{"id":1079,"date":"2015-07-15T09:29:28","date_gmt":"2015-07-15T03:59:28","guid":{"rendered":"https:\/\/www.invensislearning.com\/blog\/?p=1079"},"modified":"2026-04-06T11:46:50","modified_gmt":"2026-04-06T06:16:50","slug":"6-steps-to-build-an-effective-itsm-strategy","status":"publish","type":"post","link":"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/","title":{"rendered":"6 Steps to Create an Effective ITSM Strategy"},"content":{"rendered":"<p>The trick behind providing good service is efficient <a title=\"Offers IT Service Management (ITSM) training and certification courses such as ITIL Foundation, ITIL Intermediate courses including ITIL CSI, SS, ST, SO SD, PPO, RCV, SOA, OSA and ITIL MALC courses.\" href=\"https:\/\/www.invensislearning.com\/itsm-certification-courses\/\" target=\"_blank\" rel=\"noopener noreferrer\">ITSM<\/a> (ITSM). A customer or business user will not know what is going on behind the scenes at the service provider\u2019s premises. What can be seen or experienced is that services are operating as expected, services are provided efficiently, and issues, if any, are resolved timely. When any of these expectations are not met, the service is referred to as poor.<br \/>\nThe two key reasons for the poor quality of service are:<\/p>\n<ul>\n<li>Expectations are not set accurately<\/li>\n<li>The manner in which services are managed does not meet customer expectations<\/li>\n<\/ul>\n<p>Organizations using ITSM principles are running successfully responding to various risks, changes, and situation demands. An effective ITSM strategy is particularly useful when a situation goes beyond control.<br \/>\nBelow are a few points on how to build an effective ITSM strategy.<\/p>\n<h2>Six Steps to Build an Effective ITSM Strategy<\/h2>\n<ol>\n<li>\n<h3>Create CMDB:<\/h3>\n<p><span style=\"line-height: 1.5;\">A major part of building an ITSM strategy is to develop the Configuration Management Database (CMDB). In case you are building one or refining the existing CMDB, you need to adhere to a few guidelines.<br \/>\n<\/span><\/p>\n<ul>\n<li>Identify the major stakeholders and make sure they are aware of the goals and benefits of the project you are undertaking. Make sure that you have secured stakeholder buy-in. This is important to gain support from stakeholders at times when you want to establish governance.<\/li>\n<li>\u00a0It is not possible to build a CMDB in one go.<br \/>\nYou need to develop it in phases. Initiate the process by mapping Configuration Items (CIs) that are capable of demonstrating the value that CMDB provides. This also helps in maintaining stakeholder buy-in. Ensure that you establish the correct level of governance.<\/li>\n<li>Standards for asset discovery should be created and accurate data should be maintained within the federated model. Data should be refreshed on a regular basis. Also, ensure that data populating the CMDB model contains accurate information. You should have a clear understanding of merging, reconciling, and importing information in the database.<\/li>\n<\/ul>\n<\/li>\n<li>\n<h3>Maintain a Portfolio:<\/h3>\n<p>Create a portfolio of services that can be subscribed to by business users. The portfolio should include documentation of all processes used for delivering and supporting services.<\/li>\n<li>\n<h3>Implement Well-Known Standards:<\/h3>\n<p>Count on proven best practice methodologies for guidance. The most well-known among them is Information Technology Infrastructure Library (ITIL). When starting to build an ITSM strategy, it is best to refer to the three most widely used ITIL best practices &#8211; problem management, <a title=\" Click to know What is Incident Management in ITIL.\" href=\"https:\/\/www.invensislearning.com\/blog\/itil-incident-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">incident management<\/a>, and <a title=\"Overview of Change Management in ITIL.\" href=\"https:\/\/www.invensislearning.com\/blog\/itil-change-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">change management<\/a>.<\/li>\n<li>\n<h3>Proceed Methodically:<\/h3>\n<p>You may not be able to come up with a full-proof strategy in the first attempt. However, when you start building the strategy, identify the key pain points and plans to overcome them. Once you find that your strategies are able to find solutions to the pain areas, you will develop confidence in yourself and develop the rest.<\/li>\n<li>\n<h3>Create a Service Catalog:<\/h3>\n<p>A key component of an ITSM strategy is a service catalog. Without the catalog, it is difficult to understand what services are offered and under what conditions. The catalog not only defines the IT services but also maps them to the business processes. The service catalog also offers an additional advantage. It helps IT showcase the value it is creating for the entire organization.<\/li>\n<li>\n<h3>Hiring the Right People:<\/h3>\n<p>A critical aspect to be kept in mind while developing an ITSM strategy is enabling good communication between business and IT. IT should take the first step here. You can hire a business strategist having adequate technical knowledge who can work with developers. You can also train your existing staff in IT to avoid the costs of hiring a professional.