{"id":1273,"date":"2022-03-21T12:45:18","date_gmt":"2022-03-21T12:45:18","guid":{"rendered":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/?p=1273"},"modified":"2022-03-21T14:17:47","modified_gmt":"2022-03-21T14:17:47","slug":"cyber-security","status":"publish","type":"post","link":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2022\/03\/21\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<section id=\"builder-section-text_11\" class=\"builder-section-first builder-section builder-section-text builder-section-next-text builder-text-columns-2 layout-9\" style=\"background-size: cover; background-repeat: no-repeat;background-position: center center;\">\n<div class=\"builder-section-content\">\n<div class=\"builder-text-row\">\n<div class=\"builder-text-column builder-text-column-1\" id=\"builder-section-text_11-column-1\">\n<div class=\"builder-text-content\">\n<p>This page contains all the ideas, information and resources specific to Cyber Security in Scotland.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"builder-text-column builder-text-column-2\" id=\"builder-section-text_11-column-2\">\n<div class=\"builder-text-content\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n<section id=\"builder-section-text_69\" class=\"builder-section-prev-text builder-section builder-section-text builder-section-next-postlist builder-text-columns-2 layout-9\" style=\"background-size: cover; background-repeat: no-repeat;background-position: center center;\">\n<h3 class=\"builder-text-section-title\">\n        Cyber Resilience and Internet Safety (CRIS)    <\/h3>\n<div class=\"builder-section-content\">\n<div class=\"builder-text-row\">\n<div class=\"builder-text-column builder-text-column-1\" id=\"builder-section-text_69-column-1\">\n<div class=\"builder-text-content\">\n<p>Our Digilearn.scot site contains all the ideas, information and resources for supporting Cyber Resilience and Internet Safety, as this sits within the Digital Literacy Experiences and Outcomes.<\/p>\n<p><a id=\"ttfmake-1626443370\" class=\"ttfmake-button\" style=\"background-color: #03989e; color: #000000; font-size: 13px; font-weight: bold; padding: 4px 10px; border-radius: 100px;\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/remote\/cyber-resilience-and-internet-safety\/\" data-hover-background-color=\"#037f9e\" data-hover-color=\"#ffffff\">Go to the CRIS site<\/a><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"builder-text-column builder-text-column-2\" id=\"builder-section-text_69-column-2\">\n<div class=\"builder-text-content\">\n<p><a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/remote\/cyber-resilience-and-internet-safety\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1694 size-full\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/07\/10150410\/0ABBE9F7-371C-450F-8B76-ABDB42A0E1C7.jpeg\" alt=\"\" width=\"1024\" height=\"576\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/07\/10150410\/0ABBE9F7-371C-450F-8B76-ABDB42A0E1C7.jpeg 1024w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/07\/10150410\/0ABBE9F7-371C-450F-8B76-ABDB42A0E1C7-300x169.jpeg 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/07\/10150410\/0ABBE9F7-371C-450F-8B76-ABDB42A0E1C7-267x150.jpeg 267w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/07\/10150410\/0ABBE9F7-371C-450F-8B76-ABDB42A0E1C7-768x432.jpeg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n<section id=\"builder-section-postlist_804\" class=\"builder-section-prev-text builder-section builder-section-postlist builder-section-last -mode\" style=\"background-size: cover; background-repeat: no-repeat;background-position: center center;\">\n<h3 class=\"builder-post-list-section-title\">\n\t\tCyber Security Opportunities and Community Posts\t<\/h3>\n<div class=\"builder-section-content container\">\n\t\t\t\t<div class=\"ttfmp-post-list columns-3 thumbnail-top has-excerpt ttfmp-section-paginated ttfmp-post-list-section-paginated\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"cycle-prev\" id=\"builder-section-postlist_804-cycle-prev\"><\/div>\r\n\t\t\t<div class=\"cycle-next\" id=\"builder-section-postlist_804-cycle-next\"><\/div>\r\n\t\t\t\r\n\t\t\t\t\t\t\t<div class=\"cycle-slideshow\" data-cycle-slides=\"> div.ttfmp-section-paginate-item\" data-cycle-log=\"false\" data-cycle-swipe=\"true\" data-cycle-prev=\"#builder-section-postlist_804-cycle-prev\" data-cycle-next=\"#builder-section-postlist_804-cycle-next\" data-cycle-pager=\"#builder-section-postlist_804-cycle-pager\" data-cycle-timeout=\"6000\" data-cycle-fx=\"scrollHorz\" data-cycle-auto-height=\"container\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ttfmp-post-list-row ttfmp-section-paginate-item\">\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"ttfmp-post-list-item\">\r\n\t\t\t\t\t\t\r\n<header class=\"ttfmp-post-list-item-header\">\r\n\t\t\t<h3 class=\"ttfmp-post-list-item-title\">\r\n\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2022\/05\/31\/introduction-to-cyber-security-for-teachers-funded-places-available\/\">\r\n\t\t\tIntroduction to Cyber Security for Teachers \u2013 Funded places available!