{"id":344,"date":"2023-07-18T14:19:36","date_gmt":"2023-07-18T14:19:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/?p=344"},"modified":"2023-07-18T14:19:36","modified_gmt":"2023-07-18T14:19:36","slug":"journal-entry-1","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-1\/","title":{"rendered":"Journal Entry 1"},"content":{"rendered":"\n<p>Review the NICE Workforce Framework. Are there certain areas that you<br>would want to focus your career on? Explain which areas would appeal<br>the most to you and which would appeal the least.<\/p>\n\n\n\n<p>Yes, there are areas that I would want to focus my career on. The areas that would appeal most to me are Cyber Defense Infrastructure Support, Data Administration, Network Services, and Systems Administration. The areas would appeal the least to me are Collection Operations and Cyber Operational Planning.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Review the NICE Workforce Framework. Are there certain areas that youwould want to focus your career on? Explain which areas would appealthe most to you and which would appeal the least. Yes, there are areas that I would want to focus my career on. The areas that would appeal most to me are Cyber Defense&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-1\/\">Read More<\/a><\/div>\n","protected":false},"author":25260,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/344"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/users\/25260"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/comments?post=344"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/344\/revisions"}],"predecessor-version":[{"id":345,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/344\/revisions\/345"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/media?parent=344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/categories?post=344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/tags?post=344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}