{"id":159,"date":"2020-10-23T14:59:06","date_gmt":"2020-10-23T14:59:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=159"},"modified":"2020-10-25T15:16:04","modified_gmt":"2020-10-25T15:16:04","slug":"awards-and-recognitions","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/awards-and-recognitions\/","title":{"rendered":"Awards and Recognitions"},"content":{"rendered":"\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p>CISSP Cert Prep: The Basics<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"792\" height=\"612\" src=\"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-content\/uploads\/sites\/21637\/2020\/10\/image.png\" alt=\"\" class=\"wp-image-270\" srcset=\"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-content\/uploads\/sites\/21637\/2020\/10\/image.png 792w, https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-content\/uploads\/sites\/21637\/2020\/10\/image-300x232.png 300w, https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-content\/uploads\/sites\/21637\/2020\/10\/image-768x593.png 768w, https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-content\/uploads\/sites\/21637\/2020\/10\/image-388x300.png 388w\" sizes=\"(max-width: 792px) 100vw, 792px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<p>CISSP Cert Prep: 7 Security Operations <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"792\" height=\"612\" src=\"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-content\/uploads\/sites\/21637\/2020\/10\/image-2.png\" alt=\"\" class=\"wp-image-272\" srcset=\"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-content\/uploads\/sites\/21637\/2020\/10\/image-2.png 792w, https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-content\/uploads\/sites\/21637\/2020\/10\/image-2-300x232.png 300w, https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-content\/uploads\/sites\/21637\/2020\/10\/image-2-768x593.png 768w, https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-content\/uploads\/sites\/21637\/2020\/10\/image-2-388x300.png 388w\" sizes=\"(max-width: 792px) 100vw, 792px\" \/><\/figure>\n\n\n\n<p>Ethical Hacking: Introduction to Ethical Hacking<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"792\" height=\"612\" src=\"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-content\/uploads\/sites\/21637\/2020\/10\/image-3.png\" alt=\"\" class=\"wp-image-273\" srcset=\"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-content\/uploads\/sites\/21637\/2020\/10\/image-3.png 792w, https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-content\/uploads\/sites\/21637\/2020\/10\/image-3-300x232.png 300w, https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-content\/uploads\/sites\/21637\/2020\/10\/image-3-768x593.png 768w, https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-content\/uploads\/sites\/21637\/2020\/10\/image-3-388x300.png 388w\" sizes=\"(max-width: 792px) 100vw, 792px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>CISSP Cert Prep: The Basics CISSP Cert Prep: 7 Security Operations Ethical Hacking: Introduction to Ethical Hacking<\/p>\n","protected":false},"author":18912,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/pages\/159"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/users\/18912"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/comments?post=159"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/pages\/159\/revisions"}],"predecessor-version":[{"id":274,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/pages\/159\/revisions\/274"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/media?parent=159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}