{"id":2204,"date":"2025-02-19T07:52:41","date_gmt":"2025-02-19T07:52:41","guid":{"rendered":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/cnd_stream_videos\/18-aqa-gcse-8525-slr4-3-6-cyber-security-threats\/"},"modified":"2025-02-28T18:59:49","modified_gmt":"2025-02-28T18:59:49","slug":"gcse-aqa-slr4-cyber-security-and-cyber-security-threats","status":"publish","type":"cnd_stream_videos","link":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/videos\/gcse-aqa-slr4-cyber-security-and-cyber-security-threats\/","title":{"rendered":"18. AQA GCSE (8525) SLR4 &#8211; 3.6 Cyber security &#038; threats"},"featured_media":2928,"template":"","cnd_stream_video_categories":[78],"class_list":["post-2204","cnd_stream_videos","type-cnd_stream_videos","status-publish","has-post-thumbnail","hentry","cnd_stream_video_categories-aqa-8525-slr4-cyber-security"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/cnd_stream_videos\/2204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/cnd_stream_videos"}],"about":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/types\/cnd_stream_videos"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/media\/2928"}],"wp:attachment":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/media?parent=2204"}],"wp:term":[{"taxonomy":"cnd_stream_video_categories","embeddable":true,"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/cnd_stream_video_categories?post=2204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}