{"id":20906,"date":"2024-07-29T10:28:50","date_gmt":"2024-07-29T08:28:50","guid":{"rendered":"https:\/\/digitalschoolofmarketing.co.za\/?page_id=20906"},"modified":"2024-07-29T10:29:42","modified_gmt":"2024-07-29T08:29:42","slug":"cyber-security-blog","status":"publish","type":"page","link":"https:\/\/digitalschoolofmarketing.co.za\/blog\/cyber-security-blog\/","title":{"rendered":"Cyber Security Blog"},"content":{"rendered":"<section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_2-1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-grid us_custom_5cd26a65 type_grid layout_275 cols_2 pagination_regular overflow_hidden\" id=\"us_grid_1\" style=\"--columns:2;--gap:1.5rem;\" data-filterable=\"true\"><style>@media (max-width:600px){#us_grid_1{--columns:1!important}}.layout_275 .w-grid-item-h{background:var(--color-content-bg);border-radius:0.3rem;box-shadow:0 0.03rem 0.06rem rgba(0,0,0,0.1),0 0.1rem 0.3rem rgba(0,0,0,0.1);transition-duration:0.3s}.no-touch .layout_275 .w-grid-item-h:hover{box-shadow:0 0.1rem 0.2rem rgba(0,0,0,0.1),0 0.33rem 1rem rgba(0,0,0,0.15);z-index:4}.layout_275 .usg_post_title_1{font-size:1.2rem!important;font-weight:700!important}.layout_275 .usg_vwrapper_1{padding:8%!important}.layout_275 .usg_post_content_1{padding-top:1rem!important;padding-bottom:1rem!important}.layout_275 .usg_btn_1{max-width:100%!important;min-width:100%!important}<\/style><div class=\"w-grid-list\">\t<article class=\"w-grid-item size_1x1 post-24366 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security-blog\" data-id=\"24366\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/cyber-security-guide-to-password-hygiene\/\" class=\"w-grid-item-anchor\" aria-label=\"Cyber Security Guide to Password Hygiene and Strong Credentials\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 gray-image stretched\"><a href=\"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/cyber-security-guide-to-password-hygiene\/\" aria-label=\"Cyber Security Guide to Password Hygiene and Strong Credentials\"><img loading=\"lazy\" decoding=\"async\" width=\"289\" height=\"200\" src=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/Cybersecurity-Guide-to-Password-Hygiene-and-Strong-Credentials-289x200.png\" class=\"attachment-us_300_200 size-us_300_200 wp-post-image\" alt=\"Digital School of Marketing-Cybersecurity\" srcset=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/Cybersecurity-Guide-to-Password-Hygiene-and-Strong-Credentials-289x200.png 289w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/Cybersecurity-Guide-to-Password-Hygiene-and-Strong-Credentials-300x208.png 300w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/Cybersecurity-Guide-to-Password-Hygiene-and-Strong-Credentials-1024x709.png 1024w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/Cybersecurity-Guide-to-Password-Hygiene-and-Strong-Credentials-768x532.png 768w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/Cybersecurity-Guide-to-Password-Hygiene-and-Strong-Credentials-600x415.png 600w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/Cybersecurity-Guide-to-Password-Hygiene-and-Strong-Credentials-e1759497685194.png 680w\" sizes=\"auto, (max-width: 289px) 100vw, 289px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><div class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/cyber-security-guide-to-password-hygiene\/\">Cyber Security Guide to Password Hygiene and Strong Credentials<\/a><\/div><div class=\"w-post-elm post_content usg_post_content_1\">Today, with sensitive data constantly at risk in the digital realm, cybersecurity is a pressing concern for both individuals and businesses. Although firewalls, encryption, and intrusion detection systems are integral to preventing breaches within networks, one fundamental line of defence is often neglected: maintaining good password practices when connecting to&hellip;<\/div><button class=\"w-btn us-btn-style_3 usg_btn_1\"><span class=\"w-btn-label\">Read More<\/span><\/button><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item size_1x1 post-24367 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security-blog\" data-id=\"24367\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/the-link-between-cybersecurity-and-brand-reputation\/\" class=\"w-grid-item-anchor\" aria-label=\"The Link Between Cybersecurity and Brand Reputation\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 gray-image stretched\"><a href=\"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/the-link-between-cybersecurity-and-brand-reputation\/\" aria-label=\"The Link Between Cybersecurity and Brand Reputation\"><img