Get the source code from Github

Result:

title Dr. Rachel Levitch | Resume
description Rachel Levitch, Rachael Fisher, author, rachel levitch author and speaker, SME consultant in cybersecurity, information technology and SME in Family consulting and policy writing. Graduate Toulouse Graduate School - University of North Texas. Bill and Melinda Gates Scholar Recipient and Ronald E. McNair Baccalaureate Scholar and Professional.
url Open (new window) | https://rachellevitch.com/
keywords
Array
(
    [0] => co branding
    [1] => branding
    [2] => policies and procedures
    [3] => comp tia
    [4] => cnap
    [5] => cybersecurity
    [6] => nsa
    [7] => dhs
    [8] => intrusion detection
    [9] => networks
    [10] => it
    [11] => network security
    [12] => information technology
    [13] => consulting
)
image
code
feeds
authorName Dr. Rachel Levitch's Resume
authorUrl
icon
favicon
Open (new window) | https://rachellevitch.com/favicon.ico
providerName Rachellevitch
providerUrl Open (new window) | https://rachellevitch.com
publishedTime
license Open (new window) | The Onakee Group | http://theonakeegroup.pryvate-net.com/
cms
language en
languages
View all collected data

OEmbed data

Endpoint
All data collected

Meta data

All data collected
Array
(
    [msvalidate.01] => Array
        (
            [0] => F2807EC83FE5A85A18090575FD0F3909
        )

    [google-site-verification] => Array
        (
            [0] => I3KMZ_Z5fjD-k3lbhnJ1EocWenyxgGx_QJpE9j8-Tsk
        )

    [viewport] => Array
        (
            [0] => width=device-width, initial-scale=1
        )

    [description] => Array
        (
            [0] => Rachel Levitch, Rachael Fisher, author, rachel levitch author and speaker, SME consultant in cybersecurity, information technology and SME in  Family consulting and policy writing. Graduate Toulouse Graduate School - University of North Texas.  Bill and Melinda Gates Scholar Recipient and  Ronald E. McNair Baccalaureate Scholar and Professional.
        )

    [keywords] => Array
        (
            [0] => co branding, branding, policies and procedures, COMP TIA, CNAP, cybersecurity, NSA, DHS, intrusion detection, networks, IT, network security, information technology, consulting
        )

    [author] => Array
        (
            [0] => Dr. Rachel Levitch's Resume
            [1] => Texas Christian University Alumni. University of North Texas Alumni
        )

    [copyright] => Array
        (
            [0] => The Onakee Group | http://theonakeegroup.pryvate-net.com/
        )

    [email] => Array
        (
            [0] => raquel@oniapple.com
        )

    [charset] => Array
        (
            [0] => UTF-8
        )

    [rating] => Array
        (
            [0] => General
        )

    [distribution] => Array
        (
            [0] => Global
        )

    [robots] => Array
        (
            [0] => INDEX,NOFOLLOW
        )

    [revisit-after] => Array
        (
            [0] => 1 Day
        )

)

Linked data

All data collected

HTML content

                        <!DOCTYPE HTML>
<!--
	Editorial by the Onakee Group
	http://theonakeegroup.pryvate-net.com/ | 
	THE ONAKEE GROUP, RRE, LLC             | License: thomas973@oniapple.com
-->
<html>
	<head>


<title>Dr. Rachel Levitch | Resume</title>
<title>VETERANS’ SERVICE EXPERIENCES IN HEALTHCARE: A SELF-SERVICE TECHNOLOGY ORIENTATION</title>
	    <meta name="msvalidate.01" content="F2807EC83FE5A85A18090575FD0F3909" />
	    <meta name="google-site-verification" content="I3KMZ_Z5fjD-k3lbhnJ1EocWenyxgGx_QJpE9j8-Tsk" />
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
		<!--[if lte IE 8]><script src="assets/js/ie/html5shiv.js"></script><![endif]-->
		<link rel="stylesheet" href="assets/css/main.css" />
		<!--[if lte IE 8]><link rel="stylesheet" href="assets/css/ie8.css" /><![endif]-->
<meta name="description" content="Rachel Levitch, Rachael Fisher, author, rachel levitch author and speaker, SME consultant in cybersecurity, information technology and SME in  Family consulting and policy writing. Graduate Toulouse Graduate School - University of North Texas.  Bill and Melinda Gates Scholar Recipient and  Ronald E. McNair Baccalaureate Scholar and Professional.">
<meta name="keywords" content="co branding, branding, policies and procedures, COMP TIA, CNAP, cybersecurity, NSA, DHS, intrusion detection, networks, IT, network security, information technology, consulting">
<meta name="author" content="Dr. Rachel Levitch's Resume">
<meta name="author" content="Texas Christian University Alumni. University of North Texas Alumni">
<meta name="copyright" content="The Onakee Group | http://theonakeegroup.pryvate-net.com/">
<meta name="email" content="raquel@oniapple.com">
<meta http-equiv="Content-Language" content="en">
<meta name="Charset" content="UTF-8">
<meta name="Rating" content="General">
<meta name="Distribution" content="Global">
<meta name="Robots" content="INDEX,NOFOLLOW">
<meta name="Revisit-after" content="1 Day">