<\/li>\n<\/ol>\n<p>To conclude, two key things should be kept in mind while creating an ITSM strategy. First, the ITSM strategy should provide you with efficiency and operations enabling you to get the maximum out of the latest technology. Second, ITSM should have business functions that yield maximum benefits. Such business functions include asset management, cost management, and finance.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The trick behind providing good service is efficient ITSM (ITSM). A customer or business user will not know what is going on behind the scenes at the service provider\u2019s premises. What can be seen or experienced is that services are operating as expected, services are provided efficiently, and issues, if any, are resolved timely. When [&hellip;]<\/p>\n","protected":false},"author":36,"featured_media":7157,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v16.7 (Yoast SEO v16.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>6 Key Steps to Create an Effective ITSM Strategy<\/title>\n<meta name=\"description\" content=\"Discover 6 essential steps to create an effective ITSM strategy for your organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Steps to Create an Effective ITSM Strategy\" \/>\n<meta property=\"og:description\" content=\"Discover 6 essential steps to create an effective ITSM strategy for your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"Invensis Learning Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/invensislearn\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-15T03:59:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-06T06:16:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/07\/6-steps-to-build-an-effective-itsm-strategy-696x360-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:creator\" content=\"@InvensisElearn\" \/>\n<meta name=\"twitter:site\" content=\"@InvensisElearn\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristine Angela Millano\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#organization\",\"name\":\"Invensis Learning\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/invensislearn\/\",\"https:\/\/www.instagram.com\/invensis_learn\/\",\"https:\/\/www.linkedin.com\/company\/invensis-learning\/\",\"https:\/\/www.youtube.com\/channel\/UCq4xOlJ4xz6Fw7WcbFkrsUQ\",\"https:\/\/twitter.com\/InvensisElearn\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png\",\"contentUrl\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png\",\"width\":181,\"height\":47,\"caption\":\"Invensis Learning\"},\"image\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#website\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/\",\"name\":\"Invensis Learning Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.invensislearning.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/07\/6-steps-to-build-an-effective-itsm-strategy-696x360-2.jpg\",\"contentUrl\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/07\/6-steps-to-build-an-effective-itsm-strategy-696x360-2.jpg\",\"width\":696,\"height\":360,\"caption\":\"How to Build an Effective ITSM Strategy\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#webpage\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/\",\"name\":\"6 Key Steps to Create an Effective ITSM Strategy\",\"isPartOf\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#primaryimage\"},\"datePublished\":\"2015-07-15T03:59:28+00:00\",\"dateModified\":\"2026-04-06T06:16:50+00:00\",\"description\":\"Discover 6 essential steps to create an effective ITSM strategy for your organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"6 Steps to Create an Effective ITSM Strategy\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#\/schema\/person\/0ec0729ad55f1c5ec6e42a39d91d0ec5\"},\"headline\":\"6 Steps to Create an Effective ITSM Strategy\",\"datePublished\":\"2015-07-15T03:59:28+00:00\",\"dateModified\":\"2026-04-06T06:16:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#webpage\"},\"wordCount\":669,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/07\/6-steps-to-build-an-effective-itsm-strategy-696x360-2.jpg\",\"articleSection\":[\"Latest IT Service Management Blogs\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#\/schema\/person\/0ec0729ad55f1c5ec6e42a39d91d0ec5\",\"name\":\"Kristine Angela Millano\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2026\/03\/kristine-96x96.png\",\"contentUrl\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2026\/03\/kristine-96x96.png\",\"caption\":\"Kristine Angela Millano\"},\"description\":\"Kristine Angela Millano is a professional with experience in digital operations, data processes, and technology-driven workflows. She specializes in structured problem-solving and quality evaluation, contributing to improved operational performance and data-driven decision-making. At Invensis Learning, she develops content focused on practical learning and real-world application of technology and process improvement.