{"id":22924,"date":"2024-11-28T13:27:51","date_gmt":"2024-11-28T13:27:51","guid":{"rendered":"https:\/\/virtual-routes.org\/?page_id=22924"},"modified":"2025-06-30T07:32:59","modified_gmt":"2025-06-30T06:32:59","slug":"kursy-cyberbezpieczenstwa","status":"publish","type":"page","link":"https:\/\/virtual-routes.org\/pl\/kursy-cyberbezpieczenstwa\/","title":{"rendered":"Kursy cyberbezpiecze\u0144stwa"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"22924\" class=\"elementor elementor-22924\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1efb2b e-flex e-con-boxed e-con e-parent\" data-id=\"c1efb2b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-152a237 e-con-full e-flex e-con e-child\" data-id=\"152a237\" data-element_type=\"container\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-5919a11 elementor-widget elementor-widget-heading\" data-id=\"5919a11\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Wst\u0119pne kursy online na temat cyberbezpiecze\u0144stwa<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3076d25 elementor-widget elementor-widget-text-editor\" data-id=\"3076d25\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>W ramach <a href=\"https:\/\/virtual-routes.org\/pl\/inicjatywy\/seminaria-dotyczace-cyberbezpieczenstwa\/\">Program seminari\u00f3w Google.org dotycz\u0105cych cyberbezpiecze\u0144stwa<\/a>Firma Virtual Routes opracowa\u0142a trzy dostosowane do indywidualnych potrzeb wst\u0119pne kursy online dotycz\u0105ce podstawowych temat\u00f3w cyberbezpiecze\u0144stwa. Kursy zosta\u0142y zaprojektowane przez Virtual Routes we wsp\u00f3\u0142pracy z naukowcami z najwy\u017cszej p\u00f3\u0142ki, z kt\u00f3rych ka\u017cdy ma wieloletnie do\u015bwiadczenie w badaniach i nauczaniu cyberbezpiecze\u0144stwa.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d84a92 elementor-widget elementor-widget-button\" data-id=\"2d84a92\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/pl\/login\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Przejd\u017a do kurs\u00f3w<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0bce0ca e-con-full e-flex e-con e-child\" data-id=\"0bce0ca\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46437c8 dce_masking-none elementor-widget elementor-widget-video\" data-id=\"46437c8\" data-element_type=\"widget\" data-settings=\"{&quot;loop&quot;:&quot;yes&quot;,&quot;video_type&quot;:&quot;vimeo&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<iframe class=\"elementor-video-iframe\" allowfullscreen allow=\"clipboard-write\" title=\"vimeo Odtwarzacz film\u00f3w\" src=\"https:\/\/player.vimeo.com\/video\/1073105688?color&amp;autopause=0&amp;loop=1&amp;muted=0&amp;title=1&amp;portrait=1&amp;byline=1&amp;h=a86134bb2d#t=\"><\/iframe>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78426fd elementor-absolute hide-stairs dce_masking-none elementor-invisible elementor-widget elementor-widget-image\" data-id=\"78426fd\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;slideInLeft&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img alt=\"\" loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"808\" src=\"https:\/\/virtual-routes.org\/wp-content\/uploads\/2024\/11\/Group-5.svg\" class=\"attachment-large size-large wp-image-1899\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5494a6d e-flex e-con-boxed e-con e-parent\" data-id=\"5494a6d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-edc4245 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"edc4245\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-18fefb4 e-con-full e-flex e-con e-child\" data-id=\"18fefb4\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d71faf elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"8d71faf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Co?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61405be elementor-widget elementor-widget-text-editor\" data-id=\"61405be\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Aby realizowa\u0107 cele programu Google.org Cybersecurity Seminars, ka\u017cdy kurs przedstawia <strong>kluczowe poj\u0119cia i zasady, zilustrowane jasnymi przyk\u0142adami<\/strong> i wspierane przez szereg interaktywnych \u0107wicze\u0144, takich jak momenty refleksji, pytania do dyskusji i analiza studium przypadku.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-083215c elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"083215c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dlaczego?