\t\t<\/a>\r\n\t<\/h3>\r\n\t\t<\/header>\r\n<div class=\"ttfmp-post-list-item-content\">\r\n\t<p>The CPD award Introduction to Cyber Security, jointly funded by Education Scotland, was created for\u00a0ALL\u00a0primary and secondary teachers and designed to give\u00a0background knowledge\u00a0and understanding related&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2022\/05\/31\/introduction-to-cyber-security-for-teachers-funded-places-available\/\">Read more<\/a><\/p>\n<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ttfmp-post-list-item\">\r\n\t\t\t\t\t\t\r\n<header class=\"ttfmp-post-list-item-header\">\r\n\t\t<figure class=\"ttfmp-post-list-item-thumb position-top\">\r\n\t\t\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2022\/03\/21\/cyber-security\/\">\r\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/21141732\/20220321_141639048_iOS.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"cyber security\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/21141732\/20220321_141639048_iOS.jpg 1024w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/21141732\/20220321_141639048_iOS-300x169.jpg 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/21141732\/20220321_141639048_iOS-267x150.jpg 267w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/21141732\/20220321_141639048_iOS-768x432.jpg 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>\t\t<\/a>\r\n\t\t\t<\/figure>\r\n\t\t\t<h3 class=\"ttfmp-post-list-item-title\">\r\n\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2022\/03\/21\/cyber-security\/\">\r\n\t\t\tCyber Security\t\t<\/a>\r\n\t<\/h3>\r\n\t\t<\/header>\r\n<div class=\"ttfmp-post-list-item-content\">\r\n\t<p>This page contains all the ideas, information and resources specific to Cyber Security in Scotland. Cyber Resilience and Internet Safety (CRIS) Our Digilearn.scot site contains&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2022\/03\/21\/cyber-security\/\">Read more<\/a><\/p>\n<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ttfmp-post-list-item last\">\r\n\t\t\t\t\t\t\r\n<header class=\"ttfmp-post-list-item-header\">\r\n\t\t<figure class=\"ttfmp-post-list-item-thumb position-top\">\r\n\t\t\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2022\/03\/21\/level-4-resources-for-cyber-fundamentals-and-internet-safety\/\">\r\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/03164419\/20220203_155216592_iOS.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"level 4 prior verified assessments at level 4 cyber\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/03164419\/20220203_155216592_iOS.jpg 1024w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/03164419\/20220203_155216592_iOS-300x169.jpg 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/03164419\/20220203_155216592_iOS-267x150.jpg 267w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/03164419\/20220203_155216592_iOS-768x432.jpg 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>\t\t<\/a>\r\n\t\t\t<\/figure>\r\n\t\t\t<h3 class=\"ttfmp-post-list-item-title\">\r\n\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2022\/03\/21\/level-4-resources-for-cyber-fundamentals-and-internet-safety\/\">\r\n\t\t\tLevel 4 Resources for Cyber Fundamentals and Internet Safety\t\t<\/a>\r\n\t<\/h3>\r\n\t\t<\/header>\r\n<div class=\"ttfmp-post-list-item-content\">\r\n\t<p>Education Scotland have collaborated with Girvan Academy in South Ayrshire to produce a set of resources that combine the\u00a0SQA\u00a0level 4 units in Cyber Security Fundamentals&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2022\/03\/21\/level-4-resources-for-cyber-fundamentals-and-internet-safety\/\">Read more<\/a><\/p>\n<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ttfmp-post-list-row ttfmp-section-paginate-item\">\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"ttfmp-post-list-item\">\r\n\t\t\t\t\t\t\r\n<header class=\"ttfmp-post-list-item-header\">\r\n\t\t<figure class=\"ttfmp-post-list-item-thumb position-top\">\r\n\t\t\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2022\/03\/03\/technology-assisted-harmful-sexual-behaviour-with-stop-it-now\/\">\r\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"250\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/03165220\/20211209_152453277_iOS.