{"id":998,"date":"2021-05-19T14:58:55","date_gmt":"2021-05-19T13:58:55","guid":{"rendered":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/?p=998"},"modified":"2021-05-19T14:58:55","modified_gmt":"2021-05-19T13:58:55","slug":"digital-world-cyber-security-data-careers","status":"publish","type":"post","link":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/05\/19\/digital-world-cyber-security-data-careers\/","title":{"rendered":"DIGITAL WORLD &#8211; CYBER SECURITY &amp; DATA CAREERS"},"content":{"rendered":"<p><a href=\"https:\/\/www.digitalworld.net\/index.php\/for-teachers\">Digital World <\/a><a href=\"https:\/\/twitter.com\/digitalworldhq\">(@DigitalWorldHQ)<\/a> have created a toolkit to help teachers introduce <strong>cyber<\/strong> and <strong>data<\/strong> careers into the classroom. They&#8217;ve worked with experts to create a series of fun and engaging lessons that are easy to deliver and designed to fit a standard period.<\/p>\n<p>From how to rob a bank through to defending a hospital, and cracking passwords to tracking rhinos (and many more), their lessons can be found <a href=\"https:\/\/www.cyberskillslesson.com\/\">here.<\/a> So far, more than 100,000 pupils and teachers have used them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital World (@DigitalWorldHQ) have created a toolkit to help teachers introduce cyber and data careers into the classroom. They&#8217;ve worked with experts to create a series of fun and engaging lessons that are easy to deliver and designed to fit a standard period. From how to rob a bank through to defending a hospital, and &hellip;<\/p>\n","protected":false},"author":61927,"featured_media":1113,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[57,100,20],"class_list":["post-998","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-onlineplatforms","tag-platformsseniorphase","tag-resources"],"jetpack_featured_media_url":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/05\/19145547\/COMPUTING-SCIENCE-12.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/posts\/998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/users\/61927"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/comments?post=998"}],"version-history":[{"count":2,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/posts\/998\/revisions"}],"predecessor-version":[{"id":1114,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/posts\/998\/revisions\/1114"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/media\/1113"}],"wp:attachment":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/media?parent=998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/categories?post=998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/tags?post=998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}