{"id":423,"date":"2026-04-28T02:27:58","date_gmt":"2026-04-28T02:27:58","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cybodu\/?page_id=423"},"modified":"2026-04-30T03:46:57","modified_gmt":"2026-04-30T03:46:57","slug":"cyse-301-cyber-techniques-operations","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cybodu\/cyse-301-cyber-techniques-operations\/","title":{"rendered":"CYSE 301 &#8211; Cyber Techniques &amp; Operations"},"content":{"rendered":"\n<p>This Page is Under Development. <\/p>\n\n\n\n<p>Content will be added as coursework is completed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This Page is Under Development. Content will be added as coursework is completed.<\/p>\n","protected":false},"author":30066,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/pages\/423"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/users\/30066"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/comments?post=423"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/pages\/423\/revisions"}],"predecessor-version":[{"id":524,"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/pages\/423\/revisions\/524"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/media?parent=423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}