{"id":39340,"date":"2026-01-15T19:37:04","date_gmt":"2026-01-15T16:37:04","guid":{"rendered":"https:\/\/finstockevarsity.com\/resources\/?p=39340"},"modified":"2026-01-15T20:03:45","modified_gmt":"2026-01-15T17:03:45","slug":"cyber-threats-in-kenya","status":"publish","type":"post","link":"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/","title":{"rendered":"Certified Ethical Hacker (CEH) at\u00a0Finstock\u00a0Evarsity: Course Review &#038; Outcomes"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p><span data-contrast=\"auto\">\u00a0Cybersecurity is no longer a \u201cnice to have\u201d skill in Kenya; it is a career necessity in a world where banks, telcos, startups, and government systems face daily cyber threats. That is why the\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><b><span data-contrast=\"none\">Certified Ethical Hacker<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0course has become one of the most searched and respected cybersecurity certifications today. At\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/\"><span data-contrast=\"none\">Finstock\u00a0Evarsity\u00a0College<\/span><\/a><span data-contrast=\"auto\">, this\u00a0programme\u00a0is positioned to help learners move from curiosity about hacking to professional, ethical, and employable cybersecurity\u00a0expertise.\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:100,&quot;335559739&quot;:100,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:100,&quot;335559739&quot;:100,&quot;335559740&quot;:240}\"> <img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" class=\" wp-image-39337 aligncenter\" src=\"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/image-40.png?resize=435%2C261&#038;ssl=1\" alt=\"\" width=\"435\" height=\"261\" srcset=\"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/image-40.png?w=532&amp;ssl=1 532w, https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/image-40.png?resize=300%2C180&amp;ssl=1 300w\" sizes=\"(max-width: 435px) 100vw, 435px\" \/><\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"auto\">What is the Certified Ethical Hacker course all about?<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><b><span data-contrast=\"none\">Certified Ethical Hacker<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0course trains learners to think like\u00a0hackers, but\u00a0act\u00a0legally and ethically. Instead of\u00a0breaking\u00a0systems for harm, students learn how cybercriminals attack networks so they can prevent, detect, and respond to those attacks. At\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/\"><span data-contrast=\"none\">Finstock\u00a0Evarsity<\/span><\/a><span data-contrast=\"auto\">, the focus is on real-world skills such as penetration testing, vulnerability assessment, network security, and system hardening. The training balances theory with hands-on labs, making the learning practical rather than abstract.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:100,&quot;335559739&quot;:100,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:100,&quot;335559739&quot;:100,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"auto\">Why should Kenyan students consider Certified Ethical Hacker at\u00a0Finstock\u00a0Evarsity?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:279}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">For Kenyan learners, relevance matters. The\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><b><span data-contrast=\"none\">Certified Ethical Hacker<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0programme\u00a0at\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/\"><span data-contrast=\"none\">Finstock\u00a0Evarsity<\/span><\/a><span data-contrast=\"auto\">\u00a0is designed with local and global job markets in mind. It supports students who want internationally\u00a0recognised\u00a0skills while still understanding regional cybersecurity challenges. The institution offers flexible learning modes, making it suitable for working professionals, university graduates, and career switchers. This accessibility is one of the strongest reasons many students choose\u00a0Finstock\u00a0Evarsity\u00a0for\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><b><span data-contrast=\"none\">Certified Ethical Hacker<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0training.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:100,&quot;335559739&quot;:100,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:100,&quot;335559739&quot;:100,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"auto\">What skills do you gain from the Certified Ethical Hacker course?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:279}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">By the end of the\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><b><span data-contrast=\"none\">Certified Ethical Hacker<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0course, students develop a strong technical foundation. You learn how to\u00a0identify\u00a0system weaknesses, secure networks, test applications, and understand cyberattack methodologies. Beyond technical skills, the course builds critical thinking and problem-solving abilities. Employers value this combination because\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><b><span data-contrast=\"none\">Certified Ethical Hacker<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0graduates are trained to protect systems proactively, not just react after damage has already occurred.