{"id":1280,"date":"2023-08-14T17:28:00","date_gmt":"2023-08-14T17:28:00","guid":{"rendered":"https:\/\/security2j2.com\/?p=1280"},"modified":"2023-08-21T13:27:43","modified_gmt":"2023-08-21T13:27:43","slug":"opioid-harm-reduction-training-provider-through-the-redcross","status":"publish","type":"post","link":"https:\/\/security2j2.com\/?p=1280","title":{"rendered":"Opioid Harm Reduction Training Provider Through the REDCROSS"},"content":{"rendered":"\n<p>We can provide you, and your community  1-hr training session.  Safe procedures responding to opioid overdoses. Naloxone.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/security2j2.com\/wp-content\/uploads\/2021\/12\/CRC_Partner_Lockup_BI_ENGfirst_CMYK.jpeg\"><img loading=\"lazy\" width=\"715\" height=\"283\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2021\/12\/CRC_Partner_Lockup_BI_ENGfirst_CMYK.jpeg\" alt=\"\" class=\"wp-image-1183\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2021\/12\/CRC_Partner_Lockup_BI_ENGfirst_CMYK.jpeg 715w, https:\/\/security2j2.com\/wp-content\/uploads\/2021\/12\/CRC_Partner_Lockup_BI_ENGfirst_CMYK-300x119.jpeg 300w\" sizes=\"(max-width: 715px) 100vw, 715px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>We can provide you, and your community 1-hr training session. Safe procedures responding to opioid overdoses. Naloxone.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/posts\/1280"}],"collection":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1280"}],"version-history":[{"count":1,"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/posts\/1280\/revisions"}],"predecessor-version":[{"id":1281,"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/posts\/1280\/revisions\/1281"}],"wp:attachment":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}