{"id":216,"date":"2025-04-15T12:01:17","date_gmt":"2025-04-15T12:01:17","guid":{"rendered":"http:\/\/46.137.26.149\/?p=216"},"modified":"2025-04-15T12:04:30","modified_gmt":"2025-04-15T12:04:30","slug":"cybersecurity-training-in-nigeria-bridging-the-gap","status":"publish","type":"post","link":"http:\/\/46.137.26.149\/?p=216","title":{"rendered":"Cybersecurity Training in Nigeria: Bridging the Gap Between Learning and Real-World Readiness"},"content":{"rendered":"\n<p>As cyber threats evolve in complexity, so must our approach to training the next generation of defenders. In fact, <em>Gartner predicts that by the end of 2025, over half of all significant cyber incidents will be caused by human error or lack of expertise<\/em>. In Nigeria, where digital transformation is accelerating, this statistic isn\u2019t just a warning\u2014it\u2019s a call to action.<\/p>\n\n\n\n<p>With social engineering attacks and phishing scams on the rise, humans\u2014not just systems\u2014have become the biggest targets. That\u2019s why cybersecurity training in Nigeria must go beyond theoretical knowledge or hacking demos. To truly defend our networks, students need <em>hands-on experience<\/em> with the tools and scenarios security professionals face daily.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><em>The Allure\u2014and Limits\u2014of Current Training Programs<\/em><\/h2>\n\n\n\n<p>For many students in Nigeria, cybersecurity is an exciting field filled with possibilities. With a booming tech sector and increasing awareness of threats like Business Email Compromise (BEC) and ransomware, interest in the field is at an all-time high.<\/p>\n\n\n\n<p>But the reality is this: *many popular three-month training programs fall short. They often focus heavily on tools like *<em>Wireshark<\/em> and *Kali Linux, showcasing \u201cethical hacking\u201d without teaching practical skills needed on the job. These courses can feel thrilling\u2014cracking passwords, scanning networks\u2014but students are often left wondering: *What next?<\/p>\n\n\n\n<p>After the certificate is issued, many graduates realize they\u2019re not prepared to handle real-world cybersecurity responsibilities like monitoring alerts, investigating threats, or managing risks.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><em>What Real Cybersecurity Jobs Look Like<\/em><\/h2>\n\n\n\n<p>In a real security role\u2014whether at a bank, telecom company, or government agency\u2014you won\u2019t spend your days hacking. You\u2019ll be using tools like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>SIEM platforms (e.g., Splunk)<\/em> to analyze logs and detect suspicious login activity.<\/li>\n\n\n\n<li><em>Endpoint protection tools (e.g., CrowdStrike, Microsoft Defender)<\/em> to investigate malware and phishing attacks.<\/li>\n\n\n\n<li><em>Firewalls and IDS alerts<\/em> to spot data leaks or unusual traffic.<\/li>\n<\/ul>\n\n\n\n<p>These tasks require not just technical ability, but critical thinking, communication, and the ability to escalate issues quickly and responsibly. Yet, many training programs skip these workflows entirely.<\/p>\n\n\n\n<p>And what about job roles? Without proper guidance, terms like <em>SOC Analyst, Incident Responder, Threat Intelligence Analyst, Vulnerability Assessor, or GRC Analyst<\/em> may sound vague or intimidating. But these are real, attainable roles\u2014if training programs start explaining the responsibilities and skills associated with them.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">*Three Months *Can Be Enough\u2014With the Right Focus**<\/h2>\n\n\n\n<p>The issue isn\u2019t the length of the training\u2014it\u2019s the <em>content and approach<\/em>.<\/p>\n\n\n\n<p>In three months, students could be learning how to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use <em>Wireshark<\/em> to detect malicious traffic.<\/li>\n\n\n\n<li>Respond to phishing alerts using <em>endpoint detection tools<\/em>.<\/li>\n\n\n\n<li>Practice triaging events in a <em>SIEM<\/em> environment.<\/li>\n\n\n\n<li>Simulate ransomware attacks and document incident response procedures.