{"id":190,"date":"2025-10-19T22:06:36","date_gmt":"2025-10-19T22:06:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/anyiah-p\/?page_id=190"},"modified":"2025-11-30T22:38:03","modified_gmt":"2025-11-30T22:38:03","slug":"experience-page","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/anyiah-p\/experience-page\/","title":{"rendered":"Experience Page"},"content":{"rendered":"\n<p><strong>CYSE 450 (Ethical Hacking and Penetration)<\/strong><\/p>\n\n\n\n<p>Learned to spot vulnerabilities in data system<\/p>\n\n\n\n<p>Learned to perform penetration testing on various target systems<\/p>\n\n\n\n<p>Learned basic commands <\/p>\n\n\n\n<p><strong>CS462 (Cybersecurity Fundamentals)<\/strong><\/p>\n\n\n\n<p>Learned how to identify vulnerabilities in web applications and databases<\/p>\n\n\n\n<p>Learned about the importance of firewalls and virtual private networks (VPN)<\/p>\n\n\n\n<p>Learned about the core functions of TCP<\/p>\n\n\n\n<p><strong>CYSE495\/595 (Introduction to cyber risk management)<\/strong><\/p>\n\n\n\n<p>Learned effective risk management techniques in an organization<\/p>\n\n\n\n<p>Learned techniques to identify, examine, and mitigate threats, vulnerabilities, and exploits. <\/p>\n\n\n\n<p>Learned how to identify compliance laws, standards, best practices of risk management<\/p>\n\n\n\n<p><strong>CS463\/563 (Cryptography for\u00a0Cybersecurity)<\/strong><\/p>\n\n\n\n<p>Learned to explain functionality of current cryptographic techniques <\/p>\n\n\n\n<p>Learned basic mathematical techniques underlying cryptology<\/p>\n\n\n\n<p>Analyze applications in terms of security needs<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYSE 450 (Ethical Hacking and Penetration) Learned to spot vulnerabilities in data system Learned to perform penetration testing on various target systems Learned basic commands CS462 (Cybersecurity Fundamentals) Learned how to identify vulnerabilities in web applications and databases Learned about&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/anyiah-p\/experience-page\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26271,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/anyiah-p\/wp-json\/wp\/v2\/pages\/190"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/anyiah-p\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/anyiah-p\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/anyiah-p\/wp-json\/wp\/v2\/users\/26271"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/anyiah-p\/wp-json\/wp\/v2\/comments?post=190"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/anyiah-p\/wp-json\/wp\/v2\/pages\/190\/revisions"}],"predecessor-version":[{"id":227,"href":"https:\/\/sites.wp.odu.edu\/anyiah-p\/wp-json\/wp\/v2\/pages\/190\/revisions\/227"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/anyiah-p\/wp-json\/wp\/v2\/media?parent=190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}