{"id":218,"date":"2024-01-11T22:04:06","date_gmt":"2024-01-11T22:04:06","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-11-30T04:32:34","modified_gmt":"2025-11-30T04:32:34","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/akey010\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>Python<\/strong><\/h3>\n\n\n\n<p>My Python artifacts from ITP 100, the PyCharm environment, and my final project show how I learned programming basics and applied them to real problem-solving. Python appears in nearly every cybersecurity job posting, especially analyst roles, so this skill directly supports my future career path.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"847\" src=\"https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-1024x847.png\" alt=\"\" class=\"wp-image-407\" style=\"width:446px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-1024x847.png 1024w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-300x248.png 300w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-768x635.png 768w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-1536x1271.png 1536w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-363x300.png 363w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image.png 1818w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Wireshark<\/strong><\/h3>\n\n\n\n<p>The Wireshark and Kali Linux artifacts from CYSE 301 represent my hands-on experience with network traffic analysis. These labs helped me understand IP addresses, packet details, and how to detect unusual activity. Concepts from networking courses made the process easier and more intuitive.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"788\" src=\"https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-2-1024x788.png\" alt=\"\" class=\"wp-image-409\" style=\"width:429px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-2-1024x788.png 1024w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-2-300x231.png 300w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-2-768x591.png 768w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-2-390x300.png 390w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-2.png 1248w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"230\" src=\"https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-4-1024x230.png\" alt=\"\" class=\"wp-image-411\" style=\"width:421px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-4-1024x230.png 1024w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-4-300x67.png 300w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-4-768x172.png 768w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-4-600x135.png 600w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-4.png 1248w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Communication &amp; Collaboration<\/strong><\/h3>\n\n\n\n<p>My Communication &amp; Collaboration artifacts, Capacity Ticketing System, Power BI, and Microsoft Teams come from my IT role. These tools helped me build practical workplace skills, such as tracking issues, communicating across departments, and documenting solutions clearly.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"561\" src=\"https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-5-1024x561.png\" alt=\"\" class=\"wp-image-412\" style=\"width:412px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-5-1024x561.png 1024w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-5-300x164.png 300w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-5-768x421.png 768w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-5-547x300.png 547w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-5.png 1290w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"623\" height=\"420\" src=\"https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-6.png\" alt=\"\" class=\"wp-image-413\" style=\"width:387px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-6.png 623w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-6-300x202.png 300w, https:\/\/sites.wp.odu.edu\/akey010\/wp-content\/uploads\/sites\/35214\/2025\/11\/image-6-445x300.png 445w\" sizes=\"(max-width: 623px) 100vw, 623px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Python My Python artifacts from ITP 100, the PyCharm environment, and my final project show how I learned programming basics and applied them to real problem-solving. Python appears in nearly every cybersecurity job posting, especially analyst roles, so this skill directly supports my future career path. Wireshark The Wireshark and Kali Linux artifacts from CYSE&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/akey010\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":28225,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/users\/28225"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":415,"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/pages\/218\/revisions\/415"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}