Reflection on Skills, Artifacts, and Interdisciplinary Learning
IntroductionWhen I began my studies in cybersecurity, I thought my success would depend only on technical skill. I believed that learning how to configure systems, write secure code, and stop attacks was enough. Over time, I have learned that technical ability is only part of the picture. My degree has taught me that communication, creative problem-solving, and awareness of people’s behavior are just as important as the tools we use to secure networks. This is where interdisciplinarity becomes powerful.
In this reflection, I will examine three skills I have developed: Network Security & Threat Prevention, Entrepreneurial Thinking & Innovation, and Security Awareness & User Education. For each skill, I will discuss three artifacts that show my progress. I will connect these skills to job requirements in my field and explain how they demonstrate my readiness for a professional role. I will also explain how lessons from multiple disciplines shaped the way I approach problems. My goal is to show not just what I have done, but how I have grown into a more capable and adaptable professional.
Degree Outcomes and Interdisciplinary Approach
My degree outcomes emphasize combining knowledge from different disciplines to solve real-world problems. In cybersecurity, this means understanding not only technology, but also human behavior, business needs, and ethical responsibility. I have drawn from computer science, business, communication, and even psychology to build a complete skill set.
This approach is supported by the concept of interdisciplinarity, which Repko and Szostak (2021) define as integrating insights from multiple disciplines to produce a more comprehensive understanding of complex problems. Security threats are complex problems. They involve technology, human decision-making, legal frameworks, and organizational priorities. Without an interdisciplinary mindset, it is easy to create solutions that work in theory but fail in practice.
Skill 1: Network Security & Threat PreventionOverview
Network security is the foundation of digital safety. Every piece of information that moves across a network can be intercepted, altered, or stolen if not protected. This skill is central to nearly every cybersecurity job description. Employers expect professionals to understand threats, design defenses, and respond quickly when something goes wrong.
In developing this skill, I learned to see networks as living systems that require constant monitoring and improvement. I also learned that prevention is more effective than reaction. My three artifacts for this skill, a Network Security Plan, a Packet Analysis Report, and a Simulated Network Defense Project, each show a different part of that process.
Artifact 1: Network Security PlanThis plan was a detailed blueprint for securing a medium-sized organization’s internal network. It included firewall rules, intrusion detection systems, and access control measures. I also addressed physical security and employee training.
Creating this plan required knowledge of network architecture, security protocols, and risk assessment. I drew on networking concepts from computer science and risk management approaches from business studies. The final document balanced technical depth with clear communication so that both technical staff and management could understand the recommendations.
Artifact 2: Packet Analysis ReportIn this lab exercise, I used Wireshark to capture live network traffic and identify suspicious patterns. I analyzed normal behavior first, then applied filters to detect anomalies such as repeated failed logins and DNS requests to suspicious domains.
This artifact shows my ability to detect threats in real time. It also shows how technical work connects to communication. A report like this must translate complex data into clear findings for non-technical stakeholders. As Whitman and Mattord (2022) note, effective security professionals must “communicate the nature and impact of threats in a way that supports decision-making” (p. 213).
Artifact 3: Simulated Network Defense Project
In this simulation, I was tasked with defending a virtual network under active attack. I identified vulnerabilities, applied patches, and configured defenses while the simulation measured my speed and effectiveness.
This project reinforced the need for quick thinking under pressure. It also highlighted the importance of preparation. Without the foundational skills learned earlier, it would have been difficult to respond effectively. As Stallings (2021) points out, layered defense strategies are only as good as the speed and accuracy with which they are applied.
Connection to Career Readiness
These artifacts align directly with job postings for roles like Network Security Analyst and SOC Analyst. Employers value professionals who can design defenses, monitor traffic, and respond to incidents. My experience with both planning and hands-on defense shows that I can meet those expectations.
Skill 2: Entrepreneurial Thinking & Innovation
Overview
Entrepreneurial thinking is about finding opportunities, designing creative solutions, and turning them into reality. This is valuable in cybersecurity because threats change quickly. Solutions must be innovative to keep pace.
My work in the CPD 494 Entrepreneurship in Cybersecurity course developed this skill. The three artifacts here, a Design Thinking Discussion Post, an Opportunity Identification Discussion, and a Self-Evaluation of Growth, each show my ability to think beyond technical fixes.
