{"id":327,"date":"2023-02-16T17:15:05","date_gmt":"2023-02-16T17:15:05","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jbeasley15\/?p=327"},"modified":"2023-02-19T17:50:37","modified_gmt":"2023-02-19T17:50:37","slug":"use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jbeasley15\/2023\/02\/16\/use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity\/","title":{"rendered":"Journal #5"},"content":{"rendered":"\n<p><strong>Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.\u00a0<\/strong><\/p>\n\n\n\n<p><strong>C<\/strong>reate app that rates software<\/p>\n\n\n\n<p><strong>Y<\/strong>acht gps software that is secure<\/p>\n\n\n\n<p><strong>B<\/strong>ecoming a public speaker for cybersecurity<\/p>\n\n\n\n<p><strong>E<\/strong>thical hacking to break into companies software<\/p>\n\n\n\n<p><strong>R<\/strong>eview a organizations system software and determine weak points<\/p>\n\n\n\n<p><strong>S<\/strong>art your own Cyber business to defend phishing and fraud threats<\/p>\n\n\n\n<p><strong>E<\/strong>ngineer for information security detect threats in systems and use high tech to resolve<\/p>\n\n\n\n<p><strong>C<\/strong>reate boot camps for people to learn cybersecurity<\/p>\n\n\n\n<p><strong>U<\/strong>se job searching apps to find a job in cybersecurity<\/p>\n\n\n\n<p><strong>R<\/strong>ansomware is used to sell various categories of malicious software to generate financial gain<\/p>\n\n\n\n<p><strong>I<\/strong>nstructing others&nbsp; to broaden and expand cybersecurity skills through an organization or university.<\/p>\n\n\n\n<p><strong>T<\/strong>rading cybersecurity stocks and dividends<\/p>\n\n\n\n<p><strong>Y<\/strong>our own&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.\u00a0 Create app that rates software Yacht gps software that is secure Becoming a public speaker for cybersecurity Ethical hacking to break into companies software Review a organizations system software and determine weak points Sart your own Cyber business to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jbeasley15\/2023\/02\/16\/use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":25847,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jbeasley15\/wp-json\/wp\/v2\/posts\/327"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jbeasley15\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jbeasley15\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jbeasley15\/wp-json\/wp\/v2\/users\/25847"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jbeasley15\/wp-json\/wp\/v2\/comments?post=327"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jbeasley15\/wp-json\/wp\/v2\/posts\/327\/revisions"}],"predecessor-version":[{"id":332,"href":"https:\/\/sites.wp.odu.edu\/jbeasley15\/wp-json\/wp\/v2\/posts\/327\/revisions\/332"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jbeasley15\/wp-json\/wp\/v2\/media?parent=327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jbeasley15\/wp-json\/wp\/v2\/categories?post=327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jbeasley15\/wp-json\/wp\/v2\/tags?post=327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}