loading=\"lazy\" decoding=\"async\" width=\"289\" height=\"200\" src=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/The-Link-Between-Cybersecurity-and-Brand-Reputation-289x200.jpg\" class=\"attachment-us_300_200 size-us_300_200 wp-post-image\" alt=\"Digital School of Marketing-Cybersecurity\" srcset=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/The-Link-Between-Cybersecurity-and-Brand-Reputation-289x200.jpg 289w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/The-Link-Between-Cybersecurity-and-Brand-Reputation-300x208.jpg 300w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/The-Link-Between-Cybersecurity-and-Brand-Reputation-1024x709.jpg 1024w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/The-Link-Between-Cybersecurity-and-Brand-Reputation-768x532.jpg 768w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/The-Link-Between-Cybersecurity-and-Brand-Reputation-600x415.jpg 600w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/The-Link-Between-Cybersecurity-and-Brand-Reputation-e1759496497222.jpg 680w\" sizes=\"auto, (max-width: 289px) 100vw, 289px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><div class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/the-link-between-cybersecurity-and-brand-reputation\/\">The Link Between Cybersecurity and Brand Reputation<\/a><\/div><div class=\"w-post-elm post_content usg_post_content_1\">In the era of digital consumers who value brand loyalty and trust, overlooking cybersecurity is a luxury that businesses can no longer afford. Far from simply protecting data and, therefore, services, brands are directly impacted by cybersecurity. One breach can erode customer confidence, tarnish an organisation\u2019s reputation, and lead to&hellip;<\/div><button class=\"w-btn us-btn-style_3 usg_btn_1\"><span class=\"w-btn-label\">Read More<\/span><\/button><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item size_1x1 post-24368 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security-blog\" data-id=\"24368\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/social-media-platforms-are-handling-cybersecurity-threats\/\" class=\"w-grid-item-anchor\" aria-label=\"How Social Media Platforms Are Handling Cybersecurity Threats\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 gray-image stretched\"><a href=\"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/social-media-platforms-are-handling-cybersecurity-threats\/\" aria-label=\"How Social Media Platforms Are Handling Cybersecurity Threats\"><img loading=\"lazy\" decoding=\"async\" width=\"289\" height=\"200\" src=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/How-Social-Media-Platforms-Are-Handling-Cyber-Threats-289x200.png\" class=\"attachment-us_300_200 size-us_300_200 wp-post-image\" alt=\"Digital School of Marketing-Cybersecurity\" srcset=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/How-Social-Media-Platforms-Are-Handling-Cyber-Threats-289x200.png 289w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/How-Social-Media-Platforms-Are-Handling-Cyber-Threats-300x208.png 300w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/How-Social-Media-Platforms-Are-Handling-Cyber-Threats-1024x709.png 1024w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/How-Social-Media-Platforms-Are-Handling-Cyber-Threats-768x532.png 768w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/How-Social-Media-Platforms-Are-Handling-Cyber-Threats-600x415.png 600w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/How-Social-Media-Platforms-Are-Handling-Cyber-Threats-e1759494969671.png 680w\" sizes=\"auto, (max-width: 289px) 100vw, 289px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><div class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/social-media-platforms-are-handling-cybersecurity-threats\/\">How Social Media Platforms Are Handling Cybersecurity Threats<\/a><\/div><div class=\"w-post-elm post_content usg_post_content_1\">The advent of social media has brought about a revolution in our means of communication, information sharing and access to the world. From Facebook, Instagram, and TikTok to LinkedIn, billions of people log on every day to interact, learn, and spend money. As these systems become more influential, they risk&hellip;<\/div><button class=\"w-btn us-btn-style_3 usg_btn_1\"><span class=\"w-btn-label\">Read More<\/span><\/button><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item size_1x1 post-24369 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security-blog\" data-id=\"24369\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/importance-of-cybersecurity-metrics\/\" class=\"w-grid-item-anchor\" aria-label=\"The