{"id":110,"date":"2025-02-02T16:14:26","date_gmt":"2025-02-02T16:14:26","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=110"},"modified":"2025-11-30T21:56:48","modified_gmt":"2025-11-30T21:56:48","slug":"resume","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/aa10\/resume\/","title":{"rendered":"Resume"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/sites.wp.odu.edu\/aa10\/wp-content\/uploads\/sites\/38406\/2025\/11\/Resume.pdf\" alt=\"\" class=\"wp-image-414\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Certificates<\/h2>\n\n\n\n<ul>\n<li>Foundations of Cybersecurity (Google, 2025)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Certificates<\/p>\n","protected":false},"author":30504,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aa10\/wp-json\/wp\/v2\/pages\/110"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aa10\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aa10\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aa10\/wp-json\/wp\/v2\/users\/30504"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aa10\/wp-json\/wp\/v2\/comments?post=110"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/aa10\/wp-json\/wp\/v2\/pages\/110\/revisions"}],"predecessor-version":[{"id":415,"href":"https:\/\/sites.wp.odu.edu\/aa10\/wp-json\/wp\/v2\/pages\/110\/revisions\/415"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aa10\/wp-json\/wp\/v2\/media?parent=110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}