{"id":2701,"date":"2025-03-27T09:47:44","date_gmt":"2025-03-27T08:47:44","guid":{"rendered":"https:\/\/cyberoperations.hu\/?post_type=product&#038;p=2701"},"modified":"2025-03-27T09:47:44","modified_gmt":"2025-03-27T08:47:44","slug":"kibervedelmi-es-kiberhigieniai-trening","status":"publish","type":"product","link":"https:\/\/cyberoperations.hu\/en\/product\/kibervedelmi-es-kiberhigieniai-trening\/","title":{"rendered":"Cyber Security and Cyber Hygiene Training"},"content":{"rendered":"<p aria-level=\"3\"><span data-contrast=\"auto\">Cyber Operations\u2019 Cyber Security and Cyber Hygiene Training is a comprehensive, practice-oriented training that ensures your company\u2019s employees and leaders are up-to-date with modern cyber threats and defense strategies. The training aims to provide practical knowledge and tools for effective cybersecurity operations, whether it\u2019s proper software usage, office IT security design, or everyday cyber hygiene measures.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Training details:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83d\udccc Duration: 2 days<\/span><br \/>\n<span data-contrast=\"auto\"> \ud83d\udccc Location: On-site or online<\/span><br \/>\n<span data-contrast=\"auto\"> \ud83d\udccc Price: Based on individual quote<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">The training content:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83d\udd0d <\/span><b><span data-contrast=\"auto\">Cybersecurity basics and best practices<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> \u2013 Identifying the latest cyber threats and attack techniques<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Defense strategies and immediate reactions in case of incidents<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 System security basics and endpoint protection<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83d\udee0 <\/span><b><span data-contrast=\"auto\">Appropriate software and device usage<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> \u2013 What tools and software should be used for data security?<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Encryption and access management solutions<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Setting up VPN, multi-factor authentication and other protection mechanisms<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83c\udfe2 <\/span><b><span data-contrast=\"auto\">Creating a safe working environment<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> \u2013 IT security planning and design of a new office<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Remodeling an existing office according to modern cybersecurity requirements<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Establishing physical security, entry and network access rules<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83e\uddfc <\/span><b><span data-contrast=\"auto\">Cyber hygiene education<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> \u2013 Password rules and access management<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Recognizing and preventing social engineering attacks<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Protection against phishing and other common cybercrime techniques<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Security principles for mobile devices and remote working<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83d\udcca <\/span><b><span data-contrast=\"auto\">Cybersecurity audit and survey<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> \u2013 Assessment of the company\u2019s current cybersecurity status<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Identification of weak points and suggestions for improvements<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Preparation of a comprehensive cyber security overview at the end of the training<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><b><span data-contrast=\"none\">Cyber Operations expertise:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The training is provided by <\/span><b><span data-contrast=\"auto\">Cyber Operations Group Ltd.<\/span><\/b><span data-contrast=\"auto\"> is a nationally and internationally recognized player in the field of cyber security, regulatory compliance and technology education. The training and consulting are managed and supervised by two outstanding experts:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83e\udded <\/span><b><span data-contrast=\"auto\">\u00c1ron Par\u00e9j \u2013 Military and security engineering engineer, managing director<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Founder and CEO of Cyber Operations Group Ltd. His expertise is in the design of cyber defense systems and the coordinated development of corporate IT and physical security. He has gained his experience in defense industry projects and high-level strategic consulting, with a particular focus on critical infrastructure and corporate risk management.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u2696\ufe0f <\/span><b><span data-contrast=\"auto\">Dr. Antal Csev\u00e1r LL.M. \u2013 Artificial Intelligence and Technology Lawyer<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> During his career as a lawyer and legal advisor, he worked for several multinational financial companies, where he was responsible for developing data protection, regulatory and contractual systems. He was a member of the Corporate Governance Committee of the Budapest Stock Exchange for 10 years. In 2023, the Budapest Bar Association recognized his work with the Pro Excellentia award. He is also the Vice President of the National Association of Drone Pilots. His expertise is particularly valuable in the areas of legal compliance, data protection and technology regulations.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Who do we recommend it to?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u2714 For all companies that want to reduce the risk of cyberattacks<\/span><br \/>\n<span data-contrast=\"auto\"> \u2714 For organizations that want to increase cybersecurity awareness among their employees<\/span><br \/>\n<span data-contrast=\"auto\"> \u2714 For business leaders, IT security professionals and all employees who use digital devices in their daily work<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83d\udce9 <\/span><b><span data-contrast=\"auto\">Contact us for a customized quote and provide your employees with the most modern cyber protection and cyber hygiene knowledge - led by the best in the industry!