{"id":7,"date":"2026-02-04T13:52:14","date_gmt":"2026-02-04T13:52:14","guid":{"rendered":"https:\/\/student.wp.odu.edu\/naraf001\/?page_id=7"},"modified":"2026-02-04T13:59:11","modified_gmt":"2026-02-04T13:59:11","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/naraf001\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/student.wp.odu.edu\/naraf001\/wp-content\/uploads\/sites\/40637\/2026\/02\/cyse4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"724\" src=\"https:\/\/student.wp.odu.edu\/naraf001\/wp-content\/uploads\/sites\/40637\/2026\/02\/cyse4-1024x724.png\" alt=\"\" class=\"wp-image-15\" style=\"width:668px;height:auto\" srcset=\"https:\/\/student.wp.odu.edu\/naraf001\/wp-content\/uploads\/sites\/40637\/2026\/02\/cyse4-1024x724.png 1024w, https:\/\/student.wp.odu.edu\/naraf001\/wp-content\/uploads\/sites\/40637\/2026\/02\/cyse4-300x212.png 300w, https:\/\/student.wp.odu.edu\/naraf001\/wp-content\/uploads\/sites\/40637\/2026\/02\/cyse4-768x543.png 768w, https:\/\/student.wp.odu.edu\/naraf001\/wp-content\/uploads\/sites\/40637\/2026\/02\/cyse4-1536x1086.png 1536w, https:\/\/student.wp.odu.edu\/naraf001\/wp-content\/uploads\/sites\/40637\/2026\/02\/cyse4-2048x1448.png 2048w, https:\/\/student.wp.odu.edu\/naraf001\/wp-content\/uploads\/sites\/40637\/2026\/02\/cyse4-600x424.png 600w, https:\/\/student.wp.odu.edu\/naraf001\/wp-content\/uploads\/sites\/40637\/2026\/02\/cyse4-945x668.png 945w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><a href=\"https:\/\/softwareanalyst.substack.com\/p\/the-beginners-guide-to-cybersecurity\">https:\/\/softwareanalyst.substack.com\/p\/the-beginners-guide-to-cybersecurity<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/student.wp.odu.edu\/naraf001\/wp-content\/uploads\/sites\/40637\/2026\/02\/cyse1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"229\" height=\"220\" src=\"https:\/\/student.wp.odu.edu\/naraf001\/wp-content\/uploads\/sites\/40637\/2026\/02\/cyse1.jpg\" alt=\"\" class=\"wp-image-8\" style=\"width:510px;height:auto\" \/><\/a><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.researchgate.net\/figure\/Subareas-of-cybersecurity_fig2_342354467\">https:\/\/www.researchgate.net\/figure\/Subareas-of-cybersecurity_fig2_342354467<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/student.wp.odu.edu\/naraf001\/wp-content\/uploads\/sites\/40637\/2026\/02\/cyse2-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"291\" height=\"173\" src=\"https:\/\/student.wp.odu.edu\/naraf001\/wp-content\/uploads\/sites\/40637\/2026\/02\/cyse2-1.jpg\" alt=\"\" class=\"wp-image-11\" style=\"width:681px;height:auto\" \/><\/a><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.researchgate.net\/figure\/Cyber-Security-in-Different-Fields_fig9_381029625\">https:\/\/www.researchgate.net\/figure\/Cyber-Security-in-Different-Fields_fig9_381029625<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/softwareanalyst.substack.com\/p\/the-beginners-guide-to-cybersecurity https:\/\/www.researchgate.net\/figure\/Subareas-of-cybersecurity_fig2_342354467 https:\/\/www.researchgate.net\/figure\/Cyber-Security-in-Different-Fields_fig9_381029625<\/p>\n","protected":false},"author":32048,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/naraf001\/wp-json\/wp\/v2\/pages\/7"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/naraf001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/naraf001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/naraf001\/wp-json\/wp\/v2\/users\/32048"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/naraf001\/wp-json\/wp\/v2\/comments?post=7"}],"version-history":[{"count":3,"href":"https:\/\/student.wp.odu.edu\/naraf001\/wp-json\/wp\/v2\/pages\/7\/revisions"}],"predecessor-version":[{"id":16,"href":"https:\/\/student.wp.odu.edu\/naraf001\/wp-json\/wp\/v2\/pages\/7\/revisions\/16"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/naraf001\/wp-json\/wp\/v2\/media?parent=7"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}