
{"id":5108,"date":"2021-07-19T06:34:53","date_gmt":"2021-07-19T06:34:53","guid":{"rendered":"https:\/\/www.isutc.ac.mz\/?p=5108"},"modified":"2021-08-04T08:56:46","modified_gmt":"2021-08-04T08:56:46","slug":"vagas-para-monitores-2","status":"publish","type":"post","link":"https:\/\/www.isutc.ac.mz\/?p=5108","title":{"rendered":"Cybersecurity   Fundamentals"},"content":{"rendered":"\n<p><strong>Vis\u00e3o   Geral  do  Curso:<\/strong><\/p>\n\n\n\n<p>Este curso visa ensinar aos alunos a entender os conceitos fundamentais da rede e os conceitos gerais envolvidos na manuten\u00e7\u00e3o de um ambiente seguro de utiliza\u00e7\u00e3o na rede. Ap\u00f3s a conclus\u00e3o bem-sucedida deste curso, os participantes podem examinar, descrever os fundamentos gerais da rede e implementar t\u00e9cnicas b\u00e1sicas de configura\u00e7\u00e3o da rede.<\/p>\n\n\n\n<p><strong> Objectivos do Curso:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Descubrir as\ntend\u00eancias de computa\u00e7\u00e3o moderna e vectores de amea\u00e7as de aplicativos.<\/li><li>Configurar uma <em>interface<\/em> de rede e testar a\nconectividade.<\/li><li>Identificar\ndesafios de aplicativos de computa\u00e7\u00e3o em nuvem e <em>software<\/em> como servi\u00e7o (<em>SaaS<\/em>).<\/li><li>Conhecer os\nregulamentos e padr\u00f5es do setor de seguran\u00e7a cibern\u00e9tica.<\/li><li>Explorar os ciberataques\nrecentes e seu impacto nos neg\u00f3cios.<\/li><li>Conhecer os perfis\ndos atacantes, as motiva\u00e7\u00f5es e o ciclo de vida do ataque cibern\u00e9tico.<\/li><li>Reconhecer ataques\nde seguran\u00e7a cibern\u00e9tica de alto perfil e amea\u00e7as persistentes avan\u00e7adas.<\/li><li>Identificar tipos\nde <em>malware<\/em>, vulnerabilidades, <em>exploits, spamming<\/em> e ataques de <em>phishing.<\/em><\/li><li>Configurar e testar\num perfil de seguran\u00e7a de an\u00e1lise de <em>malware<\/em>.<\/li><li>Descrever como <em>bots<\/em> e <em>botnets<\/em> s\u00e3o usados \u200b\u200bpara atacar redes corporativas.<\/li><li>Explorar os\nprinc\u00edpios de <em>design<\/em>, arquitectura,\nrecursos e implementa\u00e7\u00e3o do <em>Zero Trust<\/em>.<\/li><li>Conhecer as\nestrat\u00e9gias, pol\u00edticas, modelos e limites de confian\u00e7a de seguran\u00e7a de rede de\nper\u00edmetro.<\/li><li>Configurar zonas de\nseguran\u00e7a interna, externa e <em>DMZ<\/em> em\num <em>NGFW.<\/em><\/li><li>Crie e teste uma\npol\u00edtica de autentica\u00e7\u00e3o em um firewall de pr\u00f3xima gera\u00e7\u00e3o.<\/li><li>Conhecer os\nrecursos da plataforma operacional de seguran\u00e7a e dos componentes.<\/li><li>Explorar como\nproteger a empresa com prote\u00e7\u00e3o de <em>endpoint\nNGFW<\/em> e <em>Traps<\/em>.<\/li><li>Descubrir como\nproteger a nuvem com <em>Prisma Access<\/em>, <em>SaaS<\/em> e <em>Cloud<\/em>.<\/li><li>Aplicar a\nautentica\u00e7\u00e3o de dois factores no <em>firewall<\/em>\nde pr\u00f3xima gera\u00e7\u00e3o (<em>NGFW)<\/em>.<\/li><li>Configurar o <em>NGFW<\/em> para permitir apenas aplicativos\nconfi\u00e1veis.<\/li><\/ul>\n\n\n\n<p><strong>M\u00f3dulos: <\/strong><\/p>\n\n\n\n<p>M\u00f3dulo 1: Cybersecurity\nLandscape<\/p>\n\n\n\n<p>M\u00f3dulo 2: Cybersecurity\nThreats<\/p>\n\n\n\n<p>M\u00f3dulo 3: Cybersecurity\nAttack Types&nbsp; <\/p>\n\n\n\n<p>M\u00f3dulo 4: Cybersecurity\nDesign Models <\/p>\n\n\n\n<p>M\u00f3dulo 5: Security Operating Platform<\/p>\n\n\n\n<p><strong>Pr\u00e9-requisitos<\/strong><\/p>\n\n\n\n<p><strong>N\u00e3o h\u00e1 pr\u00e9-requisitos<\/strong> de curso para o curso Cybersecurity Fundamentals. Alunos devem ter\nhabilidades b\u00e1sicas de Internet e software de aplicativo.