{"id":365,"date":"2025-10-11T22:28:19","date_gmt":"2025-10-12T02:28:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/?page_id=365"},"modified":"2025-10-11T22:29:44","modified_gmt":"2025-10-12T02:29:44","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/skills-2\/","title":{"rendered":"Skills (WIP)"},"content":{"rendered":"\n<p><strong>Essential Work Habits<\/strong><\/p>\n\n\n\n<p><span style=\"font-weight: 400\"> Include artifacts here that demonstrate your&nbsp; experience with some of the abilities listed below. Examples of artifacts you might include: comments on papers\/exams; test grades; internship comments)<\/span><\/p>\n\n\n\n<ul>\n<li><span style=\"font-weight: 400\">Ability to work methodically and is very detail oriented<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Eagerness to dig into technical questions and examine them from all sides<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Enthusiastic and highly adaptable<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Strong analytical and diagnostic skills<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Demonstrated skills in innovation and collaboration<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Keep a current understanding of vulnerabilities from the Internet<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Maintaining awareness and knowledge of contemporary standards, practices, procedures and methods<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Ability to get the job done<\/span><\/li>\n<\/ul>\n\n\n\n<p><strong>Soft Skills<\/strong><\/p>\n\n\n\n<p><span style=\"font-weight: 400\">Include artifacts here that demonstrate your&nbsp; experience with some of the abilities listed below. Examples of artifacts you might include: slideshow presentations, videos of presentations, etc.<\/span><\/p>\n\n\n\n<ul>\n<li><span style=\"font-weight: 400\">Excellent presentation and communications skills to effectively communicate with management and customers<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Ability to clearly articulate complex concepts both written and verbally<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Ability, understanding, and usage of active listening skills especially with customers<\/span><\/li>\n<\/ul>\n\n\n\n<p><strong>Solid Technical Foundation<\/strong><\/p>\n\n\n\n<p><span style=\"font-weight: 400\">Include artifacts here that demonstrate your&nbsp; experience with some of the abilities listed below. Examples of artifacts you might include:&nbsp;<\/span><span style=\"font-weight: 400\">programming projects, homework, or projects.<\/span><\/p>\n\n\n\n<ul>\n<li>Cybersecurity\n<ul>\n<li>The first embedded file is a penetration testing lab that showcases my ability to understand Linux and Windows operating systems in order to implement a backdoor system. Providing persistent access, therefore allowing me to identify weak points in firewalls.<\/li>\n\n\n\n<li>The second embedded file is a detailed analysis of BIA, BCP, DRP, and CIRTs and why they are important to a risk management plan. This showcases my understanding of the precautions and proactive measures to minimize risk and loss and how they are applied in a risk management plan.<\/li>\n\n\n\n<li>The third embedded file in this group is an ethical hacking lab that showcases my ability to understand Malware and its particular interactions with in a system. This lab specifically focuses on malware with the signature Mirai and VIPKeylogger. I also put them through a public analysis on any run to determine their methods of infiltration and malice.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Copy-of-Extra-Credit_-Persistent-Access-CYSE301-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Persistent Access Lab CYSE301.\"><\/object><a id=\"wp-block-file--media-63b1ca9a-ff5f-4ba0-9345-15ff6aa00e2e\" href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Copy-of-Extra-Credit_-Persistent-Access-CYSE301-1.pdf\">Persistent Access Lab CYSE301<\/a><a href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Copy-of-Extra-Credit_-Persistent-Access-CYSE301-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-63b1ca9a-ff5f-4ba0-9345-15ff6aa00e2e\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Final-Exam-CYSE-495-Alex-K-2-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The Importance of BIA, BCP, DRP, and CIRTs. CYSE 495.\"><\/object><a id=\"wp-block-file--media-640d5a6d-66cc-4368-9717-3b9766bbf491\" href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Final-Exam-CYSE-495-Alex-K-2-1.pdf\">The Importance of BIA, BCP, DRP, and CIRTs. CYSE 495<\/a><a href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Final-Exam-CYSE-495-Alex-K-2-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-640d5a6d-66cc-4368-9717-3b9766bbf491\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/CYSE450-Lab-4-Alex-K-1-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE450 Lab 4 Malware.\"><\/object><a id=\"wp-block-file--media-f99a6335-2ba7-48d5-bc92-301499816996\" href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/CYSE450-Lab-4-Alex-K-1-1.pdf\">CYSE450 Lab 4 Malware<\/a><a href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/CYSE450-Lab-4-Alex-K-1-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f99a6335-2ba7-48d5-bc92-301499816996\">Download<\/a><\/div>\n\n\n\n<ul>\n<li>Research &amp; Reporting\n<ul>\n<li>The first embedded file is a social analytical report that covers cyberterrorism, its effects, where it comes from and why it happens. This showcases my ability to analyze past cyber attacks and identify a motive for these actions.<\/li>\n\n\n\n<li>The second embedded file is a short security policy that identifies the fives most important security issues, and utilizes information researched from reputable frameworks. This proves my ability to research information and apply that to policies and plans I develop.<\/li>\n\n\n\n<li>The final embedded file in this group is a research report on the Equifax data breach of 2017. This report explores how the breach happened, its direct effects on people, its indirect effects, and potential ways it could have been prevented. This highlights my use of research to hypothesize different preventative and proactive measures that can be taken to prevent breaches such as this. Additionally it proves my knowledge of how leaks like this have lasting impact on people.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Project-Paper-CYSE-426-Alex-K-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Cyberterrorism Across the Globe CYSE 426.\"><\/object><a id=\"wp-block-file--media-48fe74df-edce-4dc8-9d0c-f3695d8f0687\" href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Project-Paper-CYSE-426-Alex-K-1.pdf\">Cyberterrorism Across the Globe CYSE 426<\/a><a href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Project-Paper-CYSE-426-Alex-K-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-48fe74df-edce-4dc8-9d0c-f3695d8f0687\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Corporate-Database-Security-Policy_-Short-Research-Paper-2-09_15-CYSE300-Alex-K-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Corporate Database Security Policy CYSE300.