{"id":15123,"date":"2025-11-13T10:41:25","date_gmt":"2025-11-13T10:41:25","guid":{"rendered":"https:\/\/wellspringuniversity.edu.ng\/?page_id=15123"},"modified":"2025-11-24T10:50:41","modified_gmt":"2025-11-24T10:50:41","slug":"intelligence-and-security-studies","status":"publish","type":"page","link":"https:\/\/wellspringuniversity.edu.ng\/index.php\/intelligence-and-security-studies\/","title":{"rendered":"Intelligence and Security Studies"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15123\" class=\"elementor elementor-15123\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2b4021b4 elementor-section-boxed elementor-section-height-default elementor-section-height-default qodef-elementor-content-no\" data-id=\"2b4021b4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-74671aac\" data-id=\"74671aac\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61622fa6 elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"61622fa6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t<p class=\"qodef-m-subtitle\" >Wellspring University <\/p>\n\t\t<h2 class=\"qodef-m-title\" >\n\t\t\t\t\t\ud83d\udee1\ufe0f BSc. Intelligence &amp; Security Studies\t\t\t<\/h2>\n\t\t<p class=\"qodef-m-text\" >Welcome to the BSc. Intelligence and Security Studies programme at Wellspring University, a specialized degree meticulously designed to meet the growing national and global demand for security experts and intelligence analysts. This program is fully approved and accredited by the National Universities Commission (NUC) of Nigeria.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cfa092c elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"2cfa092c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t\t<h2 class=\"qodef-m-title\" >\n\t\t\t\t\t\ud83d\ude80 Why Choose Intelligence &amp; Security Studies at Wellspring?\t\t\t<\/h2>\n\t\t<p class=\"qodef-m-text\" >In an era defined by complex threats\u2014from cyber warfare and terrorism to political instability and economic espionage\u2014the need for professionals who can anticipate, analyze, and mitigate risks is critical. Our program is structured to transform you into a highly competent, ethical, and versatile security specialist.\n\nNUC Approved: Our curriculum adheres strictly to the standards set by the National Universities Commission, ensuring quality and relevance.\n\nInterdisciplinary Focus: We blend core concepts from Political Science, Criminology, Information Technology, and Strategic Studies to provide a holistic understanding of the security landscape.\n\nPractical Skills: The program emphasizes practical, real-world skills, including intelligence gathering, risk assessment, data analysis, and counter-terrorism strategies.\n\nCareer Versatility: Graduates are prepared for careers in government, corporate security, international organizations, and law enforcement.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e8a8e9 elementor-widget elementor-widget-spacer\" data-id=\"3e8a8e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52cc46e elementor-widget__width-initial elementor-widget elementor-widget-valiance_core_single_image\" data-id=\"52cc46e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_single_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-single-image qodef-layout--default  \">\n\t<div class=\"qodef-m-image\">\n\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1248\" height=\"832\" src=\"https:\/\/wellspringuniversity.edu.ng\/wp-content\/uploads\/2025\/11\/Gemini_Generated_Image_3kcb3l3kcb3l3kcb.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/wellspringuniversity.edu.ng\/wp-content\/uploads\/2025\/11\/Gemini_Generated_Image_3kcb3l3kcb3l3kcb.png 1248w, https:\/\/wellspringuniversity.edu.ng\/wp-content\/uploads\/2025\/11\/Gemini_Generated_Image_3kcb3l3kcb3l3kcb-300x200.png 300w, https:\/\/wellspringuniversity.edu.ng\/wp-content\/uploads\/2025\/11\/Gemini_Generated_Image_3kcb3l3kcb3l3kcb-1024x683.png 1024w, https:\/\/wellspringuniversity.edu.ng\/wp-content\/uploads\/2025\/11\/Gemini_Generated_Image_3kcb3l3kcb3l3kcb-768x512.png 768w\" sizes=\"(max-width: 1248px) 100vw, 1248px\" \/>\t<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b2547e elementor-widget elementor-widget-spacer\" data-id=\"2b2547e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8cba90 elementor-widget__width-initial elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"e8cba90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t\t<h5 class=\"qodef-m-title\" >\n\t\t\t\t\t\ud83c\udfaf Programme Objectives\t\t\t<\/h5>\n\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6872c60 e-grid e-con-boxed e-con e-parent\" data-id=\"6872c60\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43faac5 elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"43faac5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t<p class=\"qodef-m-subtitle\" >Upon graduation, students will be able to:<\/p>\n\t\t\t<p class=\"qodef-m-text\" >Analyze Global Threats: Critically assess contemporary security challenges at local, national, and international levels.