{"id":120,"date":"2025-02-02T08:05:32","date_gmt":"2025-02-02T08:05:32","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2025-02-02T09:16:33","modified_gmt":"2025-02-02T09:16:33","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/","title":{"rendered":"Home"},"content":{"rendered":"\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"568\" src=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/AdobeStock_305166874-scaled-1-1024x568.jpeg\" alt=\"\" class=\"wp-image-286\" srcset=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/AdobeStock_305166874-scaled-1-1024x568.jpeg 1024w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/AdobeStock_305166874-scaled-1-300x166.jpeg 300w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/AdobeStock_305166874-scaled-1-768x426.jpeg 768w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/AdobeStock_305166874-scaled-1-1536x851.jpeg 1536w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/AdobeStock_305166874-scaled-1-2048x1135.jpeg 2048w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/AdobeStock_305166874-scaled-1-541x300.jpeg 541w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">https:\/\/www.securityinsights.net\/wp-content\/uploads\/2022\/02\/AdobeStock_305166874-scaled.jpeg<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"669\" src=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/Social-Engineering-Cybersecurity-scaled-1-1024x669.jpg\" alt=\"\" class=\"wp-image-287\" srcset=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/Social-Engineering-Cybersecurity-scaled-1-1024x669.jpg 1024w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/Social-Engineering-Cybersecurity-scaled-1-300x196.jpg 300w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/Social-Engineering-Cybersecurity-scaled-1-768x502.jpg 768w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/Social-Engineering-Cybersecurity-scaled-1-1536x1004.jpg 1536w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/Social-Engineering-Cybersecurity-scaled-1-459x300.jpg 459w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/Social-Engineering-Cybersecurity-scaled-1.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/intersys.co.uk\/wp-content\/uploads\/Social-Engineering-Cybersecurity-scaled.jpg\">https:\/\/intersys.co.uk\/wp-content\/uploads\/Social-Engineering-Cybersecurity-scaled.jpg<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"474\" height=\"237\" src=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/OIP.jpg\" alt=\"\" class=\"wp-image-288\" srcset=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/OIP.jpg 474w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/OIP-300x150.jpg 300w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/th.bing.com\/th\/id\/OIP.EtFuupp8mcFmVYBKKOMtjgHaDt?rs=1&amp;pid=ImgDetMain\">https:\/\/th.bing.com\/th\/id\/OIP.EtFuupp8mcFmVYBKKOMtjgHaDt?rs=1&amp;pid=ImgDetMain<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/43aaaffac7cd2fdbb9d5f88ac663f3fc-1024x1024.png\" alt=\"\" class=\"wp-image-289\" srcset=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/43aaaffac7cd2fdbb9d5f88ac663f3fc-1024x1024.png 1024w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/43aaaffac7cd2fdbb9d5f88ac663f3fc-300x300.png 300w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/43aaaffac7cd2fdbb9d5f88ac663f3fc-150x150.png 150w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/43aaaffac7cd2fdbb9d5f88ac663f3fc-768x768.png 768w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/43aaaffac7cd2fdbb9d5f88ac663f3fc.png 1080w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/i.pinimg.com\/originals\/43\/aa\/af\/43aaaffac7cd2fdbb9d5f88ac663f3fc.png\">https:\/\/i.pinimg.com\/originals\/43\/aa\/af\/43aaaffac7cd2fdbb9d5f88ac663f3fc.png<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"474\" height=\"316\" src=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/OIP-1.jpg\" alt=\"\" class=\"wp-image-290\" srcset=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/OIP-1.jpg 474w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/OIP-1-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/02\/OIP-1-450x300.jpg 450w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/vietnamtimes.org.vn\/stores\/news_dataimages\/hang.le\/042020\/01\/18\/5515_Cybersecurity-How-Social-Media-Reshaped-the-World-in-10-Years.jpg\">https:\/\/vietnamtimes.org.vn\/stores\/news_dataimages\/hang.le\/042020\/01\/18\/5515_Cybersecurity-How-Social-Media-Reshaped-the-World-in-10-Years.jpg<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/intersys.co.uk\/wp-content\/uploads\/Social-Engineering-Cybersecurity-scaled.jpg https:\/\/th.bing.com\/th\/id\/OIP.EtFuupp8mcFmVYBKKOMtjgHaDt?rs=1&amp;pid=ImgDetMain https:\/\/i.pinimg.com\/originals\/43\/aa\/af\/43aaaffac7cd2fdbb9d5f88ac663f3fc.png https:\/\/vietnamtimes.org.vn\/stores\/news_dataimages\/hang.le\/042020\/01\/18\/5515_Cybersecurity-How-Social-Media-Reshaped-the-World-in-10-Years.jpg<\/p>\n","protected":false},"author":26886,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/users\/26886"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":318,"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/pages\/120\/revisions\/318"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}