\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<h2><span data-contrast=\"auto\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\" wp-image-39336 aligncenter\" src=\"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/image-41.png?resize=329%2C278&#038;ssl=1\" alt=\"\" width=\"329\" height=\"278\" srcset=\"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/image-41.png?w=376&amp;ssl=1 376w, https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/image-41.png?resize=300%2C254&amp;ssl=1 300w\" sizes=\"(max-width: 329px) 100vw, 329px\" \/><b><span data-contrast=\"auto\">How practical and industry-focused is the training?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:279}\">\u00a0<\/span><\/span><\/h2>\n<p><span data-contrast=\"auto\">One common concern among learners is whether the\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><b><span data-contrast=\"none\">Certified Ethical Hacker<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0course is practical enough. At\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><span data-contrast=\"none\">Finstock\u00a0Evarsity,<\/span><\/a><span data-contrast=\"auto\">\u00a0the training\u00a0emphasises\u00a0hands-on labs and real-life scenarios. Students work with tools used by professionals in the cybersecurity industry, helping them build confidence before entering the job market. This practical exposure ensures that\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><b><span data-contrast=\"none\">Certified Ethical Hacker<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0graduates are job-ready rather than purely theoretical.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:100,&quot;335559739&quot;:100,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:100,&quot;335559739&quot;:100,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"auto\">What career opportunities\u00a0open up\u00a0after\u00a0Certified\u00a0Ethical Hacker?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:279}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Completing the\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><b><span data-contrast=\"none\">Certified Ethical Hacker<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0course opens doors to several cybersecurity roles. Graduates can work as ethical hackers, cybersecurity analysts, penetration testers, or information security officers. In Kenya\u2019s growing digital economy,\u00a0organisations\u00a0increasingly require professionals who understand cyber risks. Holding a\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><b><span data-contrast=\"none\">Certified Ethical Hacker<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0credential improves employability both locally and internationally, especially for roles that demand trusted security\u00a0expertise.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:100,&quot;335559739&quot;:100,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:100,&quot;335559739&quot;:100,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"auto\">Is Certified Ethical Hacker suitable for beginners?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:279}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Many people assume\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><b><span data-contrast=\"none\">Certified Ethical Hacker<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0is only for advanced IT experts, but that is not entirely true. While basic computer and networking knowledge is helpful,\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><span data-contrast=\"none\">Finstock\u00a0Evarsity<\/span><\/a><span data-contrast=\"auto\">\u00a0structures the course to support learners at\u00a0different levels. The\u00a0programme\u00a0gradually builds concepts, making it accessible to motivated beginners while still challenging enough for experienced IT professionals pursuing\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><b><span data-contrast=\"none\">Certified Ethical Hacker<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0certification for career advancement.<\/span><\/p>\n<h2><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:100,&quot;335559739&quot;:100,&quot;335559740&quot;:240}\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\" wp-image-39338 aligncenter\" src=\"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/image-42.png?resize=457%2C249&#038;ssl=1\" alt=\"\" width=\"457\" height=\"249\" srcset=\"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/image-42.png?w=519&amp;ssl=1 519w, https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/image-42.png?resize=300%2C164&amp;ssl=1 300w\" sizes=\"(max-width: 457px) 100vw, 457px\" \/><b><span data-contrast=\"auto\">Is Certified Ethical Hacker at Finstock Evarsity worth it?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:100,&quot;335559739&quot;:100,&quot;335559740&quot;:240}\">\u00a0<\/span><\/span><\/h2>\n<p><span data-contrast=\"auto\">If you are serious about a future in cybersecurity, the\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><b><span data-contrast=\"none\">Certified Ethical Hacker<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0course at\u00a0Finstock\u00a0Evarsity\u00a0College is a strong investment. It combines\u00a0recognised\u00a0certification value, practical skills, and flexible learning suited to Kenyan learners. As cyber threats continue to rise, professionals with\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><b><span data-contrast=\"none\">Certified Ethical Hacker<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0training will remain in high demand.