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"stop it now technology assisted harmful sexual behaviour professional learning\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/03165220\/20211209_152453277_iOS.jpg 1024w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/03165220\/20211209_152453277_iOS-300x78.jpg 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/03165220\/20211209_152453277_iOS-280x73.jpg 280w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/03165220\/20211209_152453277_iOS-768x200.jpg 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>\t\t<\/a>\r\n\t\t\t<\/figure>\r\n\t\t\t<h3 class=\"ttfmp-post-list-item-title\">\r\n\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2022\/03\/03\/technology-assisted-harmful-sexual-behaviour-with-stop-it-now\/\">\r\n\t\t\tTechnology Assisted Harmful Sexual Behaviour with Stop It Now\t\t<\/a>\r\n\t<\/h3>\r\n\t\t<\/header>\r\n<div class=\"ttfmp-post-list-item-content\">\r\n\t<p>Technology Assisted Harmful Sexual Behaviour (TAHSB) is unfortunately an issue that educators deal with on a daily basis. It impacts on friendships and relationships of&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2022\/03\/03\/technology-assisted-harmful-sexual-behaviour-with-stop-it-now\/\">Read more<\/a><\/p>\n<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ttfmp-post-list-item\">\r\n\t\t\t\t\t\t\r\n<header class=\"ttfmp-post-list-item-header\">\r\n\t\t<figure class=\"ttfmp-post-list-item-thumb position-top\">\r\n\t\t\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/10\/04\/cyber-resources-cyber-centurion\/\">\r\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/10\/04150316\/cyber-centurion.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/10\/04150316\/cyber-centurion.jpg 1024w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/10\/04150316\/cyber-centurion-300x169.jpg 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/10\/04150316\/cyber-centurion-267x150.jpg 267w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/10\/04150316\/cyber-centurion-768x432.jpg 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>\t\t<\/a>\r\n\t\t\t<\/figure>\r\n\t\t\t<h3 class=\"ttfmp-post-list-item-title\">\r\n\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/10\/04\/cyber-resources-cyber-centurion\/\">\r\n\t\t\tCyber Resources &#8211; Cyber Centurion\t\t<\/a>\r\n\t<\/h3>\r\n\t\t<\/header>\r\n<div class=\"ttfmp-post-list-item-content\">\r\n\t<p>Cyber Centurion provides a range of cyber resources: &nbsp; CyberCenturion &#8211; Cyber Security Challenge UK Cyber Challenge in a Box &#8211; Cyber Security Challenge UK&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/10\/04\/cyber-resources-cyber-centurion\/\">Read more<\/a><\/p>\n<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ttfmp-post-list-item last\">\r\n\t\t\t\t\t\t\r\n<header class=\"ttfmp-post-list-item-header\">\r\n\t\t<figure class=\"ttfmp-post-list-item-thumb position-top\">\r\n\t\t\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/10\/04\/cyber-chef\/\">\r\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/10\/04150446\/cyber-chef-2.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/10\/04150446\/cyber-chef-2.jpg 1024w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/10\/04150446\/cyber-chef-2-300x169.jpg 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/10\/04150446\/cyber-chef-2-267x150.jpg 267w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/10\/04150446\/cyber-chef-2-768x432.jpg 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>\t\t<\/a>\r\n\t\t\t<\/figure>\r\n\t\t\t<h3 class=\"ttfmp-post-list-item-title\">\r\n\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/10\/04\/cyber-chef\/\">\r\n\t\t\tCyber Chef\t\t<\/a>\r\n\t<\/h3>\r\n\t\t<\/header>\r\n<div class=\"ttfmp-post-list-item-content\">\r\n\t<p>CyberChef &#8211; the Cyber &#8220;Swiss Army Knife&#8221; is GCHQ&#8217;s intuitive web app for analysing and decoding data. CyberChef &#8211; the Cyber &#8220;Swiss Army Knife&#8221; &#8211;&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/10\/04\/cyber-chef\/\">Read more<\/a><\/p>\n<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ttfmp-post-list-row ttfmp-section-paginate-item\">\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"ttfmp-post-list-item\">\r\n\t\t\t\t\t\t\r\n<header class=\"ttfmp-post-list-item-header\">\r\n\t\t<figure class=\"ttfmp-post-list-item-thumb position-top\">\r\n\t\t\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/10\/04\/cyber-resources-cs4fn\/\">\r\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/10\/04150404\/cyber-cs4fn.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/10\/04150404\/cyber-cs4fn.jpg 1024w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/10\/04150404\/cyber-cs4fn-300x169.jpg 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/10\/04150404\/cyber-cs4fn-267x150.jpg 267w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/10\/04150404\/cyber-cs4fn-768x432.jpg 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>\t\t<\/a>\r\n\t\t\t<\/figure>\r\n\t\t\t<h3 class=\"ttfmp-post-list-item-title\">\r\n\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/10\/04\/cyber-resources-cs4fn\/\">\r\n\t\t\tCyber Resources &#8211; CS4FN\t\t<\/a>\r\n\t<\/h3>\r\n\t\t<\/header>\r\n<div class=\"ttfmp-post-list-item-content\">\r\n\t<p>Here are some articles and content from CS4FN to engage learners with cyber security: Computer Science for Fun &#8211; cs4fn: cs4fn Magazine+: Issue 24: Cyber&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/10\/04\/cyber-resources-cs4fn\/\">Read more<\/a><\/p>\n<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ttfmp-post-list-item\">\r\n\t\t\t\t\t\t\r\n<header class=\"ttfmp-post-list-item-header\">\r\n\t\t<figure class=\"ttfmp-post-list-item-thumb position-top\">\r\n\t\t\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/09\/14\/sign-up-for-cyberfirst-girls-development-days\/\">\r\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/09\/14104020\/20210914_092722069_iOS.