{"id":297,"date":"2024-02-08T03:31:21","date_gmt":"2024-02-08T03:31:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/apeji001\/?p=297"},"modified":"2024-02-08T03:31:21","modified_gmt":"2024-02-08T03:31:21","slug":"journal-5-use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/02\/08\/journal-5-use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity\/","title":{"rendered":"Journal #5: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity."},"content":{"rendered":"\n<p>C &#8211; Create online Cybersecurity courses to help others.<\/p>\n\n\n\n<p>Y &#8211; YouTube videos that are based in cybersecurity.<\/p>\n\n\n\n<p>B &#8211; Become a cybersecurity consultant.<\/p>\n\n\n\n<p>E &#8211; Ethically hack for organizations that need to improve security.<\/p>\n\n\n\n<p>R &#8211; Report in journals or newspapers as a cybersecurity news writer.<\/p>\n\n\n\n<p>S &#8211; Speak to the public about cybersecurity. <\/p>\n\n\n\n<p>E &#8211; Educate others on cybersecurity at a university.<\/p>\n\n\n\n<p>C &#8211; Create your own business using cybersecurity.<\/p>\n\n\n\n<p>U &#8211; Utilize writing and write books on cybersecurity.<\/p>\n\n\n\n<p>R &#8211; Run your own projects as a cybersecurity freelancer.<\/p>\n\n\n\n<p>I &#8211; Individually coach others into cybersecurity careers.<\/p>\n\n\n\n<p>T &#8211; Trade cybersecurity stocks.<\/p>\n\n\n\n<p>Y &#8211; Yield cybersecurity applications for the app store.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>C &#8211; Create online Cybersecurity courses to help others. Y &#8211; YouTube videos that are based in cybersecurity. B &#8211; Become a cybersecurity consultant. E &#8211; Ethically hack for organizations that need to improve security. R &#8211; Report in journals or newspapers as a cybersecurity news writer. S &#8211; Speak to the public about cybersecurity&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/apeji001\/2024\/02\/08\/journal-5-use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":28253,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/posts\/297"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/users\/28253"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/posts\/297\/revisions"}],"predecessor-version":[{"id":303,"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/posts\/297\/revisions\/303"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/media?parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/categories?post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/apeji001\/wp-json\/wp\/v2\/tags?post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}