\"><\/object><a id=\"wp-block-file--media-e94076ca-1d89-47bd-be1a-7bd318682ee1\" href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Corporate-Database-Security-Policy_-Short-Research-Paper-2-09_15-CYSE300-Alex-K-1.pdf\">Corporate Database Security Policy CYSE300<\/a><a href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Corporate-Database-Security-Policy_-Short-Research-Paper-2-09_15-CYSE300-Alex-K-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e94076ca-1d89-47bd-be1a-7bd318682ee1\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/The-Equifax-Data-Breach_-Short-Research-Paper-1-09_08-CYSE300-Alex-K.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The Equifax Data Breach CYSE 300.\"><\/object><a id=\"wp-block-file--media-7dfe6071-4e84-4afd-a87e-70365c809f46\" href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/The-Equifax-Data-Breach_-Short-Research-Paper-1-09_08-CYSE300-Alex-K.pdf\">The Equifax Data Breach CYSE 300<\/a><a href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/The-Equifax-Data-Breach_-Short-Research-Paper-1-09_08-CYSE300-Alex-K.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7dfe6071-4e84-4afd-a87e-70365c809f46\">Download<\/a><\/div>\n\n\n\n<ul>\n<li>Programming\n<ul>\n<li>The first embedded file is a C# lab that showcases my understanding of the C# programming language, and how to develop useful programs. The key points of this particular program is that it utilizes random number generation and a stopwatch system to time the user in a series of math questions.<\/li>\n\n\n\n<li>The second embedded file is a Java program that uses a multitude of methods in order to calculate numerous variables in the main method. This provides insight to my knowledge of the Java programming language, and my ability to create organized and easy to interpret code to accomplish multiple tasks.<\/li>\n\n\n\n<li>The final two embedded files are Python programs create a server-client connection that allow for a secure voting process. Additionally it requires authentication and stores login information with encryption. It also allows for multiple connections to be carried out at once. This provides an efficient information collecting service that is secure and anonymous. This proves my skills in using the Python programming language to develop programs that interact with multiple other systems, and vice versa.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Program-2-Speed-Math-Game.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Program 2 Speed Math Game.\"><\/object><a id=\"wp-block-file--media-9965ea3f-4439-4441-bb2a-306b05de8d90\" href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Program-2-Speed-Math-Game.pdf\">Program 2 Speed Math Game<\/a><a href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Program-2-Speed-Math-Game.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9965ea3f-4439-4441-bb2a-306b05de8d90\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/CS151-Lab-7-Task-3-Code.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CS151 Lab 7 Average Student Scores Code.\"><\/object><a id=\"wp-block-file--media-691be838-3bcf-40d2-9d70-230604e85d61\" href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/CS151-Lab-7-Task-3-Code.pdf\">CS151 Lab 7 Average Student Scores Code<\/a><a href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/CS151-Lab-7-Task-3-Code.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-691be838-3bcf-40d2-9d70-230604e85d61\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Server-Project-Server-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Server Project (Server).\"><\/object><a id=\"wp-block-file--media-b2af1092-9d13-46e2-985a-f2c2d030f484\" href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Server-Project-Server-2.pdf\">Server Project (Server)<\/a><a href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Server-Project-Server-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b2af1092-9d13-46e2-985a-f2c2d030f484\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Server-Project-Client-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Server Project (Client).\"><\/object><a id=\"wp-block-file--media-7d97024f-32a6-47ea-b549-68531658de7e\" href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Server-Project-Client-2.pdf\">Server Project (Client)<\/a><a href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-content\/uploads\/sites\/34348\/2025\/10\/Server-Project-Client-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7d97024f-32a6-47ea-b549-68531658de7e\">Download<\/a><\/div>\n\n\n\n<p><strong>Detailed Knowledge of Key Technologies<\/strong><\/p>\n\n\n\n<p><span style=\"font-weight: 400\">Include artifacts here that demonstrate your&nbsp; experience with some of the abilities listed below.&nbsp;<\/span><\/p>\n\n\n\n<ul>\n<li><span style=\"font-weight: 400\">Open Source Applications<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Linux Operating Systems<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Microsoft Technologies<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Wireless Technologies<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Database Modeling<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Web Application Technologies<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Compiled and Interpreted Development Languages<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Network Implementation (Operational and Security)<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Telephony Technologies (Analog and IP)<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Social Engineering<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">Physical Security<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Essential Work Habits Include artifacts here that demonstrate your&nbsp; experience with some of the abilities listed below. Examples of artifacts you might include: comments on papers\/exams; test grades; internship comments) Soft Skills Include artifacts here that demonstrate your&nbsp; experience with some of the abilities listed below. Examples of artifacts you might include: slideshow presentations, videos&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":27611,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-json\/wp\/v2\/pages\/365"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-json\/wp\/v2\/users\/27611"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-json\/wp\/v2\/comments?post=365"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-json\/wp\/v2\/pages\/365\/revisions"}],"predecessor-version":[{"id":369,"href":"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-json\/wp\/v2\/pages\/365\/revisions\/369"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alexander-kotzian\/wp-json\/wp\/v2\/media?parent=365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}