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/kristine-angela-millano\/\"],\"url\":\"https:\/\/www.invensislearning.com\/blog\/author\/kristine-angela-millano\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"6 Key Steps to Create an Effective ITSM Strategy","description":"Discover 6 essential steps to create an effective ITSM strategy for your organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/","og_locale":"en_US","og_type":"article","og_title":"6 Steps to Create an Effective ITSM Strategy","og_description":"Discover 6 essential steps to create an effective ITSM strategy for your organization.","og_url":"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/","og_site_name":"Invensis Learning Blog","article_publisher":"https:\/\/www.facebook.com\/invensislearn\/","article_published_time":"2015-07-15T03:59:28+00:00","article_modified_time":"2026-04-06T06:16:50+00:00","og_image":[{"width":696,"height":360,"url":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/07\/6-steps-to-build-an-effective-itsm-strategy-696x360-2.jpg","path":"\/home\/ubuntu\/dev\/blog\/invensislearning_blog\/wp-content\/uploads\/2015\/07\/6-steps-to-build-an-effective-itsm-strategy-696x360-2.jpg","size":"full","id":7157,"alt":"How to Build an Effective ITSM Strategy","pixels":250560,"type":"image\/jpeg"}],"twitter_card":"summary","twitter_creator":"@InvensisElearn","twitter_site":"@InvensisElearn","twitter_misc":{"Written by":"Kristine Angela Millano","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.invensislearning.com\/blog\/#organization","name":"Invensis Learning","url":"https:\/\/www.invensislearning.com\/blog\/","sameAs":["https:\/\/www.facebook.com\/invensislearn\/","https:\/\/www.instagram.com\/invensis_learn\/","https:\/\/www.linkedin.com\/company\/invensis-learning\/","https:\/\/www.youtube.com\/channel\/UCq4xOlJ4xz6Fw7WcbFkrsUQ","https:\/\/twitter.com\/InvensisElearn"],"logo":{"@type":"ImageObject","@id":"https:\/\/www.invensislearning.com\/blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png","contentUrl":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png","width":181,"height":47,"caption":"Invensis Learning"},"image":{"@id":"https:\/\/www.invensislearning.com\/blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.invensislearning.com\/blog\/#website","url":"https:\/\/www.invensislearning.com\/blog\/","name":"Invensis Learning Blog","description":"","publisher":{"@id":"https:\/\/www.invensislearning.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.invensislearning.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/07\/6-steps-to-build-an-effective-itsm-strategy-696x360-2.jpg","contentUrl":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/07\/6-steps-to-build-an-effective-itsm-strategy-696x360-2.jpg","width":696,"height":360,"caption":"How to Build an Effective ITSM Strategy"},{"@type":"WebPage","@id":"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#webpage","url":"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/","name":"6 Key Steps to Create an Effective ITSM Strategy","isPartOf":{"@id":"https:\/\/www.invensislearning.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#primaryimage"},"datePublished":"2015-07-15T03:59:28+00:00","dateModified":"2026-04-06T06:16:50+00:00","description":"Discover 6 essential steps to create an effective ITSM strategy for your organization.","breadcrumb":{"@id":"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"6 Steps to Create an Effective ITSM Strategy"}]},{"@type":"Article","@id":"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#article","isPartOf":{"@id":"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#webpage"},"author":{"@id":"https:\/\/www.invensislearning.com\/blog\/#\/schema\/person\/0ec0729ad55f1c5ec6e42a39d91d0ec5"},"headline":"6 Steps to Create an Effective ITSM Strategy","datePublished":"2015-07-15T03:59:28+00:00","dateModified":"2026-04-06T06:16:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#webpage"},"wordCount":669,"commentCount":0,"publisher":{"@id":"https:\/\/www.invensislearning.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/07\/6-steps-to-build-an-effective-itsm-strategy-696x360-2.jpg","articleSection":["Latest IT Service Management Blogs"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.invensislearning.com\/blog\/6-steps-to-build-an-effective-itsm-strategy\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.invensislearning.com\/blog\/#\/schema\/person\/0ec0729ad55f1c5ec6e42a39d91d0ec5","name":"Kristine Angela Millano","image":{"@type":"ImageObject","@id":"https:\/\/www.invensislearning.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2026\/03\/kristine-96x96.png","contentUrl":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2026\/03\/kristine-96x96.png","caption":"Kristine Angela Millano"},"description":"Kristine Angela Millano is a professional with experience in digital operations, data processes, and technology-driven workflows. She specializes in structured problem-solving and quality evaluation, contributing to improved operational performance and data-driven decision-making. At Invensis Learning, she develops content focused on practical learning and real-world application of technology and process improvement.","sameAs":["https:\/\/www.linkedin.com\/in\/kristine-angela-millano\/"],"url":"https:\/\/www.invensislearning.com\/blog\/author\/kristine-angela-millano\/"}]}},"_links":{"self":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/posts\/1079"}],"collection":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/comments?post=1079"}],"version-history":[{"count":7,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/posts\/1079\/revisions"}],"predecessor-version":[{"id":24878,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/posts\/1079\/revisions\/24878"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/media\/7157"}],"wp:attachment":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/media?parent=1079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/categories?post=1079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}