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a274ce elementor-widget elementor-widget-text-editor\" data-id=\"1a274ce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Kursy te zapewniaj\u0105 <strong>znormalizowany poziom bazowy dla student\u00f3w<\/strong> w programie Google.org Cybersecurity Seminars, aby rozpocz\u0105\u0107 swoj\u0105 przygod\u0119 z cyberbezpiecze\u0144stwem. Zapewniaj\u0105 one, \u017ce studenci z r\u00f3\u017cnych \u015brodowisk mog\u0105 przyst\u0105pi\u0107 do programu z podstawow\u0105 wiedz\u0105 w kluczowych obszarach, w szczeg\u00f3lno\u015bci <strong>udane zaanga\u017cowanie w lokalne organizacje spo\u0142eczne<\/strong> (LCO).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4605d8b elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"4605d8b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jak?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dd49b9 elementor-widget elementor-widget-text-editor\" data-id=\"1dd49b9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Kursy te s\u0105 dost\u0119pne tylko dla student\u00f3w uczestnicz\u0105cych w programie Google.org Cybersecurity Seminars. Ka\u017cdy kurs sk\u0142ada si\u0119 z <strong>wyselekcjonowane po\u0142\u0105czenie tre\u015bci wideo i podpowiedzi do \u0107wicze\u0144<\/strong>Zaprojektowany, aby umo\u017cliwi\u0107 studentom samodzielne uczestnictwo w kursie lub uniwersytetom zintegrowanie kursu z ich seminariami na temat cyberbezpiecze\u0144stwa.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca67c5b elementor-absolute e-transform hide-stairs dce_masking-none elementor-widget elementor-widget-image\" data-id=\"ca67c5b\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:90,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img alt=\"\" loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"808\" src=\"https:\/\/virtual-routes.org\/wp-content\/uploads\/2024\/11\/white-stair.svg\" class=\"attachment-large size-large wp-image-10938\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b2d0089 e-flex e-con-boxed e-con e-parent\" data-id=\"b2d0089\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7502cdc elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7502cdc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">KURSY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c50439 e-con-full e-flex e-con e-child\" data-id=\"0c50439\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-be2d47f elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"be2d47f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wprowadzenie do cyberbezpiecze\u0144stwa<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-717d90c e-con-full e-flex e-con e-child\" data-id=\"717d90c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dc48d1 elementor-widget elementor-widget-heading\" data-id=\"0dc48d1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dr Jason Nurse, wyk\u0142adowca cyberbezpiecze\u0144stwa, University of Kent<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ec19c4 elementor-widget elementor-widget-text-editor\" data-id=\"9ec19c4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>W tym kursie dr Jason Nurse przedstawia pochodzenie i znaczenie cyberbezpiecze\u0144stwa oraz zwi\u0105zanych z nim poj\u0119\u0107, pokazuj\u0105c, w jaki spos\u00f3b obejmuje ono wiele dyscyplin i obszar\u00f3w badawczych. Nast\u0119pnie dr Nurse zajmuje si\u0119 ludzkimi aspektami cyberbezpiecze\u0144stwa, w tym kontekstem u\u017cytkownika, a tak\u017ce ludzkimi aspektami dynamiki atakuj\u0105cy-przeciwnik. Nast\u0119pnie dr Nurse koncentruje si\u0119 na powszechnych mechanizmach kontroli cyberbezpiecze\u0144stwa, pokazuj\u0105c, w jaki spos\u00f3b mog\u0105 one pom\u00f3c w szybkim podniesieniu poziomu cyberbezpiecze\u0144stwa w LCO, ale z pewnymi istotnymi ograniczeniami. Na koniec dr Nurse analizuje pojawiaj\u0105cy si\u0119 temat szk\u00f3d cybernetycznych i zarz\u0105dzania ryzykiem.