{"id":307,"date":"2025-02-06T17:23:54","date_gmt":"2025-02-06T17:23:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/adanromero\/?page_id=307"},"modified":"2025-02-07T02:22:26","modified_gmt":"2025-02-07T02:22:26","slug":"course-work","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/adanromero\/course-work\/","title":{"rendered":"Course Work"},"content":{"rendered":"\n<p>As I progress through my bachelor&#8217;s program, I will continue to update this section with details of my coursework and projects, reflecting my ongoing academic journey and commitment to the cyber crime and cybersecurity profession.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/sites.wp.odu.edu\/adanromero\/wp-content\/uploads\/sites\/38023\/2025\/02\/NIST-Cybersecurity-Framework.png\" alt=\"\" class=\"wp-image-345\" srcset=\"https:\/\/sites.wp.odu.edu\/adanromero\/wp-content\/uploads\/sites\/38023\/2025\/02\/NIST-Cybersecurity-Framework.png 1024w, https:\/\/sites.wp.odu.edu\/adanromero\/wp-content\/uploads\/sites\/38023\/2025\/02\/NIST-Cybersecurity-Framework-300x150.png 300w, https:\/\/sites.wp.odu.edu\/adanromero\/wp-content\/uploads\/sites\/38023\/2025\/02\/NIST-Cybersecurity-Framework-768x384.png 768w, https:\/\/sites.wp.odu.edu\/adanromero\/wp-content\/uploads\/sites\/38023\/2025\/02\/NIST-Cybersecurity-Framework-600x300.png 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Course Work at BRCC<\/h2>\n\n\n\n<p><br><em><strong>Personal Computer Hardware and Troubleshooting &#8211;<\/strong><\/em><br>*Induction to basic computer hardware and windows troubleshooting<br>*Course reviews Mike Meyers&#8217; CompTIA A+<\/p>\n\n\n\n<p><strong><em>Administration of Networked Services <\/em>&#8211; <\/strong><br>*Add Server Roles and Server Features and Understanding of Active Directory<br>*Create and manage User\/Group Policies<br>*Backup and Restoring Data Servers<br>*Course reviews Mike Meyers&#8217; CompTIA Network+<\/p>\n\n\n\n<p><em><strong>Network Communication, Security and Authentication &#8211;<\/strong><\/em><br>*VMware workstation<br>*Ubuntu and kali Linux, basic understanding of syntaxes and navigating of the Linux command line.<br>*OSINT framework<br>*Web vulnerability<\/p>\n\n\n\n<p><em><strong>Computer Forensics, investigation and response <\/strong><\/em><strong><em>&#8211;<\/em><\/strong><br>*Using Software: Paraben\u2019s E3<br>*Understanding chain of custody and evidence preservation<br>*Understanding steganography and using FTK Forensic Toolkit<br>*Recover deleted files using data carving techniques<br>*Email, mobile and network forensics<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"500\" src=\"https:\/\/sites.wp.odu.edu\/adanromero\/wp-content\/uploads\/sites\/38023\/2025\/02\/what-is-digital-forensics-1.jpeg\" alt=\"\" class=\"wp-image-340\" srcset=\"https:\/\/sites.wp.odu.edu\/adanromero\/wp-content\/uploads\/sites\/38023\/2025\/02\/what-is-digital-forensics-1.jpeg 960w, https:\/\/sites.wp.odu.edu\/adanromero\/wp-content\/uploads\/sites\/38023\/2025\/02\/what-is-digital-forensics-1-300x156.jpeg 300w, https:\/\/sites.wp.odu.edu\/adanromero\/wp-content\/uploads\/sites\/38023\/2025\/02\/what-is-digital-forensics-1-768x400.jpeg 768w, https:\/\/sites.wp.odu.edu\/adanromero\/wp-content\/uploads\/sites\/38023\/2025\/02\/what-is-digital-forensics-1-576x300.jpeg 576w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Professional Certifications<\/strong> <strong>Through Blue Ridge Community College<\/strong><\/h2>\n\n\n\n<ul>\n<li><strong>Career Studies Certificate in Cybersecurity<\/strong><\/li>\n\n\n\n<li><strong>Career Studies Certificate in Cybersecurity and Networking Foundations<\/strong><\/li>\n\n\n\n<li><strong>Career Studies Certificate in Intermediate Cybersecurity<\/strong><\/li>\n<\/ul>\n\n\n\n<p>These certifications have equipped me with essential skills and knowledge in cybersecurity, including threat recognition, prevention, and defense strategies. They have provided a solid foundation for my ongoing studies and professional development in the IT and cybersecurity fields.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As I progress through my bachelor&#8217;s program, I will continue to update this section with details of my coursework and projects, reflecting my ongoing academic journey and commitment to the cyber crime and cybersecurity profession. Course Work at BRCC Personal Computer Hardware and Troubleshooting &#8211;*Induction to basic computer hardware and windows troubleshooting*Course reviews Mike Meyers&#8217;&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/adanromero\/course-work\/\">Read More<\/a><\/div>\n","protected":false},"author":30291,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/pages\/307"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/users\/30291"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/comments?post=307"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/pages\/307\/revisions"}],"predecessor-version":[{"id":378,"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/pages\/307\/revisions\/378"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/media?parent=307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}