{"id":120,"date":"2026-02-23T00:37:54","date_gmt":"2026-02-23T00:37:54","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2026-02-23T01:08:06","modified_gmt":"2026-02-23T01:08:06","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kleeeportfolio\/","title":{"rendered":"About me"},"content":{"rendered":"<p>I am a cybersecurity student focused on building the technical skills and analytical mindset needed to protect systems, understand threats, and contribute to a safer digital world. My goal is to gain hands on experience, continue growing in the field, and start my career in cybersecurity with a focus on security operations, threat analysis, or system defense.<\/p>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"1024\" src=\"http:\/\/sites.wp.odu.edu\/kleeeportfolio\/wp-content\/uploads\/sites\/40870\/2026\/02\/44355A21-2573-46E4-9CC4-66C932245BBB-683x1024.png\" alt=\"\" class=\"wp-image-286\" srcset=\"https:\/\/sites.wp.odu.edu\/kleeeportfolio\/wp-content\/uploads\/sites\/40870\/2026\/02\/44355A21-2573-46E4-9CC4-66C932245BBB-683x1024.png 683w, https:\/\/sites.wp.odu.edu\/kleeeportfolio\/wp-content\/uploads\/sites\/40870\/2026\/02\/44355A21-2573-46E4-9CC4-66C932245BBB-200x300.png 200w, https:\/\/sites.wp.odu.edu\/kleeeportfolio\/wp-content\/uploads\/sites\/40870\/2026\/02\/44355A21-2573-46E4-9CC4-66C932245BBB-768x1152.png 768w, https:\/\/sites.wp.odu.edu\/kleeeportfolio\/wp-content\/uploads\/sites\/40870\/2026\/02\/44355A21-2573-46E4-9CC4-66C932245BBB.png 1024w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>I am a cybersecurity student focused on building the technical skills and analytical mindset needed to protect systems, understand threats, and contribute to a safer digital world. My goal is to gain hands on experience, continue growing in the field, and start my career in cybersecurity with a focus on security operations, threat analysis, or&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kleeeportfolio\/\">Read More<\/a><\/div>\n","protected":false},"author":32194,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kleeeportfolio\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kleeeportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kleeeportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kleeeportfolio\/wp-json\/wp\/v2\/users\/32194"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kleeeportfolio\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/kleeeportfolio\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":287,"href":"https:\/\/sites.wp.odu.edu\/kleeeportfolio\/wp-json\/wp\/v2\/pages\/120\/revisions\/287"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kleeeportfolio\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}