	</head>
	<body>

		<!-- Wrapper -->
		
	<!-- Wrapper -->
			<div id="wrapper">

				<!-- Main -->
					<div id="main">
						<div class="inner">

							<!-- Header -->
								<header id="header">
									<a href="index.html" class="logo"><strong>Résumé | Sponsored by <li><a href="http://theonakeegroup.pryvate-net.com/" target="_blank" >the Onakee Group</a></li></strong> (800) 399-0952 x 815 | rachel093@oniapple.com</a>
									<ul class="icons">
										<li><a href="https://twitter.com/qualityfiles" class="icon fa-twitter" target="_blank" ><span class="label">Twitter</span></a></li>
										<li><a href="https://www.facebook.com/Charles-Edda-and-Charles-Bouley-INC-1981290312095890/"  target="_blank" class="icon fa-facebook"><span class="label">Facebook</span></a></li>
										<li><a href="https://www.linkedin.com/in/dr-rachael-fisher/" target="_blank" class="icon fa-medium"><span class="label">LinkedIn</span></a></li>
									</ul>
								</header>


							<!-- Banner -->
								<section id="banner">
									<div class="content">
										<header>
											<h1>Hello, I’m Résumé <br />
											</h1>
											<p><strong>RACHEL LEVITCH</strong> PhD, CISO, CMQ/QE-ASQ, CLGBSS</p>
										</header>
										<p>Dr. Levitch is Chief Information Security Officer (CISO)  at Charles Edda and C Bouley since 2014. Her security components of advisory include information technology, HRD, CRM and U.S. forgien relations within global hacking and securities.</p>
										<ul class="actions">
											<li><a href="https://rachellevitch.com/biography.html" class="button big">Learn More</a></li>
										</ul>
									</div>
									<span class="image object">
										<img src="images/pic012.jpg" alt="" />
									</span>
								</section>

							<!-- Section -->
								<section>
									<header class="major">
										<h2>SME Witness | Cybersecurity</h2>
									</header>
									<div class="features">
										<article>
											<span class="icon fa-diamond"></span>
											<div class="content">
												<h3>Cybersecurity Testifying</h3>
												<p>How changing political policies effect your foreign relations orgnaizational guidance.  What Board Governance needs to know.</p>
											</div>
										</article>
										<article>
											<span class="icon fa-paper-plane"></span>
											<div class="content">
												<h3>Security Updates | Espionage | Threats</h3>
												<p>Interest in cybersecurity in the context of online and virtual- world relations has never been a must for survival of companies</p>
											</div>
										</article>
										<article>
											<span class="icon fa-rocket"></span>
											<div class="content">
												<h3>US-CERT & ICS-CERT</h3>
												<p>Computers Expert Witness, Cybersecurity Expert Witness Data Breach, Security Incident, Information Security and cybersecurity expert.</p>
											</div>
										</article>
										<article>
											<span class="icon fa-signal"></span>
											<div class="content">
												<h3>DOD and DHS</h3>
												<p>An assessment report considering how hacking, cyber-espionage, and the threat of cyberwarfare affect U.S.-Foriegn relations and your organization.</p>
											</div>
										</article>
									</div>
								</section>