\nConduct Intelligence Operations: Master the methodologies of intelligence collection, processing, and dissemination, both human and technical.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13a95e6 elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"13a95e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t\t\t<p class=\"qodef-m-text\" >Manage Security Risks: Develop and implement effective security policies and risk mitigation plans for organizations.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8cfdad elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"f8cfdad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t\t\t<p class=\"qodef-m-text\" >Practice Ethical Security: Understand and apply the ethical, legal, and political dimensions of intelligence and security work.\n\nUtilize Technology: Leverage modern technology and data analytics tools for effective intelligence analysis and cybersecurity defense.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a72d22a elementor-widget__width-initial elementor-widget elementor-widget-valiance_core_button\" data-id=\"6a72d22a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a class=\"qodef-shortcode qodef-m  qodef-button qodef-layout--filled  qodef-html--link\" href=\"#\" target=\"_self\" data-hover-color=\"#000000\" style=\"color: #FFFFFF;background-color: #0008A5\">\n\t<span class=\"qodef-m-text\">Apply Now<\/span>\n\t<span class=\"qodef-m-icon-arrow-wrapper\">\n\t\t<span class=\"qodef-m-icon-arrow qodef-m-icon-arrow1\"><svg  xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26\" height=\"7\" viewBox=\"0 0 26 7\"><g transform=\"translate(-708.5 -168)\"><line x1=\"20\" transform=\"translate(708.5 171.5)\" fill=\"none\" stroke=\"#fff\" stroke-width=\"1\"\/><path d=\"M3.5,0,7,6H0Z\" transform=\"translate(734.5 168) rotate(90)\" fill=\"#fff\"\/><\/g><\/svg><\/span>\n\t\t<span class=\"qodef-m-icon-arrow qodef-m-icon-arrow2\"><svg  xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26\" height=\"7\" viewBox=\"0 0 26 7\"><g transform=\"translate(-708.5 -168)\"><line x1=\"20\" transform=\"translate(708.5 171.5)\" fill=\"none\" stroke=\"#fff\" stroke-width=\"1\"\/><path d=\"M3.5,0,7,6H0Z\" transform=\"translate(734.5 168) rotate(90)\" fill=\"#fff\"\/><\/g><\/svg><\/span>\n\t<\/span>\n<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-e1525b1\" data-id=\"e1525b1\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-212930a5 elementor-widget elementor-widget-spacer\" data-id=\"212930a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-22b89128 elementor-section-full_width elementor-section-height-default elementor-section-height-default qodef-elementor-content-no\" data-id=\"22b89128\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f893331\" data-id=\"f893331\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c6a452e elementor-widget elementor-widget-spacer\" data-id=\"3c6a452e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-31d53204\" data-id=\"31d53204\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20ab6e23 elementor-widget__width-initial elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"20ab6e23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t\t<h3 class=\"qodef-m-title\" >\n\t\t\t\t\t\ud83d\udcda Core Courses &amp; Areas of Study\t\t\t<\/h3>\n\t\t<p class=\"qodef-m-text\" >Our four-year programme covers essential security domains, ensuring a well-rounded education:<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4f77bc elementor-widget__width-initial elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"c4f77bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t<p class=\"qodef-m-subtitle\" style=\"margin-bottom: 8px\">Year 1 &amp; 2 (Foundations)<\/p>\n\t\t\t<p class=\"qodef-m-text\" >Introduction to