{"id":141,"date":"2023-09-18T15:12:21","date_gmt":"2023-09-18T15:12:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2025-04-21T18:04:19","modified_gmt":"2025-04-21T18:04:19","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/cyse-300\/","title":{"rendered":"CYSE 300"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"313\" height=\"220\" src=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/CYSE300-Image.jpg\" alt=\"\" class=\"wp-image-342\" style=\"width:466px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/CYSE300-Image.jpg 313w, https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/CYSE300-Image-300x211.jpg 300w\" sizes=\"(max-width: 313px) 100vw, 313px\" \/><\/figure><\/div>\n\n<h1 class=\"p1\" style=\"text-align: center\">Introduction to Cybersecurity<\/h1>\n<p>As the digital landscape continues to expand, securing systems, networks, and data becomes an essential component of every organizations operations. Taking this course introduces individuals to the evolving challenges of cybersecurity, the importance of protecting information assets, and applying strategies that are need to mitigate risks and threats. This course provides essential knowledge on different cybersecurity topics, including threat landscapes, security policies, risk management, and the basics of network security.\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-CYSE2030020Short20Research20Paper20231.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-CYSE2030020Short20Research20Paper20231.docx.\"><\/object><a id=\"wp-block-file--media-ec41fe30-06d8-4aca-8cbd-8fce61d984bd\" href=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-CYSE2030020Short20Research20Paper20231.docx.pdf\">annotated-CYSE2030020Short20Research20Paper20231.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-CYSE2030020Short20Research20Paper20231.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ec41fe30-06d8-4aca-8cbd-8fce61d984bd\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-CYSE20300-Short20Research20Paper2023220.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-CYSE20300-Short20Research20Paper2023220.docx.\"><\/object><a id=\"wp-block-file--media-16ef5350-5b60-4107-8686-353b410e9128\" href=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-CYSE20300-Short20Research20Paper2023220.docx.pdf\">annotated-CYSE20300-Short20Research20Paper2023220.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-CYSE20300-Short20Research20Paper2023220.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-16ef5350-5b60-4107-8686-353b410e9128\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Cybersecurity As the digital landscape continues to expand, securing systems, networks, and data becomes an essential component of every organizations operations. Taking this course introduces individuals to the evolving challenges of cybersecurity, the importance of protecting information assets, and applying strategies that are need to mitigate risks and threats. This course provides essential&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":27534,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/users\/27534"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":343,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/pages\/141\/revisions\/343"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}