{"id":298,"date":"2024-03-08T01:30:21","date_gmt":"2024-03-08T01:30:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/?p=298"},"modified":"2024-04-22T16:40:50","modified_gmt":"2024-04-22T16:40:50","slug":"journal-entry-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/2024\/03\/08\/journal-entry-5\/","title":{"rendered":"Journal Entry #5"},"content":{"rendered":"\n<p><strong>Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.<\/strong><\/p>\n\n\n\n<ul>\n<li><strong>C<\/strong>ompete in hacking competitions<\/li>\n\n\n\n<li><strong>Y<\/strong>ou get an OSCP job<\/li>\n\n\n\n<li><strong>B<\/strong>uild cyber applications<\/li>\n\n\n\n<li><strong>E<\/strong>thical hacking<\/li>\n\n\n\n<li><strong>R<\/strong>esearcher in offensive security <\/li>\n\n\n\n<li><strong>S<\/strong>ecurity auditing<\/li>\n\n\n\n<li><strong>E<\/strong>xchange Network Safety Stocks<\/li>\n\n\n\n<li><strong>C<\/strong>onsult as a cybersecurity analyst<\/li>\n\n\n\n<li><strong>U<\/strong>nderstand and teach a class in cybersecurity<\/li>\n\n\n\n<li><strong>R<\/strong>isk taking as a cybersecurity freelancer<\/li>\n\n\n\n<li><strong>I<\/strong>nvest in cybersecurity stocks<\/li>\n\n\n\n<li><strong>T<\/strong>rade cybersecurity stocks<\/li>\n\n\n\n<li><strong>Y<\/strong>ouTuber for cybersecurity tutorials<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity.<\/p>\n","protected":false},"author":27461,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts\/298"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/users\/27461"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/comments?post=298"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts\/298\/revisions"}],"predecessor-version":[{"id":324,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts\/298\/revisions\/324"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/media?parent=298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/categories?post=298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/tags?post=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}