{"id":245726,"date":"2025-02-13T13:02:58","date_gmt":"2025-02-13T13:02:58","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/penetration-testing-job\/"},"modified":"2025-02-13T13:02:58","modified_gmt":"2025-02-13T13:02:58","slug":"penetration-testing-job","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/penetration-testing-job\/","title":{"rendered":"5 Essential Skills for a Penetration Testing Job"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>The <strong>leaked password<\/strong> &#034;123456&#034; has made a notorious appearance in numerous <strong>data breaches<\/strong> over the years, often topping the list of the most commonly <strong>compromised passwords<\/strong>. It has been found in massive leaks from popular websites, highlighting users&#039; tendency to choose easily guessable passwords for their accounts. This is significant in the context of cybersecurity as it underscores the importance of creating <strong>strong, unique passwords<\/strong> to protect sensitive information. For users, the prevalence of such simple passwords serves as a stark reminder of the need for better security practices to safeguard against unauthorized access and potential identity theft.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-job\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-job\/#Programming_and_Scripting_Languages\" >Programming and Scripting Languages<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-job\/#Understanding_Network_Security_and_Infrastructure\" >Understanding Network Security and Infrastructure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-job\/#Threat_Assessment_and_Risk_Management\" >Threat Assessment and Risk Management<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-job\/#Security_Tool_Proficiency_and_Digital_Forensics\" >Security Tool Proficiency and Digital Forensics<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-job\/#Communication_and_Stakeholder_Engagement\" >Communication and Stakeholder Engagement<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-job\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-job\/#How_Long_Does_It_Typically_Take_to_Become_a_Professional_Penetration_Tester\" >How Long Does It Typically Take to Become a Professional Penetration Tester?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-job\/#What_Is_the_Average_Salary_Range_for_Entry-Level_Penetration_Testing_Positions\" >What Is the Average Salary Range for Entry-Level Penetration Testing Positions?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-job\/#Can_Penetration_Testing_Be_Learned_Entirely_Through_Self-Study_and_Certifications\" >Can Penetration Testing Be Learned Entirely Through Self-Study and Certifications?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-job\/#Are_Bug_Bounty_Programs_a_Good_Way_to_Gain_Penetration_Testing_Experience\" >Are Bug Bounty Programs a Good Way to Gain Penetration Testing Experience?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-job\/#Which_Industries_Have_the_Highest_Demand_for_Penetration_Testers\" >Which Industries Have the Highest Demand for Penetration Testers?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-job\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Proficiency in multiple programming languages including Python, Ruby, and C for developing custom security testing tools and scripts.<\/li>\n<li>Network infrastructure knowledge to understand system vulnerabilities, DNS, routers, and security protocols.<\/li>\n<li>Mastery of security assessment tools like Wireshark, Metasploit, and Burp Suite for effective penetration testing.<\/li>\n<li>Strong analytical skills to identify vulnerabilities, assess risks, and prioritize security threats systematically.<\/li>\n<li>Clear communication abilities to explain technical findings and recommendations to both technical and non-technical stakeholders.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Programming_and_Scripting_Languages\"><\/span>Programming and Scripting Languages<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Just like learning to speak different languages helps you make friends around the world, learning <strong>programming languages<\/strong> helps you become a super-smart computer detective!<\/p>\n<p>I love using <strong>Python<\/strong> &#8211; it&#039;s like having a magical wand that tells computers what to do. Have you ever played with building blocks? That&#039;s what coding is like!<\/p>\n<p>When I&#039;m testing websites, I use <strong>HTML and JavaScript<\/strong>, which are like the blueprint and remote control for web pages.<\/p>\n<p>Sometimes I need to be sneaky (in a good way!) and use <strong>SQL<\/strong> to check if databases are safe. It&#039;s like being a security guard at a digital playground!<\/p>\n<p>The coolest part? Each language has its own superpower. <strong>Ruby<\/strong> helps me test websites, while C lets me look deep inside computers like a tiny explorer with a magnifying glass!<\/p>\n<p><a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/bluegoatcyber.com\/blog\/key-programming-languages-for-penetration-testing-black-gray-and-white-box-testing\/\">White box testing<\/a> requires me to understand everything about how a program works, just like knowing all the secret passages in your favorite video game!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_Network_Security_and_Infrastructure\"><\/span>Understanding Network Security and Infrastructure<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Networks are like giant playgrounds where computers talk to each other! Just like you need to know the rules of tag or hide-and-seek, I need to understand how computers play nice together.<\/p>\n<p>Have you ever wondered how your favorite website shows up when you type its name? That&#039;s thanks to something called <strong>DNS<\/strong> &#8211; think of it as the <strong>internet&#039;s phone book<\/strong>!