{"id":296,"date":"2024-04-21T23:50:41","date_gmt":"2024-04-21T23:50:41","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ajohn256\/?p=296"},"modified":"2024-04-21T23:50:41","modified_gmt":"2024-04-21T23:50:41","slug":"use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ajohn256\/2024\/04\/21\/use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity\/","title":{"rendered":"Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.\u00a0"},"content":{"rendered":"\n<p>Create\u00a0app\u00a0that rates software.<br>Yacht\u00a0GPS software that is secure<br>Banning cyberattacks on a business<br>Ethical hacking<br>Robotic Process Automation Security Integration<br>Set up a firewall for a website<br>Endpoint Security Solutions<br>Create Online Cyber Security Courses or Bootcamps<br>User Authentication Solutions<br>Remote Cybersecurity Consulting<br>Individual Coaching on cybersecurity<br>Trade in Cyber Security Stocks<br>Youth Cybersecurity Education Programs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Create\u00a0app\u00a0that rates software.Yacht\u00a0GPS software that is secureBanning cyberattacks on a businessEthical hackingRobotic Process Automation Security IntegrationSet up a firewall for a websiteEndpoint Security SolutionsCreate Online Cyber Security Courses or BootcampsUser Authentication SolutionsRemote Cybersecurity ConsultingIndividual Coaching on cybersecurityTrade in Cyber Security StocksYouth Cybersecurity Education Programs<\/p>\n","protected":false},"author":28367,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ajohn256\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ajohn256\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ajohn256\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ajohn256\/wp-json\/wp\/v2\/users\/28367"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ajohn256\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ajohn256\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/sites.wp.odu.edu\/ajohn256\/wp-json\/wp\/v2\/posts\/296\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ajohn256\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ajohn256\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ajohn256\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}