{"id":607,"date":"2023-09-10T10:06:55","date_gmt":"2023-09-10T03:06:55","guid":{"rendered":"https:\/\/vietsifo.vn\/?page_id=607"},"modified":"2023-10-06T13:55:19","modified_gmt":"2023-10-06T06:55:19","slug":"overall-network-security-architecture-consultant","status":"publish","type":"page","link":"https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/","title":{"rendered":"CYBERSECURITY ARCHITECTURE CONSULTANT"},"content":{"rendered":"  <div id=\"page-header-202094817\" class=\"page-header-wrapper\">\n  <div class=\"page-title uni-page-header dark featured-title\">\n\n        <div class=\"page-title-bg\">\n      <div class=\"title-bg fill bg-fill\"\n        data-parallax-container=\".page-title\"\n        data-parallax-background\n        data-parallax=\"-\">\n      <\/div>\n      <div class=\"title-overlay fill\"><\/div>\n    <\/div>\n    \n    <div class=\"page-title-inner container align-center flex-row medium-flex-wrap\" >\n              <div class=\"title-wrapper is-larger flex-col text-left medium-text-center\">\n          <h1 class=\"entry-title mb-0\">\n            D\u1ecbch v\u1ee5          <\/h1>\n        <\/div>\n                    <div class=\"title-content flex-col flex-right text-right medium-text-center\">\n        <div class=\"title-breadcrumbs pb-half pt-half\"><\/div>      <\/div>\n    <\/div>\n\n     \n<style>\n#page-header-202094817 .page-title-inner {\n  min-height: 200px;\n}\n#page-header-202094817 .title-bg {\n  background-image: url(https:\/\/vietsifo.vn\/wp-content\/uploads\/2023\/09\/Banner.jpg);\n}\n#page-header-202094817 .title-overlay {\n  background-color: rgba(255, 255, 255, 0);\n}\n@media (min-width:550px) {\n  #page-header-202094817 .page-title-inner {\n    min-height: 250px;\n  }\n}\n@media (min-width:850px) {\n  #page-header-202094817 .page-title-inner {\n    min-height: 300px;\n  }\n}\n<\/style>\n  <\/div>\n    <\/div>\n  \n\t<section class=\"section\" id=\"section_256300724\">\n\t\t<div class=\"bg section-bg fill bg-fill  bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\t<div id=\"gap-273434131\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-273434131 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row\"  id=\"row-869530079\">\n\n\t<div id=\"col-153332237\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner box-shadow-1\" style=\"background-color:rgb(255, 255, 255);\" >\n\t\t\t\n\t\t\t\n<div class=\"row align-middle\"  id=\"row-858369992\">\n\n\t<div id=\"col-559765733\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-1237832315\" class=\"text\">\n\t\t\n<h2>Cybersecurity architechture consultant<\/h2>\n\t\t\n<style>\n#text-1237832315 {\n  font-size: 1.3rem;\n}\n@media (min-width:850px) {\n  #text-1237832315 {\n    font-size: 1.614062540625rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n<p>Overall design and consulting services on Information Security (ANTT) are an important part of building and maintaining a safe and secure network environment. Security architects are experienced experts in the field of security and management of IT and security systems, such as having knowledge of ITIL (Information Technology Infrastructure Library) and ISMS (Information Security Management System), capable of The ability to provide the necessary support for organizations to build and maintain an effective and organized security and order system.<\/p>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1211493376\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover brd-15 x md-x lg-x y md-y lg-y\" id=\"image_496687899\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img width=\"810\" height=\"450\" src=\"https:\/\/vietsifo.vn\/wp-content\/uploads\/2023\/09\/bao-ve-an-ninh-mang-cho-doanh-nghiep-1.png\" class=\"attachment-large size-large\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/vietsifo.vn\/wp-content\/uploads\/2023\/09\/bao-ve-an-ninh-mang-cho-doanh-nghiep-1.png 810w, https:\/\/vietsifo.vn\/wp-content\/uploads\/2023\/09\/bao-ve-an-ninh-mang-cho-doanh-nghiep-1-300x167.png 300w, https:\/\/vietsifo.vn\/wp-content\/uploads\/2023\/09\/bao-ve-an-ninh-mang-cho-doanh-nghiep-1-768x427.png 768w\" sizes=\"(max-width: 810px) 100vw, 810px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_496687899 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-153332237 > .col-inner {\n  padding: 30px 30px 0px 30px;\n  border-radius: 15px;\n}\n@media (min-width:850px) {\n  #col-153332237 > .col-inner {\n    padding: 40px 40px 10px 40px;\n  }\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n\t<div id=\"gap-522677120\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-522677120 {\n  padding-top: 60px;\n}\n@media (min-width:550px) {\n  #gap-522677120 {\n    padding-top: 30px;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row\"  id=\"row-515284884\">\n\n\t<div id=\"col-1768595336\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<p>Important points about overall architectural security consulting include:<\/p>\n<ol>\n<li>\n<div><strong>Understand the Organization:<\/strong> The Security Architect needs to conduct a specific analysis of the organization to understand the specific needs, environment and risks of each organization. This includes identifying critical assets, sensitive data, and potential vulnerabilities.<\/div>\n<\/li>\n<li>\n<div><strong>Risk Analysis:<\/strong> Based on an understanding of the organization, the security architect must perform risk analysis to identify potential threats and vulnerabilities in the system. They also need to prioritize each risk to focus on the most important issues.