{"id":32460,"date":"2023-07-31T10:49:48","date_gmt":"2023-07-31T10:49:48","guid":{"rendered":"https:\/\/www.cyberguru.it\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/"},"modified":"2023-08-24T13:44:10","modified_gmt":"2023-08-24T13:44:10","slug":"the-foundations-of-effective-training-the-theory-of-cognitive-load","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/","title":{"rendered":"The foundations of effective training: the theory of cognitive load"},"content":{"rendered":"\n<p>Second appointment with Maurizio Zacchi (<a href=\"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/trainings-are-not-all-created-equally-technology-with-a-human-face\/\" target=\"_blank\" rel=\"noreferrer noopener\">here is the first interview<\/a>), director of the <em>Cyber Guru<\/em> Cyber Academy.<\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;The strength of effective corporate training on cybersecurity&#8221; \u2013 explains <strong>Maurizio Zacchi, Academy Director of Cyber Guru<\/strong> \u2013 &#8220;is to generate substantial and permanent changes in the behaviour of employees, considering that it is precisely the human factor that is the vulnerability through which cybercrime manages to break down protective barriers&#8221;.<\/p>\n<\/blockquote>\n\n<p>More so than worrying about the contents of what is taught, it is important to check the level of learning, and therefore to understand if the teaching will actually arrive, and in the right way, at its destination. That is, if it will generate substantial and permanent changes in behaviour. What matters, therefore, is how effective the teaching method is and that it ensures that the teaching subject matter will be consolidated in the habits of the &#8220;learners&#8221;, becoming an integral part of the digital posture of each individual&#8221;.<\/p>\n\n<p>To achieve this, relying on the most innovative learning theories is necessary. Among these is undoubtedly that of &#8220;<strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Cognitive_load\" target=\"_blank\" rel=\"noreferrer noopener\">cognitive load<\/a><\/strong>&#8220;, developed at the end of the 1980s by John Sweller, which reconstructs the way we learn, highlighting the importance of aligning learning with human cognitive architecture. Cognitive load refers to <strong>the effort used in working memory that is related to the amount of information that the working memory can store at the same time<\/strong>. In fact, working memory has a limited capacity, educational methods must avoid overloading it with activities that do not directly and effectively contribute to learning.<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>Our mental space is like a computer&#8217;s memory: if it is too full, it freezes.<\/strong><\/h2>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;First of all&#8221; \u2013 explains Zacchi \u2013 &#8220;we must take into account that computer security training is aimed at adults who already lead daily lives that are overloaded with mental commitments, and thus risk finding themselves with little energy and availability to devote to training&#8221;.<\/p>\n<\/blockquote>\n\n<p>According to the theory of cognitive load, in fact, everything happens inside a container that is our &#8220;working memory&#8221;. It&#8217;s a bit like computer memory: if we overload it, the device will crash. Our brains work a little bit in the same way. For this reason, it is necessary to take into account the availability of &#8220;memory&#8221; that can be used to transmit new concepts. Filling an already-full container does not offer any benefit.<\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;Working memory&#8221; \u2013 continues Zacchi \u2013 &#8220;must be continuously related to long-term memory, a relationship that good training must be able to manage in the most efficient way. To do this, we need to know what elements weigh on the memory of those who have to undertake the learning process and what needs to be done to optimise the entire learning process&#8221;.<\/p>\n<\/blockquote>\n\n<h2 class=\"wp-block-heading\"><strong>The right training is short and focused<\/strong><\/h2>\n\n<p>Effective training is therefore divided into many small parts (<strong>microlearning<\/strong>) and focused from time to time on a single topic (<strong>self-contained modules<\/strong>). This is because the brain learns more if it is not overloaded and if it can concentrate on a single focus. <\/p>\n\n<p>So, it is much better to have many small lessons of a few minutes each, spread over a year rather than eight hours in a row on a one-off occasion.<\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;A training&#8221; \u2013 says Zacchi \u2013 &#8220;that is focused on the short term may seem easier to organise, compared to a training programme spread over the long term, as part of a permanent training approach. But the results are radically different. In the first option, in most cases, the information will be lost and forgotten, in the second it will be transformed into a behavioural approach that will have tangible repercussions on corporate security&#8221;.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>The Theory of Cognitive Load, the strength of effective corporate training. Effective training is divided into many small parts (microlearning) and focused from time to time on a single topic (self-contained modules)&#8230;<\/p>\n","protected":false},"author":16,"featured_media":32245,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[717,422],"tags":[657,468,470],"class_list":["post-32460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-elearning-expert-talks-en","category-blog-en","tag-cyber-guru-en","tag-cyber-security-en-2","tag-cyber-security-awareness-en-3"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The foundations of effective training: the theory of cognitive load<\/title>\n<meta name=\"description\" content=\"Effective training is divided into many small parts (microlearning) and focused from time to time on a single topic (self-contained modules).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The foundations of effective training: the theory of cognitive load\" \/>\n<meta property=\"og:description\" content=\"Effective training is divided into many small parts (microlearning) and focused from time to time on a single topic (self-contained modules).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-31T10:49:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-24T13:44:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/07\/carico-cognitivo.