{"id":94,"date":"2024-01-19T17:47:13","date_gmt":"2024-01-19T17:47:13","guid":{"rendered":"https:\/\/preview.seedprod.com\/44048\/services\/"},"modified":"2024-01-19T17:47:13","modified_gmt":"2024-01-19T17:47:13","slug":"services","status":"publish","type":"page","link":"https:\/\/preview.seedprod.com\/44048\/services\/","title":{"rendered":"Services"},"content":{"rendered":"<section id=\"sp-szkbfp\" data-mobile-visibility=\"#sp-szkbfp|false\" data-tablet-visibility=\"#sp-szkbfp|false\" data-desktop-visibility=\"#sp-szkbfp|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-section\" style=\"border-bottom: 1px solid rgb(33, 33, 33); width: 100%; max-width: 100%;\">\n<div id=\"sp-vknhwq\" data-mobile-visibility=\"#sp-vknhwq|false\" data-tablet-visibility=\"#sp-vknhwq|false\" data-desktop-visibility=\"#sp-vknhwq|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\" style=\"margin-top: 20px; margin-bottom: 50px;\">\n<div id=\"sp-vvdkwn\" data-mobile-visibility=\"#sp-vvdkwn|false\" data-tablet-visibility=\"#sp-vvdkwn|false\" data-desktop-visibility=\"#sp-vvdkwn|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% + 0px);\">\n<h1 id=\"sp-h9gykr\" data-mobile-css=\".sp-headline-block-h9gykr, #sp-h9gykr, #h9gykr|text-align:center;\" data-tablet-css=\".sp-headline-block-h9gykr, #sp-h9gykr, #h9gykr|text-align:center;\" data-mobile-visibility=\".sp-headline-block-h9gykr|false\" data-tablet-visibility=\".sp-headline-block-h9gykr|false\" data-desktop-visibility=\".sp-headline-block-h9gykr|false\" class=\"sp-css-target sp-el-block sp-headline-block-h9gykr sp-type-header\" style=\"text-align: left; margin: 0px;\">Services<\/h1>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"sp-sl7u6l\" data-mobile-visibility=\"#sp-sl7u6l|false\" data-tablet-visibility=\"#sp-sl7u6l|false\" data-desktop-visibility=\"#sp-sl7u6l|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-section  spBgcoverscroll\" style=\"background-image: linear-gradient(0deg, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0)), url('https:\/\/preview.seedprod.com\/44048\/wp-content\/uploads\/sites\/159\/2024\/01\/theme-builder-7Brd5VTJKln4gmts.png'); width: 100%; max-width: 100%;\">\n<div id=\"sp-tg7n55\" data-mobile-visibility=\"#sp-tg7n55|false\" data-tablet-visibility=\"#sp-tg7n55|false\" data-desktop-visibility=\"#sp-tg7n55|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\" style=\"margin-top: 80px;\">\n<div id=\"sp-a2xw32\" data-mobile-visibility=\"#sp-a2xw32|false\" data-tablet-visibility=\"#sp-a2xw32|false\" data-desktop-visibility=\"#sp-a2xw32|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% + 0px);\">\n<h2 id=\"sp-lx8nrw\" data-mobile-css=\".sp-headline-block-lx8nrw, #sp-lx8nrw, #lx8nrw|font-size:50px;text-align:center;\" data-tablet-css=\".sp-headline-block-lx8nrw, #sp-lx8nrw, #lx8nrw|text-align:center;\" data-mobile-visibility=\".sp-headline-block-lx8nrw|false\" data-tablet-visibility=\".sp-headline-block-lx8nrw|false\" data-desktop-visibility=\".sp-headline-block-lx8nrw|false\" class=\"sp-css-target sp-el-block sp-headline-block-lx8nrw sp-type-header\" style=\"font-size: 60px; text-align: center; margin: 0px;\">Customized Security Solutions for a Safer Tomorrow<\/h2>\n<\/div>\n<\/div>\n<div id=\"sp-b6ggyi\" data-mobile-visibility=\"#sp-b6ggyi|false\" data-tablet-visibility=\"#sp-b6ggyi|false\" data-desktop-visibility=\"#sp-b6ggyi|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\" style=\"margin-bottom: 40px;\">\n<div id=\"sp-j9txwt\" data-mobile-visibility=\"#sp-j9txwt|false\" data-tablet-visibility=\"#sp-j9txwt|false\" data-desktop-visibility=\"#sp-j9txwt|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% + 0px);\">\n<div id=\"sp-yulxui\" data-mobile-css=\".sp-text-wrapper-yulxui, #sp-yulxui, #yulxui|text-align:center;\" data-tablet-css=\".sp-text-wrapper-yulxui, #sp-yulxui, #yulxui|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-yulxui|false\" data-tablet-visibility=\".sp-text-wrapper-yulxui|false\" data-desktop-visibility=\".sp-text-wrapper-yulxui|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-yulxui\" style=\"margin: 0px; text-align: center;\">\n<p>Involves simulated cyberattacks on a system, network, or application to identify vulnerabilities and weaknesses that malicious hackers could exploit<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"sp-q3ghs1\" data-mobile-visibility=\"#sp-q3ghs1|false\" data-tablet-visibility=\"#sp-q3ghs1|false\" data-desktop-visibility=\"#sp-q3ghs1|false\" data-mobile-css=\"#sp-q3ghs1|margin:0px 