{"id":497,"date":"2026-04-18T20:35:13","date_gmt":"2026-04-18T20:35:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/?page_id=497"},"modified":"2026-04-18T21:21:01","modified_gmt":"2026-04-18T21:21:01","slug":"cs-462-cybersecurity-fundamentals","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/cs-462-cybersecurity-fundamentals\/","title":{"rendered":"CS 462 &#8211; Cybersecurity Fundamentals"},"content":{"rendered":"\n<p class=\"has-text-align-center\">This course introduced and expanded upon topics such as prevention methods, application security, information security, and network security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Course Project<\/h2>\n\n\n\n<p>The final project for this course was to describe and explain a cybersecurity attack that had occurred within the past five years. Content that was required was how the vulnerability, breach, or attack worked and describing how the topic affect today&#8217;s society. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CS462-Course-Project.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"PDF embed\"><\/object><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CS462-Course-Project.pdf\" class=\"wp-block-file__button wp-element-button\" download><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This course introduced and expanded upon topics such as prevention methods, application security, information security, and network security. Course Project The final project for this course was to describe and explain a cybersecurity attack that had occurred within the past five years. Content that was required was how the vulnerability, breach, or attack worked and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/cs-462-cybersecurity-fundamentals\/\">Read More<\/a><\/div>\n","protected":false},"author":29392,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/497"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/users\/29392"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/comments?post=497"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/497\/revisions"}],"predecessor-version":[{"id":537,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/497\/revisions\/537"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/media?parent=497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}