Importance of Cybersecurity Metrics and What to Measure\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 gray-image stretched\"><a href=\"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/importance-of-cybersecurity-metrics\/\" aria-label=\"The Importance of Cybersecurity Metrics and What to Measure\"><img loading=\"lazy\" decoding=\"async\" width=\"289\" height=\"200\" src=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/Cybersecurity-Metrics-What-to-Measure-and-Why-It-Matters-289x200.png\" class=\"attachment-us_300_200 size-us_300_200 wp-post-image\" alt=\"Digital School of Marketing-Cybersecurity\" srcset=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/Cybersecurity-Metrics-What-to-Measure-and-Why-It-Matters-289x200.png 289w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/Cybersecurity-Metrics-What-to-Measure-and-Why-It-Matters-300x208.png 300w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/Cybersecurity-Metrics-What-to-Measure-and-Why-It-Matters-1024x709.png 1024w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/Cybersecurity-Metrics-What-to-Measure-and-Why-It-Matters-768x532.png 768w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/Cybersecurity-Metrics-What-to-Measure-and-Why-It-Matters-600x415.png 600w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2025\/10\/Cybersecurity-Metrics-What-to-Measure-and-Why-It-Matters-e1759488032651.png 680w\" sizes=\"auto, (max-width: 289px) 100vw, 289px\" \/><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><div class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/importance-of-cybersecurity-metrics\/\">The Importance of Cybersecurity Metrics and What to Measure<\/a><\/div><div class=\"w-post-elm post_content usg_post_content_1\">In today\u2019s digital economy, businesses are being bombarded with increasingly sophisticated threats daily. Whether it be ransomware, phishing, insider threats or data breaches, the types of risks that companies face have never been higher. In her book, Erin acknowledges that we can\u2019t always avoid these challenges and need to invest&hellip;<\/div><button class=\"w-btn us-btn-style_3 usg_btn_1\"><span class=\"w-btn-label\">Read More<\/span><\/button><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n<\/div><div class=\"w-grid-preloader\">\t<div class=\"g-preloader type_1\">\r\n\t\t<div><\/div>\r\n\t<\/div>\r\n\t<\/div>\t\t\t<nav class=\"pagination navigation\" role=\"navigation\">\r\n\t\t\t\t<div class=\"nav-links custom us-nav-style_3\">\r\n\t\t\t\t\t<span aria-label=\"Page 1\" aria-current=\"page\" class=\"page-numbers current\"><span>1<\/span><\/span>\n<a aria-label=\"Page 2\" class=\"page-numbers\" href=\"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/pages\/20906\/page\/2\/\"><span>2<\/span><\/a>\n<a aria-label=\"Page 3\" class=\"page-numbers\" href=\"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/pages\/20906\/page\/3\/\"><span>3<\/span><\/a>\n<a aria-label=\"Page 4\" class=\"page-numbers\" href=\"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/pages\/20906\/page\/4\/\"><span>4<\/span><\/a>\n<span class=\"page-numbers dots\">&hellip;<\/span>\n<a aria-label=\"Page 10\" class=\"page-numbers\" href=\"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/pages\/20906\/page\/10\/\"><span>10<\/span><\/a>\n<a class=\"next page-numbers\" href=\"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/pages\/20906\/page\/2\/\"><span>Next<\/span><\/a>\t\t\t\t<\/div>\r\n\t\t\t<\/nav>\r\n\t\t\t\t<div class=\"w-grid-json hidden\" onclick='return {&quot;action&quot;:&quot;us_ajax_grid&quot;,&quot;infinite_scroll&quot;:0,&quot;max_num_pages&quot;:10,&quot;pagination&quot;:&quot;regular&quot;,&quot;template_vars&quot;:{&quot;columns&quot;:&quot;2&quot;,&quot;exclude_items&quot;:&quot;none&quot;,&quot;img_size&quot;:&quot;us_300_200&quot;,&quot;ignore_items_size&quot;:0,&quot;items_layout&quot;:&quot;275&quot;,&quot;items_offset&quot;:&quot;1&quot;,&quot;load_animation&quot;:&quot;none&quot;,&quot;overriding_link&quot;:&quot;%7B%22type%22%3A%22post%22%7D&quot;,&quot;post_id&quot;:0,&quot;query_args&quot;:{&quot;post_type&quot;:[&quot;post&quot;],&quot;tax_query&quot;:[{&quot;taxonomy&quot;:&quot;category&quot;,&quot;field&quot;:&quot;slug&quot;,&quot;terms&quot;:[&quot;cyber-security-blog&quot;]}],&quot;post_status&quot;:[&quot;publish&quot;,&quot;acf-disabled&quot;],&quot;posts_per_page&quot;:&quot;4&quot;},&quot;orderby_query_args&quot;:{&quot;orderby&quot;:{&quot;date&quot;:&quot;DESC&quot;}},&quot;type&quot;:&quot;grid&quot;,&quot;us_grid_post_type&quot;:&quot;post&quot;,&quot;us_grid_ajax_index&quot;:1,&quot;us_grid_filter_query_string&quot;:null,&quot;us_grid_index&quot;:1,&quot;page_args&quot;:[]}}'><\/div>\r\n\t<\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><section