{"id":120,"date":"2022-09-01T13:57:18","date_gmt":"2022-09-01T13:57:18","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2022-09-26T00:03:58","modified_gmt":"2022-09-26T00:03:58","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/bshar004\/","title":{"rendered":"ABOUT ME"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/bshar004\/wp-content\/uploads\/sites\/30170\/2022\/09\/2A07D714-96F2-45C5-96AB-B85F37B04FA2-857x1024.jpeg\" alt=\"\" class=\"wp-image-284\" width=\"381\" height=\"455\" srcset=\"https:\/\/sites.wp.odu.edu\/bshar004\/wp-content\/uploads\/sites\/30170\/2022\/09\/2A07D714-96F2-45C5-96AB-B85F37B04FA2-857x1024.jpeg 857w, https:\/\/sites.wp.odu.edu\/bshar004\/wp-content\/uploads\/sites\/30170\/2022\/09\/2A07D714-96F2-45C5-96AB-B85F37B04FA2-251x300.jpeg 251w, https:\/\/sites.wp.odu.edu\/bshar004\/wp-content\/uploads\/sites\/30170\/2022\/09\/2A07D714-96F2-45C5-96AB-B85F37B04FA2-768x918.jpeg 768w, https:\/\/sites.wp.odu.edu\/bshar004\/wp-content\/uploads\/sites\/30170\/2022\/09\/2A07D714-96F2-45C5-96AB-B85F37B04FA2-1286x1536.jpeg 1286w, https:\/\/sites.wp.odu.edu\/bshar004\/wp-content\/uploads\/sites\/30170\/2022\/09\/2A07D714-96F2-45C5-96AB-B85F37B04FA2-1714x2048.jpeg 1714w, https:\/\/sites.wp.odu.edu\/bshar004\/wp-content\/uploads\/sites\/30170\/2022\/09\/2A07D714-96F2-45C5-96AB-B85F37B04FA2.jpeg 1864w\" sizes=\"(max-width: 381px) 100vw, 381px\" \/><\/figure><\/div>\n\n\n<p><em>Thank you,<\/em> everyone, for visiting my ePortfolio. In this portfolio,<em> you will get to know me and my work done at ODU.&nbsp;<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p>My name is Bhawnish Sharma, and I am a developing professional in the field of Cybersecurity.This class introduced many cyber security tools used in the real world, such as Wireshark, John the Ripper, exploits, and many more. I particularly enjoyed learning how to create malicious payloads and use them effectively. I was fortunate to be selected as a tutor within the School of Cybersecurity. I believe that by opening this opportunity, my professor was helping me to gain confidence by interacting with other students. I also worked in the GenCyber camp this past summer, further developing my leadership skills. My job in that camp was to provide a brief lecture to high school students and teachers about the cyber security topics that we learned oh due during our coursework.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The reason why I choose the cybersecurity <\/h2>\n\n\n\n<p>There was an incident that took place in my life that led me to choose cybersecurity as my profession. Phishing and identity theft are severe problems in the world. There was an incident that happened in my life that made me select cybersecurity.&nbsp; My grandfather received a call from a scammer pretending to be a bank employee. He got terrified and immediately put the call on speaker. The scammer told my grandfather that his bank information was not secure enough. So, he needed to provide his bank account information to make the account safe. I told my grandfather to cut the call because I knew it was fake and he wanted to steal money.&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><em>Favorite quotes <\/em><\/strong><\/p>\n\n\n\n<p><strong>You will be hacked if you spend more on coffee than on IT security. What\u2019s more, you deserve to be hacked.<\/strong><em>   <\/em><br><em> -Richard Clarke<\/em><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>My message to companies that think they haven\u2019t been attacked is: \u2018You\u2019re not looking hard enough.        <\/strong><br><strong>&#8211; <\/strong><em>James Snook<\/em><\/p>\n\n\n\n<p><strong>One single vulnerability is all an attacker needs.<\/strong><em>     <\/em><br><em> &#8211; Window Snyder<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thank you, everyone, for visiting my ePortfolio. In this portfolio, you will get to know me and my work done at ODU.&nbsp; Introduction My name is Bhawnish Sharma, and I am a developing professional in the field of Cybersecurity.This class introduced many cyber security tools used in the real world, such as Wireshark, John the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bshar004\/\">Read More<\/a><\/div>\n","protected":false},"author":24673,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bshar004\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bshar004\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bshar004\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bshar004\/wp-json\/wp\/v2\/users\/24673"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bshar004\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/bshar004\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":288,"href":"https:\/\/sites.wp.odu.edu\/bshar004\/wp-json\/wp\/v2\/pages\/120\/revisions\/288"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bshar004\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}