{"id":2400,"date":"2025-02-19T07:52:43","date_gmt":"2025-02-19T07:52:43","guid":{"rendered":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/cnd_stream_videos\/cambridge-igcse-topic-5-3-protecting-digital-systems-and-data-from-threats\/"},"modified":"2025-02-28T19:22:24","modified_gmt":"2025-02-28T19:22:24","slug":"cambridge-igcse-topic-5-3-protecting-digital-systems-and-data-from-threats","status":"publish","type":"cnd_stream_videos","link":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/videos\/cambridge-igcse-topic-5-3-protecting-digital-systems-and-data-from-threats\/","title":{"rendered":"CAMBRIDGE IGCSE Topic 5.3 Protecting digital systems and data from threats"},"featured_media":3122,"template":"","cnd_stream_video_categories":[94],"class_list":["post-2400","cnd_stream_videos","type-cnd_stream_videos","status-publish","has-post-thumbnail","hentry","cnd_stream_video_categories-cambridge-igcse-0984-0478-5-the-internet-and-its-uses"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/cnd_stream_videos\/2400","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/cnd_stream_videos"}],"about":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/types\/cnd_stream_videos"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/media\/3122"}],"wp:attachment":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/media?parent=2400"}],"wp:term":[{"taxonomy":"cnd_stream_video_categories","embeddable":true,"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/cnd_stream_video_categories?post=2400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}