{"id":54291,"date":"2014-04-21T08:02:10","date_gmt":"2014-04-21T13:02:10","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?post_type=tribe_events&p=54291"},"modified":"2014-04-21T08:30:23","modified_gmt":"2014-04-21T13:30:23","slug":"curacao-may-2014-core-level-physical-security-vulnerability-assessments","status":"publish","type":"tribe_events","link":"https:\/\/ict-pulse.com\/events\/curacao-may-2014-core-level-physical-security-vulnerability-assessments\/","title":{"rendered":"Curacao – Core Level: Physical Security Vulnerability Assessments"},"content":{"rendered":"
A Systematic and Measureable Approach to Physical Security.<\/strong><\/p>\n This One (1) day seminar will provide valuable information to all those involved in planning, designing, managing, maintaining, analyzing and testing physical security systems.<\/p>\n This is a pre-requisite course for “Advanced Level: Security Risk Analysis and Budgeting Tools”.<\/strong><\/p>\n <\/p>\n","protected":false},"excerpt":{"rendered":" A Systematic and Measureable Approach to Physical Security. This One (1) day seminar will provide valuable information to all those involved in planning, designing, managing, maintaining, analyzing and testing physical […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[126,206,236,196],"class_list":["post-54291","tribe_events","type-tribe_events","status-publish","hentry","tribe_events_cat-curacao","tribe_events_cat-cybercrimecybersecurity-3","tribe_events_cat-ict-tech","tribe_events_cat-seminar","cat_curacao","cat_cybercrimecybersecurity-3","cat_ict-tech","cat_seminar"],"aioseo_notices":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events\/54291"}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=54291"}],"version-history":[{"count":0,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events\/54291\/revisions"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=54291"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=54291"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events_cat?post=54291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n