{"id":189,"date":"2025-11-21T16:30:44","date_gmt":"2025-11-21T16:30:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/?page_id=189"},"modified":"2025-11-21T17:04:25","modified_gmt":"2025-11-21T17:04:25","slug":"skills-artifacts","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/skills-artifacts\/","title":{"rendered":"Skills &amp; Artifacts"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-89981662d56c08b14028d6229e8340e7\" style=\"color:#0050fa\"><a href=\"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/sample-page\/skills-artifacts\/skill-1-cybersecurity-technical-skills\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/sample-page\/skills-artifacts\/skill-1-cybersecurity-technical-skills\/\">Skill 1: Cybersecurity Technical Skills<\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-8275b8314fd27eb614592d5303b41738\" style=\"color:#0050fa\"><a href=\"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/sample-page\/skills-artifacts\/skill-2-analytic-problem-solving-in-security-operations\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/sample-page\/skills-artifacts\/skill-2-analytic-problem-solving-in-security-operations\/\">Skill 2: Analytic Problem-Solving in Security Operations<\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-b1e3a44e8da32db631cffd3c805f1f90\" style=\"color:#0050fa\"><a href=\"http:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/sample-page\/skills-artifacts\/skill-3-training-and-mentorship-in-technology\/\" data-type=\"link\" data-id=\"sites.wp.odu.edu\/sethsantiago-eportfolio\/sample-page\/skills-artifacts\/skill-3-training-and-mentorship-in-technology\/\">Skill 3: Training and Mentorship in Technology<\/a><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Skill 1: Cybersecurity Technical Skills Skill 2: Analytic Problem-Solving in Security Operations Skill 3: Training and Mentorship in Technology<\/p>\n","protected":false},"author":28387,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/pages\/189"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/users\/28387"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/comments?post=189"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/pages\/189\/revisions"}],"predecessor-version":[{"id":209,"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/pages\/189\/revisions\/209"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/media?parent=189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}