{"id":222,"date":"2024-09-19T02:13:25","date_gmt":"2024-09-19T02:13:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cybersecurity\/?page_id=222"},"modified":"2024-09-19T02:42:16","modified_gmt":"2024-09-19T02:42:16","slug":"about-me-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cybersecurity\/","title":{"rendered":"About me"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-content\/uploads\/sites\/34152\/2024\/09\/image-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"360\" height=\"640\" src=\"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-content\/uploads\/sites\/34152\/2024\/09\/image-1.png\" alt=\"\" class=\"wp-image-233\" srcset=\"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-content\/uploads\/sites\/34152\/2024\/09\/image-1.png 360w, https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-content\/uploads\/sites\/34152\/2024\/09\/image-1-169x300.png 169w\" sizes=\"(max-width: 360px) 100vw, 360px\" \/><\/a><\/figure>\n\n\n\n<p>How are you doing my name is Seyvon Davis, and I\u2019m excited to be part of this cybersecurity class. I have a strong interest in technology and how it can be used to protect all data and systems. I\u2019m eager to learn more about cybersecurity concepts, network security, and how to stay ahead of cyber threats. Outside of class, I enjoy playing video games and football with my friends, and I\u2019m looking forward to collaborating with others and gaining practical skills in this field. I find this class a blessing and I want to take advantage of it.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How are you doing my name is Seyvon Davis, and I\u2019m excited to be part of this cybersecurity class. I have a strong interest in technology and how it can be used to protect all data and systems. I\u2019m eager to learn more about cybersecurity concepts, network security, and how to stay ahead of cyber&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":27467,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/222"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/users\/27467"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/comments?post=222"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/222\/revisions"}],"predecessor-version":[{"id":234,"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/222\/revisions\/234"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurity\/wp-json\/wp\/v2\/media?parent=222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}