{"id":495,"date":"2020-07-20T20:26:12","date_gmt":"2020-07-20T20:26:12","guid":{"rendered":"https:\/\/www.jsums.edu\/cyberawareclone-demo\/?page_id=495"},"modified":"2025-10-07T15:17:30","modified_gmt":"2025-10-07T15:17:30","slug":"jsu-cyber-trainings","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/jsu-cyber-security\/jsu-cyber-trainings\/","title":{"rendered":"JSU Cyber Trainings"},"content":{"rendered":"<p>The following Documents contain additional training materials provided by InfoSec and JSU&#8217;s Cyber Security Officer to help Jackson State University and its employees become more aware of cyber attacks and scams that we are faced with in the workplace today.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following Documents contain additional training materials provided by InfoSec and JSU&#8217;s Cyber Security Officer to help Jackson State University and its employees become more aware of cyber attacks and scams that we are faced with in the workplace today. &nbsp; &nbsp;<\/p>\n","protected":false},"author":131,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/495"}],"collection":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/comments?post=495"}],"version-history":[{"count":6,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/495\/revisions"}],"predecessor-version":[{"id":1499,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/495\/revisions\/1499"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/media?parent=495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}