{"id":4940,"date":"2020-07-08T01:01:00","date_gmt":"2020-07-07T20:31:00","guid":{"rendered":"https:\/\/www.apk.co.ir\/video\/?p=4940"},"modified":"2020-08-22T11:10:32","modified_gmt":"2020-08-22T06:40:32","slug":"improve-government-cybersecurity-postures-with-vmware-cyber-range","status":"publish","type":"post","link":"https:\/\/www.apk.co.ir\/video\/improve-government-cybersecurity-postures-with-vmware-cyber-range\/","title":{"rendered":"\u0628\u0647\u0628\u0648\u062f \u0648\u0636\u0639\u06cc\u062a \u0627\u0645\u0646\u06cc\u062a\u06cc \u062f\u0648\u0644\u062a\u200c\u0647\u0627 \u0628\u0627 \u0631\u0627\u0647\u06a9\u0627\u0631 Cyber Range \u0634\u0631\u06a9\u062a VMware"},"content":{"rendered":"\n
\u0631\u0627\u0647\u06a9\u0627\u0631 Cyber Range<\/a> \u0627\u0632 \u0634\u0631\u06a9\u062a VMware<\/a> \u06a9\u0647 \u0628\u0631\u0627\u06cc \u062d\u0641\u0638 \u0627\u0645\u0646\u06cc\u062a \u062f\u0648\u0644\u062a\u200c\u0647\u0627 \u0637\u0631\u0627\u062d\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u0648\u0627\u0642\u0639\u06cc \u0631\u0627 \u0634\u0628\u06cc\u0647\u200c\u0633\u0627\u0632\u06cc \u06a9\u0631\u062f\u0647 \u0648 \u0628\u0647 \u062a\u06cc\u0645\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u062a\u0648\u0627\u0646\u0627\u06cc\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc\u060c \u062a\u062c\u0632\u06cc\u0647 \u0648 \u062a\u062d\u0644\u06cc\u0644 \u0648 \u067e\u0627\u0633\u062e \u0641\u0639\u0627\u0644 \u0648 \u0622\u06cc\u0646\u062f\u0647\u200c\u0646\u06af\u0631\u0627\u0646\u0647 \u0628\u0647 \u062d\u0645\u0644\u0627\u062a \u0631\u0627 \u0628\u062f\u0647\u062f.<\/p>\n","protected":false},"excerpt":{"rendered":" \u0631\u0627\u0647\u06a9\u0627\u0631 Cyber Range \u0627\u0632 \u0634\u0631\u06a9\u062a VMware \u06a9\u0647 \u0628\u0631\u0627\u06cc \u062d\u0641\u0638 \u0627\u0645\u0646\u06cc\u062a \u062f\u0648\u0644\u062a\u200c\u0647\u0627 \u0637\u0631\u0627\u062d\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u0648\u0627\u0642\u0639\u06cc \u0631\u0627 \u0634\u0628\u06cc\u0647\u200c\u0633\u0627\u0632\u06cc \u06a9\u0631\u062f\u0647 \u0648 \u0628\u0647 \u062a\u06cc\u0645\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u062a\u0648\u0627\u0646\u0627\u06cc\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc\u060c \u062a\u062c\u0632\u06cc\u0647 \u0648 \u062a\u062d\u0644\u06cc\u0644 \u0648 \u067e\u0627\u0633\u062e \u0641\u0639\u0627\u0644 \u0648 \u0622\u06cc\u0646\u062f\u0647\u200c\u0646\u06af\u0631\u0627\u0646\u0647 \u0628\u0647 \u062d\u0645\u0644\u0627\u062a \u0631\u0627 \u0628\u062f\u0647\u062f.<\/p>\n","protected":false},"author":1002946,"featured_media":4929,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"video","meta":{"footnotes":""},"categories":[1],"tags":[1595,1596,1598,1597],"cactus_badges":[],"video-series":[],"class_list":{"0":"post-4940","1":"post","2":"type-post","3":"status-publish","4":"format-video","5":"has-post-thumbnail","7":"category-security","8":"tag-cyber-range","9":"tag-cyber-range-","10":"tag--cyber-range","12":"post_format-post-format-video"},"yoast_head":"\n