{"id":111,"date":"2026-05-09T16:18:09","date_gmt":"2026-05-09T16:18:09","guid":{"rendered":"https:\/\/press.tsu.ac.id\/?p=111"},"modified":"2026-05-09T16:19:08","modified_gmt":"2026-05-09T16:19:08","slug":"konsep-ancaman-dan-strategi-pertahanan-siber-berbasis-ethical-hacking","status":"publish","type":"post","link":"https:\/\/press.tsu.ac.id\/?p=111","title":{"rendered":"Konsep Ancaman dan Strategi Pertahanan Siber Berbasis Ethical Hacking"},"content":{"rendered":"\n<p>Buku ini hadir sebagai panduan komprehensif yang membahas berbagai aspek fundamental dalam dunia ethical hacking dan keamanan siber. Materi disusun secara sistematis mulai dari pengenalan konsep ethical hacking, klasifikasi hacker, jenis-jenis ancaman, teknik eksploitasi, hingga metode pertahanan dan proses penetration testing. Tidak hanya teori, buku ini juga menyoroti elemen-elemen praktis seperti taktik, teknik, dan prosedur (TTPs), indikator kompromi (IoCs), serta langkah-langkah pemetaan kerentanan dan respon insiden. Sebagian pendekatan dan struktur visual dalam buku ini merupakan hasil pengembangan mandiri yang terinspirasi dari referensi materi\u00a0<em>Ethical Hacking Essentials<\/em>\u00a0terbitan EC-Council sebuah institusi global yang telah lama dikenal dalam pengembangan sertifikasi dan pendidikan di bidang keamanan siber.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Buku ini hadir sebagai panduan komprehensif yang membahas berbagai aspek fundamental dalam dunia ethical hacking dan keamanan siber. Materi disusun secara sistematis mulai dari pengenalan konsep ethical hacking, klasifikasi hacker, jenis-jenis ancaman, teknik eksploitasi, hingga metode pertahanan dan proses penetration testing. Tidak hanya teori, buku ini juga menyoroti elemen-elemen praktis seperti taktik, teknik, dan prosedur [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":112,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[],"class_list":["post-111","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-katalog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Konsep Ancaman dan Strategi Pertahanan Siber Berbasis Ethical Hacking - TSU Press<\/title>\n<meta name=\"description\" content=\"Buku ini hadir sebagai panduan komprehensif yang membahas berbagai aspek fundamental dalam dunia ethical hacking dan keamanan siber. Materi disusun secara sistematis mulai dari pengenalan konsep ethical hacking, klasifikasi hacker, jenis-jenis ancaman, teknik eksploitasi, hingga metode pertahanan dan proses penetration testing. Tidak hanya teori, buku ini juga menyoroti elemen-elemen praktis seperti taktik, teknik, dan prosedur (TTPs), indikator kompromi (IoCs), serta langkah-langkah pemetaan kerentanan dan respon insiden. Sebagian pendekatan dan struktur visual dalam buku ini merupakan hasil pengembangan mandiri yang terinspirasi dari referensi materi\u00a0Ethical Hacking Essentials\u00a0terbitan EC-Council sebuah institusi global yang telah lama dikenal dalam pengembangan sertifikasi dan pendidikan di bidang keamanan siber.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/press.tsu.ac.id\/?p=111\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Konsep Ancaman dan Strategi Pertahanan Siber Berbasis Ethical Hacking - TSU Press\" \/>\n<meta property=\"og:description\" content=\"Buku ini hadir sebagai panduan komprehensif yang membahas berbagai aspek fundamental dalam dunia ethical hacking dan keamanan siber. Materi disusun secara sistematis mulai dari pengenalan konsep ethical hacking, klasifikasi hacker, jenis-jenis ancaman, teknik eksploitasi, hingga metode pertahanan dan proses penetration testing. Tidak hanya teori, buku ini juga menyoroti elemen-elemen praktis seperti taktik, teknik, dan prosedur (TTPs), indikator kompromi (IoCs), serta langkah-langkah pemetaan kerentanan dan respon insiden. Sebagian pendekatan dan struktur visual dalam buku ini merupakan hasil pengembangan mandiri yang terinspirasi dari referensi materi\u00a0Ethical Hacking Essentials\u00a0terbitan EC-Council sebuah institusi global yang telah lama dikenal dalam pengembangan sertifikasi dan pendidikan di bidang keamanan siber.