{"id":138,"date":"2022-01-12T14:55:05","date_gmt":"2022-01-12T14:55:05","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=138"},"modified":"2025-08-08T15:05:36","modified_gmt":"2025-08-08T15:05:36","slug":"cyse-368","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-368\/","title":{"rendered":"CYSE 368"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cybersecurity Internship<\/h1>\n\n\n\n<p>This course enables students to volunteer at an agency related to cybersecurity. Students must volunteer for 50 hours per course credit and complete course assignments.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Course Material<\/h1>\n\n\n\n<h2 class=\"wp-block-heading\">Internship Reflection<\/h2>\n\n\n<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;padding-top: 90%;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fjprosser91%2Fwp-content%2Fuploads%2Fsites%2F27654%2F2025%2F08%2FInternship-Experiences.docx&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading&#8230;<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fjprosser91%2Fwp-content%2Fuploads%2Fsites%2F27654%2F2025%2F08%2FInternship-Experiences.docx&#038;hl=en\" class=\"ead-document-btn\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n\n\n<h2 class=\"wp-block-heading\">Internship Journals<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a href=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/internship-reflection-paper1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">internship-reflection-paper1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;padding-top: 90%;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fjprosser91%2Fwp-content%2Fuploads%2Fsites%2F27654%2F2025%2F08%2FReflection-paper-3-1.docx&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading&#8230;<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fjprosser91%2Fwp-content%2Fuploads%2Fsites%2F27654%2F2025%2F08%2FReflection-paper-3-1.docx&#038;hl=en\" class=\"ead-document-btn\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n\n<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;padding-top: 90%;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fjprosser91%2Fwp-content%2Fuploads%2Fsites%2F27654%2F2025%2F08%2FReflection-paper-5-1.docx&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading&#8230;<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fjprosser91%2Fwp-content%2Fuploads%2Fsites%2F27654%2F2025%2F08%2FReflection-paper-5-1.docx&#038;hl=en\" class=\"ead-document-btn\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a href=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/internship-reflection-paper2.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">internship-reflection-paper2<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;padding-top: 90%;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fjprosser91%2Fwp-content%2Fuploads%2Fsites%2F27654%2F2025%2F08%2FReflection-paper-4-2.docx&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading&#8230;<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fjprosser91%2Fwp-content%2Fuploads%2Fsites%2F27654%2F2025%2F08%2FReflection-paper-4-2.docx&#038;hl=en\" class=\"ead-document-btn\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/internship-reflection-paper6.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">internship-reflection-paper6<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Applying Course Knowledge<\/h3>\n\n\n\n<ul>\n<li><strong>What have you learned in coursework that relates to the world of work?<\/strong>\n<ul>\n<li>I have related theoretical concepts, such as network layout, to the practical experience of understanding a network layout<\/li>\n\n\n\n<li>I have leveraged my Linux knowledge and applied management techniques to it.<\/li>\n\n\n\n<li>I have used my planning and diagram abilities to better serve myself and my department going forward.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>How are the concepts you have read about in course texts applied in practice?<\/strong>\n<ul>\n<li>The biggest thing I have learned is that each IT department implements practices differently. No one answer fits all situations and policies. In the world of education, for example, security can take a back seat to accessibility. Scientific equipment doesn&#8217;t get updated on the same time scale as technology, and upgrading can be <strong>very<\/strong> cost-prohibitive.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>What theories, ideas, or concepts might be applied in your career area?<\/strong>\n<ul>\n<li>For now, I think the idea of reactive security will be very relevant going forward. There are so many new security threats, and technology evolves so rapidly that security will always have to react to new situations and try to be proactive wherever possible.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Skill Development<\/h3>\n\n\n\n<ul>\n<li><strong>What new skills did you learn during the internship?