<\/li>\n\n\n\n<li>Escalate a high-severity alert to a senior analyst\u2014just like in a real SOC (Security Operations Centre).<\/li>\n<\/ul>\n\n\n\n<p>Hands-on labs, case studies, and realistic simulations build <em>confidence<\/em> and <em>context<\/em>\u2014two things many graduates currently lack.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><em>The Role of Government and Industry in Reforming Cyber Training<\/em><\/h2>\n\n\n\n<p>To fix the system, <em>Nigeria\u2019s government and tech ecosystem must work together<\/em>.<\/p>\n\n\n\n<p>Organizations like the <em>National Information Technology Development Agency (NITDA)<\/em> can champion industry-aligned training by:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Encouraging programs that incorporate real-world tools and simulations.<\/li>\n\n\n\n<li>Promoting certification-based curricula (e.g., *CompTIA Security+, **CEH, *<em>SSCP<\/em>) that improve job readiness.<\/li>\n\n\n\n<li>Partnering with tech companies and institutions to deliver accessible, skill-focused training.<\/li>\n\n\n\n<li>Funding scholarships and mentorship programs to support underrepresented talent.<\/li>\n<\/ul>\n\n\n\n<p>Cybersecurity isn\u2019t just a career option\u2014it\u2019s <em>a national priority<\/em> tied to protecting digital infrastructure, financial systems, and even elections.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><em>What Students Can Do: Train Smarter, Not Just Harder<\/em><\/h2>\n\n\n\n<p>While systemic changes are necessary, students also have the power to take control of their learning.<\/p>\n\n\n\n<p>Here\u2019s how:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Supplement formal training<\/em> with platforms like *TryHackMe, **Hack The Box, and free *<em>YouTube<\/em> tutorials.<\/li>\n\n\n\n<li><em>Practice real-world scenarios<\/em>\u2014not just hacking, but threat detection, log analysis, and alert escalation.<\/li>\n\n\n\n<li><em>Find a mentor<\/em> already working in cybersecurity to help guide your path.<\/li>\n\n\n\n<li><em>Understand the roles<\/em> you\u2019re aiming for. Research job descriptions and ask trainers to explain where your skills fit.<\/li>\n<\/ul>\n\n\n\n<p>With the right combination of structured training, self-study, and mentorship, students in Nigeria are already landing roles such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Junior SOC Analyst<\/em><\/li>\n\n\n\n<li><em>IT Security Support Technician<\/em><\/li>\n\n\n\n<li><em>Vulnerability Management Assistant<\/em><\/li>\n\n\n\n<li><em>Cybersecurity Risk and Compliance Analyst<\/em><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><em>A Stronger Digital Nigeria Starts With Smarter Cyber Training<\/em><\/h2>\n\n\n\n<p>Cybersecurity training in Nigeria must evolve\u2014*from tool-based tutorials to scenario-driven learning that reflects the reality of cyber defense. Students deserve programs that don\u2019t just teach them *how to use tools, but why, when, and where to apply them.<\/p>\n\n\n\n<p>With the right investments in training, resources, and mentorship, Nigeria can equip its youth to defend its digital frontier\u2014and thrive in a global cybersecurity workforce.<\/p>\n\n\n\n<p>Because the true power of cybersecurity isn\u2019t in cracking passwords\u2014it\u2019s in <em>protecting people, data, and systems<\/em> from real threats. That\u2019s the mission. Let\u2019s train like it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As cyber threats evolve in complexity, so must our approach to training the next generation of defenders. In fact, Gartner [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":217,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[120],"tags":[189,186,55,187,188],"class_list":["post-216","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-cybersecurity-careers","tag-cybersecurity-training","tag-digital-transformation","tag-mentorship","tag-practical-skills"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Training in Nigeria: Bridging the Gap Between Learning and Real-World Readiness -<\/title>\n<meta name=\"description\" content=\"Cybersecurity training in