{"id":298,"date":"2026-03-09T00:21:19","date_gmt":"2026-03-09T00:21:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/?page_id=298"},"modified":"2026-03-09T00:21:19","modified_gmt":"2026-03-09T00:21:19","slug":"cybersecurity-concepts","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/cybersecurity-concepts\/","title":{"rendered":"Cybersecurity Concepts"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Course Overview<\/h3>\n\n\n\n<p>This course introduced the fundamental concepts of cybersecurity and how organizations protect their networks, systems, and data from cyber threats. The course covered both technical security mechanisms and risk management strategies.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Key Concepts Learned<\/h3>\n\n\n\n<p>Topics included security vulnerabilities, malware, network attacks, and defensive security strategies. We also examined real-world cyber incidents and how attackers exploit system weaknesses.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Skills Developed<\/h3>\n\n\n\n<p>\u2022 Identifying common cybersecurity threats and vulnerabilities<br>\u2022 Understanding malware and ransomware attacks<br>\u2022 Learning risk assessment and mitigation strategies<br>\u2022 Analyzing security incidents and breaches<br>\u2022 Understanding security best practices for organizations<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Example Work<\/h3>\n\n\n\n<p>Assignments involved analyzing real cyberattacks such as the Stuxnet cyber weapon and evaluating how security weaknesses allowed attackers to compromise systems.<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-bd2c6eda-0230-4ad4-a3b3-ce0138e56e0f\" href=\"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-content\/uploads\/sites\/37041\/2026\/03\/Short-Research-Paper-1.docx\">Short-Research-Paper-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-content\/uploads\/sites\/37041\/2026\/03\/Short-Research-Paper-1.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-bd2c6eda-0230-4ad4-a3b3-ce0138e56e0f\">Download<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Reflection<\/h3>\n\n\n\n<p>This course helped me understand how cybersecurity works at both a technical and strategic level. It also showed how complex cyber threats can impact organizations and critical infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Course Overview This course introduced the fundamental concepts of cybersecurity and how organizations protect their networks, systems, and data from cyber threats. The course covered both technical security mechanisms and risk management strategies. Key Concepts Learned Topics included security vulnerabilities,&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/cybersecurity-concepts\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":25039,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/pages\/298"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/users\/25039"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/comments?post=298"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/pages\/298\/revisions"}],"predecessor-version":[{"id":300,"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/pages\/298\/revisions\/300"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/media?parent=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}