{"messages":[{"post_title":"Try out our new FREE Phishing Simulator","type":"action-bar","theme":"hello","animation":"slide","exit_redirect_alert_text":"","headline":"Try out our new FREE Phishing Simulator","icon":"","message":"","form_style":"style_0","form_layout":"bottom","form_bg_color":"","form_text_color":"","form_header":"","form_html_original":"","form_footer":"","label":"Phish Your Friends!","cta":"url","cta_option_form_via_ajax":"hide_on_success","link":"http:\/\/www.phish.io","redirect_to_link":"","cta_linked_message_id":"32810","use_theme_defaults":"yes","bg_color":"","text_color":"","cta_bg_color":"","cta_text_color":"","position":"01","triggers":{"when_to_show":"duration_on_page","duration_on_page":"0","duration_on_site":"0","user_inactive_for":"0","scroll_to":"middle","when_to_hide":"button_click","hide_time":"","another_message":"another"},"id":"32821","delay_time":"0","retargeting":"","campaign_id":32820,"expiry_time":"","retargeting_clicked":"yes","expiry_time_clicked":"current_session"},{"post_title":"CISSP Whitepaper","type":"messenger","theme":"canvas","animation":"no-anim","exit_redirect_alert_text":"","headline":"FREE CISSP Whitepaper","icon":"","message":"
<\/p>\n
Download our FREE<\/strong> whitepaper titled “25 Critical Factors to Analyze when Choosing a CISSP Boot Camp Training Course”. Click here for details!<\/p>\n","form_style":"style_0","form_layout":"inline","form_bg_color":"","form_text_color":"","form_header":"","form_html_original":"","form_footer":"","label":"","cta":"url","cta_option_form_via_ajax":"hide_on_success","link":"http:\/\/resources.infosecinstitute.com\/25-critical-factors-to-analyze-when-choosing-a-cissp-boot-camp-training-course-whitepaper\/","redirect_to_link":"","cta_linked_message_id":"32926","use_theme_defaults":"yes","bg_color":"","text_color":"","cta_bg_color":"","cta_text_color":"","position":"22","triggers":{"when_to_show":"duration_on_page","duration_on_page":"2","duration_on_site":"0","user_inactive_for":"0","scroll_to":"middle","when_to_hide":"button_click","hide_time":"","another_message":"another"},"id":"33205","delay_time":"2","retargeting":"","campaign_id":33207,"expiry_time":"","retargeting_clicked":"yes","expiry_time_clicked":"+50 years"}],"ajax_url":"http:\/\/resources.infosecinstitute.com\/wp-admin\/admin-ajax.php","defaults":{"icon":"http:\/\/resources.infosecinstitute.com\/wp-content\/plugins\/icegram\/assets\/images\/icegram-logo-branding-64-grey.png","powered_by_logo":"","powered_by_text":""},"messages_to_show_after_trigger":[],"cta_proxy_nonce":"ab24b1ba67","cta_plugin_active":"yes","scripts":["http:\/\/resources.infosecinstitute.com\/wp-content\/plugins\/icegram\/assets\/js\/icegram.js","http:\/\/resources.infosecinstitute.com\/wp-content\/plugins\/icegram\/message-types\/action-bar\/main.js","http:\/\/resources.infosecinstitute.com\/wp-content\/plugins\/icegram\/message-types\/messenger\/main.js","http:\/\/resources.infosecinstitute.com\/wp-content\/plugins\/ig-behavior-triggers\/classes\/..\/assets\/js\/frontend.js","http:\/\/resources.infosecinstitute.com\/wp-content\/plugins\/ig-cta-actions\/classes\/..\/assets\/js\/frontend.js"],"css":["http:\/\/resources.infosecinstitute.com\/wp-content\/plugins\/icegram\/assets\/css\/frontend.css","http:\/\/resources.infosecinstitute.com\/wp-content\/plugins\/icegram\/message-types\/action-bar\/default.css","http:\/\/resources.infosecinstitute.com\/wp-content\/plugins\/icegram\/message-types\/messenger\/default.css","http:\/\/resources.infosecinstitute.com\/wp-content\/plugins\/icegram\/message-types\/action-bar\/themes\/hello.css","http:\/\/resources.infosecinstitute.com\/wp-content\/plugins\/icegram\/message-types\/messenger\/themes\/canvas.css"]}