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:100,&quot;335559739&quot;:100,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">If you are ready to future-proof your career and step into the world of ethical cybersecurity, consider exploring the\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/programs\/college\/international-courses\/ec-council\/ceh\/\"><b><span data-contrast=\"none\">Certified Ethical Hacker<\/span><\/b><\/a><span data-contrast=\"auto\">\u00a0programme\u00a0at\u00a0<\/span><a href=\"https:\/\/finstockevarsity.com\/\"><span data-contrast=\"none\">Finstock\u00a0Evarsity<\/span><\/a><span data-contrast=\"auto\">\u00a0College and see how it can position you for long-term success.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:100,&quot;335559739&quot;:100,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:100,&quot;335559739&quot;:100,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<div class=\"fb-background-color\">\n\t\t\t  <div \n\t\t\t  \tclass = \"fb-comments\" \n\t\t\t  \tdata-href = \"http:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/\"\n\t\t\t  \tdata-numposts = \"10\"\n\t\t\t  \tdata-lazy = \"true\"\n\t\t\t\tdata-colorscheme = \"light\"\n\t\t\t\tdata-order-by = \"social\"\n\t\t\t\tdata-mobile=true>\n\t\t\t  <\/div><\/div>\n\t\t  <style>\n\t\t    .fb-background-color {\n\t\t\t\tbackground: #ffffff !important;\n\t\t\t}\n\t\t\t.fb_iframe_widget_fluid_desktop iframe {\n\t\t\t    width: 100% !important;\n\t\t\t}\n\t\t  <\/style>\n\t\t  ","protected":false},"excerpt":{"rendered":"<p>\u00a0Cybersecurity is no longer a \u201cnice to have\u201d skill in Kenya; it is a career necessity in a world where banks, telcos, startups, and government systems face daily cyber threats. That is why the\u00a0Certified Ethical Hacker\u00a0course has become one of the most searched and respected cybersecurity certifications today. At\u00a0Finstock\u00a0Evarsity\u00a0College, this\u00a0programme\u00a0is positioned to help learners move [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":39362,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3,38],"tags":[],"class_list":["post-39340","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-e-learning"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Certified Ethical Hacker (CEH) at\u00a0Finstock\u00a0Evarsity: Course Review &amp; Outcomes - Finstock Evarsity Resources<\/title>\n<meta name=\"description\" content=\"With rising cyber threats in Kenya, cybersecurity skills are in high demand across finance, telecoms, startups, and government.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Certified Ethical Hacker (CEH) at\u00a0Finstock\u00a0Evarsity: Course Review &amp; Outcomes - Finstock Evarsity Resources\" \/>\n<meta property=\"og:description\" content=\"With rising cyber threats in Kenya, cybersecurity skills are in high demand across finance, telecoms, startups, and government.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/\" \/>\n<meta property=\"og:site_name\" content=\"Finstock Evarsity Resources\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/finstockevarsity\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-15T16:37:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-15T17:03:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1005\" \/>\n\t<meta property=\"og:image:height\" content=\"604\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"CMS Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@evarsity\" \/>\n<meta name=\"twitter:site\" content=\"@evarsity\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CMS Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/cyber-threats-in-kenya\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/cyber-threats-in-kenya\\\/\"},\"author\":{\"name\":\"CMS Editor\",\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/#\\\/schema\\\/person\\\/d81e21dcb564ad244a1734af7b030ef1\"},\"headline\":\"Certified Ethical Hacker (CEH) at\u00a0Finstock\u00a0Evarsity: Course Review &#038; Outcomes\",\"datePublished\":\"2026-01-15T16:37:04+00:00\",\"dateModified\":\"2026-01-15T17:03:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/cyber-threats-in-kenya\\\/\"},\"wordCount\":629,\"publisher\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/cyber-threats-in-kenya\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/finstockevarsity.com\\\/resources\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/75.png?fit=1005%2C604&ssl=1\",\"articleSection\":[\"Blog\",\"E-learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/cyber-threats-in-kenya\\\/\",\"url\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/cyber-threats-in-kenya\\\/\",\"name\":\"Certified Ethical Hacker (CEH) at\u00a0Finstock\u00a0Evarsity: Course Review & Outcomes - Finstock Evarsity Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/cyber-threats-in-kenya\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/cyber-threats-in-kenya\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/finstockevarsity.com\\\/resources\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/75.png?fit=1005%2C604&ssl=1\",\"datePublished\":\"2026-01-15T16:37:04+00:00\",\"dateModified\":\"2026-01-15T17:03:45+00:00\",\"description\":\"With rising cyber threats in Kenya, cybersecurity skills are in high demand across finance, telecoms, startups, and government.