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/press.tsu.ac.id\/?p=111\" \/>\n<meta property=\"og:site_name\" content=\"TSU Press\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-09T16:18:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-09T16:19:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/press.tsu.ac.id\/wp-content\/uploads\/2026\/05\/Cover-Buku-Dewa-Nicholas.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"972\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/?p=111#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/?p=111\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/#\\\/schema\\\/person\\\/d2613ab28b14ea6b44a807279fffc36e\"},\"headline\":\"Konsep Ancaman dan Strategi Pertahanan Siber Berbasis Ethical Hacking\",\"datePublished\":\"2026-05-09T16:18:09+00:00\",\"dateModified\":\"2026-05-09T16:19:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/?p=111\"},\"wordCount\":113,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/?p=111#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/press.tsu.ac.id\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Cover-Buku-Dewa-Nicholas.jpg\",\"articleSection\":[\"Katalog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/press.tsu.ac.id\\\/?p=111#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/?p=111\",\"url\":\"https:\\\/\\\/press.tsu.ac.id\\\/?p=111\",\"name\":\"Konsep Ancaman dan Strategi Pertahanan Siber Berbasis Ethical Hacking - TSU Press\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/?p=111#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/?p=111#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/press.tsu.ac.id\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Cover-Buku-Dewa-Nicholas.jpg\",\"datePublished\":\"2026-05-09T16:18:09+00:00\",\"dateModified\":\"2026-05-09T16:19:08+00:00\",\"description\":\"Buku ini hadir sebagai panduan komprehensif yang membahas berbagai aspek fundamental dalam dunia ethical hacking dan keamanan siber. Materi disusun secara sistematis mulai dari pengenalan konsep ethical hacking, klasifikasi hacker, jenis-jenis ancaman, teknik eksploitasi, hingga metode pertahanan dan proses penetration testing. Tidak hanya teori, buku ini juga menyoroti elemen-elemen praktis seperti taktik, teknik, dan prosedur (TTPs), indikator kompromi (IoCs), serta langkah-langkah pemetaan kerentanan dan respon insiden. Sebagian pendekatan dan struktur visual dalam buku ini merupakan hasil pengembangan mandiri yang terinspirasi dari referensi materi\u00a0Ethical Hacking Essentials\u00a0terbitan EC-Council sebuah institusi global yang telah lama dikenal dalam pengembangan sertifikasi dan pendidikan di bidang keamanan siber.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/?p=111#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/press.tsu.ac.id\\\/?p=111\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/?p=111#primaryimage\",\"url\":\"https:\\\/\\\/press.tsu.ac.id\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Cover-Buku-Dewa-Nicholas.jpg\",\"contentUrl\":\"https:\\\/\\\/press.tsu.ac.id\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Cover-Buku-Dewa-Nicholas.jpg\",\"width\":680,\"height\":972},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/?p=111#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/press.tsu.ac.id\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Konsep Ancaman dan Strategi Pertahanan Siber Berbasis Ethical Hacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/#website\",\"url\":\"https:\\\/\\\/press.tsu.ac.id\\\/\",\"name\":\"TSU Press\",\"description\":\"Penerbit Perguruan Tinggi Universitas Tiga Serangkai\",\"publisher\":{\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/press.tsu.ac.id\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/#organization\",\"name\":\"TSU Press\",\"url\":\"https:\\\/\\\/press.tsu.ac.id\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/press.tsu.ac.id\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-Copilot_20260510_210702.png\",\"contentUrl\":\"https:\\\/\\\/press.tsu.ac.id\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-Copilot_20260510_210702.png\",\"width\":708,\"height\":233,\"caption\":\"TSU Press\"},\"image\":{\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/press.tsu.ac.id\\\/#\\\/schema\\\/person\\\/d2613ab28b14ea6b44a807279fffc36e\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e783ca462993a8f0877140a044f00de31a93f87fe9facce0ee182f34bc834cb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e783ca462993a8f0877140a044f00de31a93f87fe9facce0ee182f34bc834cb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e783ca462993a8f0877140a044f00de31a93f87fe9facce0ee182f34bc834cb?