{"id":46,"count":24,"description":"<p data-start=\"177\" data-end=\"394\">\u064a\u0642\u062f\u0645 \u0645\u0631\u0643\u0632 \u0645\u062f\u0649 \u0627\u0644\u0645\u0639\u0631\u0641\u0629 \u0644\u0644\u062a\u062f\u0631\u064a\u0628 \u0628\u0631\u0627\u0645\u062c \u0645\u062a\u062e\u0635\u0635\u0629 \u0641\u064a \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0648\u0623\u0645\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a\u060c \u062a\u0647\u062f\u0641 \u0625\u0644\u0649 \u062a\u0623\u0647\u064a\u0644 \u0627\u0644\u0645\u062a\u062f\u0631\u0628\u064a\u0646 \u0644\u062a\u0635\u0645\u064a\u0645 \u0648\u0625\u062f\u0627\u0631\u0629 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0648\u062d\u0645\u0627\u064a\u062a\u0647\u0627 \u0645\u0646 \u0627\u0644\u062a\u0647\u062f\u064a\u062f\u0627\u062a \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u0629 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0623\u062d\u062f\u062b \u0627\u0644\u062a\u0642\u0646\u064a\u0627\u062a \u0648\u0627\u0644\u0645\u0639\u0627\u064a\u064a\u0631 \u0627\u0644\u0639\u0627\u0644\u0645\u064a\u0629.<\/p>","link":"https:\/\/mada.edu.sa\/course-category\/networks-and-cybersecurity\/","name":"\u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0648\u0623\u0645\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a","slug":"networks-and-cybersecurity","taxonomy":"course_category","parent":33,"meta":[],"acf":[],"_links":{"self":[{"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/course_category\/46","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/course_category"}],"about":[{"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/taxonomies\/course_category"}],"up":[{"embeddable":true,"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/course_category\/33"}],"wp:post_type":[{"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/course?course_category=46"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}