{"id":6664,"date":"2025-10-31T16:14:33","date_gmt":"2025-10-31T16:14:33","guid":{"rendered":"https:\/\/keleaders.com\/?post_type=product&#038;p=6664"},"modified":"2025-10-31T16:14:33","modified_gmt":"2025-10-31T16:14:33","slug":"certified-cybersecurity-audit-professional-ccap","status":"publish","type":"product","link":"https:\/\/keleaders.com\/ar\/product\/certified-cybersecurity-audit-professional-ccap\/","title":{"rendered":"Certified Cybersecurity Audit Professional (CCAP)"},"content":{"rendered":"<h2><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Certified Cybersecurity Audit Professional (CCAP): Empowering Internal Auditors to Strengthen Organisational Cyber Resilience<\/span><\/strong><\/h2>\n<p>&nbsp;<\/p>\n<h3><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Course Overview<\/span><\/strong><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">In today\u2019s hyperconnected world, **cybersecurity is a core component of enterprise risk management and corporate governance**.<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">Internal auditors are now on the front line \u2014 ensuring that cyber threats are identified, managed, and mitigated through effective controls and governance mechanisms.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">The **<a href=\"https:\/\/keleaders.com\/?post_type=product&amp;p=6664&amp;preview=true\">Certified Cybersecurity Audit Professional (CCAP)<\/a>** course equips participants with **practical auditing techniques, governance frameworks, and assurance tools** to assess cyber risk and strengthen their organisation\u2019s cyber resilience.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Through interactive modules, case-based discussions, and real-world exercises, participants will gain the competence to evaluate cybersecurity governance, assess compliance with international frameworks, and deliver impactful audit findings that enhance organisational protection and preparedness.<\/span><\/p>\n<h3><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Course Objectives<\/span><\/strong><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">By the end of this programme, participants will be able to:<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">1. Understand key cyber security risks and governance frameworks.<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">2. Identify vulnerabilities and evaluate cyber control effectiveness.<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">3. Assess compliance with ISO 27001, NIST, COBIT, and GDPR standards.<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">4. Review incident response and vendor risk management frameworks.<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">5. Report and recommend strategic improvements to enhance cyber resilience.<\/span><\/p>\n<h3><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Learning Outcomes<\/span><\/strong><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Participants will be able to:<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">* Conduct a cyber-focused internal audit effectively.<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Identify and prioritise cyber threats and vulnerabilities.<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Evaluate organisational compliance with global standards.<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Strengthen awareness, prevention, and response strategies.<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Collaborate effectively with IT and cybersecurity professionals.<\/span><\/p>\n<h3><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Target Audience<\/span><\/strong><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">This course is ideal for:<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">* Internal Auditors and IT Auditors<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Risk and Compliance Officers<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Cyber Governance Professionals<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Audit Managers and Consultants<\/span><\/p>\n<h3><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Course Duration<\/span><\/strong><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">**5 Days (35 Guided Learning Hours)**<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">**Format:** In-person \/ Virtual (Instructor-led)<\/span><\/p>\n<h3><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Course Modules<\/span><\/strong><\/h3>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Module 1: Introduction to Cyber Security and the Auditor\u2019s Role<\/span><\/strong><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">* Understanding the cyber risk landscape<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Common types of cyber attacks<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* The auditor\u2019s role in cyber assurance<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Module 2: Cyber Risk Identification and Assessment<\/span><\/strong><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">* Identifying critical assets and vulnerabilities<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Developing and maintaining a cyber risk register<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Integrating cyber risk into enterprise risk management<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Module 3: Cyber Governance and Frameworks<\/span><\/strong><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">* Overview of ISO 27001, NIST, COBIT, IASME, and Cyber Essentials<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* GDPR and data protection compliance<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Aligning governance structures and policies<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Module 4: Evaluating Cyber Controls and Defences<\/span><\/strong><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">* Reviewing access management, encryption, and network defences<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Testing control effectiveness and identifying weaknesses<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Working with accredited cyber security