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/press.tsu.ac.id\"],\"url\":\"https:\\\/\\\/press.tsu.ac.id\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Konsep Ancaman dan Strategi Pertahanan Siber Berbasis Ethical Hacking - TSU Press","description":"Buku ini hadir sebagai panduan komprehensif yang membahas berbagai aspek fundamental dalam dunia ethical hacking dan keamanan siber. Materi disusun secara sistematis mulai dari pengenalan konsep ethical hacking, klasifikasi hacker, jenis-jenis ancaman, teknik eksploitasi, hingga metode pertahanan dan proses penetration testing. Tidak hanya teori, buku ini juga menyoroti elemen-elemen praktis seperti taktik, teknik, dan prosedur (TTPs), indikator kompromi (IoCs), serta langkah-langkah pemetaan kerentanan dan respon insiden. Sebagian pendekatan dan struktur visual dalam buku ini merupakan hasil pengembangan mandiri yang terinspirasi dari referensi materi\u00a0Ethical Hacking Essentials\u00a0terbitan EC-Council sebuah institusi global yang telah lama dikenal dalam pengembangan sertifikasi dan pendidikan di bidang keamanan siber.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/press.tsu.ac.id\/?p=111","og_locale":"en_US","og_type":"article","og_title":"Konsep Ancaman dan Strategi Pertahanan Siber Berbasis Ethical Hacking - TSU Press","og_description":"Buku ini hadir sebagai panduan komprehensif yang membahas berbagai aspek fundamental dalam dunia ethical hacking dan keamanan siber. Materi disusun secara sistematis mulai dari pengenalan konsep ethical hacking, klasifikasi hacker, jenis-jenis ancaman, teknik eksploitasi, hingga metode pertahanan dan proses penetration testing. Tidak hanya teori, buku ini juga menyoroti elemen-elemen praktis seperti taktik, teknik, dan prosedur (TTPs), indikator kompromi (IoCs), serta langkah-langkah pemetaan kerentanan dan respon insiden. Sebagian pendekatan dan struktur visual dalam buku ini merupakan hasil pengembangan mandiri yang terinspirasi dari referensi materi\u00a0Ethical Hacking Essentials\u00a0terbitan EC-Council sebuah institusi global yang telah lama dikenal dalam pengembangan sertifikasi dan pendidikan di bidang keamanan siber.","og_url":"https:\/\/press.tsu.ac.id\/?p=111","og_site_name":"TSU Press","article_published_time":"2026-05-09T16:18:09+00:00","article_modified_time":"2026-05-09T16:19:08+00:00","og_image":[{"width":680,"height":972,"url":"https:\/\/press.tsu.ac.id\/wp-content\/uploads\/2026\/05\/Cover-Buku-Dewa-Nicholas.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/press.tsu.ac.id\/?p=111#article","isPartOf":{"@id":"https:\/\/press.tsu.ac.id\/?p=111"},"author":{"name":"admin","@id":"https:\/\/press.tsu.ac.id\/#\/schema\/person\/d2613ab28b14ea6b44a807279fffc36e"},"headline":"Konsep Ancaman dan Strategi Pertahanan Siber Berbasis Ethical Hacking","datePublished":"2026-05-09T16:18:09+00:00","dateModified":"2026-05-09T16:19:08+00:00","mainEntityOfPage":{"@id":"https:\/\/press.tsu.ac.id\/?p=111"},"wordCount":113,"commentCount":0,"publisher":{"@id":"https:\/\/press.tsu.ac.id\/#organization"},"image":{"@id":"https:\/\/press.tsu.ac.id\/?p=111#primaryimage"},"thumbnailUrl":"https:\/\/press.tsu.ac.id\/wp-content\/uploads\/2026\/05\/Cover-Buku-Dewa-Nicholas.jpg","articleSection":["Katalog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/press.tsu.ac.id\/?p=111#respond"]}]},{"@type":"WebPage","@id":"https:\/\/press.tsu.ac.id\/?p=111","url":"https:\/\/press.tsu.ac.id\/?p=111","name":"Konsep Ancaman dan Strategi Pertahanan Siber Berbasis Ethical Hacking - TSU Press","isPartOf":{"@id":"https:\/\/press.tsu.ac.id\/#website"},"primaryImageOfPage":{"@id":"https:\/\/press.tsu.ac.id\/?p=111#primaryimage"},"image":{"@id":"https:\/\/press.tsu.ac.id\/?p=111#primaryimage"},"thumbnailUrl":"https:\/\/press.tsu.ac.id\/wp-content\/uploads\/2026\/05\/Cover-Buku-Dewa-Nicholas.jpg","datePublished":"2026-05-09T16:18:09+00:00","dateModified":"2026-05-09T16:19:08+00:00","description":"Buku