{"id":200,"date":"2023-08-05T12:46:51","date_gmt":"2023-08-05T12:46:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/darrenpritchard\/?page_id=200"},"modified":"2023-08-05T15:43:59","modified_gmt":"2023-08-05T15:43:59","slug":"skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/darrenpritchard\/skills\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<p class=\"has-larger-font-size\">Network Security<\/p>\n\n\n\n<p class=\"has-large-font-size\">Artifact I &#8211; Sword vs. Shield<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Assignment-3-lab-report.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-3-lab-report.\"><\/object><a id=\"wp-block-file--media-67b1e857-2e52-455e-9435-51f8d270a941\" href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Assignment-3-lab-report.pdf\">Assignment-3-lab-report<\/a><a href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Assignment-3-lab-report.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-67b1e857-2e52-455e-9435-51f8d270a941\">Download<\/a><\/div>\n\n\n\n<p class=\"has-large-font-size\">Artifact II &#8211; Ethical Hacking<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Assignment-4-lab-report.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-4-lab-report.\"><\/object><a id=\"wp-block-file--media-7cd59e2e-c528-4c24-a021-d92746ef68af\" href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Assignment-4-lab-report.pdf\">Assignment-4-lab-report<\/a><a href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Assignment-4-lab-report.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7cd59e2e-c528-4c24-a021-d92746ef68af\">Download<\/a><\/div>\n\n\n\n<p class=\"has-large-font-size\">Artifact III &#8211; Password Cracking<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Assignment-5-lab-report-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-5-lab-report-1.\"><\/object><a id=\"wp-block-file--media-c46fe71c-482b-480c-9899-1ea96676792c\" href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Assignment-5-lab-report-1.pdf\">Assignment-5-lab-report-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Assignment-5-lab-report-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c46fe71c-482b-480c-9899-1ea96676792c\">Download<\/a><\/div>\n\n\n\n<p class=\"has-larger-font-size\">Research<\/p>\n\n\n\n<p class=\"has-large-font-size\">Artifact IV &#8211; An Overview of Machine Learning in Intrusion Detection Systems<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/cs562-term-paper-formatted.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of cs562-term-paper-formatted.\"><\/object><a id=\"wp-block-file--media-5141e8e5-e034-4b1d-b309-c4ff2af136b9\" href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/cs562-term-paper-formatted.pdf\">cs562-term-paper-formatted<\/a><a href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/cs562-term-paper-formatted.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5141e8e5-e034-4b1d-b309-c4ff2af136b9\">Download<\/a><\/div>\n\n\n\n<p class=\"has-large-font-size\">Artifact V &#8211; Risks and Vulnerabilities of AI in Financial Institutions<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Research-Paper-FINAL.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Research-Paper-FINAL.\"><\/object><a id=\"wp-block-file--media-6fb0436c-79e6-414d-a862-e40434d582c0\" href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Research-Paper-FINAL.pdf\">Research-Paper-FINAL<\/a><a href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Research-Paper-FINAL.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6fb0436c-79e6-414d-a862-e40434d582c0\">Download<\/a><\/div>\n\n\n\n<p class=\"has-large-font-size\">Artifact VI &#8211; Security Policy for an Information System<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Short-Essay-2-CYSE-300.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Short-Essay-2-CYSE-300.\"><\/object><a id=\"wp-block-file--media-8a1e01b8-493c-4bf3-a9c8-6cc722a539aa\" href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Short-Essay-2-CYSE-300.pdf\">Short-Essay-2-CYSE-300<\/a><a href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Short-Essay-2-CYSE-300.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8a1e01b8-493c-4bf3-a9c8-6cc722a539aa\">Download<\/a><\/div>\n\n\n\n<p class=\"has-larger-font-size\">Written Communication<\/p>\n\n\n\n<p class=\"has-large-font-size\">Artifact VII &#8211; The SolarWinds Hack: How, Why, and What Could\u2019ve Prevented it<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Short-Essay-1-CYSE-300.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Short-Essay-1-CYSE-300.\"><\/object><a id=\"wp-block-file--media-90dc8ab5-3d03-412c-b446-a6f15eb835d8\" href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Short-Essay-1-CYSE-300.pdf\">Short-Essay-1-CYSE-300<\/a><a href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/Short-Essay-1-CYSE-300.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-90dc8ab5-3d03-412c-b446-a6f15eb835d8\">Download<\/a><\/div>\n\n\n\n<p class=\"has-large-font-size\">Artifact VIII &#8211; Ethical Reflections on Google Street View: A Deontological Analysis<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/deontology-google-street-view-essay.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of deontology-google-street-view-essay.\"><\/object><a id=\"wp-block-file--media-51476bf3-de35-4006-81d0-8f48d664bb30\" href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/deontology-google-street-view-essay.pdf\">deontology-google-street-view-essay<\/a><a href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/deontology-google-street-view-essay.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-51476bf3-de35-4006-81d0-8f48d664bb30\">Download<\/a><\/div>\n\n\n\n<p class=\"has-large-font-size\">Artifact IX &#8211; Effectiveness of Diceware Passwords: A Security Review<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/cyse250-research-paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of cyse250-research-paper.\"><\/object><a id=\"wp-block-file--media-a2846d26-dbf3-4a0b-92a5-751348a4bff9\" href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/cyse250-research-paper.pdf\">cyse250-research-paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-content\/uploads\/sites\/33517\/2023\/08\/cyse250-research-paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a2846d26-dbf3-4a0b-92a5-751348a4bff9\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Network Security Artifact I &#8211; Sword vs. Shield Artifact II &#8211; Ethical Hacking Artifact III &#8211; Password Cracking Research Artifact IV &#8211; An Overview of Machine Learning in Intrusion Detection Systems Artifact V &#8211; Risks and Vulnerabilities of AI in Financial Institutions Artifact VI &#8211; Security Policy for an Information System Written Communication Artifact VII [&hellip;]<\/p>\n","protected":false},"author":26784,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-json\/wp\/v2\/pages\/200"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-json\/wp\/v2\/users\/26784"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-json\/wp\/v2\/comments?post=200"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-json\/wp\/v2\/pages\/200\/revisions"}],"predecessor-version":[{"id":235,"href":"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-json\/wp\/v2\/pages\/200\/revisions\/235"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/darrenpritchard\/wp-json\/wp\/v2\/media?parent=200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}