{"id":3143,"date":"2021-03-01T09:34:11","date_gmt":"2021-03-01T09:34:11","guid":{"rendered":"https:\/\/nuclio.school\/shorts\/unit\/cybersec-perspectiva-y-vision\/"},"modified":"2021-03-01T09:34:11","modified_gmt":"2021-03-01T09:34:11","slug":"cybersec-perspectiva-y-vision","status":"publish","type":"unit","link":"https:\/\/nuclio.school\/shorts\/unit\/cybersec-perspectiva-y-vision\/","title":{"rendered":"CyberSec: perspectiva y visi\u00f3n"},"content":{"rendered":"<p>CyberSec: perspectiva y visi\u00f3n<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"_vibebp_attr":"","_vibebp_dimensions":"","_vibebp_responsive_height":"","_vibebp_accordion_ie_support":""},"_links":{"self":[{"href":"https:\/\/nuclio.school\/shorts\/wp-json\/wp\/v2\/unit\/3143"}],"collection":[{"href":"https:\/\/nuclio.school\/shorts\/wp-json\/wp\/v2\/unit"}],"about":[{"href":"https:\/\/nuclio.school\/shorts\/wp-json\/wp\/v2\/types\/unit"}],"author":[{"embeddable":true,"href":"https:\/\/nuclio.school\/shorts\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nuclio.school\/shorts\/wp-json\/wp\/v2\/comments?post=3143"}],"version-history":[{"count":0,"href":"https:\/\/nuclio.school\/shorts\/wp-json\/wp\/v2\/unit\/3143\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuclio.school\/shorts\/wp-json\/wp\/v2\/media?parent=3143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}