class=\"l-section wpb_row height_auto width_full\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-btn-wrapper align_justify\"><a class=\"w-btn us-btn-style_2\" href=\"#enquiry\"><span class=\"w-btn-label\">Enquire Today<\/span><\/a><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Blog Categories<\/span><\/span><\/h3><div class=\"wpb_text_column us_custom_5cd26a65\"><div class=\"wpb_wrapper\"><ul>\n<li class=\"cat-item cat-item-1\"><a href=\"\/blog\/content-marketing\/\">Content Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/digital-marketing\/\">Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/cyber-security-blog\/\">Cyber Security<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/graphic-design-blog\/\">Graphic Design<\/a><\/li>\n<li class=\"cat-item cat-item-3\"><a href=\"\/blog\/public-relations\/\">Public Relations<\/a><\/li>\n<li class=\"cat-item cat-item-4\"><a href=\"\/blog\/seo\/\">SEO<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/blog\/social-media-marketing\/\">Social Media Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/blog\/web-design-blog\/\">Web Design<\/a><\/li>\n<\/ul>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">You might also like<\/span><\/span><\/h3><div class=\"w-html\"><ul><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/social-media-marketing-blog\/zero-moment-of-truth-benefit-social-media-marketing\/\" rel=\"bookmark\">Use the Zero Moment of Truth to Benefit your Social Media Marketing<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/digital-marketing-blog\/your-complete-guide-to-ppc-marketing-basic\/\" rel=\"bookmark\">Your Complete Guide to PPC Marketing Basics. Find out more.<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/blog\/you-can-convey-a-lot-of-meaning-with-just-one-graphic\/\" rel=\"bookmark\">You Can Convey a Lot Of Meaning With Just One Graphic<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/digital-marketing-blog\/would-you-make-a-great-marketing-manager\/\" rel=\"bookmark\">Would you make a great marketing manager?<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/in-the-press\/win-with-bona-magazine-and-the-digital-school-of-marketing\/\" rel=\"bookmark\">Win with Bona Magazine and the Digital School of Marketing<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/in-the-press\/win-a-digital-marketing-course-valued-at-r12-000\/\" rel=\"bookmark\">Win a Digital Marketing Course Valued at  R12 000<\/a><\/li><\/ul><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Top Selling COurses<\/span><\/span><\/h3><div class=\"wpb_text_column us_custom_5cd26a65\"><div class=\"wpb_wrapper\"><ul>\n<li class=\"cat-item cat-item-1\"><a href=\"\/courses\/digital-marketing-course\/\">Intermediate Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/courses\/advanced-digital-marketing-course\/\">Advanced Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-3\"><a href=\"\/courses\/social-media-marketing-course\/\">Intermediate Social media marketing<\/a><\/li>\n<li class=\"cat-item cat-item-4\"><a href=\"\/courses\/digital-brand-management-course\/\">Brand Management<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/courses\/graphic-design-course\/\">Basic Graphic Design<\/a><\/li>\n<li class=\"cat-item cat-item-6\"><a href=\"\/courses\/advanced-graphic-design-course\/\">Advanced Graphic design<\/a><\/li>\n<li class=\"cat-item cat-item-7\"><a href=\"\/courses\/national-certificate-of-advertising\/\">National Certificate of Advertising<\/a><\/li>\n<li class=\"cat-item cat-item-8\"><a href=\"\/courses\/national-diploma-of-copywriting-course\/\">National Diploma of Copyrighting<\/a><\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n<\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":272,"featured_media":16569,"parent":17,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-20906","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/pages\/20906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/users\/272"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/comments?post=20906"}],"version-history":[{"count":0,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/pages\/20906\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/pages\/17"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/media\/16569"}],"wp:attachment":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/media?parent=20906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}