{"id":218,"date":"2024-01-09T03:35:02","date_gmt":"2024-01-09T03:35:02","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-12-05T01:04:48","modified_gmt":"2025-12-05T01:04:48","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/amira1201\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<p>This page will display my highlighted skills associated with artifacts. The artifacts presented will consist of ODU coursework, where each will showcase my skills.  <\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:53% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"452\" src=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/12\/ball-63527_1280.jpeg\" alt=\"\" class=\"wp-image-444 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/12\/ball-63527_1280.jpeg 640w, https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/12\/ball-63527_1280-300x212.jpeg 300w, https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/12\/ball-63527_1280-425x300.jpeg 425w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Technical Skills<\/strong><\/p>\n\n\n\n<p>In the field of Cybersecurity, Technical Skills are essential, as it provides the foundation needed in pursuing this career. The artifacts presented highlight the practical skills learned during my time at Old Dominion University.<\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Artifact 1:<\/h2>\n\n\n\n<ul>\n<li>Password Cracking Lab: For this lab we had to create Create 6 users in Linux Terminal, then set the password for each user. Then use John the Ripper tool to crack their passwords in wordlist mode. <\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Assignment-5-CYSE-270_compressed.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-5-CYSE-270_compressed.\"><\/object><a id=\"wp-block-file--media-2e280e44-862e-430e-a9d7-899ab33e9ec3\" href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Assignment-5-CYSE-270_compressed.pdf\">Assignment-5-CYSE-270_compressed<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Assignment-5-CYSE-270_compressed.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-2e280e44-862e-430e-a9d7-899ab33e9ec3\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Artifact 2:<\/h2>\n\n\n\n<ul>\n<li>Ethical Hacking Lab: For this lab we had to exploit SMB vulnerability on Windows XP.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Lab-Assignment-4-Penetration-Testing-for-Windows-3_compressed-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-Assignment-4-Penetration-Testing-for-Windows-3_compressed-2.\"><\/object><a id=\"wp-block-file--media-ee9af6ab-e3c9-418b-82c1-b9f61fc15745\" href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Lab-Assignment-4-Penetration-Testing-for-Windows-3_compressed-2.pdf\">Lab-Assignment-4-Penetration-Testing-for-Windows-3_compressed-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Lab-Assignment-4-Penetration-Testing-for-Windows-3_compressed-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ee9af6ab-e3c9-418b-82c1-b9f61fc15745\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Artifact 3:<\/h2>\n\n\n\n<ul>\n<li>Digital Steganography Lab: For this lab we had to use steghide and extract the contents of the executable file. <\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Assignment-6-Digital-Steganography_compressed.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-6-Digital-Steganography_compressed.\"><\/object><a id=\"wp-block-file--media-6bc3a4a3-e274-4ea5-8c0e-38489a23623c\" href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Assignment-6-Digital-Steganography_compressed.pdf\">Assignment-6-Digital-Steganography_compressed<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Assignment-6-Digital-Steganography_compressed.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6bc3a4a3-e274-4ea5-8c0e-38489a23623c\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"480\" src=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/12\/ai-generated-8627517_1280.png\" alt=\"\" class=\"wp-image-445 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/12\/ai-generated-8627517_1280.png 480w, https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/12\/ai-generated-8627517_1280-300x300.png 300w, https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/12\/ai-generated-8627517_1280-150x150.png 150w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Critical Thinking Skills<\/strong><\/p>\n\n\n\n<p>Critical Thinking is another important skill to acquire, especially in cybersecurity. It helps you think logically to achieve the best outcome in any situation. The artifacts presented showcase my critical thinking skills when executing tasks. <\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Artifact 1:<\/h2>\n\n\n\n<ul>\n<li>Home Network Diagram: Created a home network diagram using Microsoft Visio.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Module-3-Submission.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Module-3-Submission.\"><\/object><a id=\"wp-block-file--media-26b6539c-1e78-4834-a813-3b937c4c47f0\" href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Module-3-Submission.pdf\">Module-3-Submission<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Module-3-Submission.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-26b6539c-1e78-4834-a813-3b937c4c47f0\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Artifact 2:<\/h2>\n\n\n\n<ul>\n<li>Digital Forensics Paper: This paper displayed an outline plan for a computer forensic lab, showcasing the lab&#8217;s physical layout.