{"id":340,"date":"2024-09-03T01:22:27","date_gmt":"2024-09-03T01:22:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/apeji001\/?page_id=340"},"modified":"2024-12-08T21:50:43","modified_gmt":"2024-12-08T21:50:43","slug":"cyse201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/apeji001\/cyse201s\/","title":{"rendered":"CYSE201S"},"content":{"rendered":"\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-apeji-001 wp-block-embed-apeji-001\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"xAxos5cpOb\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/12\/08\/week-15-watch-this-video-and-think-about-how-the-career-of-digital-forensics-investigators-relate-to-the-social-sciences-write-a-journal-entry-describing-what-you-think-about-the-speakers-p\/\">Week 15: Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker\u2019s pathway to his career.<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 15: Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker\u2019s pathway to his career.&#8221; &#8212; apeji001\" src=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/12\/08\/week-15-watch-this-video-and-think-about-how-the-career-of-digital-forensics-investigators-relate-to-the-social-sciences-write-a-journal-entry-describing-what-you-think-about-the-speakers-p\/embed\/#?secret=gh1yw2tq9Z#?secret=xAxos5cpOb\" data-secret=\"xAxos5cpOb\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-apeji-001 wp-block-embed-apeji-001\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"Rqo0cET3dL\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/11\/21\/week-12-andriy-links-slynchuk-has-described-eleven-things-internet-users-do-that-may-be-illegal-review-what-the-author-says-and-write-a-paragraph-describing-the-five-most-serious-violations-and\/\">Week 12 #14: Andriy\u00a0Links Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 12 #14: Andriy\u00a0Links Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.&#8221; &#8212; apeji001\" src=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/11\/21\/week-12-andriy-links-slynchuk-has-described-eleven-things-internet-users-do-that-may-be-illegal-review-what-the-author-says-and-write-a-paragraph-describing-the-five-most-serious-violations-and\/embed\/#?secret=oMaxHXxCgs#?secret=Rqo0cET3dL\" data-secret=\"Rqo0cET3dL\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-apeji-001 wp-block-embed-apeji-001\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"OZ30DxpiKz\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/11\/14\/week-11-13-a-later-module-addresses-cybersecurity-policy-through-a-social-science-framework-at-this-point-attention-can-be-drawn-to-one-type-of-policy-known-as-bug-bounty-policies-these-policies\/\">Week 11 #13: A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article\u00a0and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 11 #13: A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0 To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills.\u00a0 The policies relate to economics in that they are based on cost\/benefits principles.\u00a0 Read this article\u00a0and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.&#8221; &#8212; apeji001\" src=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/11\/14\/week-11-13-a-later-module-addresses-cybersecurity-policy-through-a-social-science-framework-at-this-point-attention-can-be-drawn-to-one-type-of-policy-known-as-bug-bounty-policies-these-policies\/embed\/#?secret=PNAOPKx8rh#?secret=OZ30DxpiKz\" data-secret=\"OZ30DxpiKz\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-apeji-001 wp-block-embed-apeji-001\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"cr75TQ5xce\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/11\/14\/read-this-sample-breach-letter-sample-data-breach-notification-and-describe-how-two-different-economics-theories-and-two-different-social-sciences-theories-relate-to-the-letter\/\">Week 11 #12: Read this\u00a0sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter.<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 11 #12: Read this\u00a0sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter.&#8221; &#8212; apeji001\" src=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/11\/14\/read-this-sample-breach-letter-sample-data-breach-notification-and-describe-how-two-different-economics-theories-and-two-different-social-sciences-theories-relate-to-the-letter\/embed\/#?secret=EVoFy7Leqj#?secret=cr75TQ5xce\" data-secret=\"cr75TQ5xce\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-apeji-001 wp-block-embed-apeji-001\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"sHYJf8vMYI\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/11\/06\/week-10-11-as-you-watch-the-video-think-about-how-the-description-of-the-cybersecurity-analyst-job-relates-to-social-behaviors-write-a-paragraph-describing-social-themes-that-arise-in-the-pr\/\">Week 10 #11: As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors.\u00a0 Write a paragraph describing social themes that arise in the presentation. https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 10 #11: As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors.\u00a0 Write a paragraph describing social themes that arise in the presentation. https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0&#8221; &#8212; apeji001\" src=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/11\/06\/week-10-11-as-you-watch-the-video-think-about-how-the-description-of-the-cybersecurity-analyst-job-relates-to-social-behaviors-write-a-paragraph-describing-social-themes-that-arise-in-the-pr\/embed\/#?secret=fcyyUnmbP7#?secret=sHYJf8vMYI\" data-secret=\"sHYJf8vMYI\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-apeji-001 wp-block-embed-apeji-001\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"Eu4GPFJKGT\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/11\/06\/journal-10-read-this-and-write-a-journal-entry-summarizing-your-response-to-the-article-on-social-cybersecurity\/\">Week 10 #10: Read this and write a journal entry summarizing your response to the article on social cybersecurity<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 10 #10: Read this and write a journal entry summarizing your response to the article on social cybersecurity&#8221; &#8212; apeji001\" src=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/11\/06\/journal-10-read-this-and-write-a-journal-entry-summarizing-your-response-to-the-article-on-social-cybersecurity\/embed\/#?secret=DOzcimcxG9#?secret=Eu4GPFJKGT\" data-secret=\"Eu4GPFJKGT\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-apeji-001 wp-block-embed-apeji-001\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"Y3906k6vhw\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/10\/31\/week-9-complete-the-social-media-disorder-scale-how-did-you-score-what-do-you-think-about-the-items-in-the-scale-why-do-you-think-that-different-patterns-are-found-across-the-world\/\">Week 9: Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 9: Complete the Social Media Disorder scale. How did you score? What do you think about the items in the scale? Why do you think that different patterns are found across the world?&#8221; &#8212; apeji001\" src=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/10\/31\/week-9-complete-the-social-media-disorder-scale-how-did-you-score-what-do-you-think-about-the-items-in-the-scale-why-do-you-think-that-different-patterns-are-found-across-the-world\/embed\/#?secret=4r64PJnnef#?secret=Y3906k6vhw\" data-secret=\"Y3906k6vhw\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-apeji-001 wp-block-embed-apeji-001\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"CllYU8Vl6y\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/10\/24\/week-8-after-watching-the-video-write-a-journal-entry-about-how-you-think-the-media-influences-our-understanding-about-cybersecurity\/\">Week 8: After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 8: After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity.&#8221; &#8212; apeji001\" src=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/10\/24\/week-8-after-watching-the-video-write-a-journal-entry-about-how-you-think-the-media-influences-our-understanding-about-cybersecurity\/embed\/#?secret=HfuZBlLNMJ#?secret=CllYU8Vl6y\" data-secret=\"CllYU8Vl6y\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-apeji-001 wp-block-embed-apeji-001\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"oN3xtUFBuw\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/10\/20\/week-7-review-the-following-ten-photos-through-a-human-centered-cybersecurity-framework-create-a-meme-for-your-favorite-three-explaining-what-is-going-on-in-the-individuals-or-individuals\/\">Week 7: Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s).<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 7: Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s).&#8221; &#8212; apeji001\" src=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/10\/20\/week-7-review-the-following-ten-photos-through-a-human-centered-cybersecurity-framework-create-a-meme-for-your-favorite-three-explaining-what-is-going-on-in-the-individuals-or-individuals\/embed\/#?secret=i5RwWH8qV7#?secret=oN3xtUFBuw\" data-secret=\"oN3xtUFBuw\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-apeji-001 wp-block-embed-apeji-001\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"wDK6jgsTCt\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/10\/09\/week-6-can-you-spot-three-fake-websites-and-compare-the-three-fake-websites-to-three-real-websites-plus-showcase-what-makes-the-fake-websites-fake\/\">Week 6: Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 6: Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?&#8221; &#8212; apeji001\" src=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/10\/09\/week-6-can-you-spot-three-fake-websites-and-compare-the-three-fake-websites-to-three-real-websites-plus-showcase-what-makes-the-fake-websites-fake\/embed\/#?secret=5Ww729mvnK#?secret=wDK6jgsTCt\" data-secret=\"wDK6jgsTCt\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-apeji-001 wp-block-embed-apeji-001\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"kQQYYEAH2g\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/10\/02\/week-5-review-the-articles-linked-with-each-individual-motive-in-the-presentation-page-or-slide-4-rank-the-motives-from-1-to-7-as-the-motives-that-you-think-make-the-most-sense-being-1-to-the-le\/\">Week 5: Review the articles linked with each individual motive in the presentation page or Slide #4.