<\/p>\n<p>I love checking out all the cool gadgets in a network &#8211; <strong>routers, switches, and firewalls<\/strong>. They&#039;re like the playground equipment that keeps everyone safe and moving smoothly. Understanding these tools helps me perform <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/purplesec.us\/learn\/network-penetration-test\/\">vulnerability assessments<\/a> to find weak spots in the network, especially since <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-vs-two-factor-authentication\/\">MFA<\/a> can significantly enhance security measures.<\/p>\n<p>When I&#039;m testing <strong>network security<\/strong>, I&#039;m like a detective looking for <strong>hidden passages<\/strong>. I use special tools to peek at open doors (we call them ports) and make sure the bad guys can&#039;t sneak in. Pretty neat, right?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Threat_Assessment_and_Risk_Management\"><\/span>Threat Assessment and Risk Management<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that we comprehend how <strong>computers chat on networks<\/strong>, let&#039;s play detective and hunt for sneaky problems! It&#039;s like being a security guard at your favorite playground, looking for anything that could cause trouble.<\/p>\n<p>I scan for <strong>weak spots<\/strong> just like you&#039;d check your treehouse for loose boards. First, I use <strong>special tools<\/strong> (like a digital magnifying glass!) to find problems in computer systems. Then, I figure out which things need the <strong>most protection<\/strong> &#8211; kind of like deciding which Halloween candy to save for last! Regular testing helps uncover critical risks that could harm systems, and <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/importance-of-mfa\/\">multi-factor authentication<\/a> can serve as a crucial layer of defense against unauthorized access.<\/p>\n<p>You are aware how you make plans for rainy days? That&#039;s what I do with computers! I help companies <strong>prepare for cyber attacks<\/strong> by testing their defenses. It&#039;s like playing capture the flag, but with computer security!<\/p>\n<p>We even have <strong>different types of tests<\/strong> &#8211; some where we realize everything about the system, and others where we&#039;re totally in the dark.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Security_Tool_Proficiency_and_Digital_Forensics\"><\/span>Security Tool Proficiency and Digital Forensics<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let me share my special <strong>spy kit<\/strong> of computer tools with you! Just like you need different toys to play different games, I need special tools to keep computers safe.<\/p>\n<p>Have you ever used a magnifying glass to look for clues? That&#039;s what <strong>Wireshark<\/strong> does &#8211; it looks super close at everything happening on a computer network! MFA, or <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/what-does-mfa-stand-for-in-cyber-security\/\">Multi-Factor Authentication<\/a>, is a crucial security measure that helps protect sensitive data.<\/p>\n<p>I also use <strong>Metasploit<\/strong>, which is like playing pretend attacks to find weak spots &#8211; kind of like when you test if your pillow fort is strong enough!<\/p>\n<p>And <strong>Burp Suite<\/strong> (funny name, right?) helps me check if websites are secure, just like making sure all the doors and windows in your house are locked tight.<\/p>\n<p>Want to know the coolest part? I use a special computer system called <strong>Kali Linux<\/strong> that&#039;s packed with digital detective tools! We can write custom <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.webasha.com\/blog\/what-skills-do-i-need-to-become-a-penetration-tester-the-complete-guide\">Python scripts<\/a> to automate many of our security tests.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Communication_and_Stakeholder_Engagement\"><\/span>Communication and Stakeholder Engagement<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Communication in penetration testing is like being a friendly detective who shares clues with others! I need to talk clearly with everyone involved, just like when you explain the rules of a game to your friends. And guess what? Sometimes I have to be extra careful with secret information, just like keeping a surprise birthday party secret! The best part is that mastering these <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.infosecinstitute.com\/resources\/comptia-pentest\/comptia-pentest-domain-4-reporting-and-communication\/\">communication soft skills<\/a> helps advance your cybersecurity career.<\/p>\n<table>\n<thead>\n<tr>\n<th style=\"text-align: center\">What I Say<\/th>\n<th style=\"text-align: center\">Who I Talk To<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center\">Tech Talk<\/td>\n<td style=\"text-align: center\">Other Security Experts<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Simple Words<\/td>\n<td style=\"text-align: center\">Business Leaders<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Clear Reports<\/td>\n<td style=\"text-align: center\">Everyone Important<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Have you ever played &#034;telephone&#034; where messages get mixed up? That&#039;s why I always double-check that everyone understands what I&#039;m saying! I use pictures and diagrams to make things clear, just like how your teacher uses colorful charts in class. When I find problems, I explain them carefully and suggest fixes &#8211; it&#039;s like being a computer doctor!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Long_Does_It_Typically_Take_to_Become_a_Professional_Penetration_Tester\"><\/span>How Long Does It Typically Take to Become a Professional Penetration Tester?