0px 20px 0px ;\" data-tablet-css=\"\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\" style=\"margin-bottom: 20px;\">\n<div id=\"sp-pfw838\" data-mobile-visibility=\"#sp-pfw838|false\" data-tablet-visibility=\"#sp-pfw838|false\" data-desktop-visibility=\"#sp-pfw838|false\" data-mobile-css=\"#sp-pfw838|margin:0px 0px 30px 0px ;\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(33.3333% - 20px);\">\n<figure id=\"sp-rk8ze2\" data-mobile-css=\"#sp-rk8ze2|text-align:center;\" data-tablet-css=\"#sp-rk8ze2|text-align:left;\" class=\"sp-image-wrapper sp-el-block\" style=\"margin: 0px 0px 10px; text-align: left;\">\n<div><span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/preview.seedprod.com\/44048\/wp-content\/uploads\/sites\/159\/2024\/01\/theme-builder-qGlQkW2NV5bH4tdO.png\" alt=\"\" width=\"118\" height=\"144\" data-mobile-visibility=\".sp-image-block-rk8ze2|false\" data-tablet-visibility=\".sp-image-block-rk8ze2|false\" data-desktop-visibility=\".sp-image-block-rk8ze2|false\" srcset=\" https:\/\/preview.seedprod.com\/44048\/wp-content\/uploads\/sites\/159\/2024\/01\/theme-builder-qGlQkW2NV5bH4tdO.png 118w\" class=\"sp-image-block-rk8ze2\" style=\"width: 40px; height: 48px;\"><\/span><\/div>\n<\/figure>\n<h3 id=\"sp-gke8as\" data-mobile-css=\".sp-headline-block-gke8as, #sp-gke8as, #gke8as|text-align:center;margin:0px 0px 10px 0px ;\" data-tablet-css=\".sp-headline-block-gke8as, #sp-gke8as, #gke8as|text-align:left;\" data-mobile-visibility=\".sp-headline-block-gke8as|false\" data-tablet-visibility=\".sp-headline-block-gke8as|false\" data-desktop-visibility=\".sp-headline-block-gke8as|false\" class=\"sp-css-target sp-el-block sp-headline-block-gke8as sp-type-header\" style=\"font-size: 20px; text-align: left; margin: 0px;\">Security Auditing<\/h3>\n<div id=\"sp-f7ffbo\" data-mobile-css=\".sp-text-wrapper-f7ffbo, #sp-f7ffbo, #f7ffbo|text-align:center;\" data-tablet-css=\".sp-text-wrapper-f7ffbo, #sp-f7ffbo, #f7ffbo|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-f7ffbo|false\" data-tablet-visibility=\".sp-text-wrapper-f7ffbo|false\" data-desktop-visibility=\".sp-text-wrapper-f7ffbo|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-f7ffbo\" style=\"margin: 0px; text-align: left;\">\n<p>Evaluates an organization&#8217;s security infrastructure, policies, and procedures to ensure compliance with industry standards and best practices<\/p>\n<\/div>\n<\/div>\n<div id=\"sp-v0s106\" data-mobile-visibility=\"#sp-v0s106|false\" data-tablet-visibility=\"#sp-v0s106|false\" data-desktop-visibility=\"#sp-v0s106|false\" data-mobile-css=\"#sp-v0s106|margin:0px 0px 30px 0px ;\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(33.3333% - 20px);\">\n<figure id=\"sp-alisle\" data-mobile-css=\"#sp-alisle|text-align:center;\" data-tablet-css=\"#sp-alisle|text-align:left;\" class=\"sp-image-wrapper sp-el-block\" style=\"margin: 0px 0px 10px; text-align: left;\">\n<div><span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/preview.seedprod.com\/44048\/wp-content\/uploads\/sites\/159\/2024\/01\/theme-builder-BhYVWb3Nco21ItMw.png\" alt=\"\" width=\"144\" height=\"144\" data-mobile-visibility=\".sp-image-block-alisle|false\" data-tablet-visibility=\".sp-image-block-alisle|false\" data-desktop-visibility=\".sp-image-block-alisle|false\" srcset=\" https:\/\/preview.seedprod.com\/44048\/wp-content\/uploads\/sites\/159\/2024\/01\/theme-builder-BhYVWb3Nco21ItMw.png 144w\" class=\"sp-image-block-alisle\" style=\"width: 48px; height: 48px;\"><\/span><\/div>\n<\/figure>\n<h3 id=\"sp-b5o473\" data-mobile-css=\".sp-headline-block-b5o473, #sp-b5o473, #b5o473|text-align:center;margin:0px 0px 10px 0px ;\" data-tablet-css=\".sp-headline-block-b5o473, #sp-b5o473, #b5o473|text-align:left;\" data-mobile-visibility=\".sp-headline-block-b5o473|false\" data-tablet-visibility=\".sp-headline-block-b5o473|false\" data-desktop-visibility=\".sp-headline-block-b5o473|false\" class=\"sp-css-target sp-el-block sp-headline-block-b5o473 sp-type-header\" style=\"font-size: 20px; text-align: left; margin: 0px;\">Penetration Testing<\/h3>\n<div id=\"sp-wnjjm8\" data-mobile-css=\".sp-text-wrapper-wnjjm8, #sp-wnjjm8, #wnjjm8|text-align:center;\" data-tablet-css=\".sp-text-wrapper-wnjjm8, #sp-wnjjm8, #wnjjm8|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-wnjjm8|false\" data-tablet-visibility=\".sp-text-wrapper-wnjjm8|false\" data-desktop-visibility=\".sp-text-wrapper-wnjjm8|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-wnjjm8\" style=\"margin: 