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/09\/14104020\/20210914_092722069_iOS.jpg 1024w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/09\/14104020\/20210914_092722069_iOS-300x169.jpg 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/09\/14104020\/20210914_092722069_iOS-267x150.jpg 267w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/09\/14104020\/20210914_092722069_iOS-768x432.jpg 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>\t\t<\/a>\r\n\t\t\t<\/figure>\r\n\t\t\t<h3 class=\"ttfmp-post-list-item-title\">\r\n\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/09\/14\/sign-up-for-cyberfirst-girls-development-days\/\">\r\n\t\t\tSign up for CyberFirst Girls Development Days!\t\t<\/a>\r\n\t<\/h3>\r\n\t\t<\/header>\r\n<div class=\"ttfmp-post-list-item-content\">\r\n\t<p>This year\u2019s CyberFirst Girls Competition was a great success with over 6,000 entries from across the UK! And we\u2019re not stopping there &#8211; girls that&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/09\/14\/sign-up-for-cyberfirst-girls-development-days\/\">Read more<\/a><\/p>\n<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ttfmp-post-list-item last\">\r\n\t\t\t\t\t\t\r\n<header class=\"ttfmp-post-list-item-header\">\r\n\t\t<figure class=\"ttfmp-post-list-item-thumb position-top\">\r\n\t\t\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/05\/25\/teachers-reflections-on-clpl-uhi-intro-to-cyber-security-online-course-for-teachers\/\">\r\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/05\/25171458\/COMPUTING-SCIENCE-20.png\" class=\"attachment-large size-large wp-post-image\" alt=\"uhi cyber course reflections\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/05\/25171458\/COMPUTING-SCIENCE-20.png 1024w, https:\/\/glow-prod-glowblogs.s3.eu-west-1.amazonaws.com\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/05\/25171458\/COMPUTING-SCIENCE-20-300x169.png?X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&amp;X-Amz-Security-Token=IQoJb3JpZ2luX2VjEI3%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCWV1LXdlc3QtMSJIMEYCIQDE1WqbLwgTQzg%2Fscp%2BYpabWzkwMiwYoj3K8C1okhRfVAIhAPuFbrbKrDS9yf2guFwR9OFfBfblZ3rsvPIDhIVuK0OaKrgFCFYQBRoMMjczNTcwMTk1NDMzIgw9KUpz%2F1Xu3z%2FXE3AqlQWSVBotzvD8b9lrJLvbk8KTuIdcVMG1sC1oano3GLiAx9xQYdHPOcHKLeWa90LpeIxucwF0uOdfoWdGCD89DoF%2FFb%2Fx5y3Opl6AV7zT0IhZQywxRtRJvARMc6utbT441haKW%2Ficp1VCltYWRu%2FO29Thvqend0ObY7gR87SgK3gm4yywB637XGrxhLKgdJA8biBEptyqTl2EfWmmSD1kaQ%2B24HnhgMwipn3XsCcAEzYHMWVaFKQBTlVKEqPDVJFjLiPpPUbzSDo3fNGFX5XibNXih8xZ%2FQFbpGVz2TElrCl%2BXSoPeq22huURYcF9FV1mHsMObDiHbQJNcfBtcBv%2FKGT8E%2BDos3oacAAQIWhjlnxWA6iQamou6bjaM8z8upqoFv5VnqcThB9xIMrGkRiRYK6nLTVwbD0wIcAPRE1zxV65ItHcR9B%2Fr5gdhAcej3RnrjAbxMxHyFD9Wq0VtBWEvscY8xLpv3hE8wToFH2bX%2F%2FuM%2BVsm7t1G5zBcW2mCGjM3cf%2Fas5e8VcHB2u%2BsiIddA5HRc5f%2F%2BpsVDTa70I1StaXWxLN9xGzFrPNmWTvMou9IwTei%2F2wKlvY%2FrI5lJ5FW%2FqEmdqjWbbTxCMpa%2BFWLNghKUvD4KBRN6ZBRb%2F%2BsUTNt18J3oZPtm5ZTLY2b7uhz1njZIlYAYdIg1jPgJgkg8BnIc4JjiS72c9xdLIjVeCCwqEmui2r9Sh3de2tXTmRjETqXLtiAOI8rFNfUZBARfpapt%2BKFTlvqyqz4nr9d4wpvS27KZNs6oydHw6PC1IrHVkiZmpqHPUzZ%2BbQWviBtNX8Z3CNpXjZHbb2Xf%2BQ1v0WxXNrnFzjWzlrFbphSGzKm1QMYZ99O6RZf9Sw4afOcP%2FX9ECYdPRtMLjqpM8GOrABjhjwNh76xWnuANPYKEswAhEb0OjgrjvOckCzLa58%2BxI%2BGFNrK%2FJQsI9zCI%2BBe2ekAkg7jLV67Dj0ef6%2BGNE0F8BYv4m3v8uNHXzy8IvmXBnse6qGPKEFvl0lAmCFdsYXQvi4iuOuf00ZXpZ0WCa%2FXkMFGZte3LUHQ%2BC3qYSscv1U%2FKM3R2bPiklioiloxA5OD5vI86SjWsqWAfr9cf%2F%2BaXxao2ITfpB5mpl3GvL9fgs%3D&amp;X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Credential=ASIAT7MQN47U4T3NQYJW%2F20260422%2Feu-west-1%2Fs3%2Faws4_request&amp;X-Amz-Date=20260422T214516Z&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Expires=900&amp;X-Amz-Signature=83ab8daafdab75d6b018315791a5ccaa114816761026d140eda70880b24c2707 300w, https:\/\/glow-prod-glowblogs.s3.eu-west-1.amazonaws.com\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/05\/25171458\/COMPUTING-SCIENCE-20-267x150.png?X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&amp;X-Amz-Security-Token=IQoJb3JpZ2luX2VjEI3%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCWV1LXdlc3QtMSJIMEYCIQDE1WqbLwgTQzg%2Fscp%2BYpabWzkwMiwYoj3K8C1okhRfVAIhAPuFbrbKrDS9yf2guFwR9OFfBfblZ3rsvPIDhIVuK0OaKrgFCFYQBRoMMjczNTcwMTk1NDMzIgw9KUpz%2F1Xu3z%2FXE3AqlQWSVBotzvD8b9lrJLvbk8KTuIdcVMG1sC1oano3GLiAx9xQYdHPOcHKLeWa90LpeIxucwF0uOdfoWdGCD89DoF%2FFb%2Fx5y3Opl6AV7zT0IhZQywxRtRJvARMc6utbT441haKW%2Ficp1VCltYWRu%2FO29Thvqend0ObY7gR87SgK3gm4yywB637XGrxhLKgdJA8biBEptyqTl2EfWmmSD1kaQ%2B24HnhgMwipn3XsCcAEzYHMWVaFKQBTlVKEqPDVJFjLiPpPUbzSDo3fNGFX5XibNXih8xZ%2FQFbpGVz2TElrCl%2BXSoPeq22huURYcF9FV1mHsMObDiHbQJNcfBtcBv%2FKGT8E%2BDos3oacAAQIWhjlnxWA6iQamou6bjaM8z8upqoFv5VnqcThB9xIMrGkRiRYK6nLTVwbD0wIcAPRE1zxV65ItHcR9B%2Fr5gdhAcej3RnrjAbxMxHyFD9Wq0VtBWEvscY8xLpv3hE8wToFH2bX%2F%2FuM%2BVsm7t1G5zBcW2mCGjM3cf%2Fas5e8VcHB2u%2BsiIddA5HRc5f%2F%2BpsVDTa70I1StaXWxLN9xGzFrPNmWTvMou9IwTei%2F2wKlvY%2FrI5lJ5FW%2FqEmdqjWbbTxCMpa%2BFWLNghKUvD4KBRN6ZBRb%2F%2BsUTNt18J3oZPtm5ZTLY2b7uhz1njZIlYAYdIg1jPgJgkg8BnIc4JjiS72c9xdLIjVeCCwqEmui2r9Sh3de2tXTmRjETqXLtiAOI8rFNfUZBARfpapt%2BKFTlvqyqz4nr9d4wpvS27KZNs6oydHw6PC1IrHVkiZmpqHPUzZ%2BbQWviBtNX8Z3CNpXjZHbb2Xf%2BQ1v0WxXNrnFzjWzlrFbphSGzKm1QMYZ99O6RZf9Sw4afOcP%2FX9ECYdPRtMLjqpM8GOrABjhjwNh76xWnuANPYKEswAhEb0OjgrjvOckCzLa58%2BxI%2BGFNrK%2FJQsI9zCI%2BBe2ekAkg7jLV67Dj0ef6%2BGNE0F8BYv4m3v8uNHXzy8IvmXBnse6qGPKEFvl0lAmCFdsYXQvi4iuOuf00ZXpZ0WCa%2FXkMFGZte3LUHQ%2BC3qYSscv1U%2FKM3R2bPiklioiloxA5OD5vI86SjWsqWAfr9cf%2F%2BaXxao2ITfpB5mpl3GvL9fgs%3D&amp;X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Credential=ASIAT7MQN47U4T3NQYJW%2F20260422%2Feu-west-1%2Fs3%2Faws4_request&amp;X-Amz-Date=20260422T214516Z&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Expires=900&amp;X-Amz-Signature=9e1c951e76a8c33a568cede81d8e0de3e5945eb653f0170dcc07323636582012 267w, https:\/\/glow-prod-glowblogs.s3.eu-west-1.amazonaws.com\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/05\/25171458\/COMPUTING-SCIENCE-20-768x432.png?X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&amp;X-Amz-Security-Token=IQoJb3JpZ2luX2VjEI3%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCWV1LXdlc3QtMSJIMEYCIQDE1WqbLwgTQzg%2Fscp%2BYpabWzkwMiwYoj3K8C1okhRfVAIhAPuFbrbKrDS9yf2guFwR9OFfBfblZ3rsvPIDhIVuK0OaKrgFCFYQBRoMMjczNTcwMTk1NDMzIgw9KUpz%2F1Xu3z%2FXE3AqlQWSVBotzvD8b9lrJLvbk8KTuIdcVMG1sC1oano3GLiAx9xQYdHPOcHKLeWa90LpeIxucwF0uOdfoWdGCD89DoF%2FFb%2Fx5y3Opl6AV7zT0IhZQywxRtRJvARMc6utbT441haKW%2Ficp1VCltYWRu%2FO29Thvqend0ObY7gR87SgK3gm4yywB637XGrxhLKgdJA8biBEptyqTl2EfWmmSD1kaQ%2B24HnhgMwipn3XsCcAEzYHMWVaFKQBTlVKEqPDVJFjLiPpPUbzSDo3fNGFX5XibNXih8xZ%2FQFbpGVz2TElrCl%2BXSoPeq22huURYcF9FV1mHsMObDiHbQJNcfBtcBv%2FKGT8E%2BDos3oacAAQIWhjlnxWA6iQamou6bjaM8z8upqoFv5VnqcThB9xIMrGkRiRYK6nLTVwbD0wIcAPRE1zxV65ItHcR9B%2Fr5gdhAcej3RnrjAbxMxHyFD9Wq0VtBWEvscY8xLpv3hE8wToFH2bX%2F%2FuM%2BVsm7t1G5zBcW2mCGjM3cf%2Fas5e8VcHB2u%2BsiIddA5HRc5f%2F%2BpsVDTa70I1StaXWxLN9xGzFrPNmWTvMou9IwTei%2F2wKlvY%2FrI5lJ5FW%2FqEmdqjWbbTxCMpa%2BFWLNghKUvD4KBRN6ZBRb%2F%2BsUTNt18J3oZPtm5ZTLY2b7uhz1njZIlYAYdIg1jPgJgkg8BnIc4JjiS72c9xdLIjVeCCwqEmui2r9Sh3de2tXTmRjETqXLtiAOI8rFNfUZBARfpapt%2BKFTlvqyqz4nr9d4wpvS27KZNs6oydHw6PC1IrHVkiZmpqHPUzZ%2BbQWviBtNX8Z3CNpXjZHbb2Xf%2BQ1v0WxXNrnFzjWzlrFbphSGzKm1QMYZ99O6RZf9Sw4afOcP%2FX9ECYdPRtMLjqpM8GOrABjhjwNh76xWnuANPYKEswAhEb0OjgrjvOckCzLa58%2BxI%2BGFNrK%2FJQsI9zCI%2BBe2ekAkg7jLV67Dj0ef6%2BGNE0F8BYv4m3v8uNHXzy8IvmXBnse6qGPKEFvl0lAmCFdsYXQvi4iuOuf00ZXpZ0WCa%2FXkMFGZte3LUHQ%2BC3qYSscv1U%2FKM3R2bPiklioiloxA5OD5vI86SjWsqWAfr9cf%2F%2BaXxao2ITfpB5mpl3GvL9fgs%3D&amp;X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Credential=ASIAT7MQN47U4T3NQYJW%2F20260422%2Feu-west-1%2Fs3%2Faws4_request&amp;X-Amz-Date=20260422T214516Z&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Expires=900&amp;X-Amz-Signature=ef635134ea8844dbeadd9066e0bedfb12b952b1c0ed03bf5b13ef6af07785c76 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>\t\t<\/a>\r\n\t\t\t<\/figure>\r\n\t\t\t<h3 class=\"ttfmp-post-list-item-title\">\r\n\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/05\/25\/teachers-reflections-on-clpl-uhi-intro-to-cyber-security-online-course-for-teachers\/\">\r\n\t\t\tTEACHER&#8217;S REFLECTIONS ON CLPL &#8211; UHI INTRO TO CYBER SECURITY ONLINE COURSE FOR TEACHERS\t\t<\/a>\r\n\t<\/h3>\r\n\t\t<\/header>\r\n<div class=\"ttfmp-post-list-item-content\">\r\n\t<p>&#8220;Courses like this are vital to give teachers the skills and confidence to deliver Cyber Security to their pupils.&#8221; by Darren Brown, Computing Science Teacher&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/05\/25\/teachers-reflections-on-clpl-uhi-intro-to-cyber-security-online-course-for-teachers\/\">Read more<\/a><\/p>\n<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ttfmp-post-list-row ttfmp-section-paginate-item\">\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"ttfmp-post-list-item\">\r\n\t\t\t\t\t\t\r\n<header class=\"ttfmp-post-list-item-header\">\r\n\t\t<figure class=\"ttfmp-post-list-item-thumb position-top\">\r\n\t\t\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/04\/28\/clpl-introduction-to-cyber-security-at-uhi\/\">\r\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/04\/17101724\/13.png\" class=\"attachment-large size-large wp-post-image\" alt=\"CYBER SECURITY CLPL UHI\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/04\/17101724\/13.png 