{"id":218,"date":"2020-10-23T14:59:06","date_gmt":"2020-10-23T14:59:06","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2020-10-25T17:38:19","modified_gmt":"2020-10-25T17:38:19","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"<p><strong>Essential Work Habits<\/strong><\/p>\n<ul>\n<li><span style=\"font-weight: 400\">Ability to work through any conflict or dissension\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Great Communication Skills with team members and customers\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Knowledge of computer software: Excel, Office, Word<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Knowledge of security across multiple platforms\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\">An understanding of hacking<\/li>\n<li style=\"font-weight: 400\">Great discretion with confidential data<\/li>\n<\/ul>\n<p><strong>Soft Skills<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Time Management\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ability to clearly articulate complex concepts both written and verbally<\/span><\/li>\n<li style=\"font-weight: 400\">Ability to communicate clearly and properly<\/li>\n<li>Cooperation and Teamwork<\/li>\n<li>Pay attention to detail<\/li>\n<li>Ability to work independently<\/li>\n<li>Ability to multitask<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Essential Work Habits Ability to work through any conflict or dissension\u00a0 Great Communication Skills with team members and customers\u00a0 Knowledge of computer software: Excel, Office, Word Knowledge of security across multiple platforms\u00a0 An understanding of hacking Great discretion with confidential data Soft Skills Time Management\u00a0 Ability to clearly articulate complex concepts both written and verbally&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":18912,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/users\/18912"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":283,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/pages\/218\/revisions\/283"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity-technology\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}