0px; text-align: left;\">\n<p>Evaluates an organization&#8217;s security infrastructure, policies, and procedures to ensure compliance with industry standards and best practices<\/p>\n<\/div>\n<\/div>\n<div id=\"sp-glad2t\" data-mobile-visibility=\"#sp-glad2t|false\" data-tablet-visibility=\"#sp-glad2t|false\" data-desktop-visibility=\"#sp-glad2t|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(33.3333% - 20px);\">\n<figure id=\"sp-iofu7n\" data-mobile-css=\"#sp-iofu7n|text-align:center;\" data-tablet-css=\"#sp-iofu7n|text-align:left;\" class=\"sp-image-wrapper sp-el-block\" style=\"margin: 0px 0px 10px; text-align: left;\">\n<div><span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/preview.seedprod.com\/44048\/wp-content\/uploads\/sites\/159\/2024\/01\/theme-builder-NEoaTtJuD1i0c2Zk.png\" alt=\"\" width=\"199\" height=\"143\" data-mobile-visibility=\".sp-image-block-iofu7n|false\" data-tablet-visibility=\".sp-image-block-iofu7n|false\" data-desktop-visibility=\".sp-image-block-iofu7n|false\" srcset=\" https:\/\/seedprod-templates.local\/wp-content\/uploads\/2024\/01\/Vector-2-150x143.png 150w, https:\/\/preview.seedprod.com\/44048\/wp-content\/uploads\/sites\/159\/2024\/01\/theme-builder-NEoaTtJuD1i0c2Zk.png 199w\" class=\"sp-image-block-iofu7n\" style=\"width: 69px; height: 48px;\"><\/span><\/div>\n<\/figure>\n<h3 id=\"sp-madpf6\" data-mobile-css=\".sp-headline-block-madpf6, #sp-madpf6, #madpf6|text-align:center;margin:0px 0px 10px 0px ;\" data-tablet-css=\".sp-headline-block-madpf6, #sp-madpf6, #madpf6|text-align:left;\" data-mobile-visibility=\".sp-headline-block-madpf6|false\" data-tablet-visibility=\".sp-headline-block-madpf6|false\" data-desktop-visibility=\".sp-headline-block-madpf6|false\" class=\"sp-css-target sp-el-block sp-headline-block-madpf6 sp-type-header\" style=\"font-size: 20px; text-align: left; margin: 0px;\">Network Security<\/h3>\n<div id=\"sp-dxud3u\" data-mobile-css=\".sp-text-wrapper-dxud3u, #sp-dxud3u, #dxud3u|text-align:center;\" data-tablet-css=\".sp-text-wrapper-dxud3u, #sp-dxud3u, #dxud3u|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-dxud3u|false\" data-tablet-visibility=\".sp-text-wrapper-dxud3u|false\" data-desktop-visibility=\".sp-text-wrapper-dxud3u|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-dxud3u\" style=\"margin: 0px; text-align: left;\">\n<p>Evaluates an organization&#8217;s security infrastructure, policies, and procedures to ensure compliance with industry standards and best practices<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"sp-fd2b4b\" data-mobile-visibility=\"#sp-fd2b4b|false\" data-tablet-visibility=\"#sp-fd2b4b|false\" data-desktop-visibility=\"#sp-fd2b4b|false\" data-mobile-css=\"#sp-fd2b4b|margin:0px 0px 100px 0px ;\" data-tablet-css=\"\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\" style=\"margin-bottom: 80px;\">\n<div id=\"sp-cntnmf\" data-mobile-visibility=\"#sp-cntnmf|false\" data-tablet-visibility=\"#sp-cntnmf|false\" data-desktop-visibility=\"#sp-cntnmf|false\" data-mobile-css=\"#sp-cntnmf|margin:0px 0px 30px 0px ;\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(33.3333% - 20px);\">\n<figure id=\"sp-uve8mg\" data-mobile-css=\"#sp-uve8mg|text-align:center;\" data-tablet-css=\"#sp-uve8mg|text-align:left;\" class=\"sp-image-wrapper sp-el-block\" style=\"margin: 0px 0px 10px; text-align: left;\">\n<div><span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/preview.seedprod.com\/44048\/wp-content\/uploads\/sites\/159\/2024\/01\/theme-builder-qGlQkW2NV5bH4tdO.png\" alt=\"\" width=\"118\" height=\"144\" data-mobile-visibility=\".sp-image-block-uve8mg|false\" data-tablet-visibility=\".sp-image-block-uve8mg|false\" data-desktop-visibility=\".sp-image-block-uve8mg|false\" srcset=\" https:\/\/preview.seedprod.com\/44048\/wp-content\/uploads\/sites\/159\/2024\/01\/theme-builder-qGlQkW2NV5bH4tdO.png 118w\" class=\"sp-image-block-uve8mg\" style=\"width: 40px; height: 48px;\"><\/span><\/div>\n<\/figure>\n<h3 id=\"sp-htkidv\" data-mobile-css=\".sp-headline-block-htkidv, #sp-htkidv, #htkidv|text-align:center;margin:0px 0px 10px 0px ;\" data-tablet-css=\".sp-headline-block-htkidv, #sp-htkidv, #htkidv|text-align:left;\" data-mobile-visibility=\".sp-headline-block-htkidv|false\" data-tablet-visibility=\".sp-headline-block-htkidv|false\" data-desktop-visibility=\".sp-headline-block-htkidv|false\" class=\"sp-css-target sp-el-block sp-headline-block-htkidv sp-type-header\" style=\"font-size: 20px; text-align: left; margin: 0px;\">Security Auditing<\/h3>\n<div id=\"sp-hgv4y1\" data-mobile-css=\".sp-text-wrapper-hgv4y1, #sp-hgv4y1, #hgv4y1|text-align:center;\" data-tablet-css=\".sp-text-wrapper-hgv4y1, #sp-hgv4y1, #hgv4y1|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-hgv4y1|false\" data-tablet-visibility=\".sp-text-wrapper-hgv4y1|false\" data-desktop-visibility=\".sp-text-wrapper-hgv4y1|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-hgv4y1\" style=\"margin: 0px; text-align: left;\">\n<p>Evaluates an organization&#8217;s security infrastructure, policies, and procedures to ensure compliance with industry standards and best practices<\/p>\n<\/div>\n<\/div>\n<div id=\"sp-h7x2lw\" data-mobile-visibility=\"#sp-h7x2lw|false\" data-tablet-visibility=\"#sp-h7x2lw|false\" data-desktop-visibility=\"#sp-h7x2lw|false\" data-mobile-css=\"#sp-h7x2lw|margin:0px 0px 30px 0px ;\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(33.3333% - 20px);\">\n<figure id=\"sp-u9a170\" data-mobile-css=\"#sp-u9a170|text-align:center;\" data-tablet-css=\"#sp-u9a170|text-align:left;\" class=\"sp-image-wrapper sp-el-block\" style=\"margin: 0px 0px 10px; text-align: left;\">\n<div><span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/preview.seedprod.com\/44048\/wp-content\/uploads\/sites\/159\/2024\/01\/theme-builder-BhYVWb3Nco21ItMw.png\" alt=\"\" width=\"144\" height=\"144\" data-mobile-visibility=\".sp-image-block-u9a170|false\" data-tablet-visibility=\".sp-image-block-u9a170|false\" data-desktop-visibility=\".sp-image-block-u9a170|false\" srcset=\" https:\/\/preview.seedprod.com\/44048\/wp-content\/uploads\/sites\/159\/2024\/01\/theme-builder-BhYVWb3Nco21ItMw.png 144w\" class=\"sp-image-block-u9a170\" style=\"width: 48px; height: 48px;\"><\/span><\/div>\n<\/figure>\n<h3 id=\"sp-s8ijg1\" data-mobile-css=\".sp-headline-block-s8ijg1, #sp-s8ijg1, #s8ijg1|text-align:center;margin:0px 0px 10px 0px ;\" data-tablet-css=\".sp-headline-block-s8ijg1, #sp-s8ijg1, #s8ijg1|text-align:left;\" data-mobile-visibility=\".sp-headline-block-s8ijg1|false\" data-tablet-visibility=\".sp-headline-block-s8ijg1|false\" data-desktop-visibility=\".sp-headline-block-s8ijg1|false\" class=\"sp-css-target sp-el-block sp-headline-block-s8ijg1 sp-type-header\" style=\"font-size: 20px; text-align: left; margin: 0px;\">Penetration Testing<\/h3>\n<div id=\"sp-b0t9rt\" data-mobile-css=\".sp-text-wrapper-b0t9rt, #sp-b0t9rt, #b0t9rt|text-align:center;\" data-tablet-css=\".sp-text-wrapper-b0t9rt, #sp-b0t9rt, #b0t9rt|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-b0t9rt|false\" data-tablet-visibility=\".sp-text-wrapper-b0t9rt|false\" data-desktop-visibility=\".sp-text-wrapper-b0t9rt|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-b0t9rt\" style=\"margin: 0px; text-align: left;\">\n<p>Evaluates an organization&#8217;s security infrastructure, policies, and procedures to ensure compliance with industry standards and best practices<\/p>\n<\/div>\n<\/div>\n<div id=\"sp-zq477y\" data-mobile-visibility=\"#sp-zq477y|false\" data-tablet-visibility=\"#sp-zq477y|false\" data-desktop-visibility=\"#sp-zq477y|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(33.3333% - 20px);\">\n<figure id=\"sp-jfjthm\" data-mobile-css=\"#sp-jfjthm|text-align:center;\" data-tablet-css=\"#sp-jfjthm|text-align:left;\" class=\"sp-image-wrapper sp-el-block\" style=\"margin: 0px 0px 10px; text-align: left;\">\n<div><span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/preview.seedprod.com\/44048\/wp-content\/uploads\/sites\/159\/2024\/01\/theme-builder-NEoaTtJuD1i0c2Zk.png\" alt=\"\" width=\"199\" height=\"143\" data-mobile-visibility=\".sp-image-block-jfjthm|false\" data-tablet-visibility=\".sp-image-block-jfjthm|false\" data-desktop-visibility=\".sp-image-block-jfjthm|false\" srcset=\" https:\/\/seedprod-templates.local\/wp-content\/uploads\/2024\/01\/Vector-2-150x143.png 150w, https:\/\/preview.seedprod.com\/44048\/wp-content\/uploads\/sites\/159\/2024\/01\/theme-builder-NEoaTtJuD1i0c2Zk.png 199w\" class=\"sp-image-block-jfjthm\" style=\"width: 69px; height: 48px;\"><\/span><\/div>\n<\/figure>\n<h3 id=\"sp-gc4yu8\" data-mobile-css=\".sp-headline-block-gc4yu8, #sp-gc4yu8, #gc4yu8|text-align:center;margin:0px 