{"id":21,"date":"2024-04-08T01:07:18","date_gmt":"2024-04-08T01:07:18","guid":{"rendered":"https:\/\/student.wp.odu.edu\/ccole061\/?page_id=21"},"modified":"2024-04-08T01:07:18","modified_gmt":"2024-04-08T01:07:18","slug":"cyse-200t","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/ccole061\/cyse-200t\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/ccole061\/wp-content\/uploads\/sites\/35724\/2024\/04\/The-CIA-Triad.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The-CIA-Triad.\"><\/object><a id=\"wp-block-file--media-49ce7118-2b80-4aaa-8726-d65506d1cb83\" href=\"https:\/\/student.wp.odu.edu\/ccole061\/wp-content\/uploads\/sites\/35724\/2024\/04\/The-CIA-Triad.pdf\">The-CIA-Triad<\/a><a href=\"https:\/\/student.wp.odu.edu\/ccole061\/wp-content\/uploads\/sites\/35724\/2024\/04\/The-CIA-Triad.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-49ce7118-2b80-4aaa-8726-d65506d1cb83\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/ccole061\/wp-content\/uploads\/sites\/35724\/2024\/04\/SCADA-Systems.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of SCADA-Systems.\"><\/object><a id=\"wp-block-file--media-67d4862b-5bdf-4c04-bbfb-35493ef04198\" href=\"https:\/\/student.wp.odu.edu\/ccole061\/wp-content\/uploads\/sites\/35724\/2024\/04\/SCADA-Systems.pdf\">SCADA-Systems<\/a><a href=\"https:\/\/student.wp.odu.edu\/ccole061\/wp-content\/uploads\/sites\/35724\/2024\/04\/SCADA-Systems.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-67d4862b-5bdf-4c04-bbfb-35493ef04198\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/ccole061\/wp-content\/uploads\/sites\/35724\/2024\/04\/Write-Up-The-Human-Factor-in-Cybersecurity.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Write-Up-The-Human-Factor-in-Cybersecurity.\"><\/object><a id=\"wp-block-file--media-3afe50ed-3b47-4a1d-85c3-9a4094d11b50\" href=\"https:\/\/student.wp.odu.edu\/ccole061\/wp-content\/uploads\/sites\/35724\/2024\/04\/Write-Up-The-Human-Factor-in-Cybersecurity.pdf\">Write-Up-The-Human-Factor-in-Cybersecurity<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":28579,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/ccole061\/wp-json\/wp\/v2\/pages\/21"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/ccole061\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/ccole061\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ccole061\/wp-json\/wp\/v2\/users\/28579"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ccole061\/wp-json\/wp\/v2\/comments?post=21"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/ccole061\/wp-json\/wp\/v2\/pages\/21\/revisions"}],"predecessor-version":[{"id":26,"href":"https:\/\/student.wp.odu.edu\/ccole061\/wp-json\/wp\/v2\/pages\/21\/revisions\/26"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/ccole061\/wp-json\/wp\/v2\/media?parent=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}