{"id":287,"date":"2023-02-12T16:27:22","date_gmt":"2023-02-12T16:27:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rwood021\/?p=287"},"modified":"2023-02-12T16:27:22","modified_gmt":"2023-02-12T16:27:22","slug":"journal-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/rwood021\/2023\/02\/12\/journal-5\/","title":{"rendered":"Journal #5"},"content":{"rendered":"\n<p>Using the word CyberSecurity\u2026 list legal ways to make money in Cybersecurity<\/p>\n\n\n\n<p><strong>C<\/strong>reate online cybersecurity courses<\/p>\n\n\n\n<p><strong>Y<\/strong>ou can buy stocks in Cybersecurity<\/p>\n\n\n\n<p><strong>B<\/strong>ecome a Cybersecurity freelancer<\/p>\n\n\n\n<p><strong>E<\/strong>thical hacking (detect vulnerabilities within an application)<\/p>\n\n\n\n<p><strong>R<\/strong>egularly perform risk assessments for companies<\/p>\n\n\n\n<p><strong>S<\/strong>tart your own Cybersecurity business<\/p>\n\n\n\n<p><strong>E<\/strong>ngineering<\/p>\n\n\n\n<p><strong>C<\/strong>reating contingency plans for companies after successful attacks<\/p>\n\n\n\n<p><strong>U<\/strong>pdate cybersecurity policies and procedures for a company&nbsp;<\/p>\n\n\n\n<p><strong>R<\/strong>elease a Cybersecurity app on the app store<\/p>\n\n\n\n<p><strong>I<\/strong>nvestigating and documenting security breaches<\/p>\n\n\n\n<p><strong>T<\/strong>each Cybersecurity at a University<\/p>\n\n\n\n<p><strong>Y<\/strong>ou can become a public speaker and educate others on the importance of Cybersecurity<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Using the word CyberSecurity\u2026 list legal ways to make money in Cybersecurity Create online cybersecurity courses You can buy stocks in Cybersecurity Become a Cybersecurity freelancer Ethical hacking (detect vulnerabilities within an application) Regularly perform risk assessments for companies Start your own Cybersecurity business Engineering Creating contingency plans for companies after successful attacks Update cybersecurity&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rwood021\/2023\/02\/12\/journal-5\/\">Read More<\/a><\/div>\n","protected":false},"author":25848,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rwood021\/wp-json\/wp\/v2\/posts\/287"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rwood021\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rwood021\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rwood021\/wp-json\/wp\/v2\/users\/25848"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rwood021\/wp-json\/wp\/v2\/comments?post=287"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/rwood021\/wp-json\/wp\/v2\/posts\/287\/revisions"}],"predecessor-version":[{"id":288,"href":"https:\/\/sites.wp.odu.edu\/rwood021\/wp-json\/wp\/v2\/posts\/287\/revisions\/288"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rwood021\/wp-json\/wp\/v2\/media?parent=287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rwood021\/wp-json\/wp\/v2\/categories?post=287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rwood021\/wp-json\/wp\/v2\/tags?post=287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}