{"id":290,"date":"2021-02-19T16:17:16","date_gmt":"2021-02-19T16:17:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jwilli071\/?p=290"},"modified":"2021-02-19T16:17:17","modified_gmt":"2021-02-19T16:17:17","slug":"journal-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jwilli071\/2021\/02\/19\/journal-5\/","title":{"rendered":"Journal #5"},"content":{"rendered":"\n<p><em>Below are some legal (and maybe even fun!) ways to make money in cybersecurity.<\/em><\/p>\n\n\n\n<p><strong>C<\/strong>reate an app that notifies people when data is found in any breaches<\/p>\n\n\n\n<p><strong>Y<\/strong>outh programs that children and teens can sign up for to learn about cybersecurity<\/p>\n\n\n\n<p><strong>B<\/strong>ug bounties<\/p>\n\n\n\n<p><strong>E<\/strong>xpert in penetration testing<\/p>\n\n\n\n<p><strong>R<\/strong>eview and recommend corrections based on audit log analysis<\/p>\n\n\n\n<p><strong>S<\/strong>tart a cybersecurity firm<\/p>\n\n\n\n<p><strong>E<\/strong>ducate as a professor in cybersecurity<\/p>\n\n\n\n<p><strong>C<\/strong>areer as a cybersecurity officer<\/p>\n\n\n\n<p><strong>U<\/strong>se industry best practices to secure networks for organizations<\/p>\n\n\n\n<p><strong>R<\/strong>outinely perform backup audits for clients<\/p>\n\n\n\n<p><strong>I<\/strong>ndependent cybersecurity consulting work for clients<\/p>\n\n\n\n<p><strong>T<\/strong>utor cybersecurity students<\/p>\n\n\n\n<p><strong>Y<\/strong>o-yo championships to raise money for cybersecurity awareness organizations<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Below are some legal (and maybe even fun!) ways to make money in cybersecurity. Create an app that notifies people when data is found in any breaches Youth programs that children and teens can sign up for to learn about cybersecurity Bug bounties Expert in penetration testing Review and recommend corrections based on audit log&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jwilli071\/2021\/02\/19\/journal-5\/\">Read More<\/a><\/div>\n","protected":false},"author":19649,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jwilli071\/wp-json\/wp\/v2\/posts\/290"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jwilli071\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jwilli071\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jwilli071\/wp-json\/wp\/v2\/users\/19649"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jwilli071\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jwilli071\/wp-json\/wp\/v2\/posts\/290\/revisions"}],"predecessor-version":[{"id":291,"href":"https:\/\/sites.wp.odu.edu\/jwilli071\/wp-json\/wp\/v2\/posts\/290\/revisions\/291"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jwilli071\/wp-json\/wp\/v2\/media?parent=290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jwilli071\/wp-json\/wp\/v2\/categories?post=290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jwilli071\/wp-json\/wp\/v2\/tags?post=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}