{"id":348,"date":"2023-04-18T22:53:21","date_gmt":"2023-04-18T22:53:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nietocyse200t\/?p=348"},"modified":"2023-04-18T22:53:21","modified_gmt":"2023-04-18T22:53:21","slug":"use-the-letters-of-the-word-cyber-security-to-list-legal-ways-to-make-money-in-cyber-security","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nietocyse200t\/2023\/04\/18\/use-the-letters-of-the-word-cyber-security-to-list-legal-ways-to-make-money-in-cyber-security\/","title":{"rendered":"USE THE LETTERS OF THE WORD &#8220;CYBER SECURITY&#8221; TO LIST LEGAL WAYS TO MAKE MONEY IN CYBER SECURITY"},"content":{"rendered":"\n<p><strong>Eportfolio Entry #5<\/strong><br><strong>C<\/strong>reate Apps that rates software<br><strong>Y<\/strong>acht GPS software that is secure<br><strong>B<\/strong>lock attackers from accessing data<br><strong>R<\/strong>ent out software and equipment<br><strong>S<\/strong>et up and monitor firewalls for companies<br><strong>E<\/strong>nlist into the military taking up an IT\/Cyber position<br><strong>C<\/strong>reate a cybersecurity school<br><strong>U<\/strong>pdate equipment and software for companies<br><strong>R<\/strong>espond to reported attacks and residents on call<br><strong>I<\/strong>ntroduce new ways to combat cyber attacks as an advisor<br><strong>T<\/strong>each newcomers on the job training as training manager<br><strong>Y<\/strong>outube channel discussing cybersecurity like &#8220;Professor Messer&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eportfolio Entry #5Create Apps that rates softwareYacht GPS software that is secureBlock attackers from accessing dataRent out software and equipmentSet up and monitor firewalls for companiesEnlist into the military taking up an IT\/Cyber positionCreate a cybersecurity schoolUpdate equipment and software for companiesRespond to reported attacks and residents on callIntroduce new ways to combat cyber attacks&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nietocyse200t\/2023\/04\/18\/use-the-letters-of-the-word-cyber-security-to-list-legal-ways-to-make-money-in-cyber-security\/\">Read More<\/a><\/div>\n","protected":false},"author":25891,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse200t\/wp-json\/wp\/v2\/posts\/348"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse200t\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse200t\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse200t\/wp-json\/wp\/v2\/users\/25891"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse200t\/wp-json\/wp\/v2\/comments?post=348"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nietocyse200t\/wp-json\/wp\/v2\/posts\/348\/revisions"}],"predecessor-version":[{"id":349,"href":"https:\/\/sites.wp.odu.edu\/nietocyse200t\/wp-json\/wp\/v2\/posts\/348\/revisions\/349"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse200t\/wp-json\/wp\/v2\/media?parent=348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse200t\/wp-json\/wp\/v2\/categories?post=348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse200t\/wp-json\/wp\/v2\/tags?post=348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}