{"id":141,"date":"2024-01-14T21:24:06","date_gmt":"2024-01-14T21:24:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2026-02-10T19:22:48","modified_gmt":"2026-02-10T19:22:48","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/abrown201\/cyse-300\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.cdse.edu\/Document-Gallery\/igphoto\/2002839148\/\"><img loading=\"lazy\" decoding=\"async\" width=\"791\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-3-791x1024.png\" alt=\"\" class=\"wp-image-387\" srcset=\"https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-3-791x1024.png 791w, https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-3-232x300.png 232w, https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-3-768x995.png 768w, https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-3.png 834w\" sizes=\"(max-width: 791px) 100vw, 791px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/slidenest.com\/es\/template\/cyber-security-statistics-infographics\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-4-1024x576.png\" alt=\"\" class=\"wp-image-388\" srcset=\"https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-4-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-4-300x169.png 300w, https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-4-768x432.png 768w, https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-4-1536x864.png 1536w, https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-4-533x300.png 533w, https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-4.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.digitalvocano.com\/cybersecurity\/navigating-the-social-media-landscape-a-cyber-security-awareness-guide-october-cyber-security-awareness-month\"><img loading=\"lazy\" decoding=\"async\" width=\"870\" height=\"870\" src=\"https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-5.png\" alt=\"\" class=\"wp-image-389\" srcset=\"https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-5.png 870w, https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-5-300x300.png 300w, https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-5-150x150.png 150w, https:\/\/sites.wp.odu.edu\/abrown201\/wp-content\/uploads\/sites\/35357\/2026\/02\/image-5-768x768.png 768w\" sizes=\"(max-width: 870px) 100vw, 870px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":28385,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/users\/28385"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":391,"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/pages\/141\/revisions\/391"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}