{"id":2395,"date":"2025-02-19T07:52:43","date_gmt":"2025-02-19T07:52:43","guid":{"rendered":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/cnd_stream_videos\/cambridge-igcse-topic-5-3-cyber-security-threats-forms-of-attack\/"},"modified":"2025-02-27T15:05:22","modified_gmt":"2025-02-27T15:05:22","slug":"cambridge-igcse-topic-5-3-cyber-security-threats-forms-of-attack","status":"publish","type":"cnd_stream_videos","link":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/videos\/cambridge-igcse-topic-5-3-cyber-security-threats-forms-of-attack\/","title":{"rendered":"CAMBRIDGE IGCSE Topic 5.3 Cyber security threats, Forms of attack"},"featured_media":3117,"template":"","cnd_stream_video_categories":[94],"class_list":["post-2395","cnd_stream_videos","type-cnd_stream_videos","status-publish","has-post-thumbnail","hentry","cnd_stream_video_categories-cambridge-igcse-0984-0478-5-the-internet-and-its-uses"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/cnd_stream_videos\/2395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/cnd_stream_videos"}],"about":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/types\/cnd_stream_videos"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/media\/3117"}],"wp:attachment":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/media?parent=2395"}],"wp:term":[{"taxonomy":"cnd_stream_video_categories","embeddable":true,"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/cnd_stream_video_categories?post=2395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}