							<!-- Section -->
								<section>
									<header class="major">
										<h2>PROFESSIONAL Experience</h2>
									</header>
									<div class="posts">
										<article>
											<a href="#" class="image"><img src="images/pic001.jpg" alt="" /></a>
											<h3>FTC | PRIVACYCON</h3>
											<p>The 2018 PrivacyCon expanded collaboration among leading privacy and security researchers, academics, industry representatives, consumer advocates, and the government.</p>
											<ul class="actions">
												<li><a href="https://www.ftc.gov/news-events/events-calendar/2018/02/privacycon-2018" class="button">More</a></li>
											</ul>
										</article>
										<article>
											<a href="#" class="image"><img src="images/pic002.jpg" alt="" /></a>
											<h3>FTC | Mobile Security UPdates</h3>
											<p>The Commission is seeking to compile data concerning policies, procedures, and practices for providing security updates to mobile devices offered by unnamed persons,partnerships, corporations, or others in the United States</p>
											<ul class="actions">
												<li><a href="https://www.ftc.gov/system/files/documents/reports/mobile-security-updates-understanding-issues/mobile_security_updates_understanding_the_issues_publication_final.pdf" class="button">More</a></li>
											</ul>
										</article>
										<article>
											<a href="#" class="image"><img src="images/pic005.jpg" alt="" /></a>
											<h3>Safeguarding Your Data</h3>
											<p>These risks become especially important if you use your computer to manage your personal finances (banking, taxes, online bill payment, etc.), store sensitive personal data, or perform work-related activities away from the office.</p>
											<ul class="actions">
												<li><a href="https://rachellevitch.com/healthcare-cybersecurity.html" class="button">More</a></li>
											</ul>
										</article>
										<article>
											<a href="#" class="image"><img src="images/pic006.jpg" alt="" /></a>
											<h3>Medical | HIPPA Security Features</h3>
											<p>NIST published "An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule (SP 800-66 Revision 1)"...</p>
											<ul class="actions">
												<li><a href="https://rachellevitch.com/security-and-computer-awareness.html" class="button">More</a></li>
											</ul>
										</article>
										<article>
											<a href="#" class="image"><img src="images/pic003.jpg" alt="" /></a>
											<h3>Executive Training | Board Governance</h3>
											<p>Security training is quickly becoming mandatory for an ever-growing range of companies, far surpassing the first wave of IT firms....</p>
											<ul class="actions">
												<li><a href="https://rachellevitch.com/global-partnering.html" class="button">More</a></li>
											</ul>
										</article>
										<article>
											<a href="#" class="image"><img src="images/pic004.jpg" alt="" /></a>
											<p><h3>Employee Training | Good Faith</h3></p>
											<p>Convene a steering committee, cybersecurity awareness committee, or working group consisting of a diverse group of staff...</p>
											<ul class="actions">
												<li><a href="https://rachellevitch.com/good-practices-employee-training.html" class="button">More</a></li>
											</ul>
										</article>
									</div>
								</section>

						</div>
					</div>


				<!-- Sidebar -->
					<div id="sidebar">
						<div class="inner">

							<!-- Search -->
								<section id="search" class="alt">
									<form method="post" action="https://formspree.io/director@learn-edu.org">
										<input type="text" name="query" id="query" placeholder="Search" />
									</form>
								</section>

							<!-- Menu -->
								<nav id="menu">
									<header class="major">
										<h2>Menu</h2>
									</header>
									<ul>
										<li><a href="https://rachellevitch.com/index.html">Homepage | Dr. Levitch</a></li>
										<li><a href="https://rachellevitch.com/expert-witness.html">Expert Witness | Litigation</a></li>
										<li><a href="https://rachellevitch.com/consultant-services.html">Consultant Services</a></li>
										<li>
										    <span class="opener">Security Tips</span>
											<ul>
											    <li><a href="https://rachellevitch.com/security-tips.html">Security Tips | US-CERT</a></li>
										        <li><a href="https://rachellevitch.com/how-anonymous-are-you.html">How Anonymous Are You | US-CERT</a></li>
										        <li><a href="https://rachellevitch.com/protecting-your-data.html">Protecting Your Data | US-CERT</a></li>
										        <li><a href="https://rachellevitch.com/safeguarding-your-data.html">Safeguarding Your Data | US-CERT</a></li>
												</ul>
										           </li>
										           
