">. It\u2019s the act of making people reveal secret information such as passwords or information related to users and systems that grants access to attackers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">As an ethical hacker, it\u2019s important to use social engineering tactics to find vulnerabilities which are a result of your team under the influence of these tactics. Then countermeasures could be used to mitigate these threats.<\/span><\/p>\n<h1><span style=\"font-weight: 400\">Begin ethical hacking today!<\/span><\/h1>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3894 aligncenter\" src=\"https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-cottonbro-studio-5474295-300x200.webp\" alt=\"\" width=\"632\" height=\"421\" srcset=\"https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-cottonbro-studio-5474295-300x200.webp 300w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-cottonbro-studio-5474295-1024x683.webp 1024w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-cottonbro-studio-5474295-768x512.webp 768w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-cottonbro-studio-5474295-1536x1024.webp 1536w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-cottonbro-studio-5474295-2048x1365.webp 2048w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-cottonbro-studio-5474295-150x100.webp 150w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-cottonbro-studio-5474295-696x464.webp 696w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-cottonbro-studio-5474295-1068x712.webp 1068w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-cottonbro-studio-5474295-1920x1280.webp 1920w\" sizes=\"auto, (max-width: 632px) 100vw, 632px\" \/><\/p>\n<p><span style=\"font-weight: 400\">So the above prospects tell you how ethical hacking can be learnt without enrolling in a degree program on information security.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Now it\u2019s time to start the work. Enroll in a <\/span><a href=\"https:\/\/diceanalytics.pk\/school\/courses-and-workshops\/cybersecurity-and-ethical-hacking\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400\">short course on ethical hacking<\/span><\/a><span style=\"font-weight: 400\">, preferably a live course. This way you will be able to ask questions and interact with the instructor easily.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Spend at least <strong>2 hours<\/strong> on learning ethical hacking concepts. Follow along with hands-on practice and take time with a concept before moving on to the next.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Your weekend time on practicing ethical hacking would be icing on the cake.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Remember, your dedication is the guiding light for you. So keep your hopes high and remain persistent with your learning. One day your hard work will pay off in the form of all your professional and financial expectations being fulfilled.\u00a0<\/span><\/p>\n<h1><span style=\"font-weight: 400\">3 reasons why ethical hacking career is emerging<\/span><\/h1>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3893 aligncenter\" src=\"https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-andrea-piacquadio-3766227-300x200.webp\" alt=\"\" width=\"635\" height=\"423\" srcset=\"https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-andrea-piacquadio-3766227-300x200.webp 300w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-andrea-piacquadio-3766227-1024x683.webp 1024w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-andrea-piacquadio-3766227-768x512.webp 768w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-andrea-piacquadio-3766227-1536x1024.webp 1536w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-andrea-piacquadio-3766227-2048x1365.webp 2048w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-andrea-piacquadio-3766227-150x100.webp 150w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-andrea-piacquadio-3766227-696x464.webp 696w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-andrea-piacquadio-3766227-1068x712.webp 1068w, https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-andrea-piacquadio-3766227-1920x1280.webp 1920w\" sizes=\"auto, (max-width: 635px) 100vw, 635px\" \/><\/p>\n<p><span style=\"font-weight: 400\">There are 3 reasons why ethical hacking as a worthy career to invest your time in.\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400\">To begin with, academic programs in ethical hacking remain scarce globally while the dependency on the internet requires a robust security control for organizations. This creates a huge supply-demand gap. Organizations need talented ethical hackers to provide secure services for users as regulators create strict privacy guidelines.<\/span><\/li>\n<li><span style=\"font-weight: 400\">In addition, the frequent news of volunteer hackers revealing loopholes in big tech products has brought privacy awareness in public. To sustain customer trust, tech companies now employ white hat hackers to find and fix these threats in advance.<\/span><\/li>\n<li><span style=\"font-weight: 400\">Finally, with the prevailing cloud technology, where enterprises are migrating their processes on the cloud, new security needs are highlighted. The massive interest of companies in cloud technology creates yet another area of security for ethical hackers to work on.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">\u00a0<\/span><i><span style=\"font-weight: 400\">Wondering what ethical hacking looks like? Read how a white hat hacker\u2013 <\/span><\/i><a href=\"https:\/\/dicecamp.com\/insights\/ispr-awards-cyber-security-researcher-rafeh-baloch\/\" target=\"_blank\" rel=\"noopener\"><i><span style=\"font-weight: 400\">Rafeh Baloch<\/span><\/i><\/a><i><span style=\"font-weight: 400\"> revealed a bug in Google search engine in 2014.\u00a0<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400\">Do you have questions regarding a career in ethical hacking? Feel free to ask in the comments section. All answers come from an experienced ethical hacker.<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, as cyber security is maturing towards a developed market, experts say there\u2019s a fast and cheap way of setting a career in ethical hacking.<\/p>\n","protected":false},"author":7,"featured_media":3891,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":{"0":"post-3889","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.14 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to become an ethical hacker without an expensive degree? - Dicecamp Insights<\/title>\n<meta name=\"description\" content=\"Today, as cyber security is maturing towards a developed market, experts say there\u2019s a fast and cheap way of setting a career in ethical hacking.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dicecamp.com\/insights\/become-an-ethical-hacker\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to become an ethical hacker without an expensive degree? - Dicecamp Insights\" \/>\n<meta property=\"og:description\" content=\"Today, as cyber security is maturing towards a developed market, experts say there\u2019s a fast and cheap way of setting a career in ethical hacking.