{"id":26,"date":"2023-05-23T16:10:51","date_gmt":"2023-05-23T16:10:51","guid":{"rendered":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/?page_id=26"},"modified":"2024-07-12T12:28:17","modified_gmt":"2024-07-12T12:28:17","slug":"resources","status":"publish","type":"page","link":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/resources\/","title":{"rendered":"Resources"},"content":{"rendered":"\n\n\n\n\n<p>Link to the PD Course &#8211; <a href=\"https:\/\/rise.articulate.com\/share\/lJ0GsGjzaS0Mn31KljV9cbRZ4yD7WWWu#\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/rise.articulate.com\/share\/lJ0GsGjzaS0Mn31KljV9cbRZ4yD7WWWu#\/<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/rise.articulate.com\/share\/lJ0GsGjzaS0Mn31KljV9cbRZ4yD7WWWu#\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"557\" src=\"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2024\/07\/Screenshot-2024-07-12-at-8.25.50\u202fAM-1024x557.png\" alt=\"\" class=\"wp-image-146\" srcset=\"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2024\/07\/Screenshot-2024-07-12-at-8.25.50\u202fAM-1024x557.png 1024w, https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2024\/07\/Screenshot-2024-07-12-at-8.25.50\u202fAM-300x163.png 300w, https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2024\/07\/Screenshot-2024-07-12-at-8.25.50\u202fAM-768x418.png 768w, https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2024\/07\/Screenshot-2024-07-12-at-8.25.50\u202fAM.png 1096w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Link to the PD Course &#8211; https:\/\/rise.articulate.com\/share\/lJ0GsGjzaS0Mn31KljV9cbRZ4yD7WWWu#\/<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ncst_custom_author":"","ncst_show_custom_author":false,"ncst_dynamicHeaderBlockName":"ncst\/default-header","ncst_dynamicHeaderData":"{\"pageIntro\":\"First Implementation - Summer 2023 - 35 teachers, technology facilitators and administrators completed the professional development as of July 15, 2023<br><br>Second Implementation - Fall 2023 - 15 teachers, technology facilitators and administrators completed the professional development as of Dec 15, 2023\"}","ncst_content_audit_freq":"","ncst_content_audit_date":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-26","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/pages\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/comments?post=26"}],"version-history":[{"count":10,"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/pages\/26\/revisions"}],"predecessor-version":[{"id":150,"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/pages\/26\/revisions\/150"}],"wp:attachment":[{"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/media?parent=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}