Security Studies |\n\nFoundational Economics &amp; Political Science |\n\nIntroduction to Criminology |\n\nBasic Data Analysis &amp; Research Methods |\n\nFundamentals of Intelligence<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40ef2df elementor-widget__width-initial elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"40ef2df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t<p class=\"qodef-m-subtitle\" style=\"margin-bottom: 8px\">Year 3 &amp; 4 (Specialization &amp; Application)<\/p>\n\t\t\t<p class=\"qodef-m-text\" >Cybersecurity &amp; Information Warfare |\n\nCounter-Terrorism &amp; Asymmetrical Conflict |\n\nNational Security Policy |\n\nIntelligence Analysis and Prediction |\n\nGeopolitics and Strategic Studies |\n\nRisk Management &amp; Corporate Security<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-900b416 elementor-widget__width-initial elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"900b416\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t<p class=\"qodef-m-subtitle\" style=\"margin-bottom: 8px\">Year 3 &amp; 4 (Dissertation\/Project)<\/p>\n\t\t\t<p class=\"qodef-m-text\" >A supervised, independent research project focusing on a contemporary security issue.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-778c767 elementor-widget__width-initial elementor-widget elementor-widget-valiance_core_section_title\" data-id=\"778c767\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_section_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"qodef-shortcode qodef-m  qodef-section-title qodef-alignment--left  \">\n\t\t\t<h1 class=\"qodef-m-title\" >\n\t\t\t\t\t\/\/\t\t\t<\/h1>\n\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bbbcd0a elementor-widget elementor-widget-valiance_core_button\" data-id=\"5bbbcd0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"valiance_core_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a class=\"qodef-shortcode qodef-m  qodef-button qodef-layout--simple  qodef-html--link\" href=\"#\" target=\"_self\"  >\n\t<span class=\"qodef-m-icon-arrow qodef-m-icon-arrow1\"><svg  xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"36\" height=\"7\" viewBox=\"0 0 36 7\"><line x1=\"30\" style=\"stroke:currentColor\" transform=\"translate(0 3.5)\" stroke-width=\"1\"\/><path d=\"M3.5,0,7,6H0Z\" transform=\"translate(36) rotate(90)\" \/><\/svg><\/span>\n\t<span class=\"qodef-m-icon-arrow qodef-m-icon-arrow2\"><svg  xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"36\" height=\"7\" viewBox=\"0 0 36 7\"><line x1=\"30\" style=\"stroke:currentColor\" transform=\"translate(0 3.5)\" stroke-width=\"1\"\/><path d=\"M3.5,0,7,6H0Z\" transform=\"translate(36) rotate(90)\" \/><\/svg><\/span>\n\t<svg class=\"qodef-svg-light\" x=\"0px\" y=\"0px\" width=\"51px\" height=\"51px\" viewBox=\"39.278 38.5 51 51\" enable-background=\"new 39.278 38.5 51 51\" xml:space=\"preserve\">\n\t\t<circle fill=\"none\" stroke=\"#BEBEBD\" stroke-miterlimit=\"10\" cx=\"64.778\" cy=\"64\" r=\"25\"\/>\n\t<\/svg>\n\t<svg class=\"qodef-svg-dark\" x=\"0px\" y=\"0px\" width=\"51px\" height=\"51px\" viewBox=\"39.278 38.5 51 51\" enable-background=\"new 39.278 38.5 51 51\" xml:space=\"preserve\">\n\t\t<circle fill=\"none\" stroke=\"currentColor\" stroke-miterlimit=\"10\" cx=\"64.778\" cy=\"64\" r=\"25\"\/>\n\t<\/svg>\n<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Wellspring University \ud83d\udee1\ufe0f BSc. Intelligence &amp; Security Studies Welcome to the BSc. Intelligence and Security Studies programme at Wellspring University, a specialized degree meticulously designed to meet the growing national and global demand for security experts and intelligence analysts. This program is fully approved and accredited by the National Universities Commission (NUC) of Nigeria. \ud83d\ude80 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"footnotes":""},"class_list":["post-15123","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/pages\/15123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/comments?post=15123"}],"version-history":[{"count":16,"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/pages\/15123\/revisions"}],"predecessor-version":[{"id":15145,"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/pages\/15123\/revisions\/15145"}],"wp:attachment":[{"href":"https:\/\/wellspringuniversity.edu.ng\/index.php\/wp-json\/wp\/v2\/media?parent=15123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}