{"id":141,"date":"2022-09-20T15:52:00","date_gmt":"2022-09-20T15:52:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2025-04-29T01:25:17","modified_gmt":"2025-04-29T01:25:17","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dezireejohnson\/cyse-300\/","title":{"rendered":"CYSE 300"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Introduction to Cybersecurity<\/h1>\n\n\n\n<p><strong>This course gave me a strong foundation in the field of cybersecurity. I learned about system vulnerabilities, malware, cryptography, risk management, and how to protect networks and information. We also looked at real-world cybersecurity threats and how to respond to them. I completed online labs, module quizzes, discussion posts, and short research papers that helped me apply what I learned. The course also helped me understand the importance of protecting data, thinking critically, and using tools and strategies to keep systems secure. Overall, it prepared me for more advanced cybersecurity work and gave me skills I\u2019ll use in my future career.<\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/dezireejohnson\/wp-content\/uploads\/sites\/30544\/2025\/04\/Yahoo-Data-Breach-.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Yahoo-Data-Breach-<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/dezireejohnson\/wp-content\/uploads\/sites\/30544\/2025\/04\/5-Important-Security-Policy-Issues.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">5-Important-Security-Policy-Issues<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Cybersecurity This course gave me a strong foundation in the field of cybersecurity. I learned about system vulnerabilities, malware, cryptography, risk management, and how to protect networks and information. We also looked at real-world cybersecurity threats and how to respond to them. I completed online labs, module quizzes, discussion posts, and short research&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dezireejohnson\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":24901,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dezireejohnson\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dezireejohnson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dezireejohnson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dezireejohnson\/wp-json\/wp\/v2\/users\/24901"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dezireejohnson\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/dezireejohnson\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":410,"href":"https:\/\/sites.wp.odu.edu\/dezireejohnson\/wp-json\/wp\/v2\/pages\/141\/revisions\/410"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dezireejohnson\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}