<\/strong>\n<ul>\n<li>The biggest skill was learning how to utilize a SIEM effectively. This involved setting up mailbox rules to filter the investigations\/ assignments relevant to me, reading through and parsing log data, investigating file processes and hashes, investigating access &amp; IP addresses, investigating authentication information, and end-user communication<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"480\" src=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/Internship-SIEM-Example-1024x492.png?resize=1000%2C480&#038;ssl=1\" alt=\"\" class=\"wp-image-730\" style=\"width:840px;height:auto\" srcset=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/Internship-SIEM-Example.png?resize=1024%2C492&amp;ssl=1 1024w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/Internship-SIEM-Example.png?resize=300%2C144&amp;ssl=1 300w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/Internship-SIEM-Example.png?resize=768%2C369&amp;ssl=1 768w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/Internship-SIEM-Example.png?resize=1536%2C737&amp;ssl=1 1536w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/Internship-SIEM-Example.png?resize=600%2C288&amp;ssl=1 600w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/Internship-SIEM-Example.png?w=1712&amp;ssl=1 1712w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" data-recalc-dims=\"1\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Personal Development<\/h3>\n\n\n\n<ul>\n<li><strong>How did you benefit personally from the internship experience?<\/strong>\n<ul>\n<li>I think the biggest benefit for me was the ability to work with other departments. Each department had its way of working together and troubleshooting. Each was approachable in its way, and I was able to learn about the infrastructure of the University and its security posturing. Since I was self-managed, the hardest challenge was balancing my workload and the internship workload. I ended up prioritizing my work getting done first, so I could have more time to work on internship duties. I think this approach served each department fairly well and allowed me to gain the experiences I was seeking. I also think working with the departments lent me a new level of interdepartmental communication and collaboration that will serve me well going forward. <\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Internship This course enables students to volunteer at an agency related to cybersecurity. Students must volunteer for 50 hours per course credit and complete course assignments. Course Material Internship Reflection Internship Journals Applying Course Knowledge Skill Development Personal Development<\/p>\n","protected":false},"author":22978,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":497,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-425w\/","url_meta":{"origin":138,"position":0},"title":"CYSE 425W","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Cybersecurity Strategy andPolicy Course Description: This course explores cybersecurity policy and strategy and introduces students to the essentials ofstrategy development and policy making in cybersecurity. Topics considered include planning principlesin cyber strategy; risk management and cybersecurity policy; the connections between cybersecuritypolicies, businesses, and governmental institutions; the knowledge, skills, and abilities\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":510,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-426\/","url_meta":{"origin":138,"position":1},"title":"CYSE 426","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Cyberwar Course Description and Objectives This course will explore the national security dimension of cybersecurity and examine cyber war in international relations. Our focus will start with looking at cybersecurity as a component of national security and investigate the topics of operational considerations in cybersecurity, planning in cyber war, different\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":480,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-462\/","url_meta":{"origin":138,"position":2},"title":"CYSE 462","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Cybersecurity Fundamentals Course Overview This is the first course in the\u00a0Graduate Certificate Program in Cybersecurity. This course will introduce the networking and cybersecurity background that you'll need to succeed in the other courses in the certificate program. Cybersecurity emphasizes prevention of attacks that are perpetrated using the Internet. It includes\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":97,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/internship\/","url_meta":{"origin":138,"position":3},"title":"Internship","author":"jpros004","date":"January 12, 2022","format":false,"excerpt":"","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":141,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-300\/","url_meta":{"origin":138,"position":4},"title":"CYSE 300","author":"jpros004","date":"January 12, 2022","format":false,"excerpt":"Introduction to Cybersecurity This course provides an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Students are expected to become familiar with fundamental security concepts, technologies, and\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":207,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/law-ethics\/phil-355e\/","url_meta":{"origin":138,"position":5},"title":"PHIL 355E","author":"jpros004","date":"January 12, 2022","format":false,"excerpt":"Cybersecurity Ethics This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/138"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/users\/22978"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/comments?post=138"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/138\/revisions"}],"predecessor-version":[{"id":743,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/138\/revisions\/743"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/media?parent=138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}