<\/p>\n\n\n\n<p><strong>Dura\u00e7\u00e3o\ndo Curso<em>:<\/em><\/strong><em> 30 horas<\/em><\/p>\n\n\n\n<p><strong>Hor\u00e1rio:<\/strong> P\u00f3s-laboral, das 16h \u00e0s 20h00<\/p>\n\n\n\n<p>Aulas em ZOOM <\/p>\n\n\n\n<p><strong>Pr\u00e9-Inscri\u00e7\u00e3o<\/strong>:<em> <a href=\"https:\/\/forms.gle\/rRpF2jZn5eNtW5UV9\">https:\/\/forms.gle\/rRpF2jZn5eNtW5UV9<\/a><\/em><\/p>\n\n\n\n<p><strong>Taxa\nde Inscri\u00e7\u00e3o:<\/strong><strong><\/strong><\/p>\n\n\n\n<p><em>3.500,00Mt\n&#8211; Estudantes do ISUTC<\/em><\/p>\n\n\n\n<p><em>4.500,00Mt\n&#8211; Estudantes Externos<\/em><\/p>\n\n\n\n<p><em>6.000,00Mt\n&#8211; Graduados do ISUTC e Outros<\/em><\/p>\n\n\n\n<p><strong>Mais informa\u00e7\u00f5es:<\/strong><br>\nISUTC \u2013 Prolong. Av. Kim Il Sung, IFT\/TDM (Edf. D1) \u2013 Maputo<br>\nT: (+258) 21 48 87 92\/5 C: (+258) 82 30 26 200 \/ 82 30 62 620<br>\nWhatsApp (+258) 85 280 7983 Email: gilda@isutc.ac.mz<br>\nwww.isutc.ac.mz<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vis\u00e3o Geral do Curso: Este curso visa ensinar aos alunos a entender os conceitos fundamentais da rede e os conceitos gerais envolvidos na manuten\u00e7\u00e3o de um ambiente seguro de utiliza\u00e7\u00e3o na rede. Ap\u00f3s a conclus\u00e3o bem-sucedida deste curso, os participantes podem examinar, descrever os fundamentos gerais da rede e implementar t\u00e9cnicas b\u00e1sicas de configura\u00e7\u00e3o da [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":4769,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-5108","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity  Fundamentals - ISUTC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.isutc.ac.mz\/?p=5108\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity  Fundamentals - ISUTC\" \/>\n<meta property=\"og:description\" content=\"Vis\u00e3o Geral do Curso: Este curso visa ensinar aos alunos a entender os conceitos fundamentais da rede e os conceitos gerais envolvidos na manuten\u00e7\u00e3o de um ambiente seguro de utiliza\u00e7\u00e3o na rede. Ap\u00f3s a conclus\u00e3o bem-sucedida deste curso, os participantes podem examinar, descrever os fundamentos gerais da rede e implementar t\u00e9cnicas b\u00e1sicas de configura\u00e7\u00e3o da [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.isutc.ac.mz\/?p=5108\" \/>\n<meta property=\"og:site_name\" content=\"ISUTC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/pt-br.facebook.com\/isutc\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-19T06:34:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-04T08:56:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/12\/PALOALTO.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Francisca Chacha\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Francisca Chacha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=5108#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=5108\"},\"author\":{\"name\":\"Francisca Chacha\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/91dac55d0c4a61cc39a90540a2aa9205\"},\"headline\":\"Cybersecurity Fundamentals\",\"datePublished\":\"2021-07-19T06:34:53+00:00\",\"dateModified\":\"2021-08-04T08:56:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=5108\"},\"wordCount\":447,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=5108#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/12\/PALOALTO.png\",\"articleSection\":[\"Noticia\"],\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.isutc.ac.mz\/?p=5108#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=5108\",\"url\":\"https:\/\/www.isutc.ac.mz\/?p=5108\",\"name\":\"Cybersecurity Fundamentals - ISUTC\",\"isPartOf\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=5108#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=5108#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/12\/PALOALTO.png\",\"datePublished\":\"2021-07-19T06:34:53+00:00\",\"dateModified\":\"2021-08-04T08:56:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=5108#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.isutc.ac.mz\/?p=5108\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=5108#primaryimage\",\"url\":\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/12\/PALOALTO.png\",\"contentUrl\":\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/12\/PALOALTO.png\",\"width\":1024,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=5108#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.isutc.ac.mz\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Fundamentals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#website\",\"url\":\"https:\/\/www.isutc.ac.mz\/\",\"name\":\"ISUTC\",\"description\":\"Instituto Superior de Transportes e Comunica\u00e7\u00f5es\",\"publisher\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.isutc.ac.mz\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#organization\",\"name\":\"instituto superior de transportes e comunica\u00e7\u00f5es\",\"url\":\"https:\/\/www.isutc.ac.mz\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/08\/LOGO-20.png\",\"contentUrl\":\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/08\/LOGO-20.png\",\"width\":390,\"height\":105,\"caption\":\"instituto superior de transportes e comunica\u00e7\u00f5es\"},\"image\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/pt-br.facebook.com\/isutc\",\"https:\/\/www.instagram.com\/isutc.ac\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/91dac55d0c4a61cc39a90540a2aa9205\",\"name\":\"Francisca Chacha\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b22b2d08b8ef61c857aeaa08fac1cf21357b6ec7d91d342e408c93afe44a831?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b22b2d08b8ef61c857aeaa08fac1cf21357b6ec7d91d342e408c93afe44a831?s=96&d=mm&r=g\",\"caption\":\"Francisca Chacha\"},\"url\":\"https:\/\/www.isutc.ac.mz\/?author=17\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity  Fundamentals - ISUTC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.isutc.ac.mz\/?p=5108","og_locale":"pt_PT","og_type":"article","og_title":"Cybersecurity  Fundamentals - ISUTC","og_description":"Vis\u00e3o Geral do Curso: Este curso visa ensinar aos alunos a entender os conceitos fundamentais da rede e os conceitos gerais envolvidos na manuten\u00e7\u00e3o de um ambiente seguro de utiliza\u00e7\u00e3o na rede. Ap\u00f3s a conclus\u00e3o bem-sucedida deste curso, os participantes podem examinar, descrever os fundamentos gerais da rede e implementar t\u00e9cnicas b\u00e1sicas de configura\u00e7\u00e3o da [&hellip;]","og_url":"https:\/\/www.isutc.ac.mz\/?p=5108","og_site_name":"ISUTC","article_publisher":"https:\/\/pt-br.facebook.com\/isutc","article_published_time":"2021-07-19T06:34:53+00:00","article_modified_time":"2021-08-04T08:56:46+00:00","og_image":[{"width":1024,"height":600,"url":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/12\/PALOALTO.png","type":"image\/png"}],"author":"Francisca Chacha","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Francisca Chacha","Tempo estimado de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.isutc.ac.mz\/?p=5108#article","isPartOf":{"@id":"https:\/\/www.isutc.ac.mz\/?p=5108"},"author":{"name":"Francisca Chacha","@id":"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/91dac55d0c4a61cc39a90540a2aa9205"},"headline":"Cybersecurity