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 5: Review the articles linked with each individual motive in the presentation page or Slide #4.  Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).  Explain why you rank each motive the way you rank it.&#8221; &#8212; apeji001\" src=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/10\/02\/week-5-review-the-articles-linked-with-each-individual-motive-in-the-presentation-page-or-slide-4-rank-the-motives-from-1-to-7-as-the-motives-that-you-think-make-the-most-sense-being-1-to-the-le\/embed\/#?secret=aGJGBJx4Vs#?secret=kQQYYEAH2g\" data-secret=\"kQQYYEAH2g\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-apeji-001 wp-block-embed-apeji-001\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"mUjaK3eO2R\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/09\/26\/week-4-review-maslows-hierarchy-of-needs-and-explain-how-each-level-relates-to-your-experiences-with-technology-give-specific-examples-of-how-your-digital-experiences-relate-to-each-level-o\/\">Week 4: Review Maslow\u2019s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 4: Review Maslow\u2019s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.&#8221; &#8212; apeji001\" src=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/09\/26\/week-4-review-maslows-hierarchy-of-needs-and-explain-how-each-level-relates-to-your-experiences-with-technology-give-specific-examples-of-how-your-digital-experiences-relate-to-each-level-o\/embed\/#?secret=zBINoXkswb#?secret=mUjaK3eO2R\" data-secret=\"mUjaK3eO2R\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-apeji-001 wp-block-embed-apeji-001\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"FptMBewwC9\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/09\/19\/week-3-visit-privacyrights-org-to-see-the-types-of-publicly-available-information-about-data-breaches-how-might-researchers-use-this-information-to-study-breaches\/\">Week 3: Visit\u00a0PrivacyRights.org to\u00a0see the types of publicly available information\u00a0about data breaches. How might researchers use this information to\u00a0study breaches?<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 3: Visit\u00a0PrivacyRights.org to\u00a0see the types of publicly available information\u00a0about data breaches. How might researchers use this information to\u00a0study breaches?&#8221; &#8212; apeji001\" src=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/09\/19\/week-3-visit-privacyrights-org-to-see-the-types-of-publicly-available-information-about-data-breaches-how-might-researchers-use-this-information-to-study-breaches\/embed\/#?secret=k2HNNAdC1G#?secret=FptMBewwC9\" data-secret=\"FptMBewwC9\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-apeji-001 wp-block-embed-apeji-001\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"suxnpAEI2I\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/09\/12\/week-2-explain-how-the-principles-of-science-relate-to-cybersecurity\/\">Week 2: Explain how the principles of science relate to cybersecurity.<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 2: Explain how the principles of science relate to cybersecurity.&#8221; &#8212; apeji001\" src=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/09\/12\/week-2-explain-how-the-principles-of-science-relate-to-cybersecurity\/embed\/#?secret=2Hdj3NdIGK#?secret=suxnpAEI2I\" data-secret=\"suxnpAEI2I\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-apeji-001 wp-block-embed-apeji-001\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"hcM25xXeoc\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/09\/05\/week-1-review-the-nice-workforce-framework-are-there-certain-areas-that-you-would-want-to-focus-your-career-on-explain-which-areas-would-appeal-the-most-to-you-and-which-would-appeal-the\/\">Week 1: Review the NICE Workforce Framework. Are there certain areas that you\u00a0would want to focus your career on? Explain which areas would appeal\u00a0the most to you and which would appeal the least.<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 1: Review the NICE Workforce Framework. Are there certain areas that you\u00a0would want to focus your career on? Explain which areas would appeal\u00a0the most to you and which would appeal the least.&#8221; &#8212; apeji001\" src=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/09\/05\/week-1-review-the-nice-workforce-framework-are-there-certain-areas-that-you-would-want-to-focus-your-career-on-explain-which-areas-would-appeal-the-most-to-you-and-which-would-appeal-the\/embed\/#?secret=8od2d58o62#?secret=hcM25xXeoc\" data-secret=\"hcM25xXeoc\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":28253,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/pages\/340"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/users\/28253"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/comments?post=340"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/pages\/340\/revisions"}],"predecessor-version":[{"id":449,"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/pages\/340\/revisions\/449"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/media?parent=340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}