Throughout my academic journey in the Cybersecurity program at Old Dominion University, I have acquired a diverse skill set that includes technical research, cybersecurity fundamentals, and ethical hacking. These skills were developed through an interdisciplinary curriculum that combined computer science, law and ethics, policy analysis, and cybersecurity. The various courses I completed allowed me to approach problems from multiple angles and enhanced my ability to adapt when faced with challenges. The artifacts in my ePortfolio highlight my growth in these areas and demonstrate how my academic experiences have prepared me for a career in cybersecurity.
Technical Research and Development
One of the skills I acquired during my degree program was the ability to do technical research and development. My coursework and research assignments required me to acquire a deep knowledge of complex topics, analyze cutting-edge technologies, and examine cybersecurity issues. The interdisciplinary nature of this skill stems from the integration of technical expertise, critical thinking, and policy analysis.
VICEROY Neural Network Training Research Project
One of my most significant accomplishments was the VICEROY research project on neural network training using Python. As part of a team of three, I contributed to dataset preprocessing, model architecture design, and accuracy analysis. The many hours of work we did culminate in a presentation at the 2023 COVA CCI Cybersecurity Education & Research Conference. This project allowed for a lot of personal development in multiple areas, such as teamwork, leadership, and coding skills. Prior to this project, I had no experience in Python, and had to work hard to acquire the knowledge needed to complete the assignments., Not only did this project enhance my technical skills in Python and machine learning, but it also strengthened my collaborative abilities as we worked together to address challenges. Each of the team members, myself included, was given the opportunity to be the rotating team leader and was tasked with delegating work and presenting our findings for that week to our mentor. My prior coursework in programming and data structures provided the foundation necessary to succeed in this project. My years of working in retail provided me with the foundation needed to work as part of a team that can manage itself.
Research Paper on Cyber Incidents
In CYSE280, I researched and analyzed major cyber incidents, such as Stuxnet, WannaCry, and SolarWind. This assignment required me to evaluate the technical, political, and ethical dimensions of cybersecurity attacks and then list the appropriate preventative measures. Drawing on concepts from both cybersecurity strategy and international relations, I developed a comprehensive understanding of how cyber incidents impact global security.
FISMA Policy Analysis Paper
For CYSE425W, I wrote a policy analysis paper on the Federal Information Security Management Act (FISMA). This assignment allowed me to explore the intersection of technical cybersecurity measures and governmental policy. Understanding the rationale behind FISMA’s development and its application to national cybersecurity strategies broadened my perspective on how technical solutions are informed by legal and regulatory frameworks. This assignment will be invaluable as I transition into a professional cybersecurity role where compliance is critical.
Cybersecurity Fundamentals
Another skill acquired during my time at Old Dominion University is having a strong foundation in cybersecurity concepts. I took many courses which each built on the other and branched into new areas until I had knowledge on a wide degree of cybersecurity topics. I took courses that focused on cyberattacks and vulnerabilities, networking, and defense mechanisms, which provided me with the theoretical knowledge and practical skills necessary to analyze and mitigate security threats.
Packet Analysis with Wireshark
In an assignment for my networking course, I used Wireshark to capture and analyze network packets. This exercise demonstrated the importance of packet analysis in identifying suspicious activities and securing network traffic. The practical experience I gained in this assignment was informed by earlier lessons in basic network protocols and security, highlighting the interdisciplinary connection between theory and application.
Cyber Kill Chain Analysis
Another artifact that built up my cybersecurity foundation is my analysis of the cyber kill chain. By breaking down each stage and creating a real-world scenario involving a rootkit attack, I demonstrated my ability to apply theory to practical cybersecurity scenarios. This assignment reinforced the importance of understanding attacker methodologies to develop effective defense strategies.
Malware Analysis
As part of CYSE 450, I analyzed Mirai and VIPKeylogger malware samples. This exercise required me to dissect the functionality of each malware type and compare their attack vectors. By taking knowledge from earlier coursework in ethical hacking and malware analysis, I was able to identify key differences in their implications and come up with appropriate cybersecurity defenses. This artifact further shows how an interdisciplinary approach enabled me to integrate technical and analytical skills.
Ethical Hacking
Ethical hacking was another vital area of focus during my studies. Learning to think like an attacker is a vital skill and prepared me to identify vulnerabilities and mitigate risks in real-world systems. This skill is rooted in disciplines such as computer science, ethics, and cybersecurity policy. My ethical hacking courses covered essential concepts and techniques used to identify and mitigate security risks. In particular, my CYSE 450: Ethical Hacking and Penetration Testing course taught me the fundamentals of penetration testing, network security, and vulnerability assessment. CYSE 450 and other courses helped me understand the tools and methodologies used by ethical hackers by approaching cybersecurity problems from a hacker’s point of view while maintaining my ethical responsibilities.
Password Cracking with John the Ripper
In a Linux course I completed an assignment on password cracking using John the Ripper. I used John the Ripper to brute force attack dummy account passwords and gained insight into the vulnerabilities of weak password practices. This assignment underscored the importance of educating users about password security and implementing strong authentication measures.
Steganography Using Kali Linux
In another ethical hacking exercise, I used Kali Linux to embed a secret message into an image through steganography. This assignment deepened my understanding of how bad actors can hide malicious content in plain sight. It also highlighted the need for cybersecurity professionals to remain vigilant against sneaky techniques such as this one. Previous lessons in cryptography and information security theory were used in completing this task.
SQL Injection and XSS Attacks
Lastly, an assignment on web application vulnerabilities allowed me to perform SQL injection and XSS attacks. In this assignment, I bypassed login screens, created backdoor accounts, and injected malicious scripts. This demonstrated the potential risks posed by insecure web applications. This exercise emphasized the importance of secure coding practices and improved my understanding of how attackers exploit vulnerabilities.
Conclusion
The interdisciplinary nature of my coursework has been central to my growth as a cybersecurity professional. Each course contained a mixture of computer science, ethics, and hands-on technical applications. Through my courses, I developed a comprehensive understanding of the field and its challenges. Courses like IDS 300W (Interdisciplinary Research, Process, and Theory) were particularly valuable in teaching me to think critically across disciplines. This ability to draw connections between diverse areas of study will be essential as I go into the field of cybersecurity which requires a mixture of technical, professional, and personal skills.
In reflecting on my academic journey, I recognize the importance of having these interdisciplinary abilities. The three skills I chose to showcase, technical research, cybersecurity fundamentals, and ethical hacking, are not only essential for my career goals but highlight how an interdisciplinary teaching approach can produce well-rounded individuals. As I move forward, I am confident that the knowledge and experiences gained during my degree program will enable me to make meaningful contributions to the cybersecurity field.