{"id":21421,"date":"2022-12-27T11:23:51","date_gmt":"2022-12-27T05:53:51","guid":{"rendered":"https:\/\/www.ecoleglobale.com\/blog\/?p=21421"},"modified":"2022-12-27T11:23:51","modified_gmt":"2022-12-27T05:53:51","slug":"should-cybersecurity-taught-in-schools","status":"publish","type":"post","link":"https:\/\/www.ecoleglobale.com\/blog\/should-cybersecurity-taught-in-schools\/","title":{"rendered":"Why Should Cybersecurity Be Taught In Schools?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">While cybersecurity concerns are an everyday, nagging thought in many people&#8217;s minds, they may be unaware of the need for additional training. Cybersecurity is a topic that students are not taught in school. As per research conducted by <a href=\"https:\/\/www.ecoleglobale.com\/blog\/schools-in-dehradun\/\">Schools in Dehradun<\/a>, it is becoming increasingly important for students to learn about cybersecurity to ensure their financial, personal and mental well-being.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If this sounds like you, you might wonder: why is cybersecurity so critical to businesses and individuals? How should we best prepare the next generation for managing and defending against dangerous cyber threats?<\/span><\/p>\n<p><em><strong>Also read :<a href=\"https:\/\/www.ecoleglobale.com\/blog\/effects-of-cyber-bulling\/\"> How catfishing and cyberbullying affects people<\/a><\/strong><\/em><\/p>\n<div class=\"entry-content clr\"><\/div>\n<h2><b>Cybersecurity And Cybercrimes<\/b><\/h2>\n<p><img  fetchpriority=\"high\" decoding=\"async\" class=\"alignnone lazyload\"  width=\"786\" src=\"data:image\/svg+xml,%3Csvg%20xmlns=%22http:\/\/www.w3.org\/2000\/svg%22%20viewBox=%220%200%20786%20442%22%3E%3C\/svg%3E\" data-src=\"https:\/\/i0.wp.com\/krazytech.com\/wp-content\/uploads\/Cyber-Crime.jpg?fit=654%2C372&amp;ssl=1&amp;resize=1280%2C720\" alt=\"Cybersecurity And Cybercrimes\" width=\"786\" height=\"442\" \/><noscript><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/i0.wp.com\/krazytech.com\/wp-content\/uploads\/Cyber-Crime.jpg?fit=654%2C372&amp;ssl=1&amp;resize=1280%2C720\" alt=\"Cybersecurity And Cybercrimes\" width=\"786\" height=\"442\" \/><\/noscript><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity is the practice of protecting networks, systems, and data from unauthorised access or attack. It also refers to the collection of tools and practices used to protect those networks, systems, and data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A cyberattack is any attempt to breach computer security by gaining access to a computer system or network without authorisation or having been granted access.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybercrime is any crime that involves a computer, the internet, or information technology. It can include hacking into computers, stealing personal information, and other illegal activities related to technology.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Cyber Laws Every Indian Should Be Aware Of<\/b><\/h2>\n<p><img  decoding=\"async\" class=\"alignnone lazyload\"  width=\"733\" src=\"data:image\/svg+xml,%3Csvg%20xmlns=%22http:\/\/www.w3.org\/2000\/svg%22%20viewBox=%220%200%20733%20569%22%3E%3C\/svg%3E\" data-src=\"https:\/\/blog.ipleaders.in\/wp-content\/uploads\/2021\/08\/Cyber-law.jpg\" alt=\"Cyber Laws Every Indian Should Be Aware Of\" width=\"733\" height=\"569\" \/><noscript><img decoding=\"async\" class=\"alignnone\" src=\"https:\/\/blog.ipleaders.in\/wp-content\/uploads\/2021\/08\/Cyber-law.jpg\" alt=\"Cyber Laws Every Indian Should Be Aware Of\" width=\"733\" height=\"569\" \/><\/noscript><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The Information Technology Act of 2000 was put in place by the Indian government to control actions that infringe on an Internet user&#8217;s rights. Here are some of its components that aim to protect cyberspace while also empowering Internet users.<\/span><\/p>\n<p><b>Section 65 \u2013 Tampering with computer Source Documents<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Anyone who willfully conceals or destroys, or modifies any computer source code (such as programmes, computer commands, design, and layout) that must be kept up to date by law is guilty of an offence, and they could be sentenced to three years in prison, a fine of two lakh rupees, or both.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><b>Section 66 &#8211; Using the password of another person<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If a person fraudulently uses the password, digital signature or other unique identification of another person, he\/she can face imprisonment for up to 3 years or\/and a fine of 1 Lakh INR.