{"id":296,"date":"2024-02-11T22:42:58","date_gmt":"2024-02-11T22:42:58","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/abrown201\/?p=296"},"modified":"2024-02-11T22:42:58","modified_gmt":"2024-02-11T22:42:58","slug":"journal-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/abrown201\/2024\/02\/11\/journal-5\/","title":{"rendered":"Journal #5"},"content":{"rendered":"\n<p><strong>C<\/strong>onsultant, as helping business with cybersecurity problems is especially useful.\u00a0<br><strong>Y<\/strong>outube\u00a0<br><strong>B<\/strong>ug bounty programs\u00a0<br><strong>E<\/strong>thical hacking services\u00a0<br><strong>R<\/strong>ed Teamer\u00a0<br><strong>S<\/strong>ecure websites for clients, making sure the websites are secure from common vulnerabilities.\u00a0<br><strong>E<\/strong>xpounding on security safety\u00a0<br><strong>C<\/strong>reate your startup, as in creating your own cybersecurity company\u00a0<br><strong>U<\/strong>nite and gather reports and attacks from many companies to help improve and prevent attacks that have happened.\u00a0<br><strong>R<\/strong>esearching vulnerabilities before attackers do \u00a0<br><strong>I<\/strong>ncident response services offering help to companies respond to incidents\u00a0<br><strong>T<\/strong>ester for penetrations, as doing attacks on digital components of a company\u00a0<br><strong>Y<\/strong>acht GPS software that is secure\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Consultant, as helping business with cybersecurity problems is especially useful.\u00a0Youtube\u00a0Bug bounty programs\u00a0Ethical hacking services\u00a0Red Teamer\u00a0Secure websites for clients, making sure the websites are secure from common vulnerabilities.\u00a0Expounding on security safety\u00a0Create your startup, as in creating your own cybersecurity company\u00a0Unite and gather reports and attacks from many companies to help improve and prevent attacks that have&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/abrown201\/2024\/02\/11\/journal-5\/\">Read More<\/a><\/div>\n","protected":false},"author":28385,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/users\/28385"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/posts\/296\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abrown201\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}