{"id":269,"date":"2025-12-03T18:35:04","date_gmt":"2025-12-03T18:35:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aiden-payne\/?page_id=269"},"modified":"2025-12-05T06:09:12","modified_gmt":"2025-12-05T06:09:12","slug":"technical-skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/aiden-payne\/technical-skills\/","title":{"rendered":"Technical Skills"},"content":{"rendered":"\n<p class=\"has-black-color has-text-color has-link-color has-medium-font-size wp-elements-a675a9afb47ec4ec0506d2fecac2e4a0\">Cybersecurity Involves mastering many technical skills in order to be proficient in the industry. Over the last four years I have gained expertise in networking, network traffic analysis, security functions in operating systems, and a variety of cybersecurity concepts and practices.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Artifact 1: Steganography Lab <\/h2>\n\n\n\n<p class=\"has-text-align-left has-black-color has-text-color has-link-color has-medium-font-size wp-elements-f22b86275a5360c7506469626c57d629\">In this lab we were tasked with understanding steganography while using Linux. We had to download files, create files, embed files within images, and extract the embedded files. This lab gave me a deeper understanding of steganography and other security practices while using Linux.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/12YBKyICPF6x_pb4eTg16zGk3ViRz4l2g3CVTwKuIip8\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">LAB 4: Steganography<\/a><\/div>\n<\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file aligncenter\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-content\/uploads\/sites\/40271\/2025\/12\/CYSE_450_Lab_4_StegHide-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE_450_Lab_4_StegHide-1.\"><\/object><a id=\"wp-block-file--media-2d27d580-7898-407f-8eb5-d94fe731c8b9\" href=\"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-content\/uploads\/sites\/40271\/2025\/12\/CYSE_450_Lab_4_StegHide-1.pdf\">CYSE_450_Lab_4_StegHide-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-content\/uploads\/sites\/40271\/2025\/12\/CYSE_450_Lab_4_StegHide-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-2d27d580-7898-407f-8eb5-d94fe731c8b9\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Artifact 2: SQL Injection Lab <\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color has-medium-font-size wp-elements-83462610e8923bdadffadfb7bbaceafb\">In this lab I used a mixture of critical thinking and technical skills in order to successfully understand SQL injection. Using a virtual machine, I successfully injected malicious code in order to bypass a login screen and gain access to sensitive information. This lab put my understanding of important security practices and penetration testing to the test.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/1LWfHemje_A0zypeUZIMDSnv5CAQK50ERhMslZ2Vn-y4\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">LAB 5: SQL Injection<\/a><\/div>\n<\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-content\/uploads\/sites\/40271\/2025\/12\/CYSE_450_Lab_5_SQL_Injection_Attack.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE_450_Lab_5_SQL_Injection_Attack.\"><\/object><a id=\"wp-block-file--media-b8e80c18-f397-45cd-bb65-0febd602eecd\" href=\"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-content\/uploads\/sites\/40271\/2025\/12\/CYSE_450_Lab_5_SQL_Injection_Attack.pdf\">CYSE_450_Lab_5_SQL_Injection_Attack<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-content\/uploads\/sites\/40271\/2025\/12\/CYSE_450_Lab_5_SQL_Injection_Attack.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b8e80c18-f397-45cd-bb65-0febd602eecd\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Artifact 3: Home Network Design<\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color has-medium-font-size wp-elements-f87a2644cd338592eb27a3d20c823ebb\">In one of my networking classes we were tasked at creating a simple home network design. This assignment allowed us to understand core concepts in networking. Applying this to my own home allowed me to get a further understanding of these concepts and terms.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-content\/uploads\/sites\/40271\/2025\/12\/annotated-Drawing2028129.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Drawing2028129.\"><\/object><a id=\"wp-block-file--media-1c9a33e0-cc7a-4ec4-923f-b8540068c025\" href=\"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-content\/uploads\/sites\/40271\/2025\/12\/annotated-Drawing2028129.pdf\">annotated-Drawing2028129<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-content\/uploads\/sites\/40271\/2025\/12\/annotated-Drawing2028129.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-1c9a33e0-cc7a-4ec4-923f-b8540068c025\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Involves mastering many technical skills in order to be proficient in the industry. Over the last four years I have gained expertise in networking, network traffic analysis, security functions in operating systems, and a variety of cybersecurity concepts and practices. Artifact 1: Steganography Lab In this lab we were tasked with understanding steganography while&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aiden-payne\/technical-skills\/\">Read More<\/a><\/div>\n","protected":false},"author":31792,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-json\/wp\/v2\/pages\/269"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-json\/wp\/v2\/users\/31792"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-json\/wp\/v2\/comments?post=269"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-json\/wp\/v2\/pages\/269\/revisions"}],"predecessor-version":[{"id":335,"href":"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-json\/wp\/v2\/pages\/269\/revisions\/335"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aiden-payne\/wp-json\/wp\/v2\/media?parent=269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}