{"id":285,"date":"2026-02-07T22:50:26","date_gmt":"2026-02-07T22:50:26","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nelsoncheng\/?page_id=285"},"modified":"2026-02-07T23:46:51","modified_gmt":"2026-02-07T23:46:51","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nelsoncheng\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"637\" height=\"362\" src=\"https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-content\/uploads\/sites\/40660\/2026\/02\/Screenshot-2026-02-07-184128.png\" alt=\"\" class=\"wp-image-297\" srcset=\"https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-content\/uploads\/sites\/40660\/2026\/02\/Screenshot-2026-02-07-184128.png 637w, https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-content\/uploads\/sites\/40660\/2026\/02\/Screenshot-2026-02-07-184128-300x170.png 300w, https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-content\/uploads\/sites\/40660\/2026\/02\/Screenshot-2026-02-07-184128-528x300.png 528w\" sizes=\"(max-width: 637px) 100vw, 637px\" \/><\/figure>\n\n\n\n<p>Protect Systems and data, image from <a href=\"https:\/\/www.freepik.com\/free-photos-vectors\/cyber-security-imagery\">Cyber security imagery Images &#8211; Free Download on Freepik<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"322\" src=\"https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-content\/uploads\/sites\/40660\/2026\/02\/Screenshot-2026-02-07-184208.png\" alt=\"\" class=\"wp-image-298\" style=\"width:635px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-content\/uploads\/sites\/40660\/2026\/02\/Screenshot-2026-02-07-184208.png 480w, https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-content\/uploads\/sites\/40660\/2026\/02\/Screenshot-2026-02-07-184208-300x201.png 300w, https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-content\/uploads\/sites\/40660\/2026\/02\/Screenshot-2026-02-07-184208-447x300.png 447w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/figure>\n\n\n\n<p>Teach others about Cyber Security and prevent social engineering attacks, image from <a href=\"https:\/\/www.solidsystems.co.za\/blog\/what-is-social-engineering\/\">What Is Social Engineering and How Does It Functions? | Solid Systems<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"580\" src=\"https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-content\/uploads\/sites\/40660\/2026\/02\/Screenshot-2026-02-07-184247-1024x580.png\" alt=\"\" class=\"wp-image-299\" srcset=\"https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-content\/uploads\/sites\/40660\/2026\/02\/Screenshot-2026-02-07-184247-1024x580.png 1024w, https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-content\/uploads\/sites\/40660\/2026\/02\/Screenshot-2026-02-07-184247-300x170.png 300w, https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-content\/uploads\/sites\/40660\/2026\/02\/Screenshot-2026-02-07-184247-768x435.png 768w, https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-content\/uploads\/sites\/40660\/2026\/02\/Screenshot-2026-02-07-184247-530x300.png 530w, https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-content\/uploads\/sites\/40660\/2026\/02\/Screenshot-2026-02-07-184247.png 1092w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Build strong systems and limit variabilities, image from <a href=\"https:\/\/peerdh.com\/blogs\/programming-insights\/building-a-simple-to-do-list-in-red-programming-language\">Building A Simple To-do List In Red Programming Language \u2013 peerdh.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protect Systems and data, image from Cyber security imagery Images &#8211; Free Download on Freepik Teach others about Cyber Security and prevent social engineering attacks, image from What Is Social Engineering and How Does It Functions? | Solid Systems Build strong systems and limit variabilities, image from Building A Simple To-do List In Red Programming&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nelsoncheng\/cyse-201s\/\">Read More<\/a><\/div>\n","protected":false},"author":31965,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-json\/wp\/v2\/pages\/285"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-json\/wp\/v2\/users\/31965"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-json\/wp\/v2\/comments?post=285"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-json\/wp\/v2\/pages\/285\/revisions"}],"predecessor-version":[{"id":300,"href":"https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-json\/wp\/v2\/pages\/285\/revisions\/300"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nelsoncheng\/wp-json\/wp\/v2\/media?parent=285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}