{"id":33,"date":"2026-02-06T23:15:39","date_gmt":"2026-02-06T23:15:39","guid":{"rendered":"http:\/\/totesa.website\/student\/?page_id=33"},"modified":"2026-03-10T19:20:30","modified_gmt":"2026-03-10T19:20:30","slug":"skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/skills\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<p>This page highlights the technical and professional skills that I have developed during my cybersecurity program at Old Dominion University. These skills include work habits, communication skills, technical knowledge and experience with cybersecurity. The artifacts on this page demonstrate examples of coursework and projects that helped me develop these skills.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Essential Work Habits<\/h2>\n\n\n\n<p>I developed many strong work habits during my cybersecurity program that help me approach cyber challenges in a structured way. Attention to detail, analytical thinking and the ability to solve complex technical programs are key requirements in cybersecurity work.<\/p>\n\n\n\n<p><strong>Example Artifact: Phishing URL Detection Using Machine Learning<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-content\/uploads\/sites\/40654\/2026\/03\/Technical-Report-Jaden-Lewis.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Technical-Report-Jaden-Lewis.\"><\/object><a id=\"wp-block-file--media-d5db94dd-5dee-46c4-b386-12670b19123f\" href=\"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-content\/uploads\/sites\/40654\/2026\/03\/Technical-Report-Jaden-Lewis.pdf\">Technical-Report-Jaden-Lewis<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-content\/uploads\/sites\/40654\/2026\/03\/Technical-Report-Jaden-Lewis.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d5db94dd-5dee-46c4-b386-12670b19123f\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Soft Skills<\/h2>\n\n\n\n<p>Cybersecurity professionals are also required to communicate complex technical issues clearly and at times in a non-technical way. Through presentations, written assignments and group projects, I was able to develop communication and collaboration skills that are important in the field of cybersecurity.<\/p>\n\n\n\n<ul>\n<li>Policy Analysis<\/li>\n\n\n\n<li>Written communication for technical reports<\/li>\n\n\n\n<li>Presentation skills through class projects<\/li>\n\n\n\n<li>Collaboration in group assignments<\/li>\n<\/ul>\n\n\n\n<p><strong>Example Artifact: Policy Analysis Paper involving ethical implications for digital self-defense<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-content\/uploads\/sites\/40654\/2026\/03\/Policy-Analysis-Paper-1-Jaden-Lewis.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Policy-Analysis-Paper-1-Jaden-Lewis.\"><\/object><a id=\"wp-block-file--media-731f58ba-0b0e-4919-a6cc-2a2f6061ff5a\" href=\"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-content\/uploads\/sites\/40654\/2026\/03\/Policy-Analysis-Paper-1-Jaden-Lewis.pdf\">Policy-Analysis-Paper-1-Jaden-Lewis<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-content\/uploads\/sites\/40654\/2026\/03\/Policy-Analysis-Paper-1-Jaden-Lewis.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-731f58ba-0b0e-4919-a6cc-2a2f6061ff5a\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Solid Technical Foundation<\/h2>\n\n\n\n<p>Throughout my coursework I have developed a solid technical foundation in networking, operating systems and programming. These skills are key for understanding how systems operate and how they can be protected as well as how to protect them from cyber threats.<\/p>\n\n\n\n<ul>\n<li>Understanding operating systems and networking<\/li>\n\n\n\n<li>Programming experience in Python<\/li>\n\n\n\n<li>Understanding firewalls and Intrusion Detection Systems<\/li>\n<\/ul>\n\n\n\n<p><strong>Example Artifact: Active Reconnaissance and Vulnerability Scanning<\/strong> <br>CYSE450 Ethical Hacking and Penetration Testing<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-content\/uploads\/sites\/40654\/2026\/03\/Lab-3-Jaden-Lewis.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-3-Jaden-Lewis.\"><\/object><a id=\"wp-block-file--media-3ea62f4f-7850-4e24-872c-d95d62c49dcb\" href=\"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-content\/uploads\/sites\/40654\/2026\/03\/Lab-3-Jaden-Lewis.pdf\">Lab-3-Jaden-Lewis<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-content\/uploads\/sites\/40654\/2026\/03\/Lab-3-Jaden-Lewis.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3ea62f4f-7850-4e24-872c-d95d62c49dcb\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Detailed Knowledge of Key Technologies<\/h2>\n\n\n\n<p>I have gained knowledge to a variety of technologies used to manage, protect and analyze computer systems and networks throughout my cybersecurity program. These technologies are important tools for cybersecurity.<\/p>\n\n\n\n<p><strong>Example Artifact: Penetration Testing for Windows<\/strong><\/p>\n\n\n\n<ul>\n<li>Internal Kali<\/li>\n\n\n\n<li>pfSense VM<\/li>\n\n\n\n<li>Windows XP<\/li>\n\n\n\n<li>Windows Server 2022<\/li>\n\n\n\n<li>Windows 7<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-content\/uploads\/sites\/40654\/2026\/03\/Lab-Assignment4-Jaden-Lewis.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-Assignment4-Jaden-Lewis.\"><\/object><a id=\"wp-block-file--media-83b6ccf8-03f1-400e-8faa-b7191b1ab879\" href=\"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-content\/uploads\/sites\/40654\/2026\/03\/Lab-Assignment4-Jaden-Lewis.pdf\">Lab-Assignment4-Jaden-Lewis<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-content\/uploads\/sites\/40654\/2026\/03\/Lab-Assignment4-Jaden-Lewis.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-83b6ccf8-03f1-400e-8faa-b7191b1ab879\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This page highlights the technical and professional skills that I have developed during my cybersecurity program at Old Dominion University. These skills include work habits, communication skills, technical knowledge and experience with cybersecurity. The artifacts on this page demonstrate examples of coursework and projects that helped me develop these skills. Essential Work Habits I developed&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/skills\/\">Read More<\/a><\/div>\n","protected":false},"author":22497,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-json\/wp\/v2\/pages\/33"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-json\/wp\/v2\/users\/22497"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-json\/wp\/v2\/comments?post=33"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-json\/wp\/v2\/pages\/33\/revisions"}],"predecessor-version":[{"id":267,"href":"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-json\/wp\/v2\/pages\/33\/revisions\/267"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyberportfolio2026\/wp-json\/wp\/v2\/media?parent=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}