Skill 1 – Technical Skills
Technical skills are a core part of working in the cybersecurity field and being successfully capable of protecting company assets against cyberthreats. Technical skills takes time to develop, but rewarding through time and patience. These first three artifacts represent the journey I have made to develop these technical skills into becoming a core part of who I am as I advance on my cybersecurity path. My technical skills shows the potential I have, handling tools essential to cybersecurity and being an effective piece in the workplace.
Artifact 1: CYSE 250 – Milestone Project
Creech-CYSE-250-Milestone-1-ProjectThis project was a way for me to demonstrate my coding abilities that were learned over the semester through the idea of socket programming, establishing a connection between two devices. The program I made was related to food recipes, where the user can login into the database. They can then request directions of a recipe and its corresponding calories. It shows the current the knowledge and potential I possess in the technicalities of cybersecurity, whether it may be coding or other advanced topics such as networking.
Artifact 2: CYSE 301 Assignment #2 – Traffic Tracing and Sniffing
CYSE-301-Assignment-2In this assignment, my technical skills were expanded to include networking knowledge. I had to demonstrate my networking capabilities by using Wireshark, a network traffic monitor, to analyze the different kinds of activity that may be sifted through a company network. It also showcases my understanding of how programs like Wireshark are used to intercept sensitive information like usernames and passwords.
Artifact 3: CYSE 301 Assignment #3 – Sword vs. Shield
Assignment-3-Sword-vs.-Shield-Fall2024-1-1_compressedJust like the second artifact, this tested my networking technical skills through conducting network scans, firewall configurations, and how the rules affect networks. It also shows how anyone from companies to normal individuals on how they can better protect their network through configuring their firewall to block certain traffic that may be regarded as suspicious.
Skill 2 – Communication
Communication is the second skill I consider a strength, as it is another crucial skill to have in a cybersecurity workplace. Communication between yourself and your team is essential to ensuring security of company assets, especially in the wake of cyberattacks. These next three artifacts supporting my communication skill represent how I could use it to provide optimality and coordination, ensuring that our team is effective and demonstrates the right chemistry to swiftly eliminate threats.
Artifact 1: IT 201 Critical Thinking Assignment
Creech-IT-201-Critical-ThinkingThis assignment paper details my entrepreneurial perspective of cybersecurity and how I would effectively use communication to develop a successful product. In this case, the products are laptops called QuikTech Auroras. I would communicate to my team, gathering ideas of how this could be successfully launched on the market. Once the laptops are developed, we would communicate our opinions, voicing any weak-points in the infrastructure and simulating a realistic customer experience to attain appeal.
Artifact 2: CYSE 425W Midterm Assignment
Creech-Midterm-AssignmentThis paper analyzes the United States National Cybersecurity Strategy of March 2023, or NCS, and how it serves as a roadmap for cybersecurity companies to better defend against cyberattacks. It provides a guidance to the best framework that myself and the team can utilize to defend against these threats.
Artifact 3: CYSE 201S Career Paper
Creech-Career-PaperThis provides my examinations on how a security analyst needs to properly apply their skills to the social environment. It involves discussing strategies and disaster recovery plans between other fellow employees. They also serve as a mentor, providing knowledge to employees about how to handle certain situations. Since cybersecurity analysts are a very important part of the team, my communication skill would be crucial to serving my best capabilities in the role.
Skill 3 – Critical Thinking
The last of my most marketable skills, critical thinking, is necessary to have during important moments such as data breach aftermaths and formulating security plans/frameworks. The most optimal practices and actions in cybersecurity involve critical thinking, which is why these final three artifacts will show why my critical thinking skill is essential.
Artifact 1: CRJS 310 White Paper Writing Assignment
Creech-White-PaperThis paper analyzes the dangers of data breaches, disaster recovery plans, and prevention tactics need to be made to lessen companies from becoming victims. All of these tasks have to be conducted through communication with other employees to strengthen infrastructure and even customers, providing assurance to them that their data protection is top priority.
Artifact 2: CYSE 280 Research Paper Submission
Creech-Research-PaperThis paper is similar to the last artifact, but details the dangers of ransomware. Ransomware is an ongoing crisis in the online world as countless victims have been extorted of their personal information and money. Optimal frameworks have been developed by various companies to tackle the threat. They were developed through team discussions and employee education, which means that communication is important amongst the myself and the employees to properly implement the framework.
Artifact 3: CYSE 300 Short Research Paper #2
Creech-Short-Research-Paper-2The paper analyzes the important of communication between employees in order to develop effective security policies for protecting sensitive information. Communicating with employees about developing a security policy that incorporates solutions for the five issues will result in optimal protection of company assets.