{"id":22924,"date":"2024-11-28T13:27:51","date_gmt":"2024-11-28T13:27:51","guid":{"rendered":"https:\/\/virtual-routes.org\/?page_id=22924"},"modified":"2025-06-30T07:32:59","modified_gmt":"2025-06-30T06:32:59","slug":"cyberbeveiligingscursussen","status":"publish","type":"page","link":"https:\/\/virtual-routes.org\/nl\/cyberbeveiligingscursussen\/","title":{"rendered":"Cursussen cyberbeveiliging"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"22924\" class=\"elementor elementor-22924\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1efb2b e-flex e-con-boxed e-con e-parent\" data-id=\"c1efb2b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-152a237 e-con-full e-flex e-con e-child\" data-id=\"152a237\" data-element_type=\"container\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-5919a11 elementor-widget elementor-widget-heading\" data-id=\"5919a11\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Inleidende online cursussen over cyberbeveiliging<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3076d25 elementor-widget elementor-widget-text-editor\" data-id=\"3076d25\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Als onderdeel van de <a href=\"https:\/\/virtual-routes.org\/nl\/initiatieven\/cyberbeveiligingsseminars\/\">Google.org Cybersecurity Seminars-programma<\/a>, Virtual Routes heeft drie op maat gemaakte online introductiecursussen ontwikkeld over belangrijke onderwerpen op het gebied van cyberbeveiliging. De cursussen zijn ontworpen door Virtual Routes in samenwerking met vooraanstaande academici, die elk tientallen jaren ervaring hebben in onderzoek en onderwijs op het gebied van cyberbeveiliging.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d84a92 elementor-widget elementor-widget-button\" data-id=\"2d84a92\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/nl\/inloggen\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Ga naar cursussen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0bce0ca e-con-full e-flex e-con e-child\" data-id=\"0bce0ca\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46437c8 dce_masking-none elementor-widget elementor-widget-video\" data-id=\"46437c8\" data-element_type=\"widget\" data-settings=\"{&quot;loop&quot;:&quot;yes&quot;,&quot;video_type&quot;:&quot;vimeo&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<iframe class=\"elementor-video-iframe\" allowfullscreen allow=\"clipboard-write\" title=\"Vimeo-videospeler\" src=\"https:\/\/player.vimeo.com\/video\/1073105688?color&amp;autopause=0&amp;loop=1&amp;muted=0&amp;title=1&amp;portrait=1&amp;byline=1&amp;h=a86134bb2d#t=\"><\/iframe>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78426fd elementor-absolute hide-stairs dce_masking-none elementor-invisible elementor-widget elementor-widget-image\" data-id=\"78426fd\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;slideInLeft&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img alt=\"\" loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"808\" src=\"https:\/\/virtual-routes.org\/wp-content\/uploads\/2024\/11\/Group-5.svg\" class=\"attachment-large size-large wp-image-1899\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5494a6d e-flex e-con-boxed e-con e-parent\" data-id=\"5494a6d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-edc4245 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"edc4245\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-18fefb4 e-con-full e-flex e-con e-child\" data-id=\"18fefb4\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d71faf elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"8d71faf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wat?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61405be elementor-widget elementor-widget-text-editor\" data-id=\"61405be\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Om de doelstellingen van het Google.org Cybersecurity Seminars-programma te bevorderen, introduceert elke cursus <strong>belangrijke concepten en principes, ge\u00efllustreerd met duidelijke voorbeelden<\/strong> en ondersteund door een reeks interactieve oefeningen, zoals momenten van reflectie, discussievragen en casestudy-analyses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-083215c elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"083215c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Waarom?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a274ce elementor-widget elementor-widget-text-editor\" data-id=\"1a274ce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Deze cursussen bieden <strong>een gestandaardiseerde basisnorm voor studenten<\/strong> in het Google.org Cybersecurity Seminars-programma om hun cybersecurity-traject te beginnen. Ze zorgen ervoor dat studenten met verschillende achtergronden aan het programma kunnen deelnemen met basiskennis op belangrijke gebieden, met name <strong>succesvolle samenwerking met lokale maatschappelijke organisaties<\/strong> (LCO's).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4605d8b elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"4605d8b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hoe?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dd49b9 elementor-widget elementor-widget-text-editor\" data-id=\"1dd49b9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Deze cursussen zijn alleen beschikbaar voor studenten die deelnemen aan het Google.org Cybersecurity Seminars-programma. Elke cursus bestaat uit <strong>een zorgvuldig samengestelde mix van videocontent en oefeningen<\/strong>, ontworpen om studenten in staat te stellen de cursus zelfstandig te volgen of om universiteiten in staat te stellen de cursus te integreren in hun seminars over cyberbeveiliging.