{"id":67,"date":"2024-09-03T23:29:31","date_gmt":"2024-09-03T23:29:31","guid":{"rendered":"http:\/\/totesa.website\/student\/?page_id=67"},"modified":"2025-12-08T23:37:25","modified_gmt":"2025-12-08T23:37:25","slug":"relevant-courses","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/natemcmillan\/relevant-courses\/","title":{"rendered":"Relevant Courses"},"content":{"rendered":"\n<p>Cybersecurity Ethics &#8211; PHIL 355E<\/p>\n\n\n\n<p>Linux Systems for Cybersecurity &#8211; CYSE 270<\/p>\n\n\n\n<p>Digital Literacy &#8211; COMM 272G<\/p>\n\n\n\n<p>Cybersecurity and Social Sciences &#8211; CYSE 201S<\/p>\n\n\n\n<p>CYSE 200T &#8211; Cybersecurity, Technology, and Society<\/p>\n\n\n\n<p>IT315 &#8211; Introduction to Networking and Security<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Cybersecurity-students.png\"><img loading=\"lazy\" decoding=\"async\" width=\"999\" height=\"559\" src=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Cybersecurity-students.png\" alt=\"\" class=\"wp-image-244\" style=\"width:515px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Cybersecurity-students.png 999w, https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Cybersecurity-students-300x168.png 300w, https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Cybersecurity-students-768x430.png 768w, https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Cybersecurity-students-536x300.png 536w\" sizes=\"(max-width: 999px) 100vw, 999px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Ethics &#8211; PHIL 355E Linux Systems for Cybersecurity &#8211; CYSE 270 Digital Literacy &#8211; COMM 272G Cybersecurity and Social Sciences &#8211; CYSE 201S CYSE 200T &#8211; Cybersecurity, Technology, and Society IT315 &#8211; Introduction to Networking and Security<\/p>\n","protected":false},"author":29191,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages\/67"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/users\/29191"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/comments?post=67"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages\/67\/revisions"}],"predecessor-version":[{"id":312,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages\/67\/revisions\/312"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/media?parent=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}