{"id":200,"date":"2021-03-08T22:48:06","date_gmt":"2021-03-08T22:48:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/?p=200"},"modified":"2021-04-26T14:25:13","modified_gmt":"2021-04-26T14:25:13","slug":"list-legal-ways-to-make-money-in-cyber-security","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/2021\/03\/08\/list-legal-ways-to-make-money-in-cyber-security\/","title":{"rendered":"J5: List Legal ways to make money in cyber security."},"content":{"rendered":"\n<p><strong>C<\/strong>reate your own business<\/p>\n\n\n\n<p><strong>Y<\/strong>acht GPS software<\/p>\n\n\n\n<p><strong>B<\/strong>ack-up systems \u2013 learn them to help people\/customers<\/p>\n\n\n\n<p><strong>E<\/strong>ngineer systems\/maintaining systems<\/p>\n\n\n\n<p><strong>R<\/strong>ent out property to a cybersecurity property<\/p>\n\n\n\n<p><strong>S<\/strong>ecurity consultations<\/p>\n\n\n\n<p><strong>E<\/strong>thical hacking<\/p>\n\n\n\n<p><strong>C<\/strong>reate penetration testing for companies<\/p>\n\n\n\n<p><strong>U<\/strong>ser support technician<\/p>\n\n\n\n<p><strong>R<\/strong>ate other companies and offer comparisons<\/p>\n\n\n\n<p><strong>I<\/strong>T outsourcing<\/p>\n\n\n\n<p><strong>T<\/strong>each cybersecurity classes<\/p>\n\n\n\n<p><strong>Y<\/strong>ou can become a security guard (physcial security) <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Create your own business Yacht GPS software Back-up systems \u2013 learn them to help people\/customers Engineer systems\/maintaining systems Rent out property to a cybersecurity property Security consultations Ethical hacking Create penetration testing for companies User support technician Rate other companies and offer comparisons IT outsourcing Teach cybersecurity classes You can become a security guard (physcial &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/moralesrebekah\/2021\/03\/08\/list-legal-ways-to-make-money-in-cyber-security\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">J5: List Legal ways to make money in cyber security.<\/span><\/a><\/p>\n","protected":false},"author":19836,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts\/200"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/users\/19836"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/comments?post=200"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts\/200\/revisions"}],"predecessor-version":[{"id":217,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts\/200\/revisions\/217"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/media?parent=200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/categories?post=200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/tags?post=200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}