{"id":463,"date":"2024-12-07T22:49:55","date_gmt":"2024-12-07T22:49:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/giddenskd\/?page_id=463"},"modified":"2024-12-10T22:37:36","modified_gmt":"2024-12-10T22:37:36","slug":"graduate-course-work","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/giddenskd\/graduate-course-work\/","title":{"rendered":"Graduate Course Work"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 has-custom-font-size has-medium-font-size\"><a class=\"wp-block-button__link has-dark-brown-color has-medium-blue-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/giddenskd\/cyse600\">CYSE600<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-cover\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" class=\"wp-block-cover__image-background wp-image-500\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/technology-security-concept-safety-digital-protection-system-1080x675-1-1024x640.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/technology-security-concept-safety-digital-protection-system-1080x675-1-1024x640.jpg 1024w, https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/technology-security-concept-safety-digital-protection-system-1080x675-1-300x188.jpg 300w, https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/technology-security-concept-safety-digital-protection-system-1080x675-1-768x480.jpg 768w, https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/technology-security-concept-safety-digital-protection-system-1080x675-1-320x200.jpg 320w, https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/technology-security-concept-safety-digital-protection-system-1080x675-1.jpg 1080w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\">Cybersecurity Principles<\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 has-custom-font-size has-medium-font-size\"><a class=\"wp-block-button__link has-dark-brown-color has-medium-blue-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/giddenskd\/cyse607\">CYSE607<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-cover\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"486\" class=\"wp-block-cover__image-background wp-image-497\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/online-colleges-digital-forensics-degree-blog4-1900x900-1-1024x486.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/online-colleges-digital-forensics-degree-blog4-1900x900-1-1024x486.jpg 1024w, https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/online-colleges-digital-forensics-degree-blog4-1900x900-1-300x142.jpg 300w, https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/online-colleges-digital-forensics-degree-blog4-1900x900-1-768x364.jpg 768w, https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/online-colleges-digital-forensics-degree-blog4-1900x900-1-1536x729.jpg 1536w, https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/online-colleges-digital-forensics-degree-blog4-1900x900-1-422x200.jpg 422w, https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/online-colleges-digital-forensics-degree-blog4-1900x900-1.jpg 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\">Advanced Digital Forensics<\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 has-custom-font-size is-style-fill has-medium-font-size\"><a class=\"wp-block-button__link has-dark-brown-color has-medium-blue-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/giddenskd\/cyse695\" style=\"border-radius:67px\" rel=\"https:\/\/sites.wp.odu.edu\/giddenskd\/cyse695\">CYSE695<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-cover\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" class=\"wp-block-cover__image-background wp-image-490\" alt=\"This image has an empty alt attribute; its file name is 1703505953684-1024x585.png\" src=\"https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/image.png\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/image.png 1024w, https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/image-300x171.png 300w, https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/image-768x439.png 768w, https:\/\/sites.wp.odu.edu\/giddenskd\/wp-content\/uploads\/sites\/20268\/2024\/12\/image-350x200.png 350w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\">Bridge Windows Systems for Cybersecurity<\/p>\n<\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":17718,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/giddenskd\/wp-json\/wp\/v2\/pages\/463"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/giddenskd\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/giddenskd\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/giddenskd\/wp-json\/wp\/v2\/users\/17718"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/giddenskd\/wp-json\/wp\/v2\/comments?post=463"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/giddenskd\/wp-json\/wp\/v2\/pages\/463\/revisions"}],"predecessor-version":[{"id":504,"href":"https:\/\/sites.wp.odu.edu\/giddenskd\/wp-json\/wp\/v2\/pages\/463\/revisions\/504"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/giddenskd\/wp-json\/wp\/v2\/media?parent=463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}