{"id":2353,"date":"2025-02-19T07:52:42","date_gmt":"2025-02-19T07:52:42","guid":{"rendered":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/cnd_stream_videos\/16-aqa-gcse-8525-slr3-3-5-the-need-for-methods-of-network-security\/"},"modified":"2025-02-27T15:48:08","modified_gmt":"2025-02-27T15:48:08","slug":"gcse-aqa-slr3-the-need-for-and-methods-of-network-security","status":"publish","type":"cnd_stream_videos","link":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/videos\/gcse-aqa-slr3-the-need-for-and-methods-of-network-security\/","title":{"rendered":"16. AQA GCSE (8525) SLR3 &#8211; 3.5 The need for &#038; methods of network security"},"featured_media":3077,"template":"","cnd_stream_video_categories":[77],"class_list":["post-2353","cnd_stream_videos","type-cnd_stream_videos","status-publish","has-post-thumbnail","hentry","cnd_stream_video_categories-aqa-8525-slr3-computer-networks-protocols-and-layers"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/cnd_stream_videos\/2353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/cnd_stream_videos"}],"about":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/types\/cnd_stream_videos"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/media\/3077"}],"wp:attachment":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/media?parent=2353"}],"wp:term":[{"taxonomy":"cnd_stream_video_categories","embeddable":true,"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/cnd_stream_video_categories?post=2353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}