{"id":149,"date":"2025-08-28T12:09:57","date_gmt":"2025-08-28T12:09:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=149"},"modified":"2025-09-27T14:02:38","modified_gmt":"2025-09-27T14:02:38","slug":"skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dallenids493\/sample-page-2\/skills\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Skill 1: Microsoft Office Software Products (Word, Excel, and PowerPoint)<\/h2>\n\n\n\n<p>Supporting Artifact 1: Research Paper for ITE 119 (Information Literacy)<\/p>\n\n\n\n<p>Brief Description: A research paper on my topic, the economic effects of cyber-attacks in the tech industry. Shows how a research paper should be formatted in American Psychological Association style using Microsoft Word.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/The-Economic-Effects-of-Cyber-Attacks-on-the-Tech-Industry-Research-Paper-PDF.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The-Economic-Effects-of-Cyber-Attacks-on-the-Tech-Industry-Research-Paper-PDF.\"><\/object><a id=\"wp-block-file--media-f3937335-9107-48b3-a16f-a92aaa90801c\" href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/The-Economic-Effects-of-Cyber-Attacks-on-the-Tech-Industry-Research-Paper-PDF.pdf\">The-Economic-Effects-of-Cyber-Attacks-on-the-Tech-Industry-Research-Paper-PDF<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/The-Economic-Effects-of-Cyber-Attacks-on-the-Tech-Industry-Research-Paper-PDF.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f3937335-9107-48b3-a16f-a92aaa90801c\">Download<\/a><\/div>\n\n\n\n<p>Supporting Artifact 2: Excel Spreadsheet and Charts for my Research Topic in ITE 119<\/p>\n\n\n\n<p>Brief Description: A spreadsheet in Microsoft Excel that shows some statistics and a graph related to my research topic for ITE 119. Shows how statistics can be put into a table and used to create presentational graphs using Microsoft Excel.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Topic-Excel-Spreadsheet-Chart-PDF-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Topic-Excel-Spreadsheet-Chart-PDF-1.\"><\/object><a id=\"wp-block-file--media-caa917dc-3550-49a4-9ddf-0db93ec8afe4\" href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Topic-Excel-Spreadsheet-Chart-PDF-1.pdf\">Topic-Excel-Spreadsheet-Chart-PDF-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Topic-Excel-Spreadsheet-Chart-PDF-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-caa917dc-3550-49a4-9ddf-0db93ec8afe4\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Topic-Excel-Spreadsheet-Chart-2-PDF.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Topic-Excel-Spreadsheet-Chart-2-PDF.\"><\/object><a id=\"wp-block-file--media-48b38ae0-17cf-48b7-8671-38c268fab5a6\" href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Topic-Excel-Spreadsheet-Chart-2-PDF.pdf\">Topic-Excel-Spreadsheet-Chart-2-PDF<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Topic-Excel-Spreadsheet-Chart-2-PDF.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-48b38ae0-17cf-48b7-8671-38c268fab5a6\">Download<\/a><\/div>\n\n\n\n<p>Supporting Artifact 3: Research Presentation for ITE 119<\/p>\n\n\n\n<p>Brief Description: A Microsoft PowerPoint presentation on my research topic for ITE 119. Shows how to create a PowerPoint presentation using a research topic.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/08\/David-Allen-10292021-PowerPoint-PDF.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of David-Allen-10292021-PowerPoint-PDF.\"><\/object><a id=\"wp-block-file--media-ac16389d-7f4e-449b-9b99-7e5d5fae28ad\" href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/08\/David-Allen-10292021-PowerPoint-PDF.pdf\">David-Allen-10292021-PowerPoint-PDF<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/08\/David-Allen-10292021-PowerPoint-PDF.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ac16389d-7f4e-449b-9b99-7e5d5fae28ad\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Skill 2: Linux Operating System<\/h2>\n\n\n\n<p>Supporting Artifact 4: Group and User Accounts Assignment<\/p>\n\n\n\n<p>Brief Description: An assignment from CYSE 270 (Linux System for Cybersecurity) about managing user accounts and groups in Kali Linux, a distribution of the Linux operating system. Screenshots with directions for each task were reported on a word document using Microsoft Word. All tasks were performed in a Kali Linux virtual machine.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/08\/Assignment-4-PDF.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-4-PDF.\"><\/object><a id=\"wp-block-file--media-120e099d-51f5-4ada-9e61-19ee3b5696b5\" href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/08\/Assignment-4-PDF.pdf\">Assignment-4-PDF<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/08\/Assignment-4-PDF.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-120e099d-51f5-4ada-9e61-19ee3b5696b5\">Download<\/a><\/div>\n\n\n\n<p>Supporting Artifact 5: File Permissions Assignment<\/p>\n\n\n\n<p>Brief Description: An assignment from CYSE 270 about changing file permissions for users and groups in Kali Linux. Screenshots with directions for each task were reported on a word document using Microsoft Word. All tasks were performed in a Kali Linux virtual machine.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/08\/Assignment-6-PDF-compressed.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-6-PDF-compressed.