{"id":159,"date":"2020-10-27T00:25:39","date_gmt":"2020-10-27T00:25:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=159"},"modified":"2020-10-27T11:28:03","modified_gmt":"2020-10-27T11:28:03","slug":"awards-and-recognitions","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/torrance\/awards-and-recognitions\/","title":{"rendered":"Awards and Recognitions"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"875\" height=\"675\" src=\"https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/2cd6f09bfd8a51ca1f3d2116a70a75f7.png\" alt=\"\" class=\"wp-image-267\" srcset=\"https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/2cd6f09bfd8a51ca1f3d2116a70a75f7.png 875w, https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/2cd6f09bfd8a51ca1f3d2116a70a75f7-300x231.png 300w, https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/2cd6f09bfd8a51ca1f3d2116a70a75f7-768x592.png 768w, https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/2cd6f09bfd8a51ca1f3d2116a70a75f7-389x300.png 389w\" sizes=\"(max-width: 875px) 100vw, 875px\" \/><figcaption>Cybersecurity is evolving.&nbsp;Terminology gets added from time to time&nbsp;as new companies and technologies emerge&nbsp;in the marketplace with a new solution&nbsp;to a common problem.&nbsp;There are cornerstones of cybersecurity&nbsp;that have not changed since day one.&nbsp;And there are components that change on a regular basis.&nbsp;One of the best ways to stay up-to-date with technology,&nbsp;gain confidence and increase your skill set&nbsp;is to put in the time behind the keyboard.&nbsp;Actively participate in cybersecurity programs&nbsp;and become a constant learner.&nbsp;Challenge yourself to deepen your understanding&nbsp;of the vocabulary and concepts discussed&nbsp;throughout this course.<\/figcaption><\/figure>\n\n\n\n<div class=\"wp-block-file\"><a href=\"https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/CertificateOfCompletion_Cybersecurity-Awareness-Building-Your-Cybersecurity-Vocabulary-1.pdf\">CertificateOfCompletion_Cybersecurity-Awareness-Building-Your-Cybersecurity-Vocabulary-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/CertificateOfCompletion_Cybersecurity-Awareness-Building-Your-Cybersecurity-Vocabulary-1.pdf\" class=\"wp-block-file__button\" download>Download<\/a><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"745\" height=\"578\" src=\"https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/a7e8e518f97e26ec0c8b8c9c68d504c5.png\" alt=\"\" class=\"wp-image-268\" srcset=\"https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/a7e8e518f97e26ec0c8b8c9c68d504c5.png 745w, https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/a7e8e518f97e26ec0c8b8c9c68d504c5-300x233.png 300w, https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/a7e8e518f97e26ec0c8b8c9c68d504c5-387x300.png 387w\" sizes=\"(max-width: 745px) 100vw, 745px\" \/><figcaption>&nbsp;When you start your new job,&nbsp;it may be a while before you get oriented&nbsp;to your new environment.&nbsp;But as you\u2019re getting used to your surroundings,&nbsp;see if you can find areas related to your job&nbsp;where you may be able to make quick wins&nbsp;that lead to significant improvements.&nbsp;Your goal is to make a good first impression&nbsp;to your boss and peers as early as possible.&nbsp;Try to find three to five of these opportunities&nbsp;in your first 30 days.&nbsp;Of those areas, I recommend focusing on accomplishing&nbsp;two in your first 90 days.<\/figcaption><\/figure>\n\n\n\n<div class=\"wp-block-file\"><a href=\"https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/CertificateOfCompletion_Transitioning-to-a-Career-in-Cybersecurity.pdf\">CertificateOfCompletion_Transitioning-to-a-Career-in-Cybersecurity<\/a><a href=\"https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/CertificateOfCompletion_Transitioning-to-a-Career-in-Cybersecurity.pdf\" class=\"wp-block-file__button\" download>Download<\/a><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"746\" height=\"568\" src=\"https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/f956411e774f390f0477c9b66b029460.png\" alt=\"\" class=\"wp-image-269\" srcset=\"https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/f956411e774f390f0477c9b66b029460.png 746w, https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/f956411e774f390f0477c9b66b029460-300x228.png 300w, https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/f956411e774f390f0477c9b66b029460-394x300.png 394w\" sizes=\"(max-width: 746px) 100vw, 746px\" \/><figcaption>The internet has now become&nbsp;an essential service, as necessary for our lives&nbsp;as power and water.&nbsp;However, it has also generated new forms&nbsp;of electronic disruption and crime,&nbsp;which affects governments, industry, and individuals.&nbsp;From a means of protecting computers&nbsp;against simple vandalism,&nbsp;cybersecurity has become a key defense&nbsp;against organized cybercrime&nbsp;and state-sponsored cyber espionage and warfare.&nbsp;In this LinkedIn Learning course,&nbsp;I\u2019ll explain the frameworks and standards&nbsp;which are used as the foundations&nbsp;from which to defend against online threats,&nbsp;show you how to calculate the cyber risk,&nbsp;and explain the basics of responding to a cyber incident.<\/figcaption><\/figure>\n\n\n\n<div class=\"wp-block-file\"><a href=\"https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/CertificateOfCompletion_Cybersecurity-Foundations.pdf\">CertificateOfCompletion_Cybersecurity-Foundations<\/a><a href=\"https:\/\/sites.wp.odu.edu\/torrance\/wp-content\/uploads\/sites\/21753\/2020\/10\/CertificateOfCompletion_Cybersecurity-Foundations.pdf\" class=\"wp-block-file__button\" download>Download<\/a><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":18855,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/pages\/159"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/users\/18855"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/comments?post=159"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/pages\/159\/revisions"}],"predecessor-version":[{"id":290,"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/pages\/159\/revisions\/290"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/media?parent=159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}