{"id":363,"date":"2019-12-17T14:46:03","date_gmt":"2019-12-17T20:46:03","guid":{"rendered":"http:\/\/cybersecurity.bellevue.edu\/?p=363"},"modified":"2021-08-30T13:04:12","modified_gmt":"2021-08-30T19:04:12","slug":"wowt-highlights-bus-national-cyber-league-advance-in-national-rankings","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2019\/12\/17\/wowt-highlights-bus-national-cyber-league-advance-in-national-rankings\/","title":{"rendered":"WOWT highlights BU&#8217;s National Cyber League advance in national rankings"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"211\" src=\"http:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/12\/NCL_article.png\" alt=\"\" class=\"wp-image-364\" srcset=\"https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/12\/NCL_article.png 377w, https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/12\/NCL_article-300x168.png 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/><\/figure><\/div>\n\n\n\n<p><a href=\"https:\/\/www.wowt.com\/content\/news\/Bellevue-University-generates-key-players-in-cybersecurity-workforce-565984481.html\">https:\/\/www.wowt.com\/content\/news\/Bellevue-University-generates-key-players-in-cybersecurity-workforce-565984481.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><a href=\"https:\/\/www.wowt.com\/content\/news\/Bellevue-University-generates-key-players-in-cybersecurity-workforce-565984481.html\" rel=\"nofollow\">https:\/\/www.wowt.com\/content\/news\/Bellevue-University-generates-key-players-in-cybersecurity-workforce-565984481.html<\/a><\/p>\n","protected":false},"author":10,"featured_media":364,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[39],"tags":[],"class_list":["post-363","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ctf"],"jetpack_featured_media_url":"https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/12\/NCL_article.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=363"}],"version-history":[{"count":1,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/363\/revisions"}],"predecessor-version":[{"id":365,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/363\/revisions\/365"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media\/364"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}