partners<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Module 5: Human Risk and Awareness<\/span><\/strong><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">* Assessing staff awareness and behaviour<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Building a culture of cyber vigilance<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Evaluating employee training and awareness programmes<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Module 6: Incident Response and Business Continuity<\/span><\/strong><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">* Reviewing incident response frameworks and recovery plans<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Simulating cyber incidents and testing readiness<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Post-incident analysis and learning integration<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Module 7: Vendor and Third-Party Risk<\/span><\/strong><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">* Assessing supply chain vulnerabilities<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Reviewing vendor contracts and compliance obligations<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Case Study: Managing a vendor data breach<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Module 8: Reporting and Continuous Improvement<\/span><\/strong><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">* Writing effective audit reports and recommendations<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Communicating findings to senior leadership<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Building a continuous improvement cycle for cyber resilience<\/span><\/p>\n<h3><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Discussion-Based Questions and Model Answers<\/span><\/strong><\/h3>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">1. **Why involve internal auditors in cyber security assurance?**<\/span><\/strong><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">They provide independent oversight, identify control weaknesses, ensure compliance, and integrate cyber risks into enterprise frameworks.<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">2. **Difference between a cyber security assessment and audit?**<\/span><\/strong><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">Assessments identify vulnerabilities; audits test controls against standards for assurance.<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">3. **How can auditors assess cyber governance effectiveness?**<\/span><\/strong><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">By reviewing roles, policies, oversight, and alignment with ISO 27001 or NIST frameworks.<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">4. **What should auditors do during a cyber incident?**<\/span><\/strong><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">Observe, record, and review actions \u2014 not intervene operationally.<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">5. **Why is vendor risk management vital?**<\/span><\/strong><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">Vendors often access sensitive systems; weak controls can expose organisations to data breaches.<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">6. **How important is staff training for cyber resilience?**<\/span><\/strong><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">Crucial \u2014 human error drives most breaches; training reduces this risk.<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">7. **How can internal audit work with external cyber experts?**<\/span><\/strong><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">Collaborate on technical assessments and integrate findings into audit reports.<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">8. **Key elements of a strong incident response plan?**<\/span><\/strong><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">Defined roles, escalation, containment, recovery, and regular testing.<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">9. **How to ensure controls stay effective?**<\/span><\/strong><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">Conduct periodic reviews, follow-ups, and reassessments post-incident.<\/span><\/p>\n<p><strong><span style=\"font-family: arial, helvetica, sans-serif;\">10. **Main challenges in cyber security auditing?**<\/span><\/strong><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">Rapidly evolving threats, limited audit expertise, and weak IT\u2013audit collaboration.<\/span><\/p>\n<h3><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Certification<\/span><\/strong><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">\ud83c\udf93 **Certified Cybersecurity Audit Professional (CCAP)**<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">Awarded by **KeLeaders Training Centre, London**<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">This certification validates the participant\u2019s ability to assess, audit, and strengthen cybersecurity governance and resilience within any organisation.<\/span><\/p>\n<h3><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Key Benefits<\/span><\/strong><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">* Earn a professional certification in cyber auditing.<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Strengthen your audit and governance expertise.<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Gain practical tools for cyber risk assessment and assurance.<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Network with audit professionals across major European cities.<\/span><br \/>\n<span style=\"font-family: arial, helvetica, sans-serif;\">* Contribute to building a culture of cyber resilience within your organisation.