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><b>Section 66D &#8211; Cheating Using computer resource<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A person who commits adultery via a computer or a communication device faces a maximum sentence of three years in prison or a fine of one lakh Indian rupees.<\/span><\/p>\n<p><b>\u00a0Section 66E &#8211; Publishing Private Images of Others<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A person can receive a punishment of up to 2 lakh INR or three years in prison if they take, send, or publish pictures of another person&#8217;s private parts without that person&#8217;s knowledge or consent.<\/span><\/p>\n<p><b>\u00a0Section 66F &#8211; Acts of cyber Terrorism<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If someone attempts to breach or access a computer resource without authorisation to endanger the unity, integrity, security, or sovereignty of the country, they risk receiving a life sentence. This offence is not subject to bail.<\/span><\/p>\n<p><b>Section 67 &#8211; Publishing Child Porn or predating children online<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If someone photographs, publishes, or sends out a video of a minor engaging in sexual activity, or coerces anyone under the age of 18 into having sex, they might spend up to seven years in prison, pay a fine of up to ten lakh rupees or both.<\/span><\/p>\n<p><b>Section 69 &#8211; Govt.&#8217;s Power to block websites<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Any information generated, transferred, received, or stored in any computer resource may be intercepted, monitored, or decrypted by the government if it deems it necessary to protect India&#8217;s sovereignty and integrity. The use of the power is contingent upon following the process. The central government is also permitted to restrict public access to any material under section 69A.<\/span><\/p>\n<p><b>Section 43A &#8211; Data protection at the Corporate level<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A body corporate is responsible for compensating the victim for losses or gains that were brought about by negligence in the implementation of appropriate security standards.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Poor Cyber Hygiene Can Put A Student&#8217;s Finances, Identity And Mental Health At Risk.<\/strong><\/h2>\n<p><img  decoding=\"async\" class=\"alignnone lazyload\"  width=\"721\" src=\"data:image\/svg+xml,%3Csvg%20xmlns=%22http:\/\/www.w3.org\/2000\/svg%22%20viewBox=%220%200%20721%20417%22%3E%3C\/svg%3E\" data-src=\"https:\/\/digitalguardian.com\/sites\/default\/files\/cyber_hygiene.png\" alt=\"Poor Cyber Hygiene Can Put A Student's Finances, Identity And Mental Health At Risk.\" width=\"721\" height=\"417\" \/><noscript><img decoding=\"async\" class=\"alignnone\" src=\"https:\/\/digitalguardian.com\/sites\/default\/files\/cyber_hygiene.png\" alt=\"Poor Cyber Hygiene Can Put A Student's Finances, Identity And Mental Health At Risk.\" width=\"721\" height=\"417\" \/><\/noscript><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Children are exposed to cyberbullying and sexual predators on social media platforms. There is also a lack of awareness regarding the dangers of sharing personal information online. Students are not taught how to protect themselves from these dangers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By teaching students about cybersecurity in schools, they will be able to make informed decisions about how they use technology and what precautions they need to take when using it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To better prepare students for what they may encounter online as adults, we need more educators who are qualified in this field. By offering classes on cyber security during high school or college years, students will have a better understanding of how their personal information can be protected while using technology devices such as smartphones and computers.