1024w, https:\/\/glow-prod-glowblogs.s3.eu-west-1.amazonaws.com\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/04\/17101724\/13-300x169.png?X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&amp;X-Amz-Security-Token=IQoJb3JpZ2luX2VjEI3%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCWV1LXdlc3QtMSJIMEYCIQDE1WqbLwgTQzg%2Fscp%2BYpabWzkwMiwYoj3K8C1okhRfVAIhAPuFbrbKrDS9yf2guFwR9OFfBfblZ3rsvPIDhIVuK0OaKrgFCFYQBRoMMjczNTcwMTk1NDMzIgw9KUpz%2F1Xu3z%2FXE3AqlQWSVBotzvD8b9lrJLvbk8KTuIdcVMG1sC1oano3GLiAx9xQYdHPOcHKLeWa90LpeIxucwF0uOdfoWdGCD89DoF%2FFb%2Fx5y3Opl6AV7zT0IhZQywxRtRJvARMc6utbT441haKW%2Ficp1VCltYWRu%2FO29Thvqend0ObY7gR87SgK3gm4yywB637XGrxhLKgdJA8biBEptyqTl2EfWmmSD1kaQ%2B24HnhgMwipn3XsCcAEzYHMWVaFKQBTlVKEqPDVJFjLiPpPUbzSDo3fNGFX5XibNXih8xZ%2FQFbpGVz2TElrCl%2BXSoPeq22huURYcF9FV1mHsMObDiHbQJNcfBtcBv%2FKGT8E%2BDos3oacAAQIWhjlnxWA6iQamou6bjaM8z8upqoFv5VnqcThB9xIMrGkRiRYK6nLTVwbD0wIcAPRE1zxV65ItHcR9B%2Fr5gdhAcej3RnrjAbxMxHyFD9Wq0VtBWEvscY8xLpv3hE8wToFH2bX%2F%2FuM%2BVsm7t1G5zBcW2mCGjM3cf%2Fas5e8VcHB2u%2BsiIddA5HRc5f%2F%2BpsVDTa70I1StaXWxLN9xGzFrPNmWTvMou9IwTei%2F2wKlvY%2FrI5lJ5FW%2FqEmdqjWbbTxCMpa%2BFWLNghKUvD4KBRN6ZBRb%2F%2BsUTNt18J3oZPtm5ZTLY2b7uhz1njZIlYAYdIg1jPgJgkg8BnIc4JjiS72c9xdLIjVeCCwqEmui2r9Sh3de2tXTmRjETqXLtiAOI8rFNfUZBARfpapt%2BKFTlvqyqz4nr9d4wpvS27KZNs6oydHw6PC1IrHVkiZmpqHPUzZ%2BbQWviBtNX8Z3CNpXjZHbb2Xf%2BQ1v0WxXNrnFzjWzlrFbphSGzKm1QMYZ99O6RZf9Sw4afOcP%2FX9ECYdPRtMLjqpM8GOrABjhjwNh76xWnuANPYKEswAhEb0OjgrjvOckCzLa58%2BxI%2BGFNrK%2FJQsI9zCI%2BBe2ekAkg7jLV67Dj0ef6%2BGNE0F8BYv4m3v8uNHXzy8IvmXBnse6qGPKEFvl0lAmCFdsYXQvi4iuOuf00ZXpZ0WCa%2FXkMFGZte3LUHQ%2BC3qYSscv1U%2FKM3R2bPiklioiloxA5OD5vI86SjWsqWAfr9cf%2F%2BaXxao2ITfpB5mpl3GvL9fgs%3D&amp;X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Credential=ASIAT7MQN47U4T3NQYJW%2F20260422%2Feu-west-1%2Fs3%2Faws4_request&amp;X-Amz-Date=20260422T214516Z&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Expires=900&amp;X-Amz-Signature=0f7290dfadaf67068c68df267b3d91b273d838a24a38caad01969ca3d7b5f01b 300w, https:\/\/glow-prod-glowblogs.s3.eu-west-1.amazonaws.com\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/04\/17101724\/13-267x150.png?X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&amp;X-Amz-Security-Token=IQoJb3JpZ2luX2VjEI3%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCWV1LXdlc3QtMSJIMEYCIQDE1WqbLwgTQzg%2Fscp%2BYpabWzkwMiwYoj3K8C1okhRfVAIhAPuFbrbKrDS9yf2guFwR9OFfBfblZ3rsvPIDhIVuK0OaKrgFCFYQBRoMMjczNTcwMTk1NDMzIgw9KUpz%2F1Xu3z%2FXE3AqlQWSVBotzvD8b9lrJLvbk8KTuIdcVMG1sC1oano3GLiAx9xQYdHPOcHKLeWa90LpeIxucwF0uOdfoWdGCD89DoF%2FFb%2Fx5y3Opl6AV7zT0IhZQywxRtRJvARMc6utbT441haKW%2Ficp1VCltYWRu%2FO29Thvqend0ObY7gR87SgK3gm4yywB637XGrxhLKgdJA8biBEptyqTl2EfWmmSD1kaQ%2B24HnhgMwipn3XsCcAEzYHMWVaFKQBTlVKEqPDVJFjLiPpPUbzSDo3fNGFX5XibNXih8xZ%2FQFbpGVz2TElrCl%2BXSoPeq22huURYcF9FV1mHsMObDiHbQJNcfBtcBv%2FKGT8E%2BDos3oacAAQIWhjlnxWA6iQamou6bjaM8z8upqoFv5VnqcThB9xIMrGkRiRYK6nLTVwbD0wIcAPRE1zxV65ItHcR9B%2Fr5gdhAcej3RnrjAbxMxHyFD9Wq0VtBWEvscY8xLpv3hE8wToFH2bX%2F%2FuM%2BVsm7t1G5zBcW2mCGjM3cf%2Fas5e8VcHB2u%2BsiIddA5HRc5f%2F%2BpsVDTa70I1StaXWxLN9xGzFrPNmWTvMou9IwTei%2F2wKlvY%2FrI5lJ5FW%2FqEmdqjWbbTxCMpa%2BFWLNghKUvD4KBRN6ZBRb%2F%2BsUTNt18J3oZPtm5ZTLY2b7uhz1njZIlYAYdIg1jPgJgkg8BnIc4JjiS72c9xdLIjVeCCwqEmui2r9Sh3de2tXTmRjETqXLtiAOI8rFNfUZBARfpapt%2BKFTlvqyqz4nr9d4wpvS27KZNs6oydHw6PC1IrHVkiZmpqHPUzZ%2BbQWviBtNX8Z3CNpXjZHbb2Xf%2BQ1v0WxXNrnFzjWzlrFbphSGzKm1QMYZ99O6RZf9Sw4afOcP%2FX9ECYdPRtMLjqpM8GOrABjhjwNh76xWnuANPYKEswAhEb0OjgrjvOckCzLa58%2BxI%2BGFNrK%2FJQsI9zCI%2BBe2ekAkg7jLV67Dj0ef6%2BGNE0F8BYv4m3v8uNHXzy8IvmXBnse6qGPKEFvl0lAmCFdsYXQvi4iuOuf00ZXpZ0WCa%2FXkMFGZte3LUHQ%2BC3qYSscv1U%2FKM3R2bPiklioiloxA5OD5vI86SjWsqWAfr9cf%2F%2BaXxao2ITfpB5mpl3GvL9fgs%3D&amp;X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Credential=ASIAT7MQN47U4T3NQYJW%2F20260422%2Feu-west-1%2Fs3%2Faws4_request&amp;X-Amz-Date=20260422T214516Z&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Expires=900&amp;X-Amz-Signature=3118f21a81ccb0e4393c3981482749781add427f9fc5c4750dc4a011851a145f 267w, https:\/\/glow-prod-glowblogs.s3.eu-west-1.amazonaws.com\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/04\/17101724\/13-768x432.png?X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&amp;X-Amz-Security-Token=IQoJb3JpZ2luX2VjEI3%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCWV1LXdlc3QtMSJIMEYCIQDE1WqbLwgTQzg%2Fscp%2BYpabWzkwMiwYoj3K8C1okhRfVAIhAPuFbrbKrDS9yf2guFwR9OFfBfblZ3rsvPIDhIVuK0OaKrgFCFYQBRoMMjczNTcwMTk1NDMzIgw9KUpz%2F1Xu3z%2FXE3AqlQWSVBotzvD8b9lrJLvbk8KTuIdcVMG1sC1oano3GLiAx9xQYdHPOcHKLeWa90LpeIxucwF0uOdfoWdGCD89DoF%2FFb%2Fx5y3Opl6AV7zT0IhZQywxRtRJvARMc6utbT441haKW%2Ficp1VCltYWRu%2FO29Thvqend0ObY7gR87SgK3gm4yywB637XGrxhLKgdJA8biBEptyqTl2EfWmmSD1kaQ%2B24HnhgMwipn3XsCcAEzYHMWVaFKQBTlVKEqPDVJFjLiPpPUbzSDo3fNGFX5XibNXih8xZ%2FQFbpGVz2TElrCl%2BXSoPeq22huURYcF9FV1mHsMObDiHbQJNcfBtcBv%2FKGT8E%2BDos3oacAAQIWhjlnxWA6iQamou6bjaM8z8upqoFv5VnqcThB9xIMrGkRiRYK6nLTVwbD0wIcAPRE1zxV65ItHcR9B%2Fr5gdhAcej3RnrjAbxMxHyFD9Wq0VtBWEvscY8xLpv3hE8wToFH2bX%2F%2FuM%2BVsm7t1G5zBcW2mCGjM3cf%2Fas5e8VcHB2u%2BsiIddA5HRc5f%2F%2BpsVDTa70I1StaXWxLN9xGzFrPNmWTvMou9IwTei%2F2wKlvY%2FrI5lJ5FW%2FqEmdqjWbbTxCMpa%2BFWLNghKUvD4KBRN6ZBRb%2F%2BsUTNt18J3oZPtm5ZTLY2b7uhz1njZIlYAYdIg1jPgJgkg8BnIc4JjiS72c9xdLIjVeCCwqEmui2r9Sh3de2tXTmRjETqXLtiAOI8rFNfUZBARfpapt%2BKFTlvqyqz4nr9d4wpvS27KZNs6oydHw6PC1IrHVkiZmpqHPUzZ%2BbQWviBtNX8Z3CNpXjZHbb2Xf%2BQ1v0WxXNrnFzjWzlrFbphSGzKm1QMYZ99O6RZf9Sw4afOcP%2FX9ECYdPRtMLjqpM8GOrABjhjwNh76xWnuANPYKEswAhEb0OjgrjvOckCzLa58%2BxI%2BGFNrK%2FJQsI9zCI%2BBe2ekAkg7jLV67Dj0ef6%2BGNE0F8BYv4m3v8uNHXzy8IvmXBnse6qGPKEFvl0lAmCFdsYXQvi4iuOuf00ZXpZ0WCa%2FXkMFGZte3LUHQ%2BC3qYSscv1U%2FKM3R2bPiklioiloxA5OD5vI86SjWsqWAfr9cf%2F%2BaXxao2ITfpB5mpl3GvL9fgs%3D&amp;X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Credential=ASIAT7MQN47U4T3NQYJW%2F20260422%2Feu-west-1%2Fs3%2Faws4_request&amp;X-Amz-Date=20260422T214516Z&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Expires=900&amp;X-Amz-Signature=66b2e3e7a7ffbe03c01f85e84348beb565a2345229366ba01a9720bce017145e 