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dicecamp.com\/insights\/become-an-ethical-hacker\/\" \/>\n<meta property=\"og:site_name\" content=\"Dicecamp Insights\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-17T06:17:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-17T06:40:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-andri-218413-scaled.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1706\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Ayesha\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ayesha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dicecamp.com\/insights\/become-an-ethical-hacker\/\",\"url\":\"https:\/\/dicecamp.com\/insights\/become-an-ethical-hacker\/\",\"name\":\"How to become an ethical hacker without an expensive degree? - Dicecamp Insights\",\"isPartOf\":{\"@id\":\"https:\/\/dicecamp.com\/insights\/#website\"},\"datePublished\":\"2023-03-17T06:17:24+00:00\",\"dateModified\":\"2023-03-17T06:40:35+00:00\",\"author\":{\"@id\":\"https:\/\/dicecamp.com\/insights\/#\/schema\/person\/1b7d4bef40ac58bbedfa718df21e2463\"},\"description\":\"Today, as cyber security is maturing towards a developed market, experts say there\u2019s a fast and cheap way of setting a career in ethical hacking.\",\"breadcrumb\":{\"@id\":\"https:\/\/dicecamp.com\/insights\/become-an-ethical-hacker\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dicecamp.com\/insights\/become-an-ethical-hacker\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dicecamp.com\/insights\/become-an-ethical-hacker\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dicecamp.com\/insights\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to become an ethical hacker without an expensive degree?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dicecamp.com\/insights\/#website\",\"url\":\"https:\/\/dicecamp.com\/insights\/\",\"name\":\"Dicecamp Insights\",\"description\":\"All Things Tech!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dicecamp.com\/insights\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/dicecamp.com\/insights\/#\/schema\/person\/1b7d4bef40ac58bbedfa718df21e2463\",\"name\":\"Ayesha\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dicecamp.com\/insights\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fc0617698baa4b6b794771cffa4c63de5ee5febb87eef29e53208d83b8be582e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fc0617698baa4b6b794771cffa4c63de5ee5febb87eef29e53208d83b8be582e?s=96&d=mm&r=g\",\"caption\":\"Ayesha\"},\"description\":\"I engineer the content and acquaint the science of analytics to empower rookies and professionals.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ayesha-saeed-13as96\/\"],\"url\":\"https:\/\/dicecamp.com\/insights\/author\/ayesha\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to become an ethical hacker without an expensive degree? - Dicecamp Insights","description":"Today, as cyber security is maturing towards a developed market, experts say there\u2019s a fast and cheap way of setting a career in ethical hacking.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dicecamp.com\/insights\/become-an-ethical-hacker\/","og_locale":"en_US","og_type":"article","og_title":"How to become an ethical hacker without an expensive degree? - Dicecamp Insights","og_description":"Today, as cyber security is maturing towards a developed market, experts say there\u2019s a fast and cheap way of setting a career in ethical hacking.","og_url":"https:\/\/dicecamp.com\/insights\/become-an-ethical-hacker\/","og_site_name":"Dicecamp Insights","article_published_time":"2023-03-17T06:17:24+00:00","article_modified_time":"2023-03-17T06:40:35+00:00","og_image":[{"width":2560,"height":1706,"url":"https:\/\/dicecamp.com\/insights\/wp-content\/uploads\/2023\/03\/pexels-andri-218413-scaled.webp","type":"image\/webp"}],"author":"Ayesha","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ayesha","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dicecamp.com\/insights\/become-an-ethical-hacker\/","url":"https:\/\/dicecamp.com\/insights\/become-an-ethical-hacker\/","name":"How to become an ethical hacker without an expensive degree? - Dicecamp Insights","isPartOf":{"@id":"https:\/\/dicecamp.com\/insights\/#website"},"datePublished":"2023-03-17T06:17:24+00:00","dateModified":"2023-03-17T06:40:35+00:00","author":{"@id":"https:\/\/dicecamp.com\/insights\/#\/schema\/person\/1b7d4bef40ac58bbedfa718df21e2463"},"description":"Today, as cyber security is maturing towards a developed market, experts say there\u2019s a fast and cheap way of setting a career in ethical hacking.","breadcrumb":{"@id":"https:\/\/dicecamp.com\/insights\/become-an-ethical-hacker\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dicecamp.com\/insights\/become-an-ethical-hacker\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dicecamp.com\/insights\/become-an-ethical-hacker\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dicecamp.com\/insights\/"},{"@type":"ListItem","position":2,"name":"How to become an ethical hacker without an expensive degree?"}]},{"@type":"WebSite","@id":"https:\/\/dicecamp.com\/insights\/#website","url":"https:\/\/dicecamp.com\/insights\/","name":"Dicecamp Insights","description":"All Things Tech!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dicecamp.com\/insights\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/dicecamp.com\/insights\/#\/schema\/person\/1b7d4bef40ac58bbedfa718df21e2463","name":"Ayesha","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dicecamp.com\/insights\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fc0617698baa4b6b794771cffa4c63de5ee5febb87eef29e53208d83b8be582e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fc0617698baa4b6b794771cffa4c63de5ee5febb87eef29e53208d83b8be582e?s=96&d=mm&r=g","caption":"Ayesha"},"description":"I engineer the content and acquaint the science of analytics to empower rookies and professionals.","sameAs":["https:\/\/www.linkedin.com\/in\/ayesha-saeed-13as96\/"],"url":"https:\/\/dicecamp.com\/insights\/author\/ayesha\/"}]}},"_links":{"self":[{"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/posts\/3889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/comments?post=3889"}],"version-history":[{"count":13,"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/posts\/3889\/revisions"}],"predecessor-version":[{"id":3908,"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/posts\/3889\/revisions\/3908"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/media\/3891"}],"wp:attachment":[{"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/media?parent=3889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/categories?post=3889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dicecamp.com\/insights\/wp-json\/wp\/v2\/tags?post=3889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}