{"id":159,"date":"2021-09-16T22:28:13","date_gmt":"2021-09-16T22:28:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=159"},"modified":"2025-12-06T02:25:28","modified_gmt":"2025-12-06T02:25:28","slug":"awards-and-recognitions","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dapcyse201s\/awards-and-recognitions\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"<p>Cybersecurity Career paper<\/p>\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/e\/2PACX-1vTp7VNc5uurUUdn4IDI2FyvzjgHW0AEMqBIWVELsr58afwpM0APF5bUDk18aaj9VpMa8ZLOiIwVvzO6\/pub\">https:\/\/docs.google.com\/document\/d\/e\/2PACX-1vTp7VNc5uurUUdn4IDI2FyvzjgHW0AEMqBIWVELsr58afwpM0APF5bUDk18aaj9VpMa8ZLOiIwVvzO6\/pub<\/a><\/p>\n<p>Article review 1<\/p>\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/e\/2PACX-1vSevMe32xXm2mq0eTOXdLWF3Sqw0EIjHmVSkjlqqHu_2Qnu3zRQSCCAKJlOEsdH3oPNVZ4MSlF_YOC1\/pub\">https:\/\/docs.google.com\/document\/d\/e\/2PACX-1vSevMe32xXm2mq0eTOXdLWF3Sqw0EIjHmVSkjlqqHu_2Qnu3zRQSCCAKJlOEsdH3oPNVZ4MSlF_YOC1\/pub<\/a><\/p>\n<p>Article review 2\u00a0<\/p>\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/e\/2PACX-1vThojDHofYycgPneUPkG_ahu0dvJap-lllI-afHOGpcfH-blt0pSW_MvLSq8kSfWEhysSPlNOUyHc0r\/pub\">https:\/\/docs.google.com\/document\/d\/e\/2PACX-1vThojDHofYycgPneUPkG_ahu0dvJap-lllI-afHOGpcfH-blt0pSW_MvLSq8kSfWEhysSPlNOUyHc0r\/pub<\/a><\/p>\n<p>Cybersecurity Presentation\u00a0<\/p>\n<p><a href=\"https:\/\/docs.google.com\/presentation\/d\/e\/2PACX-1vSc8tok_Wyz1_gD5uu9GFfLID-fQB4_HHqTS0l00xtaERRgtyH3hYnXFjKLFzhZaXNbqhw0z2-TLqCQ\/pub?start=false&amp;loop=false&amp;delayms=3000\">https:\/\/docs.google.com\/presentation\/d\/e\/2PACX-1vSc8tok_Wyz1_gD5uu9GFfLID-fQB4_HHqTS0l00xtaERRgtyH3hYnXFjKLFzhZaXNbqhw0z2-TLqCQ\/pub?start=false&amp;loop=false&amp;delayms=3000<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Career paper https:\/\/docs.google.com\/document\/d\/e\/2PACX-1vTp7VNc5uurUUdn4IDI2FyvzjgHW0AEMqBIWVELsr58afwpM0APF5bUDk18aaj9VpMa8ZLOiIwVvzO6\/pub Article review 1 https:\/\/docs.google.com\/document\/d\/e\/2PACX-1vSevMe32xXm2mq0eTOXdLWF3Sqw0EIjHmVSkjlqqHu_2Qnu3zRQSCCAKJlOEsdH3oPNVZ4MSlF_YOC1\/pub Article review 2\u00a0 https:\/\/docs.google.com\/document\/d\/e\/2PACX-1vThojDHofYycgPneUPkG_ahu0dvJap-lllI-afHOGpcfH-blt0pSW_MvLSq8kSfWEhysSPlNOUyHc0r\/pub Cybersecurity Presentation\u00a0 https:\/\/docs.google.com\/presentation\/d\/e\/2PACX-1vSc8tok_Wyz1_gD5uu9GFfLID-fQB4_HHqTS0l00xtaERRgtyH3hYnXFjKLFzhZaXNbqhw0z2-TLqCQ\/pub?start=false&amp;loop=false&amp;delayms=3000<\/p>\n","protected":false},"author":21923,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dapcyse201s\/wp-json\/wp\/v2\/pages\/159"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dapcyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dapcyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dapcyse201s\/wp-json\/wp\/v2\/users\/21923"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dapcyse201s\/wp-json\/wp\/v2\/comments?post=159"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/dapcyse201s\/wp-json\/wp\/v2\/pages\/159\/revisions"}],"predecessor-version":[{"id":277,"href":"https:\/\/sites.wp.odu.edu\/dapcyse201s\/wp-json\/wp\/v2\/pages\/159\/revisions\/277"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dapcyse201s\/wp-json\/wp\/v2\/media?parent=159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}