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Midterm-CYSE407.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Midterm-CYSE407.\"><\/object><a id=\"wp-block-file--media-2a729ac8-e6ca-4abf-8092-b77f3a78618c\" href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Midterm-CYSE407.pdf\">Midterm-CYSE407<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Midterm-CYSE407.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-2a729ac8-e6ca-4abf-8092-b77f3a78618c\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Artifact 3:<\/h2>\n\n\n\n<ul>\n<li>Research Paper: A thorough research paper about Social Media impacts on cybersecurity.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Research-Paper-CYSE-280.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Research-Paper-CYSE-280.\"><\/object><a id=\"wp-block-file--media-031228e0-8428-473d-a78f-bc81ee83353a\" href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Research-Paper-CYSE-280.pdf\">Research-Paper-CYSE-280<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Research-Paper-CYSE-280.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-031228e0-8428-473d-a78f-bc81ee83353a\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:55% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"426\" src=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/12\/social-media-5187243_1280.jpeg\" alt=\"\" class=\"wp-image-447 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/12\/social-media-5187243_1280.jpeg 640w, https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/12\/social-media-5187243_1280-300x200.jpeg 300w, https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/12\/social-media-5187243_1280-451x300.jpeg 451w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Communication Skills<\/strong><\/p>\n\n\n\n<p>Communication skills are the ability to convey information and ideas clearly while actively listening and understanding. The artifacts provided show my ability to articulate information in different forms.<\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Artifact 1: <\/h2>\n\n\n\n<ul>\n<li>Group Project: A group project where we created a database that will print out popular songs of 2023. This shows my presentation skills because we had to present our findings to the professor.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Popular-Songs-Database-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Popular-Songs-Database-2.\"><\/object><a id=\"wp-block-file--media-5d618548-8379-4279-a377-a5eca945904d\" href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Popular-Songs-Database-2.pdf\">Popular-Songs-Database-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Popular-Songs-Database-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5d618548-8379-4279-a377-a5eca945904d\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Artifact 2:<\/h2>\n\n\n\n<ul>\n<li>Cybersecurity Internship: This paper showcased my cybersecurity internship, as it shows my duties I had to conduct and my interactions.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Final-Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Final-Paper.\"><\/object><a id=\"wp-block-file--media-412d405e-3ad4-4bd4-a0c3-3f06a64f12f9\" href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Final-Paper.pdf\">Final-Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Final-Paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-412d405e-3ad4-4bd4-a0c3-3f06a64f12f9\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Artifact 3:<\/h2>\n\n\n\n<ul>\n<li>Interdisciplinary Research Paper: This paper shows my written communication skills, using both multi- and inter-disciplinary theories and concepts about \u201cHow has the use of cosmetics affected individuals\u201d.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Final-Paper-IDS-300W.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Final-Paper-IDS-300W.\"><\/object><a id=\"wp-block-file--media-391e4d5f-4856-4378-8d8d-f6f4a1841f8d\" href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Final-Paper-IDS-300W.pdf\">Final-Paper-IDS-300W<\/a><a href=\"https:\/\/sites.wp.odu.edu\/amira1201\/wp-content\/uploads\/sites\/35083\/2025\/11\/Final-Paper-IDS-300W.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-391e4d5f-4856-4378-8d8d-f6f4a1841f8d\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This page will display my highlighted skills associated with artifacts. The artifacts presented will consist of ODU coursework, where each will showcase my skills. Technical Skills In the field of Cybersecurity, Technical Skills are essential, as it provides the foundation needed in pursuing this career. The artifacts presented highlight the practical skills learned during my&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/amira1201\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":28218,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/amira1201\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/amira1201\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/amira1201\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amira1201\/wp-json\/wp\/v2\/users\/28218"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amira1201\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/amira1201\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":458,"href":"https:\/\/sites.wp.odu.edu\/amira1201\/wp-json\/wp\/v2\/pages\/218\/revisions\/458"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/amira1201\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}