{"id":171,"date":"2025-11-18T20:51:01","date_gmt":"2025-11-18T20:51:01","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?p=171"},"modified":"2025-12-05T22:57:20","modified_gmt":"2025-12-05T22:57:20","slug":"hello-world","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/acuff\/2025\/11\/18\/hello-world\/","title":{"rendered":"Skills Involving Cybersecurity"},"content":{"rendered":"\n<p><strong>Skill 1: Familiarity with Virtual Machines&nbsp;<\/strong><\/p>\n\n\n\n<p>Supporting Artifact 1:&nbsp; My Module 9 Lab from CS 562<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Screenshot-2025-12-03-134456.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"465\" src=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Screenshot-2025-12-03-134456-1024x465.png\" alt=\"\" class=\"wp-image-205\" srcset=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Screenshot-2025-12-03-134456-1024x465.png 1024w, https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Screenshot-2025-12-03-134456-300x136.png 300w, https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Screenshot-2025-12-03-134456-768x349.png 768w, https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Screenshot-2025-12-03-134456-1536x698.png 1536w, https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Screenshot-2025-12-03-134456-600x272.png 600w, https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Screenshot-2025-12-03-134456.png 1918w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Brief Description: Within the lab, we had to answer 5 questions about the C program codes for exploits.<\/p>\n\n\n\n<p>Supporting Artifact 2:&nbsp; Firewall setup &amp; Network scanning<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Assignment-Lab-3.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-Lab-3.\"><\/object><a id=\"wp-block-file--media-ebe722d9-8199-4165-a329-514e711cef0b\" href=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Assignment-Lab-3.pdf\">Assignment-Lab-3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Assignment-Lab-3.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ebe722d9-8199-4165-a329-514e711cef0b\">Download<\/a><\/div>\n\n\n\n<p>Brief Description:&nbsp;In my CYSE 301 class, we learned in module 2 what a firewall was, how it works, and how to set one up within the virtual machine.<\/p>\n\n\n\n<p>Supporting Artifact 3:&nbsp;SQL Injection Attack Assignment<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Lab-5-.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-5-.\"><\/object><a id=\"wp-block-file--media-94d8412e-b176-421c-a799-68f3e8b4f551\" href=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Lab-5-.pdf\">Lab-5-<\/a><a href=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Lab-5-.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-94d8412e-b176-421c-a799-68f3e8b4f551\">Download<\/a><\/div>\n\n\n\n<p>Brief Description 3: The homework assignment for SQL Injection Attack was to provide a hands-on experience with web security through using the exploits for SQL Injections. It was to show how such attacks are executed in a real setting.&nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Skill 1: Familiarity with Virtual Machines&nbsp; Supporting Artifact 1:&nbsp; My Module 9 Lab from CS 562 Brief Description: Within the lab, we had to answer 5 questions about the C program codes for exploits. Supporting Artifact 2:&nbsp; Firewall setup &amp; Network scanning Brief Description:&nbsp;In my CYSE 301 class, we learned in module 2 what a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/acuff\/2025\/11\/18\/hello-world\/\">Read More<\/a><\/div>\n","protected":false},"author":25753,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/posts\/171"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/users\/25753"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/comments?post=171"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/posts\/171\/revisions"}],"predecessor-version":[{"id":244,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/posts\/171\/revisions\/244"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/media?parent=171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/categories?post=171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/tags?post=171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}