{"id":99,"date":"2023-09-19T01:27:22","date_gmt":"2023-09-19T01:27:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=99"},"modified":"2024-09-19T01:39:16","modified_gmt":"2024-09-19T01:39:16","slug":"capstone","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/matthewrozean\/capstone\/","title":{"rendered":"Courses"},"content":{"rendered":"\n<ul>\n<li><a href=\"https:\/\/sites.wp.odu.edu\/matthewrozean\/it-cyse-200t\/\">CYSE\/IT-200T &#8211; Cybersecurity, Technology and Society<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/matthewrozean\/cyse201s-cybersecurity-social-science\/\">CYSE-201S &#8211; Cybersecurity &amp; Social Science<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":27541,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/pages\/99"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/users\/27541"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/comments?post=99"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/pages\/99\/revisions"}],"predecessor-version":[{"id":340,"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/pages\/99\/revisions\/340"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/media?parent=99"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}