{"id":464,"date":"2026-04-23T22:38:34","date_gmt":"2026-04-23T22:38:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyber-201s\/?page_id=464"},"modified":"2026-04-25T16:49:32","modified_gmt":"2026-04-25T16:49:32","slug":"leaders-courses","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyber-201s\/leaders-courses\/","title":{"rendered":"LeADERS Courses"},"content":{"rendered":"\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-liana-davis wp-block-embed-liana-davis\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"gADsyFm8Un\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/23\/leadership-ethics-cpd-410\/\">Leadership Ethics (CPD 410)<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Leadership Ethics (CPD 410)&#8221; &#8212; Liana Davis\" src=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/23\/leadership-ethics-cpd-410\/embed\/#?secret=vDXbxfN7rC#?secret=gADsyFm8Un\" data-secret=\"gADsyFm8Un\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-liana-davis wp-block-embed-liana-davis\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"X0NEKBva1M\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/23\/entrepreneurship-in-cybersecurity-cyse-494\/\">Entrepreneurship in Cybersecurity (CYSE 494)<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Entrepreneurship in Cybersecurity (CYSE 494)&#8221; &#8212; Liana Davis\" src=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/23\/entrepreneurship-in-cybersecurity-cyse-494\/embed\/#?secret=9bYuRZ7MtK#?secret=X0NEKBva1M\" data-secret=\"X0NEKBva1M\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-liana-davis wp-block-embed-liana-davis\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"oKRteQcmGU\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/23\/interdisciplinary-theory-and-concepts-ids-300w\/\">Interdisciplinary Theory and Concepts (IDS 300W)<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Interdisciplinary Theory and Concepts (IDS 300W)&#8221; &#8212; Liana Davis\" src=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/23\/interdisciplinary-theory-and-concepts-ids-300w\/embed\/#?secret=aGZaA2yqDD#?secret=oKRteQcmGU\" data-secret=\"oKRteQcmGU\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-liana-davis wp-block-embed-liana-davis\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"npCs0R7oEo\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/25\/cyber-strategy-and-policy-cyse-425w\/\">Cyber Strategy and Policy (CYSE 425W)<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Cyber Strategy and Policy (CYSE 425W)&#8221; &#8212; Liana Davis\" src=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/25\/cyber-strategy-and-policy-cyse-425w\/embed\/#?secret=iXUrN0Cmey#?secret=npCs0R7oEo\" data-secret=\"npCs0R7oEo\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":25880,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/pages\/464"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/users\/25880"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/comments?post=464"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/pages\/464\/revisions"}],"predecessor-version":[{"id":496,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/pages\/464\/revisions\/496"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/media?parent=464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}