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>\t\t<\/a>\r\n\t\t\t<\/figure>\r\n\t\t\t<h3 class=\"ttfmp-post-list-item-title\">\r\n\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/04\/28\/clpl-introduction-to-cyber-security-at-uhi\/\">\r\n\t\t\tCLPL &#8211; Introduction to Cyber Security at UHI\t\t<\/a>\r\n\t<\/h3>\r\n\t\t<\/header>\r\n<div class=\"ttfmp-post-list-item-content\">\r\n\t<p>This module is aimed at qualified primary and secondary teachers who wish to develop the knowledge, understanding and problem-solving skills related to teaching basic cyber&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/04\/28\/clpl-introduction-to-cyber-security-at-uhi\/\">Read more<\/a><\/p>\n<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ttfmp-post-list-item\">\r\n\t\t\t\t\t\t\r\n<header class=\"ttfmp-post-list-item-header\">\r\n\t\t<figure class=\"ttfmp-post-list-item-thumb position-top\">\r\n\t\t\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/02\/18\/cyber-skills-live\/\">\r\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/02\/16145812\/cyber-skills-live.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/02\/16145812\/cyber-skills-live.png 1024w, https:\/\/glow-prod-glowblogs.s3.eu-west-1.amazonaws.com\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/02\/16145812\/cyber-skills-live-300x169.png?X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&amp;X-Amz-Security-Token=IQoJb3JpZ2luX2VjEI3%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCWV1LXdlc3QtMSJIMEYCIQDE1WqbLwgTQzg%2Fscp%2BYpabWzkwMiwYoj3K8C1okhRfVAIhAPuFbrbKrDS9yf2guFwR9OFfBfblZ3rsvPIDhIVuK0OaKrgFCFYQBRoMMjczNTcwMTk1NDMzIgw9KUpz%2F1Xu3z%2FXE3AqlQWSVBotzvD8b9lrJLvbk8KTuIdcVMG1sC1oano3GLiAx9xQYdHPOcHKLeWa90LpeIxucwF0uOdfoWdGCD89DoF%2FFb%2Fx5y3Opl6AV7zT0IhZQywxRtRJvARMc6utbT441haKW%2Ficp1VCltYWRu%2FO29Thvqend0ObY7gR87SgK3gm4yywB637XGrxhLKgdJA8biBEptyqTl2EfWmmSD1kaQ%2B24HnhgMwipn3XsCcAEzYHMWVaFKQBTlVKEqPDVJFjLiPpPUbzSDo3fNGFX5XibNXih8xZ%2FQFbpGVz2TElrCl%2BXSoPeq22huURYcF9FV1mHsMObDiHbQJNcfBtcBv%2FKGT8E%2BDos3oacAAQIWhjlnxWA6iQamou6bjaM8z8upqoFv5VnqcThB9xIMrGkRiRYK6nLTVwbD0wIcAPRE1zxV65ItHcR9B%2Fr5gdhAcej3RnrjAbxMxHyFD9Wq0VtBWEvscY8xLpv3hE8wToFH2bX%2F%2FuM%2BVsm7t1G5zBcW2mCGjM3cf%2Fas5e8VcHB2u%2BsiIddA5HRc5f%2F%2BpsVDTa70I1StaXWxLN9xGzFrPNmWTvMou9IwTei%2F2wKlvY%2FrI5lJ5FW%2FqEmdqjWbbTxCMpa%2BFWLNghKUvD4KBRN6ZBRb%2F%2BsUTNt18J3oZPtm5ZTLY2b7uhz1njZIlYAYdIg1jPgJgkg8BnIc4JjiS72c9xdLIjVeCCwqEmui2r9Sh3de2tXTmRjETqXLtiAOI8rFNfUZBARfpapt%2BKFTlvqyqz4nr9d4wpvS27KZNs6oydHw6PC1IrHVkiZmpqHPUzZ%2BbQWviBtNX8Z3CNpXjZHbb2Xf%2BQ1v0WxXNrnFzjWzlrFbphSGzKm1QMYZ99O6RZf9Sw4afOcP%2FX9ECYdPRtMLjqpM8GOrABjhjwNh76xWnuANPYKEswAhEb0OjgrjvOckCzLa58%2BxI%2BGFNrK%2FJQsI9zCI%2BBe2ekAkg7jLV67Dj0ef6%2BGNE0F8BYv4m3v8uNHXzy8IvmXBnse6qGPKEFvl0lAmCFdsYXQvi4iuOuf00ZXpZ0WCa%2FXkMFGZte3LUHQ%2BC3qYSscv1U%2FKM3R2bPiklioiloxA5OD5vI86SjWsqWAfr9cf%2F%2BaXxao2ITfpB5mpl3GvL9fgs%3D&amp;X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Credential=ASIAT7MQN47U4T3NQYJW%2F20260422%2Feu-west-1%2Fs3%2Faws4_request&amp;X-Amz-Date=20260422T214516Z&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Expires=900&amp;X-Amz-Signature=9260afe2a811199d7dc27e686ea1937d9fc7c5b58733fdf98190043a13d15df7 300w, https:\/\/glow-prod-glowblogs.s3.eu-west-1.amazonaws.com\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/02\/16145812\/cyber-skills-live-267x150.png?X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&amp;X-Amz-Security-Token=IQoJb3JpZ2luX2VjEI3%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCWV1LXdlc3QtMSJIMEYCIQDE1WqbLwgTQzg%2Fscp%2BYpabWzkwMiwYoj3K8C1okhRfVAIhAPuFbrbKrDS9yf2guFwR9OFfBfblZ3rsvPIDhIVuK0OaKrgFCFYQBRoMMjczNTcwMTk1NDMzIgw9KUpz%2F1Xu3z%2FXE3AqlQWSVBotzvD8b9lrJLvbk8KTuIdcVMG1sC1oano3GLiAx9xQYdHPOcHKLeWa90LpeIxucwF0uOdfoWdGCD89DoF%2FFb%2Fx5y3Opl6AV7zT0IhZQywxRtRJvARMc6utbT441haKW%2Ficp1VCltYWRu%2FO29Thvqend0ObY7gR87SgK3gm4yywB637XGrxhLKgdJA8biBEptyqTl2EfWmmSD1kaQ%2B24HnhgMwipn3XsCcAEzYHMWVaFKQBTlVKEqPDVJFjLiPpPUbzSDo3fNGFX5XibNXih8xZ%2FQFbpGVz2TElrCl%2BXSoPeq22huURYcF9FV1mHsMObDiHbQJNcfBtcBv%2FKGT8E%2BDos3oacAAQIWhjlnxWA6iQamou6bjaM8z8upqoFv5VnqcThB9xIMrGkRiRYK6nLTVwbD0wIcAPRE1zxV65ItHcR9B%2Fr5gdhAcej3RnrjAbxMxHyFD9Wq0VtBWEvscY8xLpv3hE8wToFH2bX%2F%2FuM%2BVsm7t1G5zBcW2mCGjM3cf%2Fas5e8VcHB2u%2BsiIddA5HRc5f%2F%2BpsVDTa70I1StaXWxLN9xGzFrPNmWTvMou9IwTei%2F2wKlvY%2FrI5lJ5FW%2FqEmdqjWbbTxCMpa%2BFWLNghKUvD4KBRN6ZBRb%2F%2BsUTNt18J3oZPtm5ZTLY2b7uhz1njZIlYAYdIg1jPgJgkg8BnIc4JjiS72c9xdLIjVeCCwqEmui2r9Sh3de2tXTmRjETqXLtiAOI8rFNfUZBARfpapt%2BKFTlvqyqz4nr9d4wpvS27KZNs6oydHw6PC1IrHVkiZmpqHPUzZ%2BbQWviBtNX8Z3CNpXjZHbb2Xf%2BQ1v0WxXNrnFzjWzlrFbphSGzKm1QMYZ99O6RZf9Sw4afOcP%2FX9ECYdPRtMLjqpM8GOrABjhjwNh76xWnuANPYKEswAhEb0OjgrjvOckCzLa58%2BxI%2BGFNrK%2FJQsI9zCI%2BBe2ekAkg7jLV67Dj0ef6%2BGNE0F8BYv4m3v8uNHXzy8IvmXBnse6qGPKEFvl0lAmCFdsYXQvi4iuOuf00ZXpZ0WCa%2FXkMFGZte3LUHQ%2BC3qYSscv1U%2FKM3R2bPiklioiloxA5OD5vI86SjWsqWAfr9cf%2F%2BaXxao2ITfpB5mpl3GvL9fgs%3D&amp;X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Credential=ASIAT7MQN47U4T3NQYJW%2F20260422%2Feu-west-1%2Fs3%2Faws4_request&amp;X-Amz-Date=20260422T214516Z&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Expires=900&amp;X-Amz-Signature=fc3645247c58ff6744fd31dd186308a3483c5c9457c81749f49f96d7f4247e9d 