{"id":845,"date":"2018-09-25T16:14:02","date_gmt":"2018-09-25T20:14:02","guid":{"rendered":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/?p=845"},"modified":"2018-09-30T16:15:02","modified_gmt":"2018-09-30T20:15:02","slug":"cybersecurity-bootcamp-hosted-saint-peters-university","status":"publish","type":"post","link":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/2018\/09\/25\/cybersecurity-bootcamp-hosted-saint-peters-university\/","title":{"rendered":"CyberSecurity Bootcamp Hosted at Saint Peter’s University"},"content":{"rendered":"

Saint Peter’s\u00a0University andCyber Security Aces Bootcamps hosted the CyberSecurity Bootcamp event “Cyber Security Begins At Home” on\u00a0Saturday September 22
\nAttendees learned how to protect themselves from cyber attacks: credit card protection, personal identity protection, emails, social media networking like LinkedIn, Twitter and Facebook. VPN, Personal Firewall, SSL\/TLS, Encryption (Storage &amp; communication), Darkweb Intro, Tor, .onion websites, document footprints.<\/p>\n

This bootcamp was presented by Albert Realuyo, Mayur Pipaliya, Jose Martinez &amp; Steven Wong.<\/p>\n

More than 50\u00a0attended.<\/p>\n

\"Cyber<\/p>\n","protected":false},"excerpt":{"rendered":"

Saint Peter’s\u00a0University andCyber Security Aces Bootcamps hosted the CyberSecurity Bootcamp event “Cyber Security Begins At Home” on\u00a0Saturday September 22 Attendees learned how to protect themselves from cyber attacks: credit card protection, personal identity protection, emails, social media networking like LinkedIn, Twitter and Facebook. VPN, Personal Firewall, SSL\/TLS, Encryption (Storage &amp; communication), Darkweb Intro, Tor, .onion […]<\/p>\n","protected":false},"author":32,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-845","post","type-post","status-publish","format-standard","hentry","category-cyber-security-trends"],"acf":[],"_links":{"self":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/comments?post=845"}],"version-history":[{"count":2,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/845\/revisions"}],"predecessor-version":[{"id":848,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/845\/revisions\/848"}],"wp:attachment":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/media?parent=845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/categories?post=845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/tags?post=845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}