<\/span><\/p>\n<h2><span style=\"font-size: 24px; font-family: arial, helvetica, sans-serif;\"><span style=\"color: #003300;\">Contact Info:<\/span><\/span><\/h2>\n<h6><span style=\"color: #000000; font-size: 12pt; font-family: arial, helvetica, sans-serif;\">\u00a0 \u00a0 \u00a0 \u00a0Enquiry at : admin@keleaders.com<\/span><\/h6>\n<h6><span style=\"font-family: arial, helvetica, sans-serif; color: #000000; font-size: 12pt;\">\u00a0 \u00a0 \u00a0 \u00a0Whatsapp: 0044 790 125 9494<\/span><\/h6>\n<h6><span style=\"font-family: arial, helvetica, sans-serif; color: #000000; font-size: 12pt;\">\u00a0 \u00a0 \u00a0 \u00a0For more details visit our website : www.keleaders.com<\/span><\/h6>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">\u00a0 \u00a0 \u00a0 \u00a0<div class=\"wpforms-container wpforms-container-full wpforms-render-modern\" id=\"wpforms-2255\"><form id=\"wpforms-form-2255\" class=\"wpforms-validate wpforms-form wpforms-ajax-form\" data-formid=\"2255\" method=\"post\" enctype=\"multipart\/form-data\" action=\"\/ar\/wp-json\/wp\/v2\/product\/6664\" data-token=\"77e2f7f6ffb5241e0b0d867bc05b1cc6\" data-token-time=\"1778709115\"><noscript class=\"wpforms-error-noscript\">Please enable JavaScript in your browser to complete this form.<\/noscript><div class=\"wpforms-hidden\" id=\"wpforms-error-noscript\">Please enable JavaScript in your browser to complete this form.<\/div><div class=\"wpforms-field-container\"><div id=\"wpforms-2255-field_1-container\" class=\"wpforms-field wpforms-field-name\" data-field-id=\"1\"><fieldset><legend class=\"wpforms-field-label\">Name <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/legend><div class=\"wpforms-field-row wpforms-field-large\"><div class=\"wpforms-field-row-block wpforms-first wpforms-one-half\"><input type=\"text\" id=\"wpforms-2255-field_1\" class=\"wpforms-field-name-first wpforms-field-required\" name=\"wpforms[fields][1][first]\" aria-errormessage=\"wpforms-2255-field_1-error\" required><label for=\"wpforms-2255-field_1\" class=\"wpforms-field-sublabel after\">First<\/label><\/div><div class=\"wpforms-field-row-block wpforms-one-half\"><input type=\"text\" id=\"wpforms-2255-field_1-last\" class=\"wpforms-field-name-last wpforms-field-required\" name=\"wpforms[fields][1][last]\" aria-errormessage=\"wpforms-2255-field_1-last-error\" required><label for=\"wpforms-2255-field_1-last\" class=\"wpforms-field-sublabel after\">Last<\/label><\/div><\/div><\/fieldset><\/div><div id=\"wpforms-2255-field_10-container\" class=\"wpforms-field wpforms-field-phone\" data-field-id=\"10\"><label class=\"wpforms-field-label\" for=\"wpforms-2255-field_10\">Phone<\/label><input type=\"tel\" id=\"wpforms-2255-field_10\" class=\"wpforms-field-large\" data-rule-int-phone-field=\"true\" name=\"wpforms[fields][10]\" aria-label=\"Phone\" aria-errormessage=\"wpforms-2255-field_10-error\" ><\/div><div id=\"wpforms-2255-field_2-container\" class=\"wpforms-field wpforms-field-email\" data-field-id=\"2\"><label class=\"wpforms-field-label\" for=\"wpforms-2255-field_2\">Email <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"email\" id=\"wpforms-2255-field_2\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][2]\" spellcheck=\"false\" aria-errormessage=\"wpforms-2255-field_2-error\" required><\/div><div id=\"wpforms-2255-field_17-container\" class=\"wpforms-field wpforms-field-select wpforms-field-select-style-classic\" data-field-id=\"17\"><label class=\"wpforms-field-label\" for=\"wpforms-2255-field_17\">Location<\/label><select id=\"wpforms-2255-field_17\" class=\"wpforms-field-large\" name=\"wpforms[fields][17]\"><option value=\"Dubai\" >Dubai<\/option><option value=\"London\" >London<\/option><option value=\"Madrid\" >Madrid<\/option><option value=\"Paris\" >Paris<\/option><option value=\"Rome\" >Rome<\/option><\/select><\/div><div id=\"wpforms-2255-field_7-container\" class=\"wpforms-field wpforms-field-textarea\" data-field-id=\"7\"><label class=\"wpforms-field-label\" for=\"wpforms-2255-field_7\">Enquiry<\/label><textarea id=\"wpforms-2255-field_7\" class=\"wpforms-field-medium\" name=\"wpforms[fields][7]\" aria-errormessage=\"wpforms-2255-field_7-error\" ><\/textarea><\/div><\/div><!-- .wpforms-field-container --><div class=\"wpforms-submit-container\" ><input type=\"hidden\" name=\"wpforms[id]\" value=\"2255\"><input type=\"hidden\" name=\"page_title\" value=\"\"><input type=\"hidden\" name=\"page_url\" value=\"https:\/\/keleaders.com\/ar\/wp-json\/wp\/v2\/product\/6664\"><button type=\"submit\" name=\"wpforms[submit]\" id=\"wpforms-submit-2255\" class=\"wpforms-submit\" data-alt-text=\"Sending...\" data-submit-text=\"Submit\" aria-live=\"assertive\" value=\"wpforms-submit\">Submit<\/button><img decoding=\"async\" src=\"https:\/\/keleaders.com\/wp-content\/plugins\/wpforms\/assets\/images\/submit-spin.svg\" class=\"wpforms-submit-spinner\" style=\"display: none;\" width=\"26\" height=\"26\" alt=\"Loading\"><\/div><\/form><\/div>  <!-- .wpforms-container --><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Certified Cybersecurity Audit Professional (CCAP): Empowering Internal Auditors to Strengthen Organisational Cyber Resilience &nbsp; Course Overview In today\u2019s hyperconnected world, [&hellip;]<\/p>\n","protected":false},"featured_media":6665,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"product_brand":[],"product_cat":[42],"product_tag":[],"class_list":{"0":"post-6664","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-accounting-and-finance","7":"desktop-align-left","8":"tablet-align-left","9":"mobile-align-left","11":"first","12":"instock","13":"shipping-taxable","14":"purchasable","15":"product-type-simple"},"acf":[],"_links":{"self":[{"href":"https:\/\/keleaders.com\/ar\/wp-json\/wp\/v2\/product\/6664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/keleaders.com\/ar\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/keleaders.com\/ar\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/keleaders.com\/ar\/wp-json\/wp\/v2\/comments?post=6664"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/keleaders.com\/ar\/wp-json\/wp\/v2\/media\/6665"}],"wp:attachment":[{"href":"https:\/\/keleaders.com\/ar\/wp-json\/wp\/v2\/media?parent=6664"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/keleaders.com\/ar\/wp-json\/wp\/v2\/product_brand?post=6664"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/keleaders.com\/ar\/wp-json\/wp\/v2\/product_cat?post=6664"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/keleaders.com\/ar\/wp-json\/wp\/v2\/product_tag?post=6664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}