{"id":270,"date":"2021-11-04T03:03:44","date_gmt":"2021-11-04T03:03:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rjack008-\/?p=270"},"modified":"2021-11-04T03:03:44","modified_gmt":"2021-11-04T03:03:44","slug":"freewrite-activity-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/rjack008-\/2021\/11\/04\/freewrite-activity-2\/","title":{"rendered":"FreeWrite activity #2"},"content":{"rendered":"\n<p><strong><span class=\"has-inline-color has-vivid-red-color\">C<\/span><\/strong>reate training courses<br><strong><span class=\"has-inline-color has-vivid-red-color\">Y<\/span><\/strong>outube<br><strong><span class=\"has-inline-color has-vivid-red-color\">B<\/span><\/strong>uild an app<br><b><span class=\"has-inline-color has-vivid-red-color\">E<\/span>ncrypt data<br><span class=\"has-inline-color has-vivid-red-color\">R<\/span>esearch new defensive  tactics<br><\/b><span class=\"has-inline-color has-vivid-red-color\" style=\"font-weight: bold\">S<\/span><b>tocks for cybersecurity companies<br><\/b><span class=\"has-inline-color has-vivid-red-color\"><b>E<\/b><\/span><b><span class=\"has-inline-color has-black-color\">xplore vulnerabilities of different networks and software<\/span><\/b><span class=\"has-inline-color has-vivid-red-color\"><b><br>C<\/b><\/span><b><span class=\"has-inline-color has-black-color\">reate security <\/span><\/b><strong><span class=\"has-inline-color has-black-color\">guidelines for organizations<\/span><span class=\"has-inline-color has-vivid-red-color\"><br>U<\/span><span class=\"has-inline-color has-black-color\">ncover hackers<\/span><span class=\"has-inline-color has-vivid-red-color\"><br>R<\/span><span class=\"has-inline-color has-black-color\">evise protocols<\/span><span class=\"has-inline-color has-vivid-red-color\"><br>I<\/span><span class=\"has-inline-color has-black-color\">nvestigate cybercrime<\/span><span class=\"has-inline-color has-vivid-red-color\"><br>T<\/span><span class=\"has-inline-color has-black-color\">est networks of various organizations<\/span><span class=\"has-inline-color has-vivid-red-color\"> <br>Y<\/span><\/strong>outh teaching<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Create training coursesYoutubeBuild an appEncrypt dataResearch new defensive tacticsStocks for cybersecurity companiesExplore vulnerabilities of different networks and softwareCreate security guidelines for organizationsUncover hackersRevise protocolsInvestigate cybercrimeTest networks of various organizations Youth teaching<\/p>\n","protected":false},"author":22297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rjack008-\/wp-json\/wp\/v2\/posts\/270"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rjack008-\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rjack008-\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rjack008-\/wp-json\/wp\/v2\/users\/22297"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rjack008-\/wp-json\/wp\/v2\/comments?post=270"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/rjack008-\/wp-json\/wp\/v2\/posts\/270\/revisions"}],"predecessor-version":[{"id":271,"href":"https:\/\/sites.wp.odu.edu\/rjack008-\/wp-json\/wp\/v2\/posts\/270\/revisions\/271"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rjack008-\/wp-json\/wp\/v2\/media?parent=270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rjack008-\/wp-json\/wp\/v2\/categories?post=270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rjack008-\/wp-json\/wp\/v2\/tags?post=270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}