<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Stone Security Engineering</provider_name><provider_url>https://stonesecurityengineering.com</provider_url><author_name>holly</author_name><author_url>https://stonesecurityengineering.com/author/holly/</author_url><title>Protective Knowledge: Protection in High Threat Environments &#x2013; Demonstration Course - Stone Security Engineering</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="K4D1MriYPl"&gt;&lt;a href="https://stonesecurityengineering.com/protective-knowledge-protection-in-high-threat-environments-demonstration-course/"&gt;Protective Knowledge: Protection in High Threat Environments &#x2013; Demonstration Course&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://stonesecurityengineering.com/protective-knowledge-protection-in-high-threat-environments-demonstration-course/embed/#?secret=K4D1MriYPl" width="600" height="338" title="&#x201C;Protective Knowledge: Protection in High Threat Environments &#x2013; Demonstration Course&#x201D; &#x2014; Stone Security Engineering" data-secret="K4D1MriYPl" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><description>Stone Security Engineering is pleased to announce our latest, and most exciting, protective design short-course.&#xA0; Developed for attendees from all backgrounds and disciplines who work in, or protect, people in high threat environments, this course is intended to provide practical information and solutions to the complex challenge of protection. The course will be 4-days long [&hellip;]</description><thumbnail_url>https://stonesecurityengineering.com/wp-content/uploads/2015/01/IMG_3840.jpg</thumbnail_url></oembed>
