{"id":199,"date":"2025-04-19T06:14:13","date_gmt":"2025-04-19T06:14:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/chrishossele\/?page_id=199"},"modified":"2025-04-29T02:35:15","modified_gmt":"2025-04-29T02:35:15","slug":"skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/chrishossele\/skills\/","title":{"rendered":"Skill #1"},"content":{"rendered":"\n<p class=\"has-larger-font-size\"><strong>Writing Proficiency<\/strong><\/p>\n\n\n\n<p class=\"has-small-font-size\">When I developed this skill, I was significantly given the strengths after taking my IDS300W class, where it showed me better ways to look at a conclusion in an interdisciplinary viewpoint. This was applied to three essays that I will use for my artifacts, such as my IDS300W final essay, my CYSE280 final essay, and my CYSE426 final essay. These essays will support my conclusion to me having a proficient skill in writing.<\/p>\n\n\n\n<p><strong>Artifact #1 <\/strong>IDS300W Final Essay &#8220;Understanding the Most Effective Cybersecurity Techniques and Methodologies&#8221;<\/p>\n\n\n\n<p>This essay as an artifact describes my ability to support a statement by using interdisciplinary viewpoints such as history, psychology, and information technology.  <\/p>\n\n\n<b>PDF Embedder requires a url attribute<\/b>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-content\/uploads\/sites\/38964\/2025\/04\/annotated-Understanding20the20Most20Effective20Cybersecurity20Techniques20and20Methodologies20-20Christopher20Hossele.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Understanding20the20Most20Effective20Cybersecurity20Techniques20and20Methodologies20-20Christopher20Hossele.docx.\"><\/object><a id=\"wp-block-file--media-3675375d-1f76-4af8-b56c-5f9c308c080c\" href=\"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-content\/uploads\/sites\/38964\/2025\/04\/annotated-Understanding20the20Most20Effective20Cybersecurity20Techniques20and20Methodologies20-20Christopher20Hossele.docx.pdf\">annotated-Understanding20the20Most20Effective20Cybersecurity20Techniques20and20Methodologies20-20Christopher20Hossele.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-content\/uploads\/sites\/38964\/2025\/04\/annotated-Understanding20the20Most20Effective20Cybersecurity20Techniques20and20Methodologies20-20Christopher20Hossele.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3675375d-1f76-4af8-b56c-5f9c308c080c\">Download<\/a><\/div>\n\n\n\n<p><strong>Artifact #2 <\/strong>CYSE280 Final Paper &#8220;The Development of Windows Systems and their Security&#8221;<\/p>\n\n\n\n<p>This paper tested my writing skills in order to chronologically discuss the developments of windows security develops over the many decades of security.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-content\/uploads\/sites\/38964\/2025\/04\/annotated-The20Development20of20Windows20Systems20and20their20Security.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-The20Development20of20Windows20Systems20and20their20Security.\"><\/object><a id=\"wp-block-file--media-e3cd9f65-9cd8-40a4-b8d3-ae2072a0b67b\" href=\"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-content\/uploads\/sites\/38964\/2025\/04\/annotated-The20Development20of20Windows20Systems20and20their20Security.pdf\">annotated-The20Development20of20Windows20Systems20and20their20Security<\/a><a href=\"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-content\/uploads\/sites\/38964\/2025\/04\/annotated-The20Development20of20Windows20Systems20and20their20Security.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e3cd9f65-9cd8-40a4-b8d3-ae2072a0b67b\">Download<\/a><\/div>\n\n\n<b>PDF Embedder requires a url attribute<\/b>\n\n\n<p><strong>Artifact #3<\/strong> CYSE426 Final Paper &#8220;How can we Build a Safer Cyber World?&#8221;<\/p>\n\n\n\n<p>This essay helped me write about the different methodologies of cybersecurity techniques and policies to develop a more secure cyberspace. <\/p>\n\n\n<b>PDF Embedder requires a url attribute<\/b>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-content\/uploads\/sites\/38964\/2025\/04\/annotated-How20can20we20Build20a20Safer20Cyber20World20-20Christopher20Hossele20Final20Term20Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-How20can20we20Build20a20Safer20Cyber20World20-20Christopher20Hossele20Final20Term20Paper.\"><\/object><a id=\"wp-block-file--media-1049745d-f3bb-4814-b517-167ae219566b\" href=\"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-content\/uploads\/sites\/38964\/2025\/04\/annotated-How20can20we20Build20a20Safer20Cyber20World20-20Christopher20Hossele20Final20Term20Paper.pdf\">annotated-How20can20we20Build20a20Safer20Cyber20World20-20Christopher20Hossele20Final20Term20Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-content\/uploads\/sites\/38964\/2025\/04\/annotated-How20can20we20Build20a20Safer20Cyber20World20-20Christopher20Hossele20Final20Term20Paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-1049745d-f3bb-4814-b517-167ae219566b\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Writing Proficiency When I developed this skill, I was significantly given the strengths after taking my IDS300W class, where it showed me better ways to look at a conclusion in an interdisciplinary viewpoint. This was applied to three essays that I will use for my artifacts, such as my IDS300W final essay, my CYSE280 final [&hellip;]<\/p>\n","protected":false},"author":25304,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-json\/wp\/v2\/pages\/199"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-json\/wp\/v2\/users\/25304"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-json\/wp\/v2\/comments?post=199"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-json\/wp\/v2\/pages\/199\/revisions"}],"predecessor-version":[{"id":228,"href":"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-json\/wp\/v2\/pages\/199\/revisions\/228"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/chrishossele\/wp-json\/wp\/v2\/media?parent=199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}