Artifact 1: Design Thinking Discussion PostThis discussion explored how the five stages of design thinking, empathize, define, ideate, prototype, and test, could be applied to cybersecurity. I proposed creating a phishing-awareness tool tailored for small businesses, starting with understanding their specific challenges.
This artifact shows how human-centered design can make security solutions more effective. Brown (2009) explains that design thinking “starts with the needs of people” and works backward to find solutions that fit their lives. This approach ensures that tools are not just functional, but also usable.
Artifact 2: Opportunity Identification DiscussionHere, I analyzed a market gap for affordable vulnerability scanning tools for nonprofits. I proposed a subscription-based model with built-in staff training. This combined my technical knowledge with business strategy.
Identifying and validating opportunities is critical in any field. In cybersecurity, it can lead to products and services that address underserved segments of the market.
Artifact 3: Self-Evaluation of Growth
This end-of-course reflection documented how my perspective on entrepreneurship had evolved. I recognized that my role as a cybersecurity professional is not only to secure systems but also to innovate responsibly.
Ethics are a key part of innovation. Drucker (1985) emphasizes that innovation must be purposeful and aimed at creating value without causing harm.
Connection to Career ReadinessMany cybersecurity job postings now list “ability to innovate” as a desirable skill. This applies in roles involving product development, consulting, and leadership. My entrepreneurial training shows I can bring fresh ideas to security challenges.
Skill 3: Security Awareness & User EducationOverview
Technical defenses fail if people are not aware of threats. Many attacks, like phishing, target human behavior. Security Awareness & User Education is about turning users into a line of defense.
The three artifacts for this skill, a Phishing Awareness Poster, a Cybersecurity Best Practices Guide, and a Security Training Program Diagram, show different ways to communicate with and train users.
Artifact 1: Phishing Awareness PosterThis poster uses visuals and short text to teach users how to recognize phishing emails. It highlights warning signs like suspicious sender addresses and urgent requests for personal information.
Visual communication is a proven way to raise awareness quickly. As Bada et al. (2019) note, awareness campaigns are most effective when they are simple, targeted, and repeated.
Artifact 2: Cybersecurity Best Practices Guide
This guide provides everyday steps for staying safe online. It covers strong passwords, multi-factor authentication, software updates, and cautious behavior with links and attachments.
Writing this guide reinforced my ability to communicate without jargon. It also showed the importance of tailoring content to a non-technical audience.
Artifact 3: Security Training Program Diagram
This diagram outlines a continuous training process. It starts with onboarding, includes monthly tips and phishing simulations, and ends with regular refreshers and feedback loops.
The diagram reflects my understanding that training is not a one-time event. It must be ongoing to stay effective.
Connection to Career Readiness
Security awareness roles exist in many organizations, especially those with compliance requirements. My ability to create training materials and structure programs adds value in any cybersecurity position.
Lessons from Interdisciplinary Learning
Each of these skills draws on more than one discipline. Network security blends computer science with risk management. Entrepreneurial thinking merges technical knowledge with business strategy. Security awareness combines cybersecurity with communication and education.
This interdisciplinary approach has given me flexibility. I can move between technical and non-technical tasks. I can work with engineers, managers, and end users. I can adapt to different environments and challenges.
Conclusion
Reflecting on my work shows how far I have come. I have built strong technical skills, but I have also learned to innovate and communicate effectively. My artifacts demonstrate my readiness for roles that require both depth and breadth.
Interdisciplinarity has been key to this growth. By integrating ideas from multiple fields, I can design solutions that are practical, ethical, and sustainable. This makes me not only a better cybersecurity professional, but also a more valuable contributor to any organization.
I will continue to build on these skills. My next goals are to deepen my technical expertise, expand my leadership abilities, and stay active in professional communities. Cybersecurity will keep evolving. I intend to evolve with it.
References
Bada, M., Sasse, A. M., & Nurse, J. R. C. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672. https://doi.org/10.48550/arXiv.1901.02672
Brown, T. (2009). Change by design: How design thinking creates new alternatives for business and society. Harper Business.
Drucker, P. F. (1985). Innovation and entrepreneurship: Practice and principles. Harper & Row.
Repko, A. F., & Szostak, R. (2021). Interdisciplinary research: Process and theory (4th ed.). SAGE Publications.
Stallings, W. (2021). Network security essentials: Applications and standards (7th ed.). Pearson.
Whitman, M. E., & Mattord, H. J. (2022). Principles of information security (7th ed.). Cengage Learning.