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/cyber-threats-in-kenya\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/cyber-threats-in-kenya\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/cyber-threats-in-kenya\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/finstockevarsity.com\\\/resources\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/75.png?fit=1005%2C604&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/finstockevarsity.com\\\/resources\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/75.png?fit=1005%2C604&ssl=1\",\"width\":1005,\"height\":604},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/cyber-threats-in-kenya\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Certified Ethical Hacker (CEH) at\u00a0Finstock\u00a0Evarsity: Course Review &#038; Outcomes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/#website\",\"url\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/\",\"name\":\"Finstock Evarsity Resources\",\"description\":\"Your online e-resources portal\",\"publisher\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/#organization\",\"name\":\"Finstock Evarsity Resources\",\"url\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/finstockevarsity.com\\\/resources\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/full-logo-small.png?fit=473%2C403&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/finstockevarsity.com\\\/resources\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/full-logo-small.png?fit=473%2C403&ssl=1\",\"width\":473,\"height\":403,\"caption\":\"Finstock Evarsity Resources\"},\"image\":{\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/finstockevarsity\\\/\",\"https:\\\/\\\/x.com\\\/evarsity\",\"https:\\\/\\\/ke.linkedin.com\\\/in\\\/finstock-evarsity-75b147a0\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC529k6jSRuNDWF6cVmFjqCQ\",\"https:\\\/\\\/www.instagram.com\\\/finstockevarsity\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@finstockevarsitycollege\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/finstockevarsity.com\\\/resources\\\/#\\\/schema\\\/person\\\/d81e21dcb564ad244a1734af7b030ef1\",\"name\":\"CMS Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d4222f1c6904053c95740249d0c13e6e0ac08cf521f02f35b04ee43ce38aa32?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d4222f1c6904053c95740249d0c13e6e0ac08cf521f02f35b04ee43ce38aa32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d4222f1c6904053c95740249d0c13e6e0ac08cf521f02f35b04ee43ce38aa32?s=96&d=mm&r=g\",\"caption\":\"CMS Editor\"},\"sameAs\":[\"https:\\\/\\\/finstockevarsity.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Certified Ethical Hacker (CEH) at\u00a0Finstock\u00a0Evarsity: Course Review & Outcomes - Finstock Evarsity Resources","description":"With rising cyber threats in Kenya, cybersecurity skills are in high demand across finance, telecoms, startups, and government.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/","og_locale":"en_US","og_type":"article","og_title":"Certified Ethical Hacker (CEH) at\u00a0Finstock\u00a0Evarsity: Course Review & Outcomes - Finstock Evarsity Resources","og_description":"With rising cyber threats in Kenya, cybersecurity skills are in high demand across finance, telecoms, startups, and government.","og_url":"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/","og_site_name":"Finstock Evarsity Resources","article_publisher":"https:\/\/www.facebook.com\/finstockevarsity\/","article_published_time":"2026-01-15T16:37:04+00:00","article_modified_time":"2026-01-15T17:03:45+00:00","og_image":[{"width":1005,"height":604,"url":"https:\/\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png","type":"image\/png"}],"author":"CMS Editor","twitter_card":"summary_large_image","twitter_creator":"@evarsity","twitter_site":"@evarsity","twitter_misc":{"Written by":"CMS Editor","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/#article","isPartOf":{"@id":"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/"},"author":{"name":"CMS Editor","@id":"https:\/\/finstockevarsity.com\/resources\/#\/schema\/person\/d81e21dcb564ad244a1734af7b030ef1"},"headline":"Certified Ethical Hacker (CEH) at\u00a0Finstock\u00a0Evarsity: Course Review &#038; Outcomes","datePublished":"2026-01-15T16:37:04+00:00","dateModified":"2026-01-15T17:03:45+00:00","mainEntityOfPage":{"@id":"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/"},"wordCount":629,"publisher":{"@id":"https:\/\/finstockevarsity.com\/resources\/#organization"},"image":{"@id":"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png?fit=1005%2C604&ssl=1","articleSection":["Blog","E-learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/","url":"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/","name":"Certified Ethical Hacker (CEH) at\u00a0Finstock\u00a0Evarsity: Course Review & Outcomes - Finstock Evarsity Resources","isPartOf":{"@id":"https:\/\/finstockevarsity.com\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/#primaryimage"},"image":{"@id":"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png?fit=1005%2C604&ssl=1","datePublished":"2026-01-15T16:37:04+00:00","dateModified":"2026-01-15T17:03:45+00:00","description":"With rising cyber threats in Kenya, cybersecurity skills are in high demand across finance, telecoms, startups, and