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Schools Are Targets Of Cybercrime<\/strong><\/h2>\n<p><img  loading=\"lazy\" decoding=\"async\" class=\"alignnone lazyload\"  width=\"725\" src=\"data:image\/svg+xml,%3Csvg%20xmlns=%22http:\/\/www.w3.org\/2000\/svg%22%20viewBox=%220%200%20725%20483%22%3E%3C\/svg%3E\" data-src=\"https:\/\/cdn.fs.teachablecdn.com\/UNrgd2vROM1BWtogRbmA\" alt=\"Schools Are Targets Of Cybercrime\" width=\"725\" height=\"483\" \/><noscript><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/cdn.fs.teachablecdn.com\/UNrgd2vROM1BWtogRbmA\" alt=\"Schools Are Targets Of Cybercrime\" width=\"725\" height=\"483\" \/><\/noscript><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Schools are a common target for cybercrimes. One reason is that many schools have insufficient security measures to protect their data, hardware, and software. This can leave them vulnerable to attacks from malicious hackers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another reason why schools are targeted by cybercriminals is because of their location in remote places.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These small communities can be easy targets for attackers who wish to cause harm to their local communities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybercrime can also affect schools because they store sensitive information about students and staff members on their computers and networks. This type of information could be used by criminals seeking to steal identities or commit other crimes against people who use the school&#8217;s resources regularly.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Cybersecurity Attacks Are Increase Alarmingly\u00a0<\/strong><\/h2>\n<p><img  loading=\"lazy\" decoding=\"async\" class=\"alignnone lazyload\"  width=\"758\" src=\"data:image\/svg+xml,%3Csvg%20xmlns=%22http:\/\/www.w3.org\/2000\/svg%22%20viewBox=%220%200%20758%20400%22%3E%3C\/svg%3E\" data-src=\"https:\/\/imageio.forbes.com\/specials-images\/imageserve\/60748323005a4ab57c199223\/Global-computer-network-diagram--Cyber-futuristic-financial-network-security-concept-\/960x0.jpg?format=jpg&amp;width=960\" alt=\"Cybersecurity Attacks Are Increase Alarmingly\u00a0\" width=\"758\" height=\"400\" \/><noscript><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/imageio.forbes.com\/specials-images\/imageserve\/60748323005a4ab57c199223\/Global-computer-network-diagram--Cyber-futuristic-financial-network-security-concept-\/960x0.jpg?format=jpg&amp;width=960\" alt=\"Cybersecurity Attacks Are Increase Alarmingly\u00a0\" width=\"758\" height=\"400\" \/><\/noscript><\/p>\n<p><span style=\"font-weight: 400;\">According to a 2021 IBM Security X-Force research, a 23% increase in cybersecurity incidents required the team&#8217;s assistance. The first half (H1) of 2022 alone saw 6.74 million cyber incidents in India, according to the Indian Computer Emergency Response Team (CERT-In).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a result, it\u2019s become more important than ever to teach children about cybersecurity and how to protect themselves and others.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Protecting yourself online is just as crucial as knowing how to take care of your health and safety.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Students should have the opportunity to learn about cybersecurity through their school curriculum.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Future Careers Will Require Knowledge Of Cybersecurity<\/strong><\/h2>\n<p><img  loading=\"lazy\" decoding=\"async\" class=\"alignnone lazyload\"  width=\"767\" src=\"data:image\/svg+xml,%3Csvg%20xmlns=%22http:\/\/www.w3.org\/2000\/svg%22%20viewBox=%220%200%20767%20402%22%3E%3C\/svg%3E\" data-src=\"https:\/\/onlinedegrees.sandiego.edu\/wp-content\/uploads\/2020\/08\/USD-Cyber-Entry-Level-Job-Career-Guide-1-1-1.jpeg\" alt=\"Future Careers Will Require Knowledge Of Cybersecurity\" width=\"767\" height=\"402\" \/><noscript><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/onlinedegrees.sandiego.edu\/wp-content\/uploads\/2020\/08\/USD-Cyber-Entry-Level-Job-Career-Guide-1-1-1.jpeg\" alt=\"Future Careers Will Require Knowledge Of Cybersecurity\" width=\"767\" height=\"402\" \/><\/noscript><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The consequences of a cyber attack can be devastating and life-changing. Cybercriminals are using sophisticated tools and techniques to hack into our data and personal information, putting us at risk for identity theft, financial loss, and even physical harm. By teaching students about cybersecurity, we can help them recognise the signs of a cyber attack and how to prevent it from happening in the first place.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the modern world, cybersecurity is more important than ever.