Fundamentals","datePublished":"2021-07-19T06:34:53+00:00","dateModified":"2021-08-04T08:56:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.isutc.ac.mz\/?p=5108"},"wordCount":447,"commentCount":0,"publisher":{"@id":"https:\/\/www.isutc.ac.mz\/#organization"},"image":{"@id":"https:\/\/www.isutc.ac.mz\/?p=5108#primaryimage"},"thumbnailUrl":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/12\/PALOALTO.png","articleSection":["Noticia"],"inLanguage":"pt-PT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.isutc.ac.mz\/?p=5108#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.isutc.ac.mz\/?p=5108","url":"https:\/\/www.isutc.ac.mz\/?p=5108","name":"Cybersecurity Fundamentals - ISUTC","isPartOf":{"@id":"https:\/\/www.isutc.ac.mz\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.isutc.ac.mz\/?p=5108#primaryimage"},"image":{"@id":"https:\/\/www.isutc.ac.mz\/?p=5108#primaryimage"},"thumbnailUrl":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/12\/PALOALTO.png","datePublished":"2021-07-19T06:34:53+00:00","dateModified":"2021-08-04T08:56:46+00:00","breadcrumb":{"@id":"https:\/\/www.isutc.ac.mz\/?p=5108#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.isutc.ac.mz\/?p=5108"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.isutc.ac.mz\/?p=5108#primaryimage","url":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/12\/PALOALTO.png","contentUrl":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/12\/PALOALTO.png","width":1024,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.isutc.ac.mz\/?p=5108#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.isutc.ac.mz\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Fundamentals"}]},{"@type":"WebSite","@id":"https:\/\/www.isutc.ac.mz\/#website","url":"https:\/\/www.isutc.ac.mz\/","name":"ISUTC","description":"Instituto Superior de Transportes e Comunica\u00e7\u00f5es","publisher":{"@id":"https:\/\/www.isutc.ac.mz\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.isutc.ac.mz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/www.isutc.ac.mz\/#organization","name":"instituto superior de transportes e comunica\u00e7\u00f5es","url":"https:\/\/www.isutc.ac.mz\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.isutc.ac.mz\/#\/schema\/logo\/image\/","url":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/08\/LOGO-20.png","contentUrl":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/08\/LOGO-20.png","width":390,"height":105,"caption":"instituto superior de transportes e comunica\u00e7\u00f5es"},"image":{"@id":"https:\/\/www.isutc.ac.mz\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/pt-br.facebook.com\/isutc","https:\/\/www.instagram.com\/isutc.ac\/"]},{"@type":"Person","@id":"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/91dac55d0c4a61cc39a90540a2aa9205","name":"Francisca Chacha","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b22b2d08b8ef61c857aeaa08fac1cf21357b6ec7d91d342e408c93afe44a831?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b22b2d08b8ef61c857aeaa08fac1cf21357b6ec7d91d342e408c93afe44a831?s=96&d=mm&r=g","caption":"Francisca Chacha"},"url":"https:\/\/www.isutc.ac.mz\/?author=17"}]}},"_links":{"self":[{"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/posts\/5108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5108"}],"version-history":[{"count":6,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/posts\/5108\/revisions"}],"predecessor-version":[{"id":5179,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/posts\/5108\/revisions\/5179"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/media\/4769"}],"wp:attachment":[{"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}