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca67c5b elementor-absolute e-transform hide-stairs dce_masking-none elementor-widget elementor-widget-image\" data-id=\"ca67c5b\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:90,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img alt=\"\" loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"808\" src=\"https:\/\/virtual-routes.org\/wp-content\/uploads\/2024\/11\/white-stair.svg\" class=\"attachment-large size-large wp-image-10938\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b2d0089 e-flex e-con-boxed e-con e-parent\" data-id=\"b2d0089\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7502cdc elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7502cdc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CURSUSSEN<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c50439 e-con-full e-flex e-con e-child\" data-id=\"0c50439\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-be2d47f elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"be2d47f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Inleiding tot cyberbeveiliging<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-717d90c e-con-full e-flex e-con e-child\" data-id=\"717d90c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dc48d1 elementor-widget elementor-widget-heading\" data-id=\"0dc48d1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dr. Jason Nurse, docent cyberbeveiliging, Universiteit van Kent<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ec19c4 elementor-widget elementor-widget-text-editor\" data-id=\"9ec19c4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In deze cursus geeft Dr. Jason Nurse een inleiding tot de oorsprong en betekenis van cyberbeveiliging en aanverwante concepten, waarbij hij laat zien hoe deze meerdere disciplines en onderzoeksgebieden omvat. Vervolgens gaat Dr. Nurse in op de menselijke aspecten van cyberbeveiliging, waaronder de gebruikerscontext en de menselijke aspecten van de dynamiek tussen aanvallers en verdedigers. Daarna richt Dr. Nurse zich op veelgebruikte cyberbeveiligingsmaatregelen en laat hij zien hoe deze kunnen helpen om het cyberbeveiligingsniveau in LCO's snel te verhogen, maar met enkele belangrijke beperkingen. Ten slotte gaat Dr. Nurse in op het opkomende onderwerp van cyber schade en risicobeheer.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1b82723 e-con-full e-flex e-con e-child\" data-id=\"1b82723\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-3e6694b elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"3e6694b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Inleiding tot systeembeveiliging<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33a8a7a e-con-full e-flex e-con e-child\" data-id=\"33a8a7a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7948158 elementor-widget elementor-widget-heading\" data-id=\"7948158\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Professor Andrew Martin, hoogleraar systeembeveiliging, Universiteit van Oxford<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99767d0 elementor-widget elementor-widget-text-editor\" data-id=\"99767d0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In deze cursus geeft professor Andrew Martin een inleiding tot de cyberbeveiliging van digitale systemen. Professor Martin schetst eerst de kernconcepten van systeemontwerp en -implementatie, evenals de belangrijkste bedreigingen voor digitale systemen. Vervolgens gaat professor Martin in op aspecten van systeemontwerp die een brede impact hebben op cyberbeveiliging, zoals encryptie en authenticatie. Deze voorbeelden laten zien hoe abstractie gebruikers en ontwerpers helpt om de enorme complexiteit van digitale systemen te overwinnen, maar tegelijkertijd aannames en verwachtingen introduceert die beveiligingsrisico's cre\u00ebren en tot systeemstoringen leiden.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f707b0 e-con-full e-flex e-con e-child\" data-id=\"1f707b0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-d85ade6 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"d85ade6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyberveiligheid in de samenleving<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-56168a3 e-con-full e-flex e-con e-child\" data-id=\"56168a3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f33ed2e elementor-widget elementor-widget-heading\" data-id=\"f33ed2e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Lizzie Coles-Kemp, hoofdonderzoeker, Onderzoeksinstituut voor Sociotechnische Cyberveiligheid (RISCS)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82b0ff2 elementor-widget elementor-widget-text-editor\" data-id=\"82b0ff2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In deze cursus onderzoekt professor Lizzie Coles-Kemp de plaats van cyberbeveiliging in de samenleving. Professor Coles-Kemp gaat eerst in op de maatschappelijke impact van cyberbeveiligingskwesties en introduceert het concept van mensgerichte cyberbeveiliging, voortbouwend op theorie\u00ebn over bruikbare beveiliging en gebruikersgericht ontwerp. Vervolgens schetst professor Coles-Kemp een benadering van lokale gemeenschapsbetrokkenheid die de orthodoxe opvattingen over beveiliging ter discussie stelt en de realiteit van het werken met diverse, gemarginaliseerde en geminoriseerde groepen onderkent. De cursus wordt afgesloten met een casestudy over de cyberbeveiligingsaspecten van informele begeleide toegang tot digitale technologie\u00ebn.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b5a49a0 e-flex e-con-boxed e-con e-parent\" data-id=\"b5a49a0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e4315f elementor-align-center elementor-widget__width-inherit elementor-widget elementor-widget-button\" data-id=\"9e4315f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/nl\/inloggen\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Ga naar cursussen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Inleidende online cursussen over cyberbeveiliging Als onderdeel van het Google.org Cybersecurity Seminars-programma heeft Virtual Routes drie op maat gemaakte inleidende online cursussen ontwikkeld over belangrijke onderwerpen op het gebied van cyberbeveiliging. De cursussen zijn ontworpen door Virtual Routes in samenwerking met vooraanstaande academici, die elk tientallen jaren ervaring hebben in onderzoek en onderwijs op het gebied van cyberbeveiliging. Ga naar [\u2026]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","inline_featured_image":false,"footnotes":""},"class_list":["post-22924","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/virtual-routes.org\/nl\/wp-json\/wp\/v2\/pages\/22924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtual-routes.org\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/virtual-routes.org\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/nl\/wp-json\/wp\/v2\/comments?post=22924"}],"version-history":[{"count":20,"href":"https:\/\/virtual-routes.org\/nl\/wp-json\/wp\/v2\/pages\/22924\/revisions"}],"predecessor-version":[{"id":56537,"href":"https:\/\/virtual-routes.org\/nl\/wp-json\/wp\/v2\/pages\/22924\/revisions\/56537"}],"wp:attachment":[{"href":"https:\/\/virtual-routes.org\/nl\/wp-json\/wp\/v2\/media?parent=22924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}