ini hadir sebagai panduan komprehensif yang membahas berbagai aspek fundamental dalam dunia ethical hacking dan keamanan siber. Materi disusun secara sistematis mulai dari pengenalan konsep ethical hacking, klasifikasi hacker, jenis-jenis ancaman, teknik eksploitasi, hingga metode pertahanan dan proses penetration testing. Tidak hanya teori, buku ini juga menyoroti elemen-elemen praktis seperti taktik, teknik, dan prosedur (TTPs), indikator kompromi (IoCs), serta langkah-langkah pemetaan kerentanan dan respon insiden. Sebagian pendekatan dan struktur visual dalam buku ini merupakan hasil pengembangan mandiri yang terinspirasi dari referensi materi\u00a0Ethical Hacking Essentials\u00a0terbitan EC-Council sebuah institusi global yang telah lama dikenal dalam pengembangan sertifikasi dan pendidikan di bidang keamanan siber.","breadcrumb":{"@id":"https:\/\/press.tsu.ac.id\/?p=111#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/press.tsu.ac.id\/?p=111"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/press.tsu.ac.id\/?p=111#primaryimage","url":"https:\/\/press.tsu.ac.id\/wp-content\/uploads\/2026\/05\/Cover-Buku-Dewa-Nicholas.jpg","contentUrl":"https:\/\/press.tsu.ac.id\/wp-content\/uploads\/2026\/05\/Cover-Buku-Dewa-Nicholas.jpg","width":680,"height":972},{"@type":"BreadcrumbList","@id":"https:\/\/press.tsu.ac.id\/?p=111#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/press.tsu.ac.id\/"},{"@type":"ListItem","position":2,"name":"Konsep Ancaman dan Strategi Pertahanan Siber Berbasis Ethical Hacking"}]},{"@type":"WebSite","@id":"https:\/\/press.tsu.ac.id\/#website","url":"https:\/\/press.tsu.ac.id\/","name":"TSU Press","description":"Penerbit Perguruan Tinggi Universitas Tiga Serangkai","publisher":{"@id":"https:\/\/press.tsu.ac.id\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/press.tsu.ac.id\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/press.tsu.ac.id\/#organization","name":"TSU Press","url":"https:\/\/press.tsu.ac.id\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/press.tsu.ac.id\/#\/schema\/logo\/image\/","url":"https:\/\/press.tsu.ac.id\/wp-content\/uploads\/2026\/05\/cropped-Copilot_20260510_210702.png","contentUrl":"https:\/\/press.tsu.ac.id\/wp-content\/uploads\/2026\/05\/cropped-Copilot_20260510_210702.png","width":708,"height":233,"caption":"TSU Press"},"image":{"@id":"https:\/\/press.tsu.ac.id\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/press.tsu.ac.id\/#\/schema\/person\/d2613ab28b14ea6b44a807279fffc36e","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5e783ca462993a8f0877140a044f00de31a93f87fe9facce0ee182f34bc834cb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5e783ca462993a8f0877140a044f00de31a93f87fe9facce0ee182f34bc834cb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5e783ca462993a8f0877140a044f00de31a93f87fe9facce0ee182f34bc834cb?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/press.tsu.ac.id"],"url":"https:\/\/press.tsu.ac.id\/?author=1"}]}},"jetpack_featured_media_url":"https:\/\/press.tsu.ac.id\/wp-content\/uploads\/2026\/05\/Cover-Buku-Dewa-Nicholas.jpg","_links":{"self":[{"href":"https:\/\/press.tsu.ac.id\/index.php?rest_route=\/wp\/v2\/posts\/111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/press.tsu.ac.id\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/press.tsu.ac.id\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/press.tsu.ac.id\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/press.tsu.ac.id\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=111"}],"version-history":[{"count":1,"href":"https:\/\/press.tsu.ac.id\/index.php?rest_route=\/wp\/v2\/posts\/111\/revisions"}],"predecessor-version":[{"id":113,"href":"https:\/\/press.tsu.ac.id\/index.php?rest_route=\/wp\/v2\/posts\/111\/revisions\/113"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/press.tsu.ac.id\/index.php?rest_route=\/wp\/v2\/media\/112"}],"wp:attachment":[{"href":"https:\/\/press.tsu.ac.id\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/press.tsu.ac.id\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/press.tsu.ac.id\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}