{"id":295,"date":"2024-04-22T01:54:11","date_gmt":"2024-04-22T01:54:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/hc003\/?p=295"},"modified":"2024-04-22T01:54:11","modified_gmt":"2024-04-22T01:54:11","slug":"journal-5-use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/hc003\/2024\/04\/22\/journal-5-use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity\/","title":{"rendered":"Journal #5: Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.\u00a0"},"content":{"rendered":"\n<p>Compliance auditing <\/p>\n\n\n\n<p>Yield optimization for security operations <\/p>\n\n\n\n<p>Biometric security solutions<\/p>\n\n\n\n<p>Ethical hacking<\/p>\n\n\n\n<p>Research and development<\/p>\n\n\n\n<p>Secure software development <\/p>\n\n\n\n<p>End point security <\/p>\n\n\n\n<p>Cloud security<\/p>\n\n\n\n<p>User security training <\/p>\n\n\n\n<p>Risk assessment <\/p>\n\n\n\n<p>Information system security management <\/p>\n\n\n\n<p>Two factor authentication development<\/p>\n\n\n\n<p>Yield farming<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Compliance auditing Yield optimization for security operations Biometric security solutions Ethical hacking Research and development Secure software development End point security Cloud security User security training Risk assessment Information system security management Two factor authentication development Yield farming<\/p>\n","protected":false},"author":28359,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/hc003\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/hc003\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/hc003\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hc003\/wp-json\/wp\/v2\/users\/28359"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hc003\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/hc003\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/hc003\/wp-json\/wp\/v2\/posts\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/hc003\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hc003\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hc003\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}