{"id":287,"date":"2023-09-27T22:19:20","date_gmt":"2023-09-27T22:19:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/johnpang21\/?p=287"},"modified":"2023-09-27T22:19:20","modified_gmt":"2023-09-27T22:19:20","slug":"journal-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/johnpang21\/2023\/09\/27\/journal-5\/","title":{"rendered":"Journal #5"},"content":{"rendered":"\n<p><span style=\"text-decoration: underline\"><strong>C<\/strong><\/span>onsultant. You can be a consultant for different organizations or companies and give them pieces of advice on cybersecurity.<br><strong><span style=\"text-decoration: underline\">Y<\/span><\/strong>ouTube. You can create a youtube channel and educate the masses about cybersecurity. <br><strong><span style=\"text-decoration: underline\">B<\/span><\/strong>ounty Hunter. You can be a &#8220;Bounty Hunter&#8221; and your job is to find the cause of such attack.<br><strong><span style=\"text-decoration: underline\">E<\/span><\/strong>ducation. You can be a certified teacher and teach cybersecurity classes.<br><strong><span style=\"text-decoration: underline\">R<\/span><\/strong>esearch. You can be a professional researcher and get hired by companies to do research about cybersecurity.<br><strong><span style=\"text-decoration: underline\">S<\/span><\/strong>ecurity Company. You can make a security company that is capable of protecting your hardware and most importantly software. <br><strong><span style=\"text-decoration: underline\">E<\/span><\/strong>thical Hacker. You can be hired as a &#8220;good&#8221; hacker and test the strength of one&#8217;s security and offer analysis after.<br><strong><span style=\"text-decoration: underline\">C<\/span><\/strong>ontent Creator. You can be a content creator and create content for different platforms like making your own blogs, TikTok videos, or an Instagram page.<br><strong><span style=\"text-decoration: underline\">U<\/span><\/strong>ser Support. You can be a tech\/user support for a company or organization that is having security issues or just having trouble with their device.<br><strong><span style=\"text-decoration: underline\">R<\/span><\/strong>eselling. You can buy and sell cybersecurity products or services from other vendors and earn commissions or profits.<br><strong><span style=\"text-decoration: underline\">I<\/span><\/strong>ncident Responder. You can be a companies &#8220;911&#8221; and help them incase there&#8217;s an emergency.<br><strong><span style=\"text-decoration: underline\">T<\/span><\/strong>raining. You can make your own training guides and sell it or offer to train people.<br><strong><span style=\"text-decoration: underline\">Y<\/span><\/strong>ourself. You should invest in yourself as you are your biggest asset and therefore you can get a lot more if you take care of yourself.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Consultant. You can be a consultant for different organizations or companies and give them pieces of advice on cybersecurity.YouTube. You can create a youtube channel and educate the masses about cybersecurity. Bounty Hunter. You can be a &#8220;Bounty Hunter&#8221; and your job is to find the cause of such attack.Education. You can be a certified&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/johnpang21\/2023\/09\/27\/journal-5\/\">Read More<\/a><\/div>\n","protected":false},"author":24939,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/johnpang21\/wp-json\/wp\/v2\/posts\/287"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/johnpang21\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/johnpang21\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/johnpang21\/wp-json\/wp\/v2\/users\/24939"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/johnpang21\/wp-json\/wp\/v2\/comments?post=287"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/johnpang21\/wp-json\/wp\/v2\/posts\/287\/revisions"}],"predecessor-version":[{"id":288,"href":"https:\/\/sites.wp.odu.edu\/johnpang21\/wp-json\/wp\/v2\/posts\/287\/revisions\/288"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/johnpang21\/wp-json\/wp\/v2\/media?parent=287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/johnpang21\/wp-json\/wp\/v2\/categories?post=287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/johnpang21\/wp-json\/wp\/v2\/tags?post=287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}