\"><\/object><a id=\"wp-block-file--media-56d55f6f-d689-4d58-9115-5ab698327132\" href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/08\/Assignment-6-PDF-compressed.pdf\">Assignment-6-PDF-compressed<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/08\/Assignment-6-PDF-compressed.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-56d55f6f-d689-4d58-9115-5ab698327132\">Download<\/a><\/div>\n\n\n\n<p>Supporting Artifact 6: Task Automation Assignment<\/p>\n\n\n\n<p>Brief Description: An assignment from CYSE 270 about automating tasks in Kali Linux. Screenshots with directions for each task were reported on a word document using Microsoft Word. All tasks were performed in a Kali Linux virtual machine.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Assignment-9-PDF.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-9-PDF.\"><\/object><a id=\"wp-block-file--media-17893393-95a3-4eb8-bf35-59cbeb3d9e08\" href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Assignment-9-PDF.pdf\">Assignment-9-PDF<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Assignment-9-PDF.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-17893393-95a3-4eb8-bf35-59cbeb3d9e08\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Skill 3: Network Design<\/h2>\n\n\n\n<p>Supporting Artifact 7: Network Firewalls and VPNs Final Project<\/p>\n\n\n\n<p>Brief Description: The final project for ITN 263 (Internet\/Intranet and E-Commerce Security) that utilizes firewall and VPN solutions for a secure network. Diagrams were created with Cisco Packet Tracer and the report was written using Microsoft Word.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Firewalls-and-VPN-Network-Design-PDF.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Firewalls-and-VPN-Network-Design-PDF.\"><\/object><a id=\"wp-block-file--media-d16f7585-7eeb-4a71-97c3-b2c3c8ec89f2\" href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Firewalls-and-VPN-Network-Design-PDF.pdf\">Firewalls-and-VPN-Network-Design-PDF<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Firewalls-and-VPN-Network-Design-PDF.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d16f7585-7eeb-4a71-97c3-b2c3c8ec89f2\">Download<\/a><\/div>\n\n\n\n<p>Supporting Artifact 8: Network Topology, Addressing, and Application Delivery Project<\/p>\n\n\n\n<p>Brief Description: A project for ITN 262 (Network Communication, Security, and Authentication) that goes over a secure network topology, addressing scheme, and web application delivery methods. Diagrams were created with Cisco Packet Tracer and the report was written using Microsoft Word.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Network-Topology-Addressing-and-Application-Delivery-PDF.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Network-Topology-Addressing-and-Application-Delivery-PDF.\"><\/object><a id=\"wp-block-file--media-e6c9aada-f96e-4050-8e06-bf9b9e0032f8\" href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Network-Topology-Addressing-and-Application-Delivery-PDF.pdf\">Network-Topology-Addressing-and-Application-Delivery-PDF<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Network-Topology-Addressing-and-Application-Delivery-PDF.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e6c9aada-f96e-4050-8e06-bf9b9e0032f8\">Download<\/a><\/div>\n\n\n\n<p>Supporting Artifact 9: Wireless and Wide Area Networking Project<\/p>\n\n\n\n<p>Brief Description: A project for ITN 262 that ensures high security utilizing wireless and wide area networking technology. Diagrams were created with Cisco Packet Tracer and the report was written using Microsoft Word.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Wireless-and-Wide-Area-Networking-PDF.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Wireless-and-Wide-Area-Networking-PDF.\"><\/object><a id=\"wp-block-file--media-3341de1e-5824-46fb-a3d3-ecf304499ed0\" href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Wireless-and-Wide-Area-Networking-PDF.pdf\">Wireless-and-Wide-Area-Networking-PDF<\/a><a href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-content\/uploads\/sites\/39327\/2025\/09\/Wireless-and-Wide-Area-Networking-PDF.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3341de1e-5824-46fb-a3d3-ecf304499ed0\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Skill 1: Microsoft Office Software Products (Word, Excel, and PowerPoint) Supporting Artifact 1: Research Paper for ITE 119 (Information Literacy) Brief Description: A research paper on my topic, the economic effects of cyber-attacks in the tech industry. Shows how a research paper should be formatted in American Psychological Association style using Microsoft Word. Supporting Artifact&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dallenids493\/sample-page-2\/skills\/\">Read More<\/a><\/div>\n","protected":false},"author":29413,"featured_media":0,"parent":120,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-json\/wp\/v2\/pages\/149"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-json\/wp\/v2\/users\/29413"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-json\/wp\/v2\/comments?post=149"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-json\/wp\/v2\/pages\/149\/revisions"}],"predecessor-version":[{"id":340,"href":"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-json\/wp\/v2\/pages\/149\/revisions\/340"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-json\/wp\/v2\/pages\/120"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dallenids493\/wp-json\/wp\/v2\/media?parent=149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}