{"id":341,"date":"2024-09-01T19:52:57","date_gmt":"2024-09-01T19:52:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/justin-lassalle\/?page_id=341"},"modified":"2024-12-07T22:40:21","modified_gmt":"2024-12-07T22:40:21","slug":"cyse-201-3","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/justin-lassalle\/cyse-201-3\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-c1f179f3-965b-4ed1-bc53-802078e78488\" href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/NICE-FRAMEWORK.docx\">NICE-FRAMEWORK<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/NICE-FRAMEWORK.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c1f179f3-965b-4ed1-bc53-802078e78488\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-45524657-2bfd-423b-83e4-73c3135182b9\" href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/Cybersecurity-Principles.docx\">Cybersecurity-Principles<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/Cybersecurity-Principles.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-45524657-2bfd-423b-83e4-73c3135182b9\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-b596c494-e751-4ce9-bded-8b0d895e50a0\" href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/Privacy-Rights.docx\">Privacy-Rights<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/Privacy-Rights.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b596c494-e751-4ce9-bded-8b0d895e50a0\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-35609b04-2d6b-4d5a-a18a-bea4b846c095\" href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/Maslows-Hierarchy-of-Needs.docx\">Maslows-Hierarchy-of-Needs<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/Maslows-Hierarchy-of-Needs.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-35609b04-2d6b-4d5a-a18a-bea4b846c095\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-9c5edb24-f1f7-45de-bfa7-9ec9a881afd8\" href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/CYSE-201-Rank-the-Motives-1.docx\">Rank-the-Motives<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/CYSE-201-Rank-the-Motives-1.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9c5edb24-f1f7-45de-bfa7-9ec9a881afd8\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-79fe5f05-d995-46cf-9d0e-9d9506adecf8\" href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/Real-and-Fake-Websites.docx\">Real-and-Fake-Websites<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/Real-and-Fake-Websites.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-79fe5f05-d995-46cf-9d0e-9d9506adecf8\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-1d1ac694-62fd-4ac7-bb08-0decb7383061\" href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/How-it-influences-Cybersecurity.-Video.docx\">How-it-influences-Cybersecurity.-Video<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/How-it-influences-Cybersecurity.-Video.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-1d1ac694-62fd-4ac7-bb08-0decb7383061\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-cbbeb150-1adb-434d-9fc4-06d78e8239a2\" href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/Social-Media-Disorder-Scale.docx\">Social-Media-Disorder-Scale<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/10\/Social-Media-Disorder-Scale.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-cbbeb150-1adb-434d-9fc4-06d78e8239a2\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-b9fc831a-3ebf-4e93-873e-b286d439294f\" href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/11\/Reflection-on-Social-Cybersecurity.docx\">Reflection-on-Social-Cybersecurity<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/11\/Reflection-on-Social-Cybersecurity.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b9fc831a-3ebf-4e93-873e-b286d439294f\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-5fe19aa4-191d-4e35-92b7-35fac25e5189\" href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/11\/Cybersecurity-Analyst-JobRrelates-to-Social-Behaviors.docx\">Cybersecurity-Analyst-Job-Relates-to-Social-Behaviors<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/11\/Cybersecurity-Analyst-JobRrelates-to-Social-Behaviors.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5fe19aa4-191d-4e35-92b7-35fac25e5189\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-3806772c-f9a4-40e7-9229-44c0929323e7\" href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/11\/Economics-Theories-and-Social-Theories-Relate-to-the-Letter.docx\">Economics-Theories-and-Social-Theories-Relate-to-the-Letter<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/11\/Economics-Theories-and-Social-Theories-Relate-to-the-Letter.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3806772c-f9a4-40e7-9229-44c0929323e7\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-9b815215-71c7-48b3-9240-a1984721f788\" href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/11\/Bug-Bounty-Programs-and-Their-Impact-on-Cybersecurity.docx\">Bug-Bounty-Programs-and-Their-Impact-on-Cybersecurity<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/11\/Bug-Bounty-Programs-and-Their-Impact-on-Cybersecurity.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9b815215-71c7-48b3-9240-a1984721f788\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-7c6ea470-ee66-4da4-a21a-f655ad78016a\" href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/11\/Recognizes-Hidden-Behaviors.docx\">Recognizes-Hidden-Behaviors<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/11\/Recognizes-Hidden-Behaviors.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7c6ea470-ee66-4da4-a21a-f655ad78016a\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-a6658c37-6318-4b03-9431-cc5a2904835d\" href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/12\/Digital-Forensics-and-Human-Behavior.docx\">Digital-Forensics-and-Human-Behavior<\/a><a href=\"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-content\/uploads\/sites\/35112\/2024\/12\/Digital-Forensics-and-Human-Behavior.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a6658c37-6318-4b03-9431-cc5a2904835d\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":28246,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-json\/wp\/v2\/pages\/341"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-json\/wp\/v2\/users\/28246"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-json\/wp\/v2\/comments?post=341"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-json\/wp\/v2\/pages\/341\/revisions"}],"predecessor-version":[{"id":440,"href":"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-json\/wp\/v2\/pages\/341\/revisions\/440"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/justin-lassalle\/wp-json\/wp\/v2\/media?parent=341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}