{"id":54297,"date":"2014-04-21T08:19:59","date_gmt":"2014-04-21T13:19:59","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?post_type=tribe_events&p=54297"},"modified":"2014-04-21T08:23:41","modified_gmt":"2014-04-21T13:23:41","slug":"st-lucia-may-2014-core-level-physical-security-vulnerability-assessments","status":"publish","type":"tribe_events","link":"https:\/\/ict-pulse.com\/events\/st-lucia-may-2014-core-level-physical-security-vulnerability-assessments\/","title":{"rendered":"Saint Lucia – Core Level: Physical Security Vulnerability Assessments"},"content":{"rendered":"
A Systematic and Measureable Approach to Physical Security.<\/strong><\/p>\n This One (1) day seminar will provide valuable information to all those involved in planning, designing, managing, maintaining, analyzing and testing physical security systems.<\/p>\n This is a pre-requisite course for “Advanced Level: Security Risk Analysis and Budgeting Tools”.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":" A Systematic and Measureable Approach to Physical Security. This One (1) day seminar will provide valuable information to all those involved in planning, designing, managing, maintaining, analyzing and testing physical […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[206,236,196,131],"class_list":["post-54297","tribe_events","type-tribe_events","status-publish","hentry","tribe_events_cat-cybercrimecybersecurity-3","tribe_events_cat-ict-tech","tribe_events_cat-seminar","tribe_events_cat-st-lucia","cat_cybercrimecybersecurity-3","cat_ict-tech","cat_seminar","cat_st-lucia"],"aioseo_notices":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events\/54297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=54297"}],"version-history":[{"count":0,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events\/54297\/revisions"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=54297"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=54297"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events_cat?post=54297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n