{"id":482,"date":"2026-02-13T23:54:35","date_gmt":"2026-02-13T23:54:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/?page_id=482"},"modified":"2026-03-04T20:42:09","modified_gmt":"2026-03-04T20:42:09","slug":"experience-2-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/experience-2-2\/","title":{"rendered":"Experience 2"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">CYSE 525 &#8211; cybersecurity strategy and policy<\/h2>\n\n\n\n<p><strong>Description: <\/strong>This course explores cybersecurity policy and strategy and introduces students to the essentials of strategy development and policy making in cybersecurity. Topics considered include planning principles in cyber strategy; risk management and cybersecurity policy; the connections between cybersecurity policies, businesses, and governmental institutions; the knowledge, skills, and abilities needed to develop and implement cybersecurity policy; the social, political and ethical implications that arise in cybersecurity policies and strategies; strategies to assess cybersecurity policy; and the ties between national security and cybersecurity policy.<\/p>\n\n\n\n<p><strong>Reflection<\/strong>: This course has significantly strengthened my cybersecurity degree by showing me how technical security practices connect to broader policy and strategic decision-making. It helped me understand how risk management, national security, and business objectives all influence cybersecurity policies. I also developed a better awareness of the social, political, and ethical implications involved in cyber strategy. Overall, the course improved my ability to think beyond the technical level and approach cybersecurity from a leadership and policy perspective.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYSE 525 &#8211; cybersecurity strategy and policy Description: This course explores cybersecurity policy and strategy and introduces students to the essentials of strategy development and policy making in cybersecurity. Topics considered include planning principles in cyber strategy; risk management and&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/experience-2-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28140,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/pages\/482"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/users\/28140"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/comments?post=482"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/pages\/482\/revisions"}],"predecessor-version":[{"id":517,"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/pages\/482\/revisions\/517"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/media?parent=482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}