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;d say it takes about 2-3 years to become a professional <strong>penetration tester<\/strong>.<\/p>\n<p>Let me break it down for you! First, you&#039;ll need <strong>6-8 months<\/strong> to learn the basics like computers and coding.<\/p>\n<p>Then, you&#039;ll want to get some certifications &#8211; that&#039;s like earning badges in scouts!<\/p>\n<p>Finally, you&#039;ll need about a year of <strong>hands-on experience<\/strong>.<\/p>\n<p>Think of it like learning to ride a bike &#8211; practice makes perfect!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Is_the_Average_Salary_Range_for_Entry-Level_Penetration_Testing_Positions\"><\/span>What Is the Average Salary Range for Entry-Level Penetration Testing Positions?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you what <strong>entry-level penetration testers<\/strong> make &#8211; it&#039;s pretty exciting!<\/p>\n<p>In the US, you can expect between $70,200 to $76,042 starting out. That&#039;s like earning 7,000 pizza slices worth of money each month!<\/p>\n<p>Globally, the average is around $75,083. Isn&#039;t that cool? Different places pay differently though &#8211; in the UK it&#039;s about &#xA3;61,021, while in India it&#039;s &#x20B9;18,19,269.<\/p>\n<p>Fancy certifications and where you live can make these numbers go up!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Penetration_Testing_Be_Learned_Entirely_Through_Self-Study_and_Certifications\"><\/span>Can Penetration Testing Be Learned Entirely Through Self-Study and Certifications?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I believe you can learn <strong>penetration testing<\/strong> through self-study and certifications, but it&#039;ll take dedication!<\/p>\n<p>I&#039;d compare it to building a LEGO castle &#8211; you start with the basics and keep adding pieces.<\/p>\n<p>You&#039;ll need <strong>hands-on practice<\/strong> through labs, virtual machines, and CTF challenges.<\/p>\n<p>While formal education isn&#039;t required, having a <strong>mentor or community support<\/strong> makes the journey smoother.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Are_Bug_Bounty_Programs_a_Good_Way_to_Gain_Penetration_Testing_Experience\"><\/span>Are Bug Bounty Programs a Good Way to Gain Penetration Testing Experience?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ve found <strong>bug bounty programs<\/strong> are an excellent way to gain real <strong>penetration testing experience<\/strong>.<\/p>\n<p>You&#039;ll work on live systems, just like professional testers do. I love how they let you practice finding <strong>security problems<\/strong> while earning rewards.<\/p>\n<p>Think of it like being a detective &#8211; you&#039;re hunting for clues that could help protect websites.<\/p>\n<p>Plus, you&#039;ll learn from other security experts in the community.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Which_Industries_Have_the_Highest_Demand_for_Penetration_Testers\"><\/span>Which Industries Have the Highest Demand for Penetration Testers?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you where <strong>penetration testers<\/strong> are needed most!<\/p>\n<p>Banks and <strong>financial companies<\/strong> are always hiring because they need to protect your money &#8211; just like a super-secure piggy bank!<\/p>\n<p>Government agencies also need lots of testers to keep our country safe.<\/p>\n<p>Healthcare companies protecting patient information and online stores safeguarding your parent&#039;s credit cards are big employers too.<\/p>\n<p>Tech companies need testers to check their apps and software.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As you embark on your journey to becoming a proficient <strong>penetration tester<\/strong>, it&#039;s crucial to remember that securing your own digital assets is just as important as testing others&#039;. <strong>Password security<\/strong> is a vital aspect of cybersecurity that often gets overlooked. Weak passwords can lead to devastating breaches, which is why <strong>effective password management<\/strong> and passkey management are essential skills in this field.<\/p>\n<p>To enhance your security and protect your sensitive information, consider utilizing a robust password management system. By doing so, you&#039;ll streamline your <strong>password storage<\/strong> and ensure that you&#039;re using <strong>strong, unique passwords<\/strong> across all your accounts. Start by checking out <strong>LogMeOnce<\/strong>, which offers a comprehensive solution to manage your passwords effectively. You can sign up for a <strong>Free account<\/strong> today by visiting <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>. Equip yourself with the tools you need to stay secure as you delve deeper into the world of penetration testing and cybersecurity.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Investigate the crucial cybersecurity abilities you need to master for landing your dream penetration testing career today.<\/p>\n","protected":false},"author":5,"featured_media":245725,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[22128,36736,12662],"class_list":["post-245726","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-career-development","tag-cybersecurity-skills","tag-penetration-testing"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245726","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=245726"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245726\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/245725"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=245726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=245726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=245726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}