{"id":33,"date":"2022-10-23T17:41:48","date_gmt":"2022-10-23T17:41:48","guid":{"rendered":"http:\/\/totesa.website\/student\/?page_id=33"},"modified":"2024-11-27T03:35:06","modified_gmt":"2024-11-27T03:35:06","slug":"academics","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/academics\/","title":{"rendered":"Academics"},"content":{"rendered":"\n<p>A selection of my course work through the ODU Cyber Security major. These represent the most impactful classes forming the foundational academic and theoretical knowledge for performing duties as a cyber security expert. Cryptography represents the theoretical knowledge for how and why encryption systems work. Python programming is an academic base line for practical use in real world situations. Cybersecurity Techniques and Operations provide the foundational security techniques and mindset of a professional security consultant. <\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-edwin-wells-e-portfolio wp-block-embed-edwin-wells-e-portfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"700nQrOoJy\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/cs-463-cryptography-for-cybersecurity\/\">CS 463 Cryptography for Cybersecurity<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CS 463 Cryptography for Cybersecurity&#8221; &#8212; Edwin Wells E-Portfolio\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/cs-463-cryptography-for-cybersecurity\/embed\/#?secret=7uJLu0f57K#?secret=700nQrOoJy\" data-secret=\"700nQrOoJy\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-edwin-wells-e-portfolio wp-block-embed-edwin-wells-e-portfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"xNtZ9hZQ4D\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/cyse-250-python-programming\/\">CYSE 250 Python Programming<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CYSE 250 Python Programming&#8221; &#8212; Edwin Wells E-Portfolio\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/cyse-250-python-programming\/embed\/#?secret=fIStogw4s2#?secret=xNtZ9hZQ4D\" data-secret=\"xNtZ9hZQ4D\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-edwin-wells-e-portfolio wp-block-embed-edwin-wells-e-portfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"RIT8ynxA3f\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/cyse-301-cybersecurity-techniques-and-operations\/\">CYSE 301 Cybersecurity Techniques and Operations<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CYSE 301 Cybersecurity Techniques and Operations&#8221; &#8212; Edwin Wells E-Portfolio\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/cyse-301-cybersecurity-techniques-and-operations\/embed\/#?secret=dAUrzVzG8S#?secret=RIT8ynxA3f\" data-secret=\"RIT8ynxA3f\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>A selection of my course work through the ODU Cyber Security major. These represent the most impactful classes forming the foundational academic and theoretical knowledge for performing duties as a cyber security expert. Cryptography represents the theoretical knowledge for how and why encryption systems work. Python programming is an academic base line for practical use&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/academics\/\">Read More<\/a><\/div>\n","protected":false},"author":25223,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages\/33"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/users\/25223"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/comments?post=33"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages\/33\/revisions"}],"predecessor-version":[{"id":703,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages\/33\/revisions\/703"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/media?parent=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}