{"id":16,"date":"2024-09-02T15:00:22","date_gmt":"2024-09-02T15:00:22","guid":{"rendered":"https:\/\/student.wp.odu.edu\/toliv007\/?page_id=16"},"modified":"2024-11-30T20:00:13","modified_gmt":"2024-11-30T20:00:13","slug":"technical-training-and-projects","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/toliv007\/technical-training-and-projects\/","title":{"rendered":"Technical Training and Projects"},"content":{"rendered":"\n<p class=\"has-white-color has-text-color has-background has-link-color has-medium-font-size wp-elements-f28b97ee010ebab4be70816fb7c14355\" style=\"background-color:#5c6464\">Here you can find a library of the work and application of ideals throughout my personal and educational journey. These show my understanding of modern Cybersecurity and the implementation of key skills and strategies. <\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-background has-link-color has-medium-font-size wp-elements-6bf48683818b3bef186f053900358b87\" style=\"background-color:#ffa83f\"><strong>Article Review<\/strong>: &#8220;Cyberattacks, Cyber Threats, and Attitudes Toward Cybersecurity Policies<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-background has-link-color has-medium-font-size wp-elements-cadad3f18c7a400bc6eee323bdbd147b\" style=\"background-color:#5c6464\">In this article review I study the effects of witnessing consequences of cyber attacks. This review focuses on how the public reacts to attacks and how the public deserves more regulation when it comes to the protection of their information controlled by a corporation.<\/p>\n\n\n\n<div class=\"wp-block-file aligncenter has-black-background-color has-background\"><a id=\"wp-block-file--media-a1f1697b-7039-48d7-afcb-259c9071b723\" href=\"https:\/\/student.wp.odu.edu\/toliv007\/wp-content\/uploads\/sites\/36749\/2024\/11\/Article-review-Cyberattacks-Cyber-Threats-and-Attitudes-toward-Cybersecurity-Policies.docx\">Article-review-Cyberattacks-Cyber-Threats-and-Attitudes-toward-Cybersecurity-Policies<\/a><a href=\"https:\/\/student.wp.odu.edu\/toliv007\/wp-content\/uploads\/sites\/36749\/2024\/11\/Article-review-Cyberattacks-Cyber-Threats-and-Attitudes-toward-Cybersecurity-Policies.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a1f1697b-7039-48d7-afcb-259c9071b723\">Download<\/a><\/div>\n\n\n\n<p class=\"has-black-color has-text-color has-background has-link-color has-medium-font-size wp-elements-16f8da9e2996f5e3872d63f06e6a37c5\" style=\"background-color:#ffa83f\"><strong>Article Review<\/strong>: The Health Belief Model and Phishing: Determinants of Preventative Security Behaviors<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-background has-link-color has-medium-font-size wp-elements-4a636a32592c030cdf3c83e4dfa4b3cf\" style=\"background-color:#5c6464\">In this review, I focus on how security experts can use communities to delve into the psyches of the individuals within them. This can be used to develop policies and tools directed around these specific types of groups such as universities and large corporations. <\/p>\n\n\n\n<div class=\"wp-block-file has-black-background-color has-background\"><a id=\"wp-block-file--media-717634e9-b80c-47d5-b00e-75f02dbd476c\" href=\"https:\/\/student.wp.odu.edu\/toliv007\/wp-content\/uploads\/sites\/36749\/2024\/11\/Article-Review-The-Health-Belief-Model-and-Phishing-Determinants-of-Preventative-Security-Behaviors.docx\">Article-Review-The-Health-Belief-Model-and-Phishing-Determinants-of-Preventative-Security-Behaviors<\/a><a href=\"https:\/\/student.wp.odu.edu\/toliv007\/wp-content\/uploads\/sites\/36749\/2024\/11\/Article-Review-The-Health-Belief-Model-and-Phishing-Determinants-of-Preventative-Security-Behaviors.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-717634e9-b80c-47d5-b00e-75f02dbd476c\">Download<\/a><\/div>\n\n\n\n<p class=\"has-background has-medium-font-size\" style=\"background-color:#ffa83f\"><strong>Career Paper<\/strong>: Penetration Testing and the Social Sciences<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-background has-link-color has-medium-font-size wp-elements-6d1eaa6bb3b7c443e6f965a22725cfd0\" style=\"background-color:#5c6464\">This paper details how social science and penetration testing correlate. There are many elements of social science pen testers use to their advantage and continue to use as they train their clients. This explanation not only shows their unique career, but also why they are necessary.<\/p>\n\n\n\n<div class=\"wp-block-file has-black-background-color has-background\"><a id=\"wp-block-file--media-62b0bdd2-e67e-4331-9e0c-49b8b714cd66\" href=\"https:\/\/student.wp.odu.edu\/toliv007\/wp-content\/uploads\/sites\/36749\/2024\/11\/Career-Paper-Penetration-Testing-and-the-Social-Sciences.docx\">Career-Paper-Penetration-Testing-and-the-Social-Sciences<\/a><a href=\"https:\/\/student.wp.odu.edu\/toliv007\/wp-content\/uploads\/sites\/36749\/2024\/11\/Career-Paper-Penetration-Testing-and-the-Social-Sciences.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-62b0bdd2-e67e-4331-9e0c-49b8b714cd66\">Download<\/a><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" src=\"https:\/\/student.wp.odu.edu\/toliv007\/wp-content\/uploads\/sites\/36749\/2024\/11\/info-graph-from-naval-opsec-support-team-naval-information-4a3de9-640.jpg\" alt=\"\" class=\"wp-image-112\" srcset=\"https:\/\/student.wp.odu.edu\/toliv007\/wp-content\/uploads\/sites\/36749\/2024\/11\/info-graph-from-naval-opsec-support-team-naval-information-4a3de9-640.jpg 640w, https:\/\/student.wp.odu.edu\/toliv007\/wp-content\/uploads\/sites\/36749\/2024\/11\/info-graph-from-naval-opsec-support-team-naval-information-4a3de9-640-300x225.jpg 300w, https:\/\/student.wp.odu.edu\/toliv007\/wp-content\/uploads\/sites\/36749\/2024\/11\/info-graph-from-naval-opsec-support-team-naval-information-4a3de9-640-192x144.jpg 192w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Here you can find a library of the work and application of ideals throughout my personal and educational journey. These show my understanding of modern Cybersecurity and the implementation of key skills and strategies. Article Review: &#8220;Cyberattacks, Cyber Threats, and Attitudes Toward Cybersecurity Policies In this article review I study the effects of witnessing consequences &hellip; <a href=\"https:\/\/student.wp.odu.edu\/toliv007\/technical-training-and-projects\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Technical Training and Projects<\/span><\/a><\/p>\n","protected":false},"author":29483,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/toliv007\/wp-json\/wp\/v2\/pages\/16"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/toliv007\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/toliv007\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/toliv007\/wp-json\/wp\/v2\/users\/29483"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/toliv007\/wp-json\/wp\/v2\/comments?post=16"}],"version-history":[{"count":4,"href":"https:\/\/student.wp.odu.edu\/toliv007\/wp-json\/wp\/v2\/pages\/16\/revisions"}],"predecessor-version":[{"id":113,"href":"https:\/\/student.wp.odu.edu\/toliv007\/wp-json\/wp\/v2\/pages\/16\/revisions\/113"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/toliv007\/wp-json\/wp\/v2\/media?parent=16"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}