0px 10px 0px ;\" data-tablet-css=\".sp-headline-block-gc4yu8, #sp-gc4yu8, #gc4yu8|text-align:left;\" data-mobile-visibility=\".sp-headline-block-gc4yu8|false\" data-tablet-visibility=\".sp-headline-block-gc4yu8|false\" data-desktop-visibility=\".sp-headline-block-gc4yu8|false\" class=\"sp-css-target sp-el-block sp-headline-block-gc4yu8 sp-type-header\" style=\"font-size: 20px; text-align: left; margin: 0px;\">Network Security<\/h3>\n<div id=\"sp-ihir3a\" data-mobile-css=\".sp-text-wrapper-ihir3a, #sp-ihir3a, #ihir3a|text-align:center;\" data-tablet-css=\".sp-text-wrapper-ihir3a, #sp-ihir3a, #ihir3a|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-ihir3a|false\" data-tablet-visibility=\".sp-text-wrapper-ihir3a|false\" data-desktop-visibility=\".sp-text-wrapper-ihir3a|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-ihir3a\" style=\"margin: 0px; text-align: left;\">\n<p>Evaluates an organization&#8217;s security infrastructure, policies, and procedures to ensure compliance with industry standards and best practices<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"sp-arfrt5\" data-mobile-visibility=\"#sp-arfrt5|false\" data-tablet-visibility=\"#sp-arfrt5|false\" data-desktop-visibility=\"#sp-arfrt5|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-section  spBgcoverscroll\" style=\"width: 100%; max-width: 100%;\">\n<div id=\"sp-p0h5cq\" data-mobile-visibility=\"#sp-p0h5cq|false\" data-tablet-visibility=\"#sp-p0h5cq|false\" data-desktop-visibility=\"#sp-p0h5cq|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\" style=\"margin-bottom: 30px;\">\n<div id=\"sp-tbwxzi\" data-mobile-visibility=\"#sp-tbwxzi|false\" data-tablet-visibility=\"#sp-tbwxzi|false\" data-desktop-visibility=\"#sp-tbwxzi|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% + 0px);\">\n<h2 id=\"sp-gjhqnh\" data-mobile-css=\".sp-headline-block-gjhqnh, #sp-gjhqnh, #gjhqnh|font-size:50px;text-align:center;\" data-tablet-css=\".sp-headline-block-gjhqnh, #sp-gjhqnh, #gjhqnh|text-align:center;\" data-mobile-visibility=\".sp-headline-block-gjhqnh|false\" data-tablet-visibility=\".sp-headline-block-gjhqnh|false\" data-desktop-visibility=\".sp-headline-block-gjhqnh|false\" class=\"sp-css-target sp-el-block sp-headline-block-gjhqnh sp-type-header\" style=\"font-size: 60px; text-align: center; margin: 0px;\">Ultra Performance<\/h2>\n<\/div>\n<\/div>\n<div id=\"sp-f1zf10\" data-mobile-visibility=\"#sp-f1zf10|false\" data-tablet-visibility=\"#sp-f1zf10|false\" data-desktop-visibility=\"#sp-f1zf10|false\" data-mobile-css=\"#sp-f1zf10|margin:0px 0px 100px 0px ;\" data-tablet-css=\"\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\" style=\"margin-bottom: 80px;\">\n<div id=\"sp-gcf1ix\" data-mobile-visibility=\"#sp-gcf1ix|false\" data-tablet-visibility=\"#sp-gcf1ix|false\" data-desktop-visibility=\"#sp-gcf1ix|false\" data-mobile-css=\"#sp-gcf1ix|margin:0px 0px 30px 0px ;\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(50% - 10px);\">\n<div id=\"sp-wjml0x\" data-mobile-visibility=\".sp-templatepart-block-wjml0x|false\" data-tablet-visibility=\".sp-templatepart-block-wjml0x|false\" data-desktop-visibility=\".sp-templatepart-block-wjml0x|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-templatepart-wrapper sp-templatepart-block-wjml0x\" style=\"margin: 0px -20px; display: flex;\">\n<div class=\"sp-w-full\">     <section id=\"sp-bxhrnb\" data-mobile-visibility=\"#sp-bxhrnb|false\" data-tablet-visibility=\"#sp-bxhrnb|false\" data-desktop-visibility=\"#sp-bxhrnb|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-section\" style=\"width: 100%; max-width: 100%;\"><div id=\"sp-tjtdqg\" data-mobile-visibility=\"#sp-tjtdqg|false\" data-tablet-visibility=\"#sp-tjtdqg|false\" data-desktop-visibility=\"#sp-tjtdqg|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\"><div id=\"sp-ez52ng\" data-mobile-visibility=\"#sp-ez52ng|false\" data-tablet-visibility=\"#sp-ez52ng|false\" data-desktop-visibility=\"#sp-ez52ng|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(50% + 0px);\"><h3 id=\"sp-vaq05o\" data-mobile-css=\".sp-headline-block-vaq05o, #sp-vaq05o, #vaq05o|text-align:center;margin:0px 0px 10px 0px ;\" data-tablet-css=\".sp-headline-block-vaq05o, #sp-vaq05o, #vaq05o|text-align:left;\" data-mobile-visibility=\".sp-headline-block-vaq05o|false\" data-tablet-visibility=\".sp-headline-block-vaq05o|false\" data-desktop-visibility=\".sp-headline-block-vaq05o|false\" class=\"sp-css-target