{"id":285,"date":"2022-12-06T19:04:00","date_gmt":"2022-12-06T19:04:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/?p=285"},"modified":"2022-12-06T19:04:28","modified_gmt":"2022-12-06T19:04:28","slug":"cyse-200t","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/2022\/12\/06\/cyse-200t\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">This post will hold some of the works from my introduction to cybersecurity class.<\/h2>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-8a2984b2-4d7f-4d07-9008-a416b0b91d10\" href=\"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-content\/uploads\/sites\/30494\/2022\/12\/NIST-Cyber-security-framework-disscussion-board-post.pdf\">NIST-Cyber-security-framework-disscussion-board-post<\/a><a href=\"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-content\/uploads\/sites\/30494\/2022\/12\/NIST-Cyber-security-framework-disscussion-board-post.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-8a2984b2-4d7f-4d07-9008-a416b0b91d10\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-af65e7cc-a981-4464-b16c-2acbb5c50dcd\" href=\"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-content\/uploads\/sites\/30494\/2022\/12\/SGiorgi-CSYE200T-SCADA-writeup.pdf\">SGiorgi-CSYE200T-SCADA-writeup<\/a><a href=\"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-content\/uploads\/sites\/30494\/2022\/12\/SGiorgi-CSYE200T-SCADA-writeup.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-af65e7cc-a981-4464-b16c-2acbb5c50dcd\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-3ff64fab-9cc3-4b0e-bae5-4e07393049f7\" href=\"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-content\/uploads\/sites\/30494\/2022\/12\/SGiorgi-CIA-Triad-Write-up.pdf\">SGiorgi-CIA-Triad-Write-up<\/a><a href=\"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-content\/uploads\/sites\/30494\/2022\/12\/SGiorgi-CIA-Triad-Write-up.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-3ff64fab-9cc3-4b0e-bae5-4e07393049f7\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This post will hold some of the works from my introduction to cybersecurity class.<\/p>\n","protected":false},"author":24556,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/posts\/285"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/users\/24556"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/comments?post=285"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/posts\/285\/revisions"}],"predecessor-version":[{"id":289,"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/posts\/285\/revisions\/289"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/media?parent=285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/categories?post=285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/tags?post=285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}