{"id":245,"date":"2024-12-07T04:29:25","date_gmt":"2024-12-07T04:29:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dhopk002-eportfolio\/?page_id=245"},"modified":"2024-12-08T14:53:42","modified_gmt":"2024-12-08T14:53:42","slug":"cybersecurity-analysis","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dhopk002-eportfolio\/cybersecurity-analysis\/","title":{"rendered":"Cybersecurity Analysis"},"content":{"rendered":"\n<p>Hover over tab for artifacts<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hover over tab for artifacts<\/p>\n","protected":false},"author":25833,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dhopk002-eportfolio\/wp-json\/wp\/v2\/pages\/245"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dhopk002-eportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dhopk002-eportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dhopk002-eportfolio\/wp-json\/wp\/v2\/users\/25833"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dhopk002-eportfolio\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/dhopk002-eportfolio\/wp-json\/wp\/v2\/pages\/245\/revisions"}],"predecessor-version":[{"id":314,"href":"https:\/\/sites.wp.odu.edu\/dhopk002-eportfolio\/wp-json\/wp\/v2\/pages\/245\/revisions\/314"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dhopk002-eportfolio\/wp-json\/wp\/v2\/media?parent=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}