<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>A Cyber Operations Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Oktat\u00e1sa egy \u00e1tfog\u00f3, gyakorlatorient\u00e1lt tr\u00e9ning, amely biztos\u00edtja, hogy v\u00e1llalat\u00e1nak munkav\u00e1llal\u00f3i \u00e9s vezet\u0151i naprak\u00e9szek legyenek [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"product_brand":[],"product_cat":[25],"product_tag":[],"class_list":{"0":"post-2701","1":"product","2":"type-product","3":"status-publish","5":"product_cat-uncategorized","6":"desktop-align-left","7":"tablet-align-left","8":"mobile-align-left","10":"first","11":"instock","12":"shipping-taxable","13":"product-type-simple"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Tr\u00e9ning - Cyber Operations Group Kft.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberoperations.hu\/en\/product\/cyber-protection-and-cyber-hygiene-training\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Tr\u00e9ning\" \/>\n<meta property=\"og:description\" content=\"A Cyber Operations Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Oktat\u00e1sa egy \u00e1tfog\u00f3, gyakorlatorient\u00e1lt tr\u00e9ning, amely biztos\u00edtja, hogy v\u00e1llalat\u00e1nak munkav\u00e1llal\u00f3i \u00e9s vezet\u0151i naprak\u00e9szek legyenek [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberoperations.hu\/en\/product\/cyber-protection-and-cyber-hygiene-training\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Operations Group Kft.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Price\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Availability\" \/>\n\t<meta name=\"twitter:data2\" content=\"In stock\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/en\\\/product\\\/cyber-protection-and-cyber-hygiene-training\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/en\\\/product\\\/cyber-protection-and-cyber-hygiene-training\\\/\",\"name\":\"Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Tr\u00e9ning - Cyber Operations Group Kft.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\"},\"datePublished\":\"2025-03-27T08:47:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/en\\\/product\\\/cyber-protection-and-cyber-hygiene-training\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberoperations.hu\\\/en\\\/product\\\/cyber-protection-and-cyber-hygiene-training\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/en\\\/product\\\/cyber-protection-and-cyber-hygiene-training\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Kezd\u0151lap\",\"item\":\"https:\\\/\\\/cyberoperations.hu\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\\\/\\\/cyberoperations.hu\\\/shop\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Tr\u00e9ning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"name\":\"Cyber Operations Group Kft.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberoperations.hu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\",\"name\":\"Cyber Operations Group Kft.\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"width\":1500,\"height\":400,\"caption\":\"Cyber Operations Group Kft.\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<meta property=\"product:price:currency\" content=\"EUR\" \/>\n<meta property=\"og:availability\" content=\"instock\" \/>\n<meta property=\"product:availability\" content=\"instock\" \/>\n<meta property=\"product:condition\" content=\"new\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Security and Cyber Hygiene Training - Cyber Operations Group Ltd.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberoperations.hu\/en\/product\/cyber-protection-and-cyber-hygiene-training\/","og_locale":"en_GB","og_type":"article","og_title":"Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Tr\u00e9ning","og_description":"A Cyber Operations Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Oktat\u00e1sa egy \u00e1tfog\u00f3, gyakorlatorient\u00e1lt tr\u00e9ning, amely biztos\u00edtja, hogy v\u00e1llalat\u00e1nak munkav\u00e1llal\u00f3i \u00e9s vezet\u0151i naprak\u00e9szek legyenek [&hellip;]","og_url":"https:\/\/cyberoperations.hu\/en\/product\/cyber-protection-and-cyber-hygiene-training\/","og_site_name":"Cyber Operations Group Kft.","twitter_card":"summary_large_image","twitter_misc":{"Price":"","Availability":"In stock"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberoperations.hu\/en\/product\/cyber-protection-and-cyber-hygiene-training\/","url":"https:\/\/cyberoperations.hu\/en\/product\/cyber-protection-and-cyber-hygiene-training\/","name":"Cyber Security and Cyber Hygiene Training - Cyber Operations Group Ltd.","isPartOf":{"@id":"https:\/\/cyberoperations.hu\/#website"},"datePublished":"2025-03-27T08:47:44+00:00","breadcrumb":{"@id":"https:\/\/cyberoperations.hu\/en\/product\/cyber-protection-and-cyber-hygiene-training\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberoperations.hu\/en\/product\/cyber-protection-and-cyber-hygiene-training\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberoperations.hu\/en\/product\/cyber-protection-and-cyber-hygiene-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Kezd\u0151lap","item":"https:\/\/cyberoperations.hu\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/cyberoperations.hu\/shop\/"},{"@type":"ListItem","position":3,"name":"Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Tr\u00e9ning"}]},{"@type":"WebSite","@id":"https:\/\/cyberoperations.hu\/#website","url":"https:\/\/cyberoperations.hu\/","name":"Cyber Operations Group Ltd.","description":"","publisher":{"@id":"https:\/\/cyberoperations.hu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberoperations.hu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/cyberoperations.hu\/#organization","name":"Cyber Operations Group Ltd.","url":"https:\/\/cyberoperations.hu\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","width":1500,"height":400,"caption":"Cyber Operations Group Kft."},"image":{"@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/"}}]},"product_price_currency":"EUR","og_availability":"instock","product_availability":"instock","product_condition":"new"},"_links":{"self":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/product\/2701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/types\/product"}],"version-history":[{"count":0,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/product\/2701\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/media?parent=2701"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/product_brand?post=2701"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/product_cat?post=2701"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/product_tag?post=2701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}