government.","breadcrumb":{"@id":"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/#primaryimage","url":"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png?fit=1005%2C604&ssl=1","contentUrl":"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png?fit=1005%2C604&ssl=1","width":1005,"height":604},{"@type":"BreadcrumbList","@id":"https:\/\/finstockevarsity.com\/resources\/cyber-threats-in-kenya\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/finstockevarsity.com\/resources\/"},{"@type":"ListItem","position":2,"name":"Certified Ethical Hacker (CEH) at\u00a0Finstock\u00a0Evarsity: Course Review &#038; Outcomes"}]},{"@type":"WebSite","@id":"https:\/\/finstockevarsity.com\/resources\/#website","url":"https:\/\/finstockevarsity.com\/resources\/","name":"Finstock Evarsity Resources","description":"Your online e-resources portal","publisher":{"@id":"https:\/\/finstockevarsity.com\/resources\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/finstockevarsity.com\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/finstockevarsity.com\/resources\/#organization","name":"Finstock Evarsity Resources","url":"https:\/\/finstockevarsity.com\/resources\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/finstockevarsity.com\/resources\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2018\/08\/full-logo-small.png?fit=473%2C403&ssl=1","contentUrl":"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2018\/08\/full-logo-small.png?fit=473%2C403&ssl=1","width":473,"height":403,"caption":"Finstock Evarsity Resources"},"image":{"@id":"https:\/\/finstockevarsity.com\/resources\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/finstockevarsity\/","https:\/\/x.com\/evarsity","https:\/\/ke.linkedin.com\/in\/finstock-evarsity-75b147a0","https:\/\/www.youtube.com\/channel\/UC529k6jSRuNDWF6cVmFjqCQ","https:\/\/www.instagram.com\/finstockevarsity\/","https:\/\/www.tiktok.com\/@finstockevarsitycollege"]},{"@type":"Person","@id":"https:\/\/finstockevarsity.com\/resources\/#\/schema\/person\/d81e21dcb564ad244a1734af7b030ef1","name":"CMS Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7d4222f1c6904053c95740249d0c13e6e0ac08cf521f02f35b04ee43ce38aa32?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7d4222f1c6904053c95740249d0c13e6e0ac08cf521f02f35b04ee43ce38aa32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d4222f1c6904053c95740249d0c13e6e0ac08cf521f02f35b04ee43ce38aa32?s=96&d=mm&r=g","caption":"CMS Editor"},"sameAs":["https:\/\/finstockevarsity.com\/"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png?fit=1005%2C604&ssl=1","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"rttpg_featured_image_url":{"full":["https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png?fit=1005%2C604&ssl=1",1005,604,false],"landscape":["https:\/\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png",1005,604,false],"portraits":["https:\/\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png",1005,604,false],"thumbnail":["https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png?resize=300%2C300&ssl=1",300,300,true],"medium":["https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png?fit=600%2C361&ssl=1",600,361,true],"large":["https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png?fit=900%2C541&ssl=1",900,541,true],"1536x1536":["https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png?fit=1005%2C604&ssl=1",1005,604,true],"2048x2048":["https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png?fit=1005%2C604&ssl=1",1005,604,true],"woocommerce_thumbnail":["https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png?fit=300%2C180&ssl=1",300,180,true],"woocommerce_single":["https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png?fit=600%2C361&ssl=1",600,361,true],"woocommerce_gallery_thumbnail":["https:\/\/i0.wp.com\/finstockevarsity.com\/resources\/wp-content\/uploads\/2026\/01\/75.png?resize=100%2C100&ssl=1",100,100,true]},"rttpg_author":{"display_name":"CMS Editor","author_link":"https:\/\/finstockevarsity.com\/resources\/author\/cmseditor\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/finstockevarsity.com\/resources\/category\/blog\/\" rel=\"category tag\">Blog<\/a> <a href=\"https:\/\/finstockevarsity.com\/resources\/category\/e-learning\/\" rel=\"category tag\">E-learning<\/a>","rttpg_excerpt":"\u00a0Cybersecurity is no longer a \u201cnice to have\u201d skill in Kenya; it is a career necessity in a world where banks, telcos, startups, and government systems face daily cyber threats. That is why the\u00a0Certified Ethical Hacker\u00a0course has become one of the most searched and respected cybersecurity certifications today. At\u00a0Finstock\u00a0Evarsity\u00a0College, this\u00a0programme\u00a0is positioned to help learners move&hellip;","_links":{"self":[{"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/posts\/39340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/comments?post=39340"}],"version-history":[{"count":1,"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/posts\/39340\/revisions"}],"predecessor-version":[{"id":39341,"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/posts\/39340\/revisions\/39341"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/media\/39362"}],"wp:attachment":[{"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/media?parent=39340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/categories?post=39340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/finstockevarsity.com\/resources\/wp-json\/wp\/v2\/tags?post=39340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}