sp-el-block sp-headline-block-vaq05o sp-type-header\" style=\"font-size: 20px; text-align: left; padding: 0px 10px; margin: 0px;\">Google PageSpeed<\/h3><\/div><div id=\"sp-u00b8h\" data-mobile-visibility=\"#sp-u00b8h|false\" data-tablet-visibility=\"#sp-u00b8h|false\" data-desktop-visibility=\"#sp-u00b8h|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(50% + 0px);\"><div id=\"sp-yd7hsh\" data-mobile-css=\".sp-text-wrapper-yd7hsh, #sp-yd7hsh, #yd7hsh|text-align:left;\" data-tablet-css=\".sp-text-wrapper-yd7hsh, #sp-yd7hsh, #yd7hsh|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-yd7hsh|false\" data-tablet-visibility=\".sp-text-wrapper-yd7hsh|false\" data-desktop-visibility=\".sp-text-wrapper-yd7hsh|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-yd7hsh\" style=\"font-weight: 600; font-style: normal; font-family: Poppins; color: rgb(255, 255, 255); padding: 0px 10px; margin: 0px; text-align: right;\"><p>80%<\/p><\/div><\/div><\/div><div id=\"sp-oenvuk\" data-mobile-visibility=\"#sp-oenvuk|false\" data-tablet-visibility=\"#sp-oenvuk|false\" data-desktop-visibility=\"#sp-oenvuk|false\" data-mobile-css=\"#sp-oenvuk|margin:0px 0px 100px 0px ;\" data-tablet-css=\"\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\" style=\"\"><div id=\"sp-yv7qau\" data-mobile-visibility=\"#sp-yv7qau|false\" data-tablet-visibility=\"#sp-yv7qau|false\" data-desktop-visibility=\"#sp-yv7qau|false\" data-mobile-css=\"#sp-yv7qau|margin:0px 0px 30px 0px ;\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% - 10px);\"><div id=\"sp-lox205\" data-mobile-visibility=\".sp-progress-bar-block-lox205|false\" data-tablet-visibility=\".sp-progress-bar-block-lox205|false\" data-desktop-visibility=\".sp-progress-bar-block-lox205|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-progressbar-wrapper sp-el-block sp-progress-bar-block-lox205\" style=\"padding: 0px 10px 10px; margin: 0px;\"><div class=\"sp-w-full sp-shadow-inner sp-progressbar-block-template-0\" style=\"background-color: rgb(102, 106, 248); border-radius: 3px;\"><div data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-flex sp-items-center sp-justify-center sp-truncate sp-text-sm sp-py-1 sp-px-2 sp-css-target sp-progress-bar-inner-lox205\" style=\"text-align: center; justify-content: center; border-radius: 3px; background-color: rgb(255, 169, 14); width: 80%; color: rgb(255, 255, 255);\"><\/div><\/div><\/div><div id=\"sp-ayvewb\" data-mobile-css=\".sp-text-wrapper-ayvewb, #sp-ayvewb, #ayvewb|text-align:center;\" data-tablet-css=\".sp-text-wrapper-ayvewb, #sp-ayvewb, #ayvewb|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-ayvewb|false\" data-tablet-visibility=\".sp-text-wrapper-ayvewb|false\" data-desktop-visibility=\".sp-text-wrapper-ayvewb|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-ayvewb\" style=\"margin: 0px; text-align: left;\"><p>Evaluates an organization's security infrastructure, policies, and procedures to ensure compliance with industry standards and best practices<\/p><\/div><\/div><\/div><\/section>   <\/div>\n<\/div>\n<\/div>\n<div id=\"sp-gkequ5\" data-mobile-visibility=\"#sp-gkequ5|false\" data-tablet-visibility=\"#sp-gkequ5|false\" data-desktop-visibility=\"#sp-gkequ5|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(50% - 10px);\">\n<div id=\"sp-d1tyzd\" data-mobile-visibility=\".sp-templatepart-block-d1tyzd|false\" data-tablet-visibility=\".sp-templatepart-block-d1tyzd|false\" data-desktop-visibility=\".sp-templatepart-block-d1tyzd|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-templatepart-wrapper sp-templatepart-block-d1tyzd\" style=\"margin: 0px -20px; display: flex;\">\n<div class=\"sp-w-full\">     <section id=\"sp-bxhrnb\" data-mobile-visibility=\"#sp-bxhrnb|false\" data-tablet-visibility=\"#sp-bxhrnb|false\" data-desktop-visibility=\"#sp-bxhrnb|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-section\" style=\"width: 100%; max-width: 100%;\"><div id=\"sp-tjtdqg\" data-mobile-visibility=\"#sp-tjtdqg|false\" data-tablet-visibility=\"#sp-tjtdqg|false\" data-desktop-visibility=\"#sp-tjtdqg|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\"><div id=\"sp-ez52ng\" data-mobile-visibility=\"#sp-ez52ng|false\" data-tablet-visibility=\"#sp-ez52ng|false\" data-desktop-visibility=\"#sp-ez52ng|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(50% + 0px);\"><h3 