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity is a growing industry that requires extensive knowledge of new technologies and trends. In the past, computer science was not taught in schools, but now it is becoming increasingly important for students to know how computers work and how one uses them safely.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Students who study cybersecurity will have access to a wide range of careers in both government and private sector jobs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While it&#8217;s true that many cybersecurity jobs are found within large corporations or in government agencies, there are also plenty of opportunities for people who want to work on their own or with small groups.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The skills needed for these jobs are similar regardless of whether you&#8217;re working with a huge corporation or owning your own business:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">knowing how to protect yourself against attacks, building secure systems from scratch,\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">keeping up with new developments in technology<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">\u00a0so that you can stay ahead of the competition (or at least know what threats are coming).<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Cybersecurity-Related Jobs Are Well-Paying<\/strong><\/h2>\n<p><img  loading=\"lazy\" decoding=\"async\" class=\"alignnone lazyload\"  width=\"711\" src=\"data:image\/svg+xml,%3Csvg%20xmlns=%22http:\/\/www.w3.org\/2000\/svg%22%20viewBox=%220%200%20711%20400%22%3E%3C\/svg%3E\" data-src=\"https:\/\/onlinedegrees.sandiego.edu\/wp-content\/uploads\/2020\/06\/iStock-1194430861-1-2.jpeg\" alt=\"Cybersecurity-Related Jobs Are Well-Paying\" width=\"711\" height=\"400\" \/><noscript><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/onlinedegrees.sandiego.edu\/wp-content\/uploads\/2020\/06\/iStock-1194430861-1-2.jpeg\" alt=\"Cybersecurity-Related Jobs Are Well-Paying\" width=\"711\" height=\"400\" \/><\/noscript><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The Indian government has made cybersecurity a priority. To become more competitive in the global economy and attract foreign investment, Indian leaders want to ensure that they have enough skilled workers available to meet industry demand.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The former has created a boom in job opportunities that no one can afford to ignore. If you&#8217;re interested in pursuing a career in cybersecurity, now is a perfect time!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Advanced cybersecurity experts work in a &#8220;seller&#8217;s market&#8221; where there is no unemployment, employers are fighting for the best candidates, and senior-level positions pay up to $400,000 and more.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to Paul Smith, vice president of PEAK Technical Staffing, who was speaking to CSOonline.com, &#8220;The ideal candidate can command over $400,000 at the highest levels.&#8221; In addition to cybersecurity-specific jobs, security engineers and architects are also in high demand and make an average of $99,000 annually<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Following are some of the highest paying jobs after completing any course related to cyber security:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cybersecurity Analyst.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Information Security Manager.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cybersecurity Engineer.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Security Architect.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Application Security Engineer.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Network Security Engineer.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ethical Hackers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Chief Information Security Officer (CISO)<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2><strong>Teaching Students About Cybersecurity Can Help Protect The Wider Community Too<\/strong><\/h2>\n<p><img  loading=\"lazy\" decoding=\"async\" class=\"alignnone lazyload\"  width=\"719\" src=\"data:image\/svg+xml,%3Csvg%20xmlns=%22http:\/\/www.w3.org\/2000\/svg%22%20viewBox=%220%200%20719%20479%22%3E%3C\/svg%3E\" data-src=\"https:\/\/cdn.ucberkeleybootcamp.com\/wp-content\/uploads\/sites\/106\/2020\/09\/tes_cyb_blog_image_2.jpg\" alt=\"Teaching Students About Cybersecurity Can Help Protect The Wider Community Too\" width=\"719\" height=\"479\" \/><noscript><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/cdn.ucberkeleybootcamp.com\/wp-content\/uploads\/sites\/106\/2020\/09\/tes_cyb_blog_image_2.jpg\" alt=\"Teaching Students About Cybersecurity Can Help Protect The Wider Community Too\" width=\"719\" height=\"479\" \/><\/noscript><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In the age of social media, it&#8217;s not just students at risk of cyber threats. The whole community is affected.