{"id":290,"date":"2023-02-12T22:02:45","date_gmt":"2023-02-12T22:02:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/keilanacybersecurity\/?p=290"},"modified":"2023-04-24T02:33:43","modified_gmt":"2023-04-24T02:33:43","slug":"e-portfolio-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/keilanacybersecurity\/2023\/02\/12\/e-portfolio-5\/","title":{"rendered":"E-Portfolio entry #5"},"content":{"rendered":"\n<p><strong>Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.\u00a0<\/strong><\/p>\n\n\n\n<p>For example:<\/p>\n\n\n\n<p><strong>C<\/strong>reate&nbsp;app&nbsp;that rates software.<br><strong>Y<\/strong>acht&nbsp;GPS software that is secure<br><strong>B<\/strong>ecome a Cybersecurity analyst.<br><strong>E<\/strong>valuate data collected in data base.<br><strong>R<\/strong>eprogramming software<br><strong>S<\/strong>ecurity auditing<br><strong>E<\/strong>ducate and guide future cybersecurity trainees.<br><strong>C<\/strong>reate solutions to business organizations.<br><strong>U<\/strong>tilize all my experience working in the field of cybersecurity into book to publish.<br><strong>R<\/strong>epairing industrial hardware<br><strong>I<\/strong>nstructional courses<br><strong>T<\/strong>rading stocks<br><b>YouTub<\/b>e videos content creating about cybersecurity terms<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.\u00a0 For example: Create&nbsp;app&nbsp;that rates software.Yacht&nbsp;GPS software that is secureBecome a Cybersecurity analyst.Evaluate data collected in data base.Reprogramming softwareSecurity auditingEducate and guide future cybersecurity trainees.Create solutions to business organizations.Utilize all my experience working in the field of cybersecurity into book&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/keilanacybersecurity\/2023\/02\/12\/e-portfolio-5\/\">Read More<\/a><\/div>\n","protected":false},"author":26336,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/keilanacybersecurity\/wp-json\/wp\/v2\/posts\/290"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/keilanacybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/keilanacybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/keilanacybersecurity\/wp-json\/wp\/v2\/users\/26336"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/keilanacybersecurity\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/keilanacybersecurity\/wp-json\/wp\/v2\/posts\/290\/revisions"}],"predecessor-version":[{"id":365,"href":"https:\/\/sites.wp.odu.edu\/keilanacybersecurity\/wp-json\/wp\/v2\/posts\/290\/revisions\/365"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/keilanacybersecurity\/wp-json\/wp\/v2\/media?parent=290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/keilanacybersecurity\/wp-json\/wp\/v2\/categories?post=290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/keilanacybersecurity\/wp-json\/wp\/v2\/tags?post=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}