{"id":155,"date":"2023-02-04T20:00:30","date_gmt":"2023-02-04T20:00:30","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=155"},"modified":"2025-08-10T02:20:56","modified_gmt":"2025-08-10T02:20:56","slug":"experience-2-2-2-2-2-2-2-2-2-2-2-2-2-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/capa003\/experience-2-2-2-2-2-2-2-2-2-2-2-2-2-2\/","title":{"rendered":"Skills"},"content":{"rendered":"<h1><strong>Work Ethic<\/strong><\/h1>\n\n\n<p>During my academic experience, I&#8217;ve committed myself to my education in both classroom and professional settings. As a full-time student, I valued the insights gained through coursework. While the knowledge I received during my academic career was less practical in terms of hands-on experience, I&#8217;ve obtained a strong foundational understanding of Cybersecurity. Through my experience working as an intern and part-time at Old Dominion University, I was able to practice the disciplines learned in class and apply them to real-world environments. In addition to building strong work ethic skills, my experience taught me adaptability, time management, and grit. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Internship-December-Monthly-Evaluation.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Internship-December-Monthly-Evaluation.\"><\/object><a id=\"wp-block-file--media-f6499ef0-853e-4b9d-a5f3-317bc125118d\" href=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Internship-December-Monthly-Evaluation.pdf\">Internship-December-Monthly-Evaluation<\/a><a href=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Internship-December-Monthly-Evaluation.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f6499ef0-853e-4b9d-a5f3-317bc125118d\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Internship-January-Monthly-Evaluation-.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Internship-January-Monthly-Evaluation-.\"><\/object><a id=\"wp-block-file--media-8e2f195e-b1db-4d31-bcca-5a3bbf861d3f\" href=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Internship-January-Monthly-Evaluation-.pdf\">Internship-January-Monthly-Evaluation-<\/a><a href=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Internship-January-Monthly-Evaluation-.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8e2f195e-b1db-4d31-bcca-5a3bbf861d3f\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Internship-April-Monthly-Evaluation.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Internship-April-Monthly-Evaluation.\"><\/object><a id=\"wp-block-file--media-1e7c3ae3-e0f5-4664-bd68-a7db6d58766b\" href=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Internship-April-Monthly-Evaluation.pdf\">Internship-April-Monthly-Evaluation<\/a><a href=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Internship-April-Monthly-Evaluation.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-1e7c3ae3-e0f5-4664-bd68-a7db6d58766b\">Download<\/a><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Network Security <\/h1>\n\n\n\n<p>I have cultivated strong technical expertise in network analysis and system administration, gaining hands-on experience with tools like Wireshark and Linux-based operating systems. Through my education at ODU, I&#8217;ve gained direct experience in Wireshark capturing, filtering, and and analyzing network traffic through virtual machines such as CyberRange, CCI, and ODU&#8217;s MOVE. I provided a deeper understanding on troublshooting connectivity issues and network security. Through the Linux environment, I&#8217;ve conducted vunrability scans, bash scripts, and created user accounts through a network system. <\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"419\" height=\"195\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXd-7ybJg8FTfyPMrDt7Hj6GIW215cz48MNAnC0pwAg3NHr7a0ZdbBp8i7qn8FgTleAXS44FAp8T7kk5_zO-MXNtwHujgKr6_hi9lQsg2a_kyhCF4lsUhQ434nrDmh577XyrukgVBQ?key=2owS-6u-z95odk3E8I396rq0\"><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"395\" height=\"272\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXdcERYK9YgDK6-qebAfqSXiFneEZ8GZ1Th38xKVmAbdCZrh6h8zWNTurp4brp8VOrN09gQnfMnyo-W3VA-H7a_NtEr3sKQE5Rcq37WetvqBdNUTVGHwvVH_8AT8SKXT9uBmNj1Q?key=J6wux0fqBDVnQG_A2sgs4lVV\"><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"338\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXd4rQtFsJ0dDlGFMTanhS7RjX9a-FrB_sAJe0NzKSxFvvS82ZIoBiDlnCpjAevkqUNx0RoOAicG41mzl3DC4Q8gyZcMfP8hNR9e2LiaY1_H9c0UmV3m76aiMF6bLHEa7gLrE5p0kA?key=XnnIe8iJR8brlceNkco2UHoO\"><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"510\" height=\"295\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXejWcbahfaBmNsIvvyOh5Ut7qsOCFWcQkLQmmjPpKfL-SWSTnW2qOtMSWVcBHx1HRdqQk8rrCm_dYzMX80sev_K-ewtH3b6pBFIa9xMRmBeb9m2ISaVAWtYq8nEAXDvHNlS7KDkCg?key=XnnIe8iJR8brlceNkco2UHoO\"><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"516\" height=\"297\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXeMfFQbhAat9Zam35HuL9jLns2j1H14kBdO4v-T51EVmsFQBH53mN6PRhKOT3ZI1pR2EfL9YiZy18wVSGZqq2mur6yizwAjrdZpH4xLuFtGfllwKjYhvFmn9-tpiwABhILUJm40tg?key=XnnIe8iJR8brlceNkco2UHoO\"><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"305\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXffCsFbtnjq-n9I3bliwTLhLvLuHrXlVpT-OHC_fzryUl25_70l1DtMAD50-xCu6XdZak_KvjTZY9DQka5hokJJeDIPd1m7ksETYwSFQnGaKTEOK8CpgPUE9zSJb0XC7tT1_LeJMw?key=XnnIe8iJR8brlceNkco2UHoO\"><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXf2YmOBvQbq1eeTAICobi6T0s2VfwlPdzZ4Rgo6s_2mLaImzx9nc2YEIoYsFUgJubSMEdBPFPywGxap5ijiCS9302rDUsS64c3wcRDhTKda4Lw_ySBCdqv3stvpPtpnNQdnQX9G?key=XnnIe8iJR8brlceNkco2UHoO\" width=\"624\" height=\"305\"><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Interdisciplinary