{"id":218,"date":"2023-02-02T03:01:10","date_gmt":"2023-02-02T03:01:10","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-12-10T03:50:22","modified_gmt":"2025-12-10T03:50:22","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/anthony-gomez\/skills-2\/","title":{"rendered":"Skills &amp; Artifacts Page"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\"><strong>Skill 1: <\/strong>Cybersecurity Technical Skills (Threat Analysis &amp; Network Security)<\/h1>\n\n\n\n<p><strong>Description:<\/strong> Understanding threats, vulnerabilities, and basic defense methods.<br><strong>Why it works:<\/strong> Every job ad for cybersecurity wants threat awareness, logs analysis, and understanding of cyberattacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 1 \u2013 <\/strong>Network Security Assignment<\/h3>\n\n\n\n<ul>\n<li>This was a basic network configuration\/security project<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"662\" src=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/Screenshot-2025-12-09-at-10.23.43\u202fPM-1024x662.png\" alt=\"\" class=\"wp-image-454\" srcset=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/Screenshot-2025-12-09-at-10.23.43\u202fPM-1024x662.png 1024w, https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/Screenshot-2025-12-09-at-10.23.43\u202fPM-300x194.png 300w, https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/Screenshot-2025-12-09-at-10.23.43\u202fPM-768x497.png 768w, https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/Screenshot-2025-12-09-at-10.23.43\u202fPM-1536x994.png 1536w, https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/Screenshot-2025-12-09-at-10.23.43\u202fPM-2048x1325.png 2048w, https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/Screenshot-2025-12-09-at-10.23.43\u202fPM-464x300.png 464w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 2 \u2013 <\/strong>NIST or Cybersecurity Framework Summary<\/h3>\n\n\n\n<ul>\n<li>CIA Triad Report<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/annotated-The20CIA20Triad20write20up-2020Anthony20Gomez-Reyes.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CIA Triad.\"><\/object><a id=\"wp-block-file--media-34a01697-35ae-4508-a15a-38752991bacf\" href=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/annotated-The20CIA20Triad20write20up-2020Anthony20Gomez-Reyes.pdf\">CIA Triad<\/a><a href=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/annotated-The20CIA20Triad20write20up-2020Anthony20Gomez-Reyes.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-34a01697-35ae-4508-a15a-38752991bacf\">Download<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 3 \u2013<\/strong> Cybertrespass Research Paper<\/h3>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/Anthony-Gomez-Reyes-White-Paper-Writing-Assignment.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Anthony-Gomez-Reyes - Cybertrespass research Paper.\"><\/object><a id=\"wp-block-file--media-bfa48dfb-da24-4bec-af8a-286562625bb6\" href=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/Anthony-Gomez-Reyes-White-Paper-Writing-Assignment.pdf\">Anthony-Gomez-Reyes &#8211; Cybertrespass research Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/Anthony-Gomez-Reyes-White-Paper-Writing-Assignment.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-bfa48dfb-da24-4bec-af8a-286562625bb6\">Download<\/a><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Skill 2: Digital Forensics &amp; Analytical Problem-Solving<\/strong><\/h1>\n\n\n\n<p><strong>Description:<\/strong> Ability to analyze logs, incidents, systems, and digital evidence.<br><strong>Why it works:<\/strong> Employers look for investigation skills, even at entry level.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 1 \u2013 <\/strong>Log Analysis Practice <\/h3>\n\n\n\n<ul>\n<li>During this log analysis practice, I identified several suspicious activities: Multiple failed logins in a short time (potential password-guessing). Repeated login failures from an external IP attempting to access the admin account (possible brute-force attack). Log deletion following a successful login, which could indicate an attempt to cover tracks. This exercise demonstrates my ability to read system logs, recognize abnormal behavior, and identify early warning signs of unauthorized access.<\/li>\n\n\n\n<li><strong>Sample system logs<\/strong>: <\/li>\n\n\n\n<li>2025-01-12 08:15:43 LOGIN SUCCESS user=agomez ip=192.168.1.24<\/li>\n\n\n\n<li>2025-01-12 08:17:10 FILE ACCESS user=agomez file=\/docs\/final_paper.docx<\/li>\n\n\n\n<li>2025-01-12 09:42:55 LOGIN FAILED user=agomez ip=192.168.1.24<\/li>\n\n\n\n<li>2025-01-12 09:43:01 LOGIN FAILED user=agomez ip=192.168.1.24<\/li>\n\n\n\n<li>2025-01-12 10:02:18 LOGIN FAILED user=admin ip=185.243.11.92<\/li>\n\n\n\n<li>2025-01-12 10:02:22 LOGIN FAILED user=admin ip=185.243.11.92<\/li>\n\n\n\n<li>2025-01-12 10:02:29 LOGIN FAILED user=admin ip=185.243.11.92<\/li>\n\n\n\n<li>2025-01-12 10:15:40 LOGIN SUCCESS user=agomez ip=192.168.1.24<\/li>\n\n\n\n<li>2025-01-12 10:17:09 FILE DELETE user=agomez file=\/logs\/error_temp.log<\/li>\n\n\n\n<li>2025-01-12 11:55:41 LOGIN FAILED user=admin ip=185.243.11.92<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 2 \u2013 <\/strong>Case Study<\/h3>\n\n\n\n<ul>\n<li>write-up about SCADA Systems and explaining the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/annotated-Write-Up20-20SCADA20Systems20-20Anthony20Gomez-Reyes.