{"id":120,"date":"2025-02-03T19:20:44","date_gmt":"2025-02-03T19:20:44","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2025-02-03T19:51:54","modified_gmt":"2025-02-03T19:51:54","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/","title":{"rendered":"Home"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"717\" src=\"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/1-1024x717.jpg\" alt=\"\" class=\"wp-image-288\" srcset=\"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/1-1024x717.jpg 1024w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/1-300x210.jpg 300w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/1-768x538.jpg 768w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/1-1536x1076.jpg 1536w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/1-428x300.jpg 428w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/1.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Some Facets of Cybersecurity<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/2-1024x683.jpg\" alt=\"\" class=\"wp-image-289\" srcset=\"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/2-1024x683.jpg 1024w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/2-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/2-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/2-1536x1024.jpg 1536w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/2-960x640.jpg 960w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/2-450x300.jpg 450w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/2.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Phishing Scams, Viruses, and Theft of Confidential and Personal Data<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"681\" src=\"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/3-1024x681.jpg\" alt=\"\" class=\"wp-image-290\" srcset=\"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/3-1024x681.jpg 1024w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/3-300x199.jpg 300w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/3-768x510.jpg 768w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/3-1536x1021.jpg 1536w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/3-451x300.jpg 451w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/3.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Online Data Protection<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"714\" src=\"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/1-1-1024x714.jpg\" alt=\"\" class=\"wp-image-291\" srcset=\"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/1-1-1024x714.jpg 1024w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/1-1-300x209.jpg 300w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/1-1-768x536.jpg 768w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/1-1-1536x1071.jpg 1536w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/1-1-430x300.jpg 430w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/1-1.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Cybersecurity Engineers Working to Provide Protection Against Cyber Attacks from Hackers for Online Networks and Systems<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"595\" src=\"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/2-1-1024x595.jpg\" alt=\"\" class=\"wp-image-292\" srcset=\"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/2-1-1024x595.jpg 1024w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/2-1-300x174.jpg 300w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/2-1-768x446.jpg 768w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/2-1-1536x893.jpg 1536w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/2-1-516x300.jpg 516w, https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-content\/uploads\/sites\/38480\/2025\/02\/2-1.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Cyber security  firewall interface protection concept. Businesswoman protecting herself from cyber attacks. Personal data security and banking<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":30511,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-json\/wp\/v2\/users\/30511"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":293,"href":"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-json\/wp\/v2\/pages\/120\/revisions\/293"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/lance-eportfolio\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}