{"id":206,"date":"2025-04-16T02:19:31","date_gmt":"2025-04-16T02:19:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/?page_id=206"},"modified":"2025-04-16T02:19:31","modified_gmt":"2025-04-16T02:19:31","slug":"resume","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/resume\/","title":{"rendered":"Resume"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.12\u202fPM.png\"><img loading=\"lazy\" decoding=\"async\" width=\"793\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.12\u202fPM-793x1024.png\" alt=\"\" class=\"wp-image-207\" srcset=\"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.12\u202fPM-793x1024.png 793w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.12\u202fPM-232x300.png 232w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.12\u202fPM-768x992.png 768w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.12\u202fPM-1189x1536.png 1189w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.12\u202fPM-600x775.png 600w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.12\u202fPM-945x1221.png 945w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.12\u202fPM.png 1372w\" sizes=\"(max-width: 793px) 100vw, 793px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.28\u202fPM.png\"><img loading=\"lazy\" decoding=\"async\" width=\"811\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.28\u202fPM-811x1024.png\" alt=\"\" class=\"wp-image-208\" srcset=\"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.28\u202fPM-811x1024.png 811w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.28\u202fPM-238x300.png 238w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.28\u202fPM-768x970.png 768w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.28\u202fPM-1217x1536.png 1217w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.28\u202fPM-600x757.png 600w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.28\u202fPM-945x1193.png 945w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.28\u202fPM.png 1402w\" sizes=\"(max-width: 811px) 100vw, 811px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.37\u202fPM.png\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.37\u202fPM-800x1024.png\" alt=\"\" class=\"wp-image-209\" srcset=\"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.37\u202fPM-800x1024.png 800w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.37\u202fPM-234x300.png 234w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.37\u202fPM-768x983.png 768w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.37\u202fPM-1200x1536.png 1200w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.37\u202fPM-600x768.png 600w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.37\u202fPM-945x1210.png 945w, https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-content\/uploads\/sites\/38934\/2025\/04\/Screenshot-2025-04-15-at-10.17.37\u202fPM.png 1378w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":27401,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-json\/wp\/v2\/pages\/206"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-json\/wp\/v2\/users\/27401"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-json\/wp\/v2\/comments?post=206"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-json\/wp\/v2\/pages\/206\/revisions"}],"predecessor-version":[{"id":210,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-json\/wp\/v2\/pages\/206\/revisions\/210"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityportfolio\/wp-json\/wp\/v2\/media?parent=206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}