{"id":260,"date":"2025-08-05T03:06:23","date_gmt":"2025-08-05T03:06:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/?p=260"},"modified":"2025-08-07T23:16:03","modified_gmt":"2025-08-07T23:16:03","slug":"critical-thinking-skills","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/2025\/08\/05\/critical-thinking-skills\/","title":{"rendered":"Critical Thinking Skills"},"content":{"rendered":"\n<p><strong>IDS493 Job Analysis<\/strong>:<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-content\/uploads\/sites\/39247\/2025\/08\/writing-assignment-one-job-analysis.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of writing-assignment-one-job-analysis.\"><\/object><a id=\"wp-block-file--media-3126b9a2-518c-460d-81ce-ddaf6eaa46a3\" href=\"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-content\/uploads\/sites\/39247\/2025\/08\/writing-assignment-one-job-analysis.pdf\">writing-assignment-one-job-analysis<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-content\/uploads\/sites\/39247\/2025\/08\/writing-assignment-one-job-analysis.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3126b9a2-518c-460d-81ce-ddaf6eaa46a3\">Download<\/a><\/div>\n\n\n\n<p><strong>Cyber Law 406: Privacy and Personal Data Protection<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-content\/uploads\/sites\/39247\/2025\/08\/Cyber-Law-406-writing-assignment.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Cyber-Law-406-writing-assignment.\"><\/object><a id=\"wp-block-file--media-61343428-7144-43d7-a871-4fb68f3ebbb8\" href=\"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-content\/uploads\/sites\/39247\/2025\/08\/Cyber-Law-406-writing-assignment.pdf\">Cyber-Law-406-writing-assignment<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-content\/uploads\/sites\/39247\/2025\/08\/Cyber-Law-406-writing-assignment.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-61343428-7144-43d7-a871-4fb68f3ebbb8\">Download<\/a><\/div>\n\n\n\n<p><strong>CS 462 \u2013 Cybersecurity Fundamentals: Microsoft Exchange Server vulnerability exploit<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-content\/uploads\/sites\/39247\/2025\/08\/Research-Paper-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Research-Paper-2.\"><\/object><a id=\"wp-block-file--media-477aacf1-6d64-44d5-a443-19751783b13b\" href=\"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-content\/uploads\/sites\/39247\/2025\/08\/Research-Paper-2.pdf\">Research-Paper-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-content\/uploads\/sites\/39247\/2025\/08\/Research-Paper-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-477aacf1-6d64-44d5-a443-19751783b13b\">Download<\/a><\/div>\n\n\n\n<p><strong>IDS Electronic Portfolio Project<\/strong>: <strong>&#8220;A Reflection on Cybersecurity Skill Development&#8221;<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-content\/uploads\/sites\/39247\/2025\/08\/a-reflection-on-cybersecurity-skill-development.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of a-reflection-on-cybersecurity-skill-development.\"><\/object><a id=\"wp-block-file--media-54b1a4be-a551-452d-8b54-6a09f662dd23\" href=\"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-content\/uploads\/sites\/39247\/2025\/08\/a-reflection-on-cybersecurity-skill-development.pdf\">a-reflection-on-cybersecurity-skill-development<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-content\/uploads\/sites\/39247\/2025\/08\/a-reflection-on-cybersecurity-skill-development.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-54b1a4be-a551-452d-8b54-6a09f662dd23\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>IDS493 Job Analysis: Cyber Law 406: Privacy and Personal Data Protection CS 462 \u2013 Cybersecurity Fundamentals: Microsoft Exchange Server vulnerability exploit IDS Electronic Portfolio Project: &#8220;A Reflection on Cybersecurity Skill Development&#8221;<\/p>\n","protected":false},"author":21638,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-json\/wp\/v2\/posts\/260"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-json\/wp\/v2\/users\/21638"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-json\/wp\/v2\/comments?post=260"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-json\/wp\/v2\/posts\/260\/revisions"}],"predecessor-version":[{"id":281,"href":"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-json\/wp\/v2\/posts\/260\/revisions\/281"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-json\/wp\/v2\/media?parent=260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-json\/wp\/v2\/categories?post=260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dominiqueportfolio\/wp-json\/wp\/v2\/tags?post=260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}