267w, https:\/\/glow-prod-glowblogs.s3.eu-west-1.amazonaws.com\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/02\/16145812\/cyber-skills-live-768x432.png?X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&amp;X-Amz-Security-Token=IQoJb3JpZ2luX2VjEI3%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCWV1LXdlc3QtMSJIMEYCIQDE1WqbLwgTQzg%2Fscp%2BYpabWzkwMiwYoj3K8C1okhRfVAIhAPuFbrbKrDS9yf2guFwR9OFfBfblZ3rsvPIDhIVuK0OaKrgFCFYQBRoMMjczNTcwMTk1NDMzIgw9KUpz%2F1Xu3z%2FXE3AqlQWSVBotzvD8b9lrJLvbk8KTuIdcVMG1sC1oano3GLiAx9xQYdHPOcHKLeWa90LpeIxucwF0uOdfoWdGCD89DoF%2FFb%2Fx5y3Opl6AV7zT0IhZQywxRtRJvARMc6utbT441haKW%2Ficp1VCltYWRu%2FO29Thvqend0ObY7gR87SgK3gm4yywB637XGrxhLKgdJA8biBEptyqTl2EfWmmSD1kaQ%2B24HnhgMwipn3XsCcAEzYHMWVaFKQBTlVKEqPDVJFjLiPpPUbzSDo3fNGFX5XibNXih8xZ%2FQFbpGVz2TElrCl%2BXSoPeq22huURYcF9FV1mHsMObDiHbQJNcfBtcBv%2FKGT8E%2BDos3oacAAQIWhjlnxWA6iQamou6bjaM8z8upqoFv5VnqcThB9xIMrGkRiRYK6nLTVwbD0wIcAPRE1zxV65ItHcR9B%2Fr5gdhAcej3RnrjAbxMxHyFD9Wq0VtBWEvscY8xLpv3hE8wToFH2bX%2F%2FuM%2BVsm7t1G5zBcW2mCGjM3cf%2Fas5e8VcHB2u%2BsiIddA5HRc5f%2F%2BpsVDTa70I1StaXWxLN9xGzFrPNmWTvMou9IwTei%2F2wKlvY%2FrI5lJ5FW%2FqEmdqjWbbTxCMpa%2BFWLNghKUvD4KBRN6ZBRb%2F%2BsUTNt18J3oZPtm5ZTLY2b7uhz1njZIlYAYdIg1jPgJgkg8BnIc4JjiS72c9xdLIjVeCCwqEmui2r9Sh3de2tXTmRjETqXLtiAOI8rFNfUZBARfpapt%2BKFTlvqyqz4nr9d4wpvS27KZNs6oydHw6PC1IrHVkiZmpqHPUzZ%2BbQWviBtNX8Z3CNpXjZHbb2Xf%2BQ1v0WxXNrnFzjWzlrFbphSGzKm1QMYZ99O6RZf9Sw4afOcP%2FX9ECYdPRtMLjqpM8GOrABjhjwNh76xWnuANPYKEswAhEb0OjgrjvOckCzLa58%2BxI%2BGFNrK%2FJQsI9zCI%2BBe2ekAkg7jLV67Dj0ef6%2BGNE0F8BYv4m3v8uNHXzy8IvmXBnse6qGPKEFvl0lAmCFdsYXQvi4iuOuf00ZXpZ0WCa%2FXkMFGZte3LUHQ%2BC3qYSscv1U%2FKM3R2bPiklioiloxA5OD5vI86SjWsqWAfr9cf%2F%2BaXxao2ITfpB5mpl3GvL9fgs%3D&amp;X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Credential=ASIAT7MQN47U4T3NQYJW%2F20260422%2Feu-west-1%2Fs3%2Faws4_request&amp;X-Amz-Date=20260422T214516Z&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Expires=900&amp;X-Amz-Signature=27bc2c0532dc3808464b531e5415dd0d262e492e195699a9ecd4d906bc9e2bf4 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>\t\t<\/a>\r\n\t\t\t<\/figure>\r\n\t\t\t<h3 class=\"ttfmp-post-list-item-title\">\r\n\t\t<a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/02\/18\/cyber-skills-live\/\">\r\n\t\t\tCYBER SKILLS LIVE\t\t<\/a>\r\n\t<\/h3>\r\n\t\t<\/header>\r\n<div class=\"ttfmp-post-list-item-content\">\r\n\t<p>The Cyber Skills Live site offers interactive ethical hacking challenges for learners to test their cyber security skills. Keep an eye on their site for&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/02\/18\/cyber-skills-live\/\">Read more<\/a><\/p>\n<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"cycle-pager\" id=\"builder-section-postlist_804-cycle-pager\"><\/div>\r\n\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\n\t<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>This page contains all the ideas, information and resources specific to Cyber Security in Scotland. Cyber Resilience and Internet Safety (CRIS) Our Digilearn.scot site contains all the ideas, information and resources for supporting Cyber Resilience and Internet Safety, as this sits within the Digital Literacy Experiences and Outcomes. Go to the CRIS site Cyber Security &hellip;<\/p>\n","protected":false},"author":61927,"featured_media":1989,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,168],"tags":[27],"class_list":["post-1273","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-secondary-resources","tag-cyber"],"jetpack_featured_media_url":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2022\/03\/21141732\/20220321_141639048_iOS.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/posts\/1273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/users\/61927"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/comments?post=1273"}],"version-history":[{"count":10,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/posts\/1273\/revisions"}],"predecessor-version":[{"id":1990,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/posts\/1273\/revisions\/1990"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/media\/1989"}],"wp:attachment":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/media?parent=1273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/categories?post=1273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/tags?post=1273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}