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When we learn of the most recent data breach or leak, we are puzzled as to how it could have occurred. In reality, suitable training and awareness can prevent many breaches and threats.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Many people must understand that cybersecurity is a worldwide problem and that teaching pupils about it can help them safeguard their communities and selves.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity encompasses everything from hacking to malware to phishing attacks. And while it may seem overwhelming, there are some easy ways you can teach your students about cybersecurity in an engaging way right now!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That&#8217;s why teaching kids about cybersecurity is so important; they are the ones who will be able to protect the broader community from online threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And, if you&#8217;re thinking that you don&#8217;t know enough about cybersecurity yourself to teach your kids about it, don&#8217;t worry! Plenty of resources are available for learning more about keeping yourself safe online\u2014and teaching your kids how not to get caught up in scams or other dangerous situations.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Cybersecurity is something one should read very well. Those who venture online ought to be aware of the former, and take precautions to defend themselves. Some go so far as to train to become cybersecurity professionals. Knowing when you&#8217;re over your head is just as crucial as knowing how to keep yourself safe online.<\/span><\/p>\n<p><strong>For any queries related to parenting, schooling, or any student-related tips,\u00a0<a href=\"https:\/\/www.ecoleglobale.com\/blog\/\">click here<\/a>\u00a0to check out our latest blogs<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While cybersecurity concerns are an everyday, nagging thought in many people&#8217;s minds, they may be unaware of the need for additional training. Cybersecurity is a topic that students are not taught in school. As per research conducted by Schools in Dehradun, it is becoming increasingly important for students to learn about cybersecurity to ensure their [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":21423,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","omw_enable_modal_window":"enable","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"off","ocean_gallery_id":[],"footnotes":""},"categories":[13209],"tags":[9308,13213,13216,13217,13211,13215,13214,9315,13212,9310],"class_list":["post-21421","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-should-cybersecurity-be-taught-in-schools","tag-cyber-security","tag-cyber-security-course","tag-cyber-security-explained","tag-cyber-security-pro-course","tag-cybersecurity","tag-it-security","tag-network-security","tag-security","tag-what-cybersecurity-do","tag-what-is-cyber-security","entry","has-media"],"_links":{"self":[{"href":"https:\/\/www.ecoleglobale.com\/blog\/wp-json\/wp\/v2\/posts\/21421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ecoleglobale.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecoleglobale.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecoleglobale.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecoleglobale.com\/blog\/wp-json\/wp\/v2\/comments?post=21421"}],"version-history":[{"count":2,"href":"https:\/\/www.ecoleglobale.com\/blog\/wp-json\/wp\/v2\/posts\/21421\/revisions"}],"predecessor-version":[{"id":21425,"href":"https:\/\/www.ecoleglobale.com\/blog\/wp-json\/wp\/v2\/posts\/21421\/revisions\/21425"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecoleglobale.com\/blog\/wp-json\/wp\/v2\/media\/21423"}],"wp:attachment":[{"href":"https:\/\/www.ecoleglobale.com\/blog\/wp-json\/wp\/v2\/media?parent=21421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecoleglobale.com\/blog\/wp-json\/wp\/v2\/categories?post=21421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecoleglobale.com\/blog\/wp-json\/wp\/v2\/tags?post=21421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}