											<li>	
											<span class="opener">Cybersecurity</span>
											<ul>
											    <li><a href="https://rachellevitch.com/security-tips.html">Security Tips | US-CERT</a></li>
											    <li><a href="https://rachellevitch.com/cybersecurity.html">Dr. Levitch & Cybersecurity</a></li>
												<li><a href="https://rachellevitch.com/computer-emergency-readiness.html">Computer Emergency Readiness</a></li>
												<li><a href="https://rachellevitch.com/cyber-assessment.html">Cyber Assessment</a></li>
												<li><a href="https://rachellevitch.com/duty-to-protect.html">Attorney| Duty to Protect</a></li>
												<li><a href="https://rachellevitch.com/healthcare-cybersecurity.html">Healthcare Cybersecurity</a></li>
											    <li><a href="https://rachellevitch.com/ics-cert.html">ICS-CERT</a></li>
											    <li><a href="https://rachellevitch.com/dhs-gov.html">DHS |Critical-Infrastructure-Sectors</a></li>
											</ul>
										</li>
										<li><a href="https://rachellevitch.com/executive-training.html">Executive Training</a></li>
										<li><a href="https://rachellevitch.com/global-partnering.html">Nonprofit| Global Partnering</a></li>
										<li>
											<span class="opener">Good Practices Employee Training</span>
											<ul>
												<li><a href="https://rachellevitch.com/access-control.html">Employee Computer Security</a></li>
												<li><a href="https://rachellevitch.com/email.html">Email</a></li>
												<li><a href="https://rachellevitch.com/social-media.html">Social Media</a></li>
												<li><a href="https://rachellevitch.com/track-and-trace.html"> Organizational Health | Tracking</a></li>
											</ul>
										</li>
										<li><a href="https://rachellevitch.com/information-technology.html">Information Technology</a></li>
										<li><a href="https://rachellevitch.com/policies-and-practices.html">Policies & Practices</a></li>
										<li><a href="https://rachellevitch.com/business-acumen.html">Business Acumen</a></li>
									</ul>
								</nav>

							<!-- Section -->
								<section>
									<header class="major">
										<h2>Dr. Levitch's Resume & CV</h2>
										</header>
									<div class="mini-posts">
										<article>
											<p>CV</p>
											<ul class="actions"
											<li><a href="https://drive.google.com/file/d/1Z--6JQd5rjk_yQeOjMz0J0HG4q7BqO0Y/view?usp=sharing" target="_blank" class="button">Complete Cirriculum Vitea (CV)</a></li>
										</ul>
										</article>
										
											<article>
											<p>COVER</p>
										<ul class="actions"	
											<li><a href="https://drive.google.com/file/d/1ogco9sd4Myg-H4R6C4owxhdjIqFCr0EP/view?usp=sharing" target="_blank" class="button">Professional Cover</a></li>
									</ul>
									</article>
										<article>
											<p> Quick Resume</p>
										<ul class="actions"
											<li><a href="https://drive.google.com/file/d/1cfrgxCvNrGaLSoST9kDFPR3QWXSzCId7/view?usp=sharing" target="_blank" class="button">Complete Professional Resume</a></li>
									</ul>
										</article>
								    	<article>
											<p>Gigg Grabbers</p>
										</article>
									</div>
									<ul class="actions">
										<li><a href="https://www.giggrabbers.com/it-consultant/levitch093" target="_blank" class="button">Consulting Giggs</a></li>
										</ul>
										</article>
								    	<article>
											<p>Chronicle Vitae</p>
										<ul class="actions">
										<li><a href="https://chroniclevitae.com/people/946022-rachel-levitch/profile" target="_blank" class="button">professorial Experience</a></li>
								</div>
								</article>
								</ul>
								</section>

							<!-- Section -->
								<section>
									<header class="major">
										<h2>Get in touch</h2>
									</header>
									<p>Dr. Rachel Levitch can be reached for SME | expert witnessing, consulting and cybersecurity issues.  Careful! She has a retainer. Resume was created and sponsored by the Onakee Group.</p>
									<ul class="contact">
										<li class="fa-envelope-o"><a href="#">rachel093@oniapple.com</a></li>
										<li class="fa-phone">(800) 399-0952 x814 (If Traveling x815)</li>
										<li class="fa-home">Charles Edda & C. Bouley - USA, ---- 333 Milam St., Suite 856<br />
										Shreveport, LA 71162</li>
									</ul>
								</section>


							<!-- Footer -->
								<footer id="footer">
									<p class="copyright">&copy; the Onakee Group. All rights reserved. 2017-2018</p>
								</footer>

						</div>
					</div>

			</div>

		<!-- Scripts -->
			<script src="assets/js/jquery.min.js"></script>
			<script src="assets/js/skel.min.js"></script>
			<script src="assets/js/util.js"></script>
			<!--[if lte IE 8]><script src="assets/js/ie/respond.min.js"></script><![endif]-->
			<script src="assets/js/main.js"></script>

	</body>
</html>