{"id":293,"date":"2024-02-09T16:32:09","date_gmt":"2024-02-09T16:32:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kridl004\/?p=293"},"modified":"2024-02-09T16:32:09","modified_gmt":"2024-02-09T16:32:09","slug":"use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kridl004\/2024\/02\/09\/use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity\/","title":{"rendered":"Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.\u00a0"},"content":{"rendered":"\n<p><strong>C- <\/strong><strong>CREATING YOUR OWN COMPANY<\/strong><\/p>\n\n\n\n<p><strong>Y- <\/strong><strong>YOUTUBE VIDEOS ABOUT CYBERSECURITY<\/strong><\/p>\n\n\n\n<p><strong>B- <\/strong><strong>BUYING TECH PARTS TO SELL<\/strong><\/p>\n\n\n\n<p><strong>E- <\/strong><strong>EDUCATING OTHERS ON HOW CYBERSECURITY WORKS<\/strong><\/p>\n\n\n\n<p><strong>R- <\/strong><strong>RECONSTRUCTING AND WRITING YOUR OWN BOOKS TO SELL TO OTHERS&nbsp;<\/strong><\/p>\n\n\n\n<p><strong>S- <\/strong><strong>SECURITY CONSULTING<\/strong><\/p>\n\n\n\n<p><strong>E-<\/strong><strong> EXPERTS RUNNING THE COMPANY<\/strong><\/p>\n\n\n\n<p><strong>C-<\/strong><strong>CONSULTING OTHERS WITH THEIR TECH PROBLEMS<\/strong><\/p>\n\n\n\n<p><strong>U- <\/strong><strong>UNIVERSITY COURSES<\/strong><\/p>\n\n\n\n<p><strong>R-<\/strong><strong>RESEARCHING AND CONSTRUCTING\/CREATING&nbsp; ARTICLES<\/strong><\/p>\n\n\n\n<p><strong>I- <\/strong><strong>INFORMING OTHERS WHY IT&#8217;S SO IMPORTANT TO HAVE\/USE<\/strong><\/p>\n\n\n\n<p><strong>T- <\/strong><strong>TALKING TO A REPRESENTATIVE OF YOUR COMPANY<\/strong><\/p>\n\n\n\n<p><strong>Y-<\/strong><strong>YOU CAN USE YOUR SKILLS TO MAKE A CLASS TO HELP OTHERS<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>C- CREATING YOUR OWN COMPANY Y- YOUTUBE VIDEOS ABOUT CYBERSECURITY B- BUYING TECH PARTS TO SELL E- EDUCATING OTHERS ON HOW CYBERSECURITY WORKS R- RECONSTRUCTING AND WRITING YOUR OWN BOOKS TO SELL TO OTHERS&nbsp; S- SECURITY CONSULTING E- EXPERTS RUNNING THE COMPANY C-CONSULTING OTHERS WITH THEIR TECH PROBLEMS U- UNIVERSITY COURSES R-RESEARCHING AND CONSTRUCTING\/CREATING&nbsp; ARTICLES&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kridl004\/2024\/02\/09\/use-the-letters-of-the-word-cybersecurity-to-list-legal-ways-to-make-money-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":28412,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kridl004\/wp-json\/wp\/v2\/posts\/293"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kridl004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kridl004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kridl004\/wp-json\/wp\/v2\/users\/28412"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kridl004\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kridl004\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":294,"href":"https:\/\/sites.wp.odu.edu\/kridl004\/wp-json\/wp\/v2\/posts\/293\/revisions\/294"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kridl004\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kridl004\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kridl004\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}