id=\"sp-vaq05o\" data-mobile-css=\".sp-headline-block-vaq05o, #sp-vaq05o, #vaq05o|text-align:center;margin:0px 0px 10px 0px ;\" data-tablet-css=\".sp-headline-block-vaq05o, #sp-vaq05o, #vaq05o|text-align:left;\" data-mobile-visibility=\".sp-headline-block-vaq05o|false\" data-tablet-visibility=\".sp-headline-block-vaq05o|false\" data-desktop-visibility=\".sp-headline-block-vaq05o|false\" class=\"sp-css-target sp-el-block sp-headline-block-vaq05o sp-type-header\" style=\"font-size: 20px; text-align: left; padding: 0px 10px; margin: 0px;\">Performance Grade<\/h3><\/div><div id=\"sp-u00b8h\" data-mobile-visibility=\"#sp-u00b8h|false\" data-tablet-visibility=\"#sp-u00b8h|false\" data-desktop-visibility=\"#sp-u00b8h|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(50% + 0px);\"><div id=\"sp-yd7hsh\" data-mobile-css=\".sp-text-wrapper-yd7hsh, #sp-yd7hsh, #yd7hsh|text-align:left;\" data-tablet-css=\".sp-text-wrapper-yd7hsh, #sp-yd7hsh, #yd7hsh|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-yd7hsh|false\" data-tablet-visibility=\".sp-text-wrapper-yd7hsh|false\" data-desktop-visibility=\".sp-text-wrapper-yd7hsh|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-yd7hsh\" style=\"font-weight: 600; font-style: normal; font-family: Poppins; color: rgb(255, 255, 255); padding: 0px 10px; margin: 0px; text-align: right;\"><p>80%<\/p><\/div><\/div><\/div><div id=\"sp-oenvuk\" data-mobile-visibility=\"#sp-oenvuk|false\" data-tablet-visibility=\"#sp-oenvuk|false\" data-desktop-visibility=\"#sp-oenvuk|false\" data-mobile-css=\"#sp-oenvuk|margin:0px 0px 100px 0px ;\" data-tablet-css=\"\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\" style=\"\"><div id=\"sp-yv7qau\" data-mobile-visibility=\"#sp-yv7qau|false\" data-tablet-visibility=\"#sp-yv7qau|false\" data-desktop-visibility=\"#sp-yv7qau|false\" data-mobile-css=\"#sp-yv7qau|margin:0px 0px 30px 0px ;\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% - 10px);\"><div id=\"sp-lox205\" data-mobile-visibility=\".sp-progress-bar-block-lox205|false\" data-tablet-visibility=\".sp-progress-bar-block-lox205|false\" data-desktop-visibility=\".sp-progress-bar-block-lox205|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-progressbar-wrapper sp-el-block sp-progress-bar-block-lox205\" style=\"padding: 0px 10px 10px; margin: 0px;\"><div class=\"sp-w-full sp-shadow-inner sp-progressbar-block-template-0\" style=\"background-color: rgb(102, 106, 248); border-radius: 3px;\"><div data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-flex sp-items-center sp-justify-center sp-truncate sp-text-sm sp-py-1 sp-px-2 sp-css-target sp-progress-bar-inner-lox205\" style=\"text-align: center; justify-content: center; border-radius: 3px; background-color: rgb(255, 169, 14); width: 80%; color: rgb(255, 255, 255);\"><\/div><\/div><\/div><div id=\"sp-ayvewb\" data-mobile-css=\".sp-text-wrapper-ayvewb, #sp-ayvewb, #ayvewb|text-align:center;\" data-tablet-css=\".sp-text-wrapper-ayvewb, #sp-ayvewb, #ayvewb|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-ayvewb|false\" data-tablet-visibility=\".sp-text-wrapper-ayvewb|false\" data-desktop-visibility=\".sp-text-wrapper-ayvewb|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-ayvewb\" style=\"margin: 0px; text-align: left;\"><p>Evaluates an organization's security infrastructure, policies, and procedures to ensure compliance with industry standards and best practices<\/p><\/div><\/div><\/div><\/section>   <\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"sp-nki3y7\" data-mobile-visibility=\"#sp-nki3y7|false\" data-tablet-visibility=\"#sp-nki3y7|false\" data-desktop-visibility=\"#sp-nki3y7|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-section\" style=\"width: 100%; max-width: 100%; padding: 10px 0px;\">\n<div id=\"sp-tyy1ga\" data-mobile-visibility=\"#sp-tyy1ga|false\" data-tablet-visibility=\"#sp-tyy1ga|false\" data-desktop-visibility=\"#sp-tyy1ga|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-row sm:sp-flex sp-w-full  sp-m-auto sp-justify-between\" style=\"width: 100%; max-width: 100%; margin-bottom: 80px;\">\n<div id=\"sp-mpry51\" data-mobile-visibility=\"#sp-mpry51|false\" data-tablet-visibility=\"#sp-mpry51|false\" data-desktop-visibility=\"#sp-mpry51|false\" data-mobile-css=\"#sp-mpry51|margin:0px 0px 20px 0px ;\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full sm:sp-flex sp-flex-col sp-justify-center\" style=\"width: calc(50% - 10px); padding: 