{"id":239,"date":"2021-09-10T02:48:43","date_gmt":"2021-09-10T02:48:43","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=239"},"modified":"2023-06-23T17:15:48","modified_gmt":"2023-06-23T17:15:48","slug":"cyse-494","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/cyse-494\/","title":{"rendered":"CYSE 494"},"content":{"rendered":"<h1 style=\"text-align: center\">Entrepreneurship in Cybersecurity<\/h1>\n<div>\n<p class=\"p1\">This course is designed to help students enhance their personal and professional development through innovation guided by faculty members and professionals. It offers students an opportunity to integrate disciplinary theory and knowledge through developing a nonprofit program, product, business, or other initiative. The real-world experiences that entrepreneurships provide will help students understand how academic knowledge leads to transformations, innovations, and solutions to different types of problems.<\/p>\n<div>\n<p class=\"p1\">After completing an entrepreneurship, a student\/entrepreneur will be able to:<\/p>\n<ul>\n<li class=\"p1\">Identify how to use knowledge they have accumulated from their general education and major coursework to create non-profit programs, products, businesses, or other innovations.<\/li>\n<li class=\"p1\">Apply disciplinary and interdisciplinary knowledge to the process of innovation.<\/li>\n<li class=\"p1\">Demonstrate the ability to integrate professional and interdisciplinary knowledge to produce new programs, products, businesses, or other innovations.<\/li>\n<li class=\"p1\">Describe how products\/businesses\/programs related to their career interests are created and influenced by different disciplines.<\/li>\n<li class=\"p1\">Assess the effectiveness of innovations<\/li>\n<li class=\"p1\">Communicate effective solutions to societal problems to stakeholders.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<h1 style=\"text-align: center\">Course Material<\/h1>\n<p><\/p>\n<h1 style=\"text-align: center\">Elevator Pitch<\/h1>\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-81944dd4-27e8-4f7d-b187-659f62bfe7fa\" href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/elevator-pitch.pptx\">elevator-pitch<\/a><a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/elevator-pitch.pptx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-81944dd4-27e8-4f7d-b187-659f62bfe7fa\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Journals<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/05\/week-1-journal-CYSE494.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">week-1-journal-CYSE494<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/journal-week-2-CYSE-494.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">journal-week-2-CYSE-494<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Journals-week-3-494.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journals-week-3-494<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Journals-week-4-cyse-494.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journals-week-4-cyse-494<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Journals-week-5.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journals-week-5<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Journal-6-cyse-494.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-6-cyse-494<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Innovation Pitch<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/pitch-ppresentation.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">pitch-ppresentation<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Academic Paper<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Academic-Paper-EDITED.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Academic-Paper-EDITED<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Pictures <\/h2>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"980\" height=\"1024\" data-id=\"383\" src=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Screenshot-2023-06-22-at-11.17.55-PM-980x1024.png\" alt=\"\" class=\"wp-image-383\" srcset=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Screenshot-2023-06-22-at-11.17.55-PM-980x1024.png 980w, https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Screenshot-2023-06-22-at-11.17.55-PM-287x300.png 287w, https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Screenshot-2023-06-22-at-11.17.55-PM-768x802.png 768w, https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Screenshot-2023-06-22-at-11.17.55-PM.png 1160w\" sizes=\"(max-width: 980px) 100vw, 980px\" \/><\/figure>\n<\/figure>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"814\" data-id=\"384\" src=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Screenshot-2023-06-23-at-12.48.32-PM-1024x814.png\" alt=\"\" class=\"wp-image-384\" srcset=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Screenshot-2023-06-23-at-12.48.32-PM-1024x814.png 1024w, https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Screenshot-2023-06-23-at-12.48.32-PM-300x238.png 300w, https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Screenshot-2023-06-23-at-12.48.32-PM-768x610.png 768w, https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Screenshot-2023-06-23-at-12.48.32-PM-377x300.png 377w, https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Screenshot-2023-06-23-at-12.48.32-PM.png 1340w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/Picture1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Picture1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/MasterPhisherman.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">MasterPhisherman<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/06\/mobileVPNsetup.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">mobileVPNsetup<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Entrepreneurship in Cybersecurity This course is designed to help students enhance their personal and professional development through innovation guided by faculty members and professionals. It offers students an opportunity to integrate disciplinary theory and knowledge through developing a nonprofit program, product, business, or other initiative. The real-world experiences that entrepreneurships provide will help students understand&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/cyse-494\/\">Read More<\/a><\/div>\n","protected":false},"author":21783,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/pages\/239"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/users\/21783"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/comments?post=239"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/pages\/239\/revisions"}],"predecessor-version":[{"id":394,"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/pages\/239\/revisions\/394"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/media?parent=239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}