Nigeria must evolve to meet demands of the industry. Learn about the role of government, industry, and students in reforming cyber training\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/46.137.26.149\/?p=216\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Training in Nigeria: Bridging the Gap Between Learning and Real-World Readiness -\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity training in Nigeria must evolve to meet demands of the industry. Learn about the role of government, industry, and students in reforming cyber training\" \/>\n<meta property=\"og:url\" content=\"http:\/\/46.137.26.149\/?p=216\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-15T12:01:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-15T12:04:30+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/46.137.26.149\/wp-content\/uploads\/2025\/04\/WhatsApp-Image-2025-04-15-at-12.49.08-PM-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"372\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stephen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stephen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/46.137.26.149\/?p=216\",\"url\":\"http:\/\/46.137.26.149\/?p=216\",\"name\":\"Cybersecurity Training in Nigeria: Bridging the Gap Between Learning and Real-World Readiness -\",\"isPartOf\":{\"@id\":\"http:\/\/46.137.26.149\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/46.137.26.149\/?p=216#primaryimage\"},\"image\":{\"@id\":\"http:\/\/46.137.26.149\/?p=216#primaryimage\"},\"thumbnailUrl\":\"http:\/\/46.137.26.149\/wp-content\/uploads\/2025\/04\/WhatsApp-Image-2025-04-15-at-12.49.08-PM-1.jpeg\",\"datePublished\":\"2025-04-15T12:01:17+00:00\",\"dateModified\":\"2025-04-15T12:04:30+00:00\",\"author\":{\"@id\":\"http:\/\/46.137.26.149\/#\/schema\/person\/10fa3226df7f9f658ae9fec37a120c86\"},\"description\":\"Cybersecurity training in Nigeria must evolve to meet demands of the industry. Learn about the role of government, industry, and students in reforming cyber training\",\"breadcrumb\":{\"@id\":\"http:\/\/46.137.26.149\/?p=216#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/46.137.26.149\/?p=216\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/46.137.26.149\/?p=216#primaryimage\",\"url\":\"http:\/\/46.137.26.149\/wp-content\/uploads\/2025\/04\/WhatsApp-Image-2025-04-15-at-12.49.08-PM-1.jpeg\",\"contentUrl\":\"http:\/\/46.137.26.149\/wp-content\/uploads\/2025\/04\/WhatsApp-Image-2025-04-15-at-12.49.08-PM-1.jpeg\",\"width\":700,\"height\":372,\"caption\":\"CYBERSECURITY TRAINING IN NIGERIA: BRIDGING THE GAP BETWEEN LEARNING AND REAL-WORLD READINESS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/46.137.26.149\/?p=216#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/46.137.26.149\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Training in Nigeria: Bridging the Gap Between Learning and Real-World Readiness\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/46.137.26.149\/#website\",\"url\":\"http:\/\/46.137.26.149\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/46.137.26.149\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"http:\/\/46.137.26.149\/#\/schema\/person\/10fa3226df7f9f658ae9fec37a120c86\",\"name\":\"Stephen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/46.137.26.149\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/301b6803c1cd6e25566bdbf1b358ffdbc6daac18f1b9cecc06b5f45802a93b9b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/301b6803c1cd6e25566bdbf1b358ffdbc6daac18f1b9cecc06b5f45802a93b9b?s=96&d=mm&r=g\",\"caption\":\"Stephen\"},\"url\":\"http:\/\/46.137.26.149?author=3\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Training in Nigeria: Bridging the Gap Between Learning and Real-World Readiness -","description":"Cybersecurity training in Nigeria must evolve to meet demands of the industry. Learn about the role of government, industry, and students in reforming cyber training","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/46.137.26.149\/?p=216","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Training in Nigeria: Bridging the Gap Between Learning and Real-World Readiness -","og_description":"Cybersecurity training in Nigeria must evolve to meet demands of the industry. Learn about the role of government, industry, and students in reforming cyber training","og_url":"http:\/\/46.137.26.149\/?p=216","article_published_time":"2025-04-15T12:01:17+00:00","article_modified_time":"2025-04-15T12:04:30+00:00","og_image":[{"width":700,"height":372,"url":"http:\/\/46.137.26.149\/wp-content\/uploads\/2025\/04\/WhatsApp-Image-2025-04-15-at-12.49.08-PM-1.jpeg","type":"image\/jpeg"}],"author":"Stephen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Stephen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/46.137.26.149\/?p=216","url":"http:\/\/46.137.26.149\/?p=216","name":"Cybersecurity Training in Nigeria: Bridging the Gap Between Learning and Real-World Readiness -","isPartOf":{"@id":"http:\/\/46.137.26.149\/#website"},"primaryImageOfPage":{"@id":"http:\/\/46.137.26.149\/?p=216#primaryimage"},"image":{"@id":"http:\/\/46.137.26.149\/?p=216#primaryimage"},"thumbnailUrl":"http:\/\/46.137.26.149\/wp-content\/uploads\/2025\/04\/WhatsApp-Image-2025-04-15-at-12.49.08-PM-1.jpeg","datePublished":"2025-04-15T12:01:17+00:00","dateModified":"2025-04-15T12:04:30+00:00","author":{"@id":"http:\/\/46.137.26.149\/#\/schema\/person\/10fa3226df7f9f658ae9fec37a120c86"},"description":"Cybersecurity training in Nigeria must evolve to meet demands of the industry. Learn about the role of government, industry, and students in reforming cyber training","breadcrumb":{"@id":"http:\/\/46.137.26.149\/?p=216#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/46.137.26.149\/?p=216"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/46.137.26.149\/?p=216#primaryimage","url":"http:\/\/46.137.26.149\/wp-content\/uploads\/2025\/04\/WhatsApp-Image-2025-04-15-at-12.49.08-PM-1.jpeg","contentUrl":"http:\/\/46.137.26.149\/wp-content\/uploads\/2025\/04\/WhatsApp-Image-2025-04-15-at-12.49.08-PM-1.jpeg","width":700,"height":372,"caption":"CYBERSECURITY TRAINING IN NIGERIA: BRIDGING THE GAP BETWEEN LEARNING AND REAL-WORLD READINESS"},{"@type":"BreadcrumbList","@id":"http:\/\/46.137.26.149\/?p=216#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/46.137.26.149\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Training in Nigeria: Bridging the Gap Between Learning and Real-World Readiness"}]},{"@type":"WebSite","@id":"http:\/\/46.137.26.149\/#website","url":"http:\/\/46.137.26.149\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/46.137.26.149\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"http:\/\/46.137.26.149\/#\/schema\/person\/10fa3226df7f9f658ae9fec37a120c86","name":"Stephen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/46.137.26.149\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/301b6803c1cd6e25566bdbf1b358ffdbc6daac18f1b9cecc06b5f45802a93b9b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/301b6803c1cd6e25566bdbf1b358ffdbc6daac18f1b9cecc06b5f45802a93b9b?s=96&d=mm&r=g","caption":"Stephen"},"url":"http:\/\/46.137.26.149?author=3"}]}},"_links":{"self":[{"href":"http:\/\/46.137.26.149\/index.php?rest_route=\/wp\/v2\/posts\/216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/46.137.26.149\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/46.137.26.149\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/46.137.26.149\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/46.137.26.149\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=216"}],"version-history":[{"count":1,"href":"http:\/\/46.137.26.149\/index.php?rest_route=\/wp\/v2\/posts\/216\/revisions"}],"predecessor-version":[{"id":218,"href":"http:\/\/46.137.26.149\/index.php?rest_route=\/wp\/v2\/posts\/216\/revisions\/218"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/46.137.26.149\/index.php?rest_route=\/wp\/v2\/media\/217"}],"wp:attachment":[{"href":"http:\/\/46.137.26.149\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=216"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/46.137.26.149\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=216"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/46.137.26.149\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}