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1b82723 e-con-full e-flex e-con e-child\" data-id=\"1b82723\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-3e6694b elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"3e6694b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wprowadzenie do bezpiecze\u0144stwa system\u00f3w<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33a8a7a e-con-full e-flex e-con e-child\" data-id=\"33a8a7a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7948158 elementor-widget elementor-widget-heading\" data-id=\"7948158\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Profesor Andrew Martin, profesor bezpiecze\u0144stwa system\u00f3w, Uniwersytet Oksfordzki<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99767d0 elementor-widget elementor-widget-text-editor\" data-id=\"99767d0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>W tym kursie profesor Andrew Martin przedstawia wprowadzenie do cyberbezpiecze\u0144stwa system\u00f3w cyfrowych. Profesor Martin najpierw przedstawia podstawowe koncepcje projektowania i wdra\u017cania system\u00f3w, a tak\u017ce kluczowe zagro\u017cenia dla system\u00f3w cyfrowych. Nast\u0119pnie profesor Martin omawia obszary projektowania system\u00f3w o szerokim wp\u0142ywie na cyberbezpiecze\u0144stwo, takie jak szyfrowanie i uwierzytelnianie. Przypadki te pokazuj\u0105, w jaki spos\u00f3b abstrakcja pomaga u\u017cytkownikom i projektantom przezwyci\u0119\u017cy\u0107 ogromn\u0105 z\u0142o\u017cono\u015b\u0107 system\u00f3w cyfrowych, ale z kolei wprowadza za\u0142o\u017cenia i oczekiwania, kt\u00f3re tworz\u0105 luki w zabezpieczeniach i prowadz\u0105 do awarii systemu.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f707b0 e-con-full e-flex e-con e-child\" data-id=\"1f707b0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-d85ade6 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"d85ade6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyberbezpiecze\u0144stwo w spo\u0142ecze\u0144stwie<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-56168a3 e-con-full e-flex e-con e-child\" data-id=\"56168a3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f33ed2e elementor-widget elementor-widget-heading\" data-id=\"f33ed2e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Lizzie Coles-Kemp, Principal Fellow, Instytut Bada\u0144 nad Socjotechnicznym Cyberbezpiecze\u0144stwem (RISCS)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82b0ff2 elementor-widget elementor-widget-text-editor\" data-id=\"82b0ff2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>W tym kursie profesor Lizzie Coles-Kemp bada miejsce cyberbezpiecze\u0144stwa w spo\u0142ecze\u0144stwie. Profesor Coles-Kemp najpierw szczeg\u00f3\u0142owo opisuje spo\u0142eczny wp\u0142yw kwestii cyberbezpiecze\u0144stwa i wprowadza koncepcj\u0119 cyberbezpiecze\u0144stwa skoncentrowanego na ludziach, opieraj\u0105c si\u0119 na teoriach u\u017cytecznego bezpiecze\u0144stwa i projektowania zorientowanego na u\u017cytkownika. Nast\u0119pnie profesor Coles-Kemp nakre\u015bla podej\u015bcie do zaanga\u017cowania spo\u0142eczno\u015bci lokalnej, kt\u00f3re rzuca wyzwanie ortodoksyjnym zasadom bezpiecze\u0144stwa i uznaje realia pracy z r\u00f3\u017cnorodnymi, zmarginalizowanymi i mniejszo\u015bciowymi grupami. Kurs ko\u0144czy si\u0119 studium przypadku dotycz\u0105cym aspekt\u00f3w cyberbezpiecze\u0144stwa nieformalnego dost\u0119pu do technologii cyfrowych.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b5a49a0 e-flex e-con-boxed e-con e-parent\" data-id=\"b5a49a0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e4315f elementor-align-center elementor-widget__width-inherit elementor-widget elementor-widget-button\" data-id=\"9e4315f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/pl\/login\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Przejd\u017a do kurs\u00f3w<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Wst\u0119pne kursy online na temat cyberbezpiecze\u0144stwa W ramach programu Google.org Cybersecurity Seminars firma Virtual Routes opracowa\u0142a trzy dostosowane do potrzeb wst\u0119pne kursy online na podstawowe tematy zwi\u0105zane z cyberbezpiecze\u0144stwem. Kursy zosta\u0142y zaprojektowane przez Virtual Routes we wsp\u00f3\u0142pracy z naukowcami z najwy\u017cszej p\u00f3\u0142ki, z kt\u00f3rych ka\u017cdy ma dziesi\u0119ciolecia do\u015bwiadczenia w badaniach i nauczaniu cyberbezpiecze\u0144stwa. Przejd\u017a do [...]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","inline_featured_image":false,"footnotes":""},"class_list":["post-22924","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/pages\/22924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/comments?post=22924"}],"version-history":[{"count":20,"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/pages\/22924\/revisions"}],"predecessor-version":[{"id":56537,"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/pages\/22924\/revisions\/56537"}],"wp:attachment":[{"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/media?parent=22924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}