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of SCADA Systems.\"><\/object><a id=\"wp-block-file--media-49cc96b0-1ca3-4d50-99cc-71106827934f\" href=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/annotated-Write-Up20-20SCADA20Systems20-20Anthony20Gomez-Reyes.pdf\">SCADA Systems<\/a><a href=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/annotated-Write-Up20-20SCADA20Systems20-20Anthony20Gomez-Reyes.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-49cc96b0-1ca3-4d50-99cc-71106827934f\">Download<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 3 \u2013 <\/strong>SQL \/ Database Project<\/h3>\n\n\n\n<ul>\n<li>Develop a Conceptual Model of database for Asante, LLC, and transform it to a Relational Model (ERD).<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/Group-2-Team-Project.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of SQL Project.\"><\/object><a id=\"wp-block-file--media-05cb7784-df58-48ca-95eb-1cb13fc7e5d6\" href=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/Group-2-Team-Project.pdf\">SQL Project<\/a><a href=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/Group-2-Team-Project.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-05cb7784-df58-48ca-95eb-1cb13fc7e5d6\">Download<\/a><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Skill 3: <\/strong>Secure Systems &amp; Policy\/Compliance Knowledge<\/h1>\n\n\n\n<p><strong>Description: <\/strong>Understanding rules, procedures, access control, and cyber policies.<br><strong>Why it works:<\/strong> A lot of cybersecurity work involves compliance, auditing, and policies.<\/p>\n\n\n\n<p><strong>Artifact 1 \u2013<\/strong> Security Policy or Risk Assessment Paper<\/p>\n\n\n\n<ul>\n<li>analysis of the social meaning and impact of cybersecurity-related techn<strong>i<\/strong>cal systems<strong>.<\/strong><\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/annotated-The20Analytical20Paper20-20Anthony20Gomez-Reyes.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of A1.\"><\/object><a id=\"wp-block-file--media-f2fc17ec-8974-4187-b42f-377b1992fe38\" href=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/annotated-The20Analytical20Paper20-20Anthony20Gomez-Reyes.pdf\">A1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/annotated-The20Analytical20Paper20-20Anthony20Gomez-Reyes.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f2fc17ec-8974-4187-b42f-377b1992fe38\">Download<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 2 \u2013 Access Control or Authentication Assignment<\/strong><\/h3>\n\n\n\n<ul>\n<li>human element is a critical component of cybersecurity<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/annotated-Anthony20Gomez-Reyes20-20Article20Review205EN22028CYSE201S29-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of A2.\"><\/object><a id=\"wp-block-file--media-a120d8d9-28ba-4b15-9213-140cc4c611eb\" href=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/annotated-Anthony20Gomez-Reyes20-20Article20Review205EN22028CYSE201S29-1.pdf\">A2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/annotated-Anthony20Gomez-Reyes20-20Article20Review205EN22028CYSE201S29-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a120d8d9-28ba-4b15-9213-140cc4c611eb\">Download<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 3 \u2013 <\/strong>Interdisciplinary Project Showing Cyber Ethics<\/h3>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/annotated-Anthony20Gomez-Reyes20-20Career20Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of ethic.\"><\/object><a id=\"wp-block-file--media-cd1e00db-43a2-4c5d-a8dc-cdde589a5676\" href=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/annotated-Anthony20Gomez-Reyes20-20Career20Paper.pdf\">ethic<\/a><a href=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-content\/uploads\/sites\/32436\/2025\/12\/annotated-Anthony20Gomez-Reyes20-20Career20Paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-cd1e00db-43a2-4c5d-a8dc-cdde589a5676\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Skill 1: Cybersecurity Technical Skills (Threat Analysis &amp; Network Security) Description: Understanding threats, vulnerabilities, and basic defense methods.Why it works: Every job ad for cybersecurity wants threat awareness, logs analysis, and understanding of cyberattacks. Artifact 1 \u2013 Network Security Assignment Artifact 2 \u2013 NIST or Cybersecurity Framework Summary Artifact 3 \u2013 Cybertrespass Research Paper Skill&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/anthony-gomez\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":26132,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-json\/wp\/v2\/users\/26132"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":459,"href":"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-json\/wp\/v2\/pages\/218\/revisions\/459"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/anthony-gomez\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}