<\/div>\n<\/li>\n<li>\n<div><strong>Designing Information Security Architecture:<\/strong> Based on risk analysis and organizational needs, the information security architect is responsible for designing an appropriate information security architecture. This includes selecting appropriate security technologies and solutions, developing security policies and procedures, and creating appropriate layers of defense and control.<\/div>\n<\/li>\n<li>\n<div><strong>Implementation and Operations:<\/strong> Once the design is complete, the security architect needs to assist the organization in implementing the security architecture and ensuring that it functions properly. They also need to establish operating procedures and monitor system performance to ensure continuity and safety.<\/div>\n<\/li>\n<li>\n<div><strong>Management and Evaluation:<\/strong> The consulting and design process does not end after implementation. Security architects need to ensure that the organization maintains and continuously improves the security system by performing regular assessments and adapting the architecture to new needs.<\/div>\n<\/li>\n<\/ol>\n<div>This overview of overall security architecture consulting shows the importance of understanding the organization, analyzing risks, designing the appropriate architecture, and maintaining the system effectively to ensure information security. and protect against cyber threats.<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n<div class=\"row\"  id=\"row-48616379\">\n\n\t<div id=\"col-1248713894\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<div class=\"social-icons share-icons share-row relative icon-style-fill\" ><span class=\"share-icons-title\">Share:<\/span><a href=\"whatsapp:\/\/send?text=CYBERSECURITY%20ARCHITECTURE%20CONSULTANT - https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/\" data-action=\"share\/whatsapp\/share\" class=\"icon primary button circle tooltip whatsapp show-for-medium\" title=\"Share on WhatsApp\" aria-label=\"Share on WhatsApp\" ><i class=\"icon-whatsapp\" ><\/i><\/a><a href=\"https:\/\/www.facebook.com\/sharer.php?u=https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/\" data-label=\"Facebook\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" class=\"icon primary button circle tooltip facebook\" title=\"Share on Facebook\" aria-label=\"Share on Facebook\" ><i class=\"icon-facebook\" ><\/i><\/a><a href=\"https:\/\/twitter.com\/share?url=https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" class=\"icon primary button circle tooltip twitter\" title=\"Share on Twitter\" aria-label=\"Share on Twitter\" ><i class=\"icon-twitter\" ><\/i><\/a><a href=\"mailto:?subject=CYBERSECURITY%20ARCHITECTURE%20CONSULTANT&body=Check%20this%20out%3A%20https%3A%2F%2Fvietsifo.vn%2Fen%2Fservices%2Foverall-network-security-architecture-consultant%2F\" rel=\"nofollow\" class=\"icon primary button circle tooltip email\" title=\"Email to a Friend\" aria-label=\"Email to a Friend\" ><i class=\"icon-envelop\" ><\/i><\/a><a href=\"https:\/\/pinterest.com\/pin\/create\/button?url=https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/&media&description=CYBERSECURITY%20ARCHITECTURE%20CONSULTANT\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" class=\"icon primary button circle tooltip pinterest\" title=\"Pin on Pinterest\" aria-label=\"Pin on Pinterest\" ><i class=\"icon-pinterest\" ><\/i><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/&title=CYBERSECURITY%20ARCHITECTURE%20CONSULTANT\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" class=\"icon primary button circle tooltip linkedin\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" ><i class=\"icon-linkedin\" ><\/i><\/a><\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t<div id=\"gap-1895876885\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1895876885 {\n  padding-top: 60px;\n}\n@media (min-width:550px) {\n  #gap-1895876885 {\n    padding-top: 80px;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row\"  id=\"row-844558074\">\n\n\t<div id=\"col-872249210\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n  <div class=\"banner has-hover brd-20\" id=\"banner-349262393\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" >\n            <div class=\"bg fill bg-fill \"><\/div>\n                        <div class=\"overlay\"><\/div>            \n                    <\/div>\n\t\t\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n\n   <div id=\"text-box-113514651\" class=\"text-box banner-layer x5 md-x5 lg-x5 y50 md-y50 lg-y50 res-text\">\n                                <div class=\"text-box-content text dark\">\n              \n              <div class=\"text-inner text-left\">\n                  \n\n\t<div id=\"text-154492991\" class=\"text p-0 font-600\">\n\t\t\n\n<h5>VIET SIFO<\/h5>\n\t\t\n<style>\n#text-154492991 {\n  font-size: 1rem;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3652676492\" class=\"text\">\n\t\t\n\n<h3>Bringing safety in cyberspace<\/h3>\n\n\t\t\n<style>\n#text-3652676492 {\n  font-size: 1rem;\n  color: rgb(255, 255, 255);\n}\n#text-3652676492 > * {\n  color: rgb(255, 255, 255);\n}\n@media (min-width:550px) {\n  #text-3652676492 {\n    font-size: 1.2rem;\n  }\n}\n@media (min-width:850px) {\n  #text-3652676492 {\n    font-size: 1.125rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"gap-1188802391\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1188802391 {\n  