{"id":346,"date":"2025-04-26T16:59:36","date_gmt":"2025-04-26T16:59:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/shawnziegler\/?page_id=346"},"modified":"2025-04-26T19:24:23","modified_gmt":"2025-04-26T19:24:23","slug":"write-ups","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/shawnziegler\/write-ups\/","title":{"rendered":"Write-Ups"},"content":{"rendered":"\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/Write-Up-Cyber-Roles.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Write-Up-Cyber-Roles.\"><\/object><a id=\"wp-block-file--media-1a7587ba-6d01-4295-9668-936420285457\" href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/Write-Up-Cyber-Roles.pdf\">Write-Up-Cyber-Roles<\/a><a href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/Write-Up-Cyber-Roles.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-1a7587ba-6d01-4295-9668-936420285457\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/Write-Up-Business.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Write-Up-Business.\"><\/object><a id=\"wp-block-file--media-0cd446de-6e3b-41b0-91a8-9c0132e9ab91\" href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/Write-Up-Business.pdf\">Write-Up-Business<\/a><a href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/Write-Up-Business.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-0cd446de-6e3b-41b0-91a8-9c0132e9ab91\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Creating-Cybersecurity-Policies-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE-200T-Creating-Cybersecurity-Policies-1.\"><\/object><a id=\"wp-block-file--media-7e2998b1-6878-415f-a4e9-b3d8a293686a\" href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Creating-Cybersecurity-Policies-1.pdf\">CYSE-200T-Creating-Cybersecurity-Policies-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Creating-Cybersecurity-Policies-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7e2998b1-6878-415f-a4e9-b3d8a293686a\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Write-Up-3-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE-200T-Write-Up-3-1.\"><\/object><a id=\"wp-block-file--media-b94e15d3-7b4f-45d0-ab71-61a10f42851d\" href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Write-Up-3-1.pdf\">CYSE-200T-Write-Up-3-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Write-Up-3-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b94e15d3-7b4f-45d0-ab71-61a10f42851d\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Write-Up-Hacking-Humans.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE-200T-Write-Up-Hacking-Humans.\"><\/object><a id=\"wp-block-file--media-6e484e09-496d-46dd-af8c-4f040487399c\" href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Write-Up-Hacking-Humans.pdf\">CYSE-200T-Write-Up-Hacking-Humans<\/a><a href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Write-Up-Hacking-Humans.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6e484e09-496d-46dd-af8c-4f040487399c\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Write-Up-Exploring-Attacks-on-Availability.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE-200T-Write-Up-Exploring-Attacks-on-Availability.\"><\/object><a id=\"wp-block-file--media-1f456dd7-b5da-44b6-85fa-a97d39b994b8\" href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Write-Up-Exploring-Attacks-on-Availability.pdf\">CYSE-200T-Write-Up-Exploring-Attacks-on-Availability<\/a><a href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Write-Up-Exploring-Attacks-on-Availability.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-1f456dd7-b5da-44b6-85fa-a97d39b994b8\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Write-Up-The-Human-Factor-in-Cybersecurity.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE-200T-Write-Up-The-Human-Factor-in-Cybersecurity.\"><\/object><a id=\"wp-block-file--media-a194fea4-1f70-41af-8f30-427ed7a10dda\" href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Write-Up-The-Human-Factor-in-Cybersecurity.pdf\">CYSE-200T-Write-Up-The-Human-Factor-in-Cybersecurity<\/a><a href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Write-Up-The-Human-Factor-in-Cybersecurity.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a194fea4-1f70-41af-8f30-427ed7a10dda\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Write-Up-SCADA-Systems.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE-200T-Write-Up-SCADA-Systems.\"><\/object><a id=\"wp-block-file--media-619116a3-967a-4b64-a399-2b8353f84750\" href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Write-Up-SCADA-Systems.pdf\">CYSE-200T-Write-Up-SCADA-Systems<\/a><a href=\"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-content\/uploads\/sites\/38434\/2025\/04\/CYSE-200T-Write-Up-SCADA-Systems.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-619116a3-967a-4b64-a399-2b8353f84750\">Download<\/a><\/div>\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":30500,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/pages\/346"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/users\/30500"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/comments?post=346"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/pages\/346\/revisions"}],"predecessor-version":[{"id":416,"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/pages\/346\/revisions\/416"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/shawnziegler\/wp-json\/wp\/v2\/media?parent=346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}