0px 60px 0px 100px;\">\n<h2 id=\"sp-tm2qym\" data-mobile-css=\".sp-headline-block-tm2qym, #sp-tm2qym, #tm2qym|text-align:center;\" data-tablet-css=\".sp-headline-block-tm2qym, #sp-tm2qym, #tm2qym|text-align:center;\" data-mobile-visibility=\".sp-headline-block-tm2qym|false\" data-tablet-visibility=\".sp-headline-block-tm2qym|false\" data-desktop-visibility=\".sp-headline-block-tm2qym|false\" class=\"sp-css-target sp-el-block sp-headline-block-tm2qym sp-type-header\" style=\"text-align: left; margin: 0px;\">Digital Ethical Hacking Excellence<\/h2>\n<div id=\"xh4kva\" data-mobile-css=\".sp-text-wrapper-xh4kva, #sp-xh4kva, #xh4kva|text-align:center;\" data-tablet-css=\".sp-text-wrapper-xh4kva, #sp-xh4kva, #xh4kva|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-xh4kva|false\" data-tablet-visibility=\".sp-text-wrapper-xh4kva|false\" data-desktop-visibility=\".sp-text-wrapper-xh4kva|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-xh4kva mce-content-body html4-captions\"  style=\"margin: 0px 0px 20px; text-align: left; position: relative;\" >\n<p>Involves simulated cyberattacks on a system, network, or application to identify vulnerabilities and weaknesses that malicious hackers could exploit. It helps assess the effectiveness of existing security measures<\/p>\n<\/div>\n<h3 id=\"sp-ataqtv\" data-mobile-css=\".sp-headline-block-ataqtv, #sp-ataqtv, #ataqtv|text-align:center;\" data-tablet-css=\".sp-headline-block-ataqtv, #sp-ataqtv, #ataqtv|text-align:center;\" data-mobile-visibility=\".sp-headline-block-ataqtv|false\" data-tablet-visibility=\".sp-headline-block-ataqtv|false\" data-desktop-visibility=\".sp-headline-block-ataqtv|false\" class=\"sp-css-target sp-el-block sp-headline-block-ataqtv sp-type-header\" style=\"font-size: 20px; text-align: left; margin: 0px;\">Unlocking Security<\/h3>\n<div id=\"sp-nc7dy2\" data-mobile-css=\".sp-text-wrapper-nc7dy2, #sp-nc7dy2, #nc7dy2|text-align:center;\" data-tablet-css=\".sp-text-wrapper-nc7dy2, #sp-nc7dy2, #nc7dy2|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-nc7dy2|false\" data-tablet-visibility=\".sp-text-wrapper-nc7dy2|false\" data-desktop-visibility=\".sp-text-wrapper-nc7dy2|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-nc7dy2\" style=\"margin: 0px; text-align: left;\">Evaluates an organization&#8217;s security infrastructure, policies, and procedures to ensure compliance with industry standards and best practices<\/div>\n<\/div>\n<div id=\"sp-v345o3\" data-mobile-visibility=\"#sp-v345o3|false\" data-tablet-visibility=\"#sp-v345o3|false\" data-desktop-visibility=\"#sp-v345o3|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  spBgcoverscroll sp-w-full\" style=\"width: calc(50% - 10px); background-image: linear-gradient(0deg, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0)), url('https:\/\/preview.seedprod.com\/44048\/wp-content\/uploads\/sites\/159\/2024\/01\/theme-builder-ftZFID4TjWPbxa6C.png');\">\n<div id=\"sp-j9qibd\" data-mobile-css=\"#sp-j9qibd|height:350px;\" data-tablet-css=\"#sp-j9qibd|height:10px;\" class=\"sp-spacer\" style=\"height: 520px;\"><\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Services Customized Security Solutions for a Safer Tomorrow Involves simulated cyberattacks on a system, network, or application to identify vulnerabilities and weaknesses that malicious hackers could exploit Security Auditing Evaluates an organization&#8217;s security infrastructure, policies, and procedures to ensure compliance with industry standards and best practices Penetration Testing Evaluates an organization&#8217;s security infrastructure, policies, and [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-94","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/preview.seedprod.com\/44048\/wp-json\/wp\/v2\/pages\/94","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/preview.seedprod.com\/44048\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/preview.seedprod.com\/44048\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/preview.seedprod.com\/44048\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/preview.seedprod.com\/44048\/wp-json\/wp\/v2\/comments?post=94"}],"version-history":[{"count":0,"href":"https:\/\/preview.seedprod.com\/44048\/wp-json\/wp\/v2\/pages\/94\/revisions"}],"wp:attachment":[{"href":"https:\/\/preview.seedprod.com\/44048\/wp-json\/wp\/v2\/media?parent=94"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}