padding-top: 15px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<a href=\"#dangky\" target=\"_self\" class=\"button primary lowercase button-main\"  style=\"border-radius:5px;\">\n    <span>Sign up for consultation<\/span>\n  <\/a>\n\n\n\n              <\/div>\n           <\/div>\n                            \n<style>\n#text-box-113514651 {\n  width: 90%;\n}\n#text-box-113514651 .text-box-content {\n  font-size: 100%;\n}\n@media (min-width:550px) {\n  #text-box-113514651 {\n    width: 60%;\n  }\n}\n@media (min-width:850px) {\n  #text-box-113514651 {\n    width: 40%;\n  }\n}\n<\/style>\n    <\/div>\n \n\n        <\/div>\n      <\/div>\n\n            \n<style>\n#banner-349262393 {\n  padding-top: 460px;\n}\n#banner-349262393 .bg.bg-loaded {\n  background-image: url(https:\/\/vietsifo.vn\/wp-content\/uploads\/2023\/09\/bg.png);\n}\n#banner-349262393 .overlay {\n  background-color: rgba(255, 255, 255, 0);\n}\n#banner-349262393 .bg {\n  background-position: 38% 36%;\n}\n<\/style>\n  <\/div>\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\n\t\t\n<style>\n#section_256300724 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n@media (min-width:850px) {\n  #section_256300724 {\n    padding-top: 70px;\n    padding-bottom: 70px;\n  }\n}\n<\/style>\n\t<\/section>\n\t\n","protected":false},"excerpt":{"rendered":"<p>Overall consulting and design services on security and information with security architects who are experienced experts in the field of security and management\/operation of IT and security management systems such as ITIL, ISMS<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":595,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-service.php","meta":{"footnotes":""},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CYBERSECURITY ARCHITECTURE CONSULTANT - C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CYBERSECURITY ARCHITECTURE CONSULTANT - C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO\" \/>\n<meta property=\"og:description\" content=\"Overall consulting and design services on security and information with security architects who are experienced experts in the field of security and management\/operation of IT and security management systems such as ITIL, ISMS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/\" \/>\n<meta property=\"og:site_name\" content=\"C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-06T06:55:19+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/\",\"url\":\"https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/\",\"name\":\"CYBERSECURITY ARCHITECTURE CONSULTANT - C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO\",\"isPartOf\":{\"@id\":\"https:\/\/vietsifo.vn\/en\/#website\"},\"datePublished\":\"2023-09-10T03:06:55+00:00\",\"dateModified\":\"2023-10-06T06:55:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/vietsifo.vn\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/vietsifo.vn\/en\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CYBERSECURITY ARCHITECTURE CONSULTANT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vietsifo.vn\/en\/#website\",\"url\":\"https:\/\/vietsifo.vn\/en\/\",\"name\":\"C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/vietsifo.vn\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CYBERSECURITY ARCHITECTURE CONSULTANT - C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/","og_locale":"en_US","og_type":"article","og_title":"CYBERSECURITY ARCHITECTURE CONSULTANT - C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO","og_description":"Overall consulting and design services on security and information with security architects who are experienced experts in the field of security and management\/operation of IT and security management systems such as ITIL, ISMS","og_url":"https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/","og_site_name":"C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO","article_modified_time":"2023-10-06T06:55:19+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/","url":"https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/","name":"CYBERSECURITY ARCHITECTURE CONSULTANT - C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO","isPartOf":{"@id":"https:\/\/vietsifo.vn\/en\/#website"},"datePublished":"2023-09-10T03:06:55+00:00","dateModified":"2023-10-06T06:55:19+00:00","breadcrumb":{"@id":"https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/vietsifo.vn\/en\/services\/overall-network-security-architecture-consultant\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/vietsifo.vn\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/vietsifo.vn\/en\/services\/"},{"@type":"ListItem","position":3,"name":"CYBERSECURITY ARCHITECTURE CONSULTANT"}]},{"@type":"WebSite","@id":"https:\/\/vietsifo.vn\/en\/#website","url":"https:\/\/vietsifo.vn\/en\/","name":"C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/vietsifo.vn\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/pages\/607"}],"collection":[{"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/comments?post=607"}],"version-history":[{"count":6,"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/pages\/607\/revisions"}],"predecessor-version":[{"id":739,"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/pages\/607\/revisions\/739"}],"up":[{"embeddable":true,"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/pages\/595"}],"wp:attachment":[{"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/media?parent=607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}