Skills<\/h1>\n\n\n\n<p>My approach to cybersecurity is grounded in an interdisciplinary framework that combines technical expertise with insights from policy, ethics, and the social sciences. I merge skills in network analysis, system security, and data privacy with an awareness of the human and societal factors influencing cyber threats. This involves exploring the ethical and legal aspects of cybersecurity, assessing the broader implications of surveillance, and using political and behavioral insights to enhance security strategies. My work demonstrates this blend of disciplines, featuring outputs such as network traffic analyses paired with ethical evaluations and policy reviews that link legislative frameworks to practical security applications.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Unraveling-Human-Behaviors-in-Cybersecurity-for-Enhanced-Information-System-Defense.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Unraveling-Human-Behaviors-in-Cybersecurity-for-Enhanced-Information-System-Defense.\"><\/object><a id=\"wp-block-file--media-72e8e84e-68d3-455a-a48d-b1bf91627b78\" href=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Unraveling-Human-Behaviors-in-Cybersecurity-for-Enhanced-Information-System-Defense.pdf\">Unraveling-Human-Behaviors-in-Cybersecurity-for-Enhanced-Information-System-Defense<\/a><a href=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Unraveling-Human-Behaviors-in-Cybersecurity-for-Enhanced-Information-System-Defense.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-72e8e84e-68d3-455a-a48d-b1bf91627b78\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Cyber-Law-406_-Wrighting-Assignment.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Cyber-Law-406_-Wrighting-Assignment.\"><\/object><a id=\"wp-block-file--media-e5d01400-90ed-407a-9939-fe8f49fe6e16\" href=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Cyber-Law-406_-Wrighting-Assignment.pdf\">Cyber-Law-406_-Wrighting-Assignment<\/a><a href=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Cyber-Law-406_-Wrighting-Assignment.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e5d01400-90ed-407a-9939-fe8f49fe6e16\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Human-Factors-in-Cybersecurity.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Human-Factors-in-Cybersecurity.\"><\/object><a id=\"wp-block-file--media-24369558-7779-4e35-b91b-30e63dc0417d\" href=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Human-Factors-in-Cybersecurity.pdf\">Human-Factors-in-Cybersecurity<\/a><a href=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Human-Factors-in-Cybersecurity.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-24369558-7779-4e35-b91b-30e63dc0417d\">Download<br><\/a><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Reflective Essay<\/strong><\/h1>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Reflection-Essay-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Reflection-Essay-1.\"><\/object><a id=\"wp-block-file--media-5c2fb614-086f-4ac7-98e3-5f33d9a28306\" href=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Reflection-Essay-1.pdf\">Reflection-Essay-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/capa003\/wp-content\/uploads\/sites\/32526\/2025\/08\/Reflection-Essay-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5c2fb614-086f-4ac7-98e3-5f33d9a28306\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Work Ethic During my academic experience, I&#8217;ve committed myself to my education in both classroom and professional settings. As a full-time student, I valued the insights gained through coursework. While the knowledge I received during my academic career was less&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/capa003\/experience-2-2-2-2-2-2-2-2-2-2-2-2-2-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":21404,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":"","wds_primary_avhec_catgroup":0},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/capa003\/wp-json\/wp\/v2\/pages\/155"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/capa003\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/capa003\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/capa003\/wp-json\/wp\/v2\/users\/21404"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/capa003\/wp-json\/wp\/v2\/comments?post=155"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/capa003\/wp-json\/wp\/v2\/pages\/155\/revisions"}],"predecessor-version":[{"id":398,"href":"https:\/\/sites.wp.odu.edu\/capa003\/wp-json\/wp\/v2\/pages\/155\/revisions\/398"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/capa003\/wp-json\/wp\/v2\/media?parent=155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}