{"id":337,"date":"2019-09-30T09:49:47","date_gmt":"2019-09-30T15:49:47","guid":{"rendered":"http:\/\/cybersecurity.bellevue.edu\/?p=337"},"modified":"2021-08-30T13:06:12","modified_gmt":"2021-08-30T19:06:12","slug":"strange-course-title","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2019\/09\/30\/strange-course-title\/","title":{"rendered":"Strange Course Title?"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"670\" height=\"122\" src=\"http:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/09\/CYBR525-title.png\" alt=\"\" class=\"wp-image-339\" srcset=\"https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/09\/CYBR525-title.png 670w, https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/09\/CYBR525-title-300x55.png 300w\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" \/><\/figure>\n\n\n\n<p>Remember in the not too distant past having to explain what cybersecurity was to family, friends, and co-workers?  With all the news of breaches that doesn&#8217;t seem to be much of a problem any longer however some of our course titles still give people pause.  The Bellevue Leader recently did an article on a few courses that made them think twice &#8211; our Ethical Hacking course included.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.omaha.com\/sarpy\/bellevue\/strange-courses-a-vital-part-to-bu-education\/article_d75ea670-9c42-5f51-ba10-fbdc1785a8e4.html?fbclid=IwAR1FiHoiSdnNWfsbTgPxFoMw-JiiZDZHNiVFZPU4_7g6AON34WktQZ1l11Q\">Bellevue Leader &#8211; Strange Courses a Vital Part to BU Education<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Remember in the not too distant past having to explain what cybersecurity was to family, friends, and co-workers? With all the news of breaches that doesn&#8217;t seem to be much of a problem any longer however some of our course titles still give people pause. The Bellevue Leader recently did an article on a few [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-337","post","type-post","status-publish","format-standard","hentry","category-security-education"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=337"}],"version-history":[{"count":2,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/337\/revisions"}],"predecessor-version":[{"id":340,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/337\/revisions\/340"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}