{"id":369,"date":"2023-07-18T14:29:44","date_gmt":"2023-07-18T14:29:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/?p=369"},"modified":"2023-07-18T14:29:44","modified_gmt":"2023-07-18T14:29:44","slug":"journal-entry-14","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-14\/","title":{"rendered":"Journal Entry 14"},"content":{"rendered":"\n<p>Digital Forensics | Davin Teo | TEDxHongKongSalon \u2013 YouTube Watch<br>this video and think about how the career of digital forensics<br>investigators relate to the social sciences. Write a journal entry<br>describing what you think about the speaker\u2019s pathway to his career.<\/p>\n\n\n\n<p>I think his pathway from being an accountant to getting IT is interesting. He took a chance on the job not knowing much about and decided to give it a try. By him doing this brought him further in his career and his life than he may have ever thought would be possible. His story of opportunity to get into the field is inspiring for people to take chances in life.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital Forensics | Davin Teo | TEDxHongKongSalon \u2013 YouTube Watchthis video and think about how the career of digital forensicsinvestigators relate to the social sciences. Write a journal entrydescribing what you think about the speaker\u2019s pathway to his career. I think his pathway from being an accountant to getting IT is interesting. He took a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-14\/\">Read More<\/a><\/div>\n","protected":false},"author":25260,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/369"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/users\/25260"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/comments?post=369"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/369\/revisions"}],"predecessor-version":[{"id":370,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/369\/revisions\/370"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/media?parent=369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/categories?post=369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/tags?post=369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}