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"simona derubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"simona derubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/07\\\/31\\\/the-foundations-of-effective-training-the-theory-of-cognitive-load\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/07\\\/31\\\/the-foundations-of-effective-training-the-theory-of-cognitive-load\\\/\"},\"author\":{\"name\":\"simona derubis\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"headline\":\"The foundations of effective training: the theory of cognitive load\",\"datePublished\":\"2023-07-31T10:49:48+00:00\",\"dateModified\":\"2023-08-24T13:44:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/07\\\/31\\\/the-foundations-of-effective-training-the-theory-of-cognitive-load\\\/\"},\"wordCount\":608,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/07\\\/31\\\/the-foundations-of-effective-training-the-theory-of-cognitive-load\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/carico-cognitivo.webp\",\"keywords\":[\"Cyber Guru\",\"Cyber Security\",\"Cyber Security Awareness\"],\"articleSection\":[\"eLearning Expert Talks\",\"Security Awareness\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/07\\\/31\\\/the-foundations-of-effective-training-the-theory-of-cognitive-load\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/07\\\/31\\\/the-foundations-of-effective-training-the-theory-of-cognitive-load\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/07\\\/31\\\/the-foundations-of-effective-training-the-theory-of-cognitive-load\\\/\",\"name\":\"The foundations of effective training: the theory of cognitive load\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/07\\\/31\\\/the-foundations-of-effective-training-the-theory-of-cognitive-load\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/07\\\/31\\\/the-foundations-of-effective-training-the-theory-of-cognitive-load\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/carico-cognitivo.webp\",\"datePublished\":\"2023-07-31T10:49:48+00:00\",\"dateModified\":\"2023-08-24T13:44:10+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"description\":\"Effective training is divided into many small parts (microlearning) and focused from time to time on a single topic (self-contained modules).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/07\\\/31\\\/the-foundations-of-effective-training-the-theory-of-cognitive-load\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/07\\\/31\\\/the-foundations-of-effective-training-the-theory-of-cognitive-load\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/07\\\/31\\\/the-foundations-of-effective-training-the-theory-of-cognitive-load\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/carico-cognitivo.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/carico-cognitivo.webp\",\"width\":1200,\"height\":800,\"caption\":\"La teoria del carico cognitivo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2023\\\/07\\\/31\\\/the-foundations-of-effective-training-the-theory-of-cognitive-load\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The foundations of effective training: the theory of cognitive load\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\",\"name\":\"simona derubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"caption\":\"simona derubis\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/simona-derubis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The foundations of effective training: the theory of cognitive load","description":"Effective training is divided into many small parts (microlearning) and focused from time to time on a single topic (self-contained modules).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/","og_locale":"en_US","og_type":"article","og_title":"The foundations of effective training: the theory of cognitive load","og_description":"Effective training is divided into many small parts (microlearning) and focused from time to time on a single topic (self-contained modules).","og_url":"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2023-07-31T10:49:48+00:00","article_modified_time":"2023-08-24T13:44:10+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/07\/carico-cognitivo.webp","type":"image\/webp"}],"author":"simona derubis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"simona derubis","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/"},"author":{"name":"simona derubis","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"headline":"The foundations of effective training: the theory of cognitive load","datePublished":"2023-07-31T10:49:48+00:00","dateModified":"2023-08-24T13:44:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/"},"wordCount":608,"commentCount":0,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/07\/carico-cognitivo.webp","keywords":["Cyber Guru","Cyber Security","Cyber Security Awareness"],"articleSection":["eLearning Expert Talks","Security Awareness"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/","url":"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/","name":"The foundations of effective training: the theory of cognitive load","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/07\/carico-cognitivo.webp","datePublished":"2023-07-31T10:49:48+00:00","dateModified":"2023-08-24T13:44:10+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"description":"Effective training is divided into many small parts (microlearning) and focused from time to time on a single topic (self-contained modules).","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/07\/carico-cognitivo.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/07\/carico-cognitivo.webp","width":1200,"height":800,"caption":"La teoria del carico cognitivo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2023\/07\/31\/the-foundations-of-effective-training-the-theory-of-cognitive-load\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"The foundations of effective training: the theory of cognitive load"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484","name":"simona derubis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","caption":"simona derubis"},"url":"https:\/\/www.cyberguru.it\/en\/author\/simona-derubis\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/32460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=32460"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/32460\/revisions"}],"predecessor-version":[{"id":32463,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/32460\/revisions\/32463"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/32245"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=32460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=32460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=32460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}