{"id":320,"date":"2025-04-24T03:40:07","date_gmt":"2025-04-24T03:40:07","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/david-smetek-cyse200tsum\/?page_id=320"},"modified":"2025-04-26T18:21:27","modified_gmt":"2025-04-26T18:21:27","slug":"reflection","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/david-smetek-cyse200tsum\/reflection\/","title":{"rendered":"Reflection"},"content":{"rendered":"\n<p><strong>Reflective Essay: Demonstrating Career Readiness through Interdisciplinary Learning<\/strong><\/p>\n\n\n\n<p> As I look back on my academic journey in the cybersecurity program at Old Dominion University, I realize just how much I\u2019ve grown\u2014not only in my technical abilities, but also in how I think, communicate, and solve problems. This program hasn\u2019t just taught me how to use firewalls or monitor traffic logs; it\u2019s taught me how to think critically, write clearly, and adapt to new challenges. What made this experience so valuable is the interdisciplinary nature of the program. Along the way, I took courses that touched on law, ethics, communication, and technology. These different perspectives helped shape me into someone who doesn\u2019t just understand cybersecurity from a technical point of view but also sees its legal, social, and ethical impacts.<\/p>\n\n\n\n<p>Throughout the program, three skills became central to my development: cybersecurity strategy and monitoring, technical writing and documentation, and professional communication and teamwork. Each of these skills is reflected in the artifacts I\u2019ve included in my portfolio, and each one tells a story of how I learned to connect theory to real-world practice. In this essay, I\u2019ll walk through each skill, share the lessons behind the artifacts, and explain how they\u2019ve helped prepare me for a career in cybersecurity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Cybersecurity Strategy &amp; Monitoring<\/strong><\/p>\n\n\n\n<p>One of the most valuable skills I developed is being able to assess and implement cybersecurity strategies. I didn\u2019t fully appreciate how complex this skill was until I started volunteering with the National Association of Certified Child Forensic Interviewers (NACCFI). Over the past few years, I\u2019ve helped them monitor their website for unusual activity, track potential security concerns, and flag risks before they became problems. What started as a basic role quickly grew into something more involved\u2014I was reading server logs, setting up access controls, and even writing up informal reports on what I found.<\/p>\n\n\n\n<p>The Web Monitoring Log artifact in my portfolio is a simulation of this work. While the entries are fictional, they reflect real types of issues I helped NACCFI handle. This experience connected directly with what I learned in my cybersecurity strategy and network defense classes. I could finally see how concepts like the NIST Cybersecurity Framework applied in an actual organization, and I understood how to use tools like monitoring logs and user authentication settings in meaningful ways.<\/p>\n\n\n\n<p>But the learning didn\u2019t stop at just the tech. My classes in ethics and law gave me a broader view. For example, when I monitored for login attempts or flagged suspicious activity, I also had to think about privacy rights and transparency. Those were topics we discussed in courses like Cyber Law and IDS 300W, and they shaped the way I approached my work. I didn\u2019t want to just monitor a site\u2014I wanted to do it responsibly.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Technical Writing &amp; Documentation<\/strong><\/p>\n\n\n\n<p>Before this program, I never imagined how important writing would be in a tech career. I used to think cybersecurity was mostly about coding, configuring systems, and fighting off hackers. But the more I got into the field, the more I realized how essential it is to document what you\u2019re doing\u2014and to explain it in a way that other people can understand. Whether you\u2019re creating a user policy, writing a report after an incident, or putting together training materials, being able to write clearly and professionally is key.<\/p>\n\n\n\n<p>That\u2019s where the NACCFI Handbook Excerpt and the Cyber Law Memorandum in my portfolio come in. These two documents represent very different types of writing, but they both show how I\u2019ve developed my skills in technical documentation.<\/p>\n\n\n\n<p>The handbook excerpt is something I contributed to during my work with NACCFI. It focuses on best practices for child forensic interviewing, and I helped reword and reorganize parts of the manual to make them more user-friendly. Even though the content wasn\u2019t always directly about cybersecurity, the experience taught me how to structure professional documents and tailor my language for the right audience\u2014skills that definitely carry over to cybersecurity documentation.<\/p>\n\n\n\n<p>The memorandum, on the other hand, was a class assignment where I wrote to a fictional governor about data privacy laws. It pushed me to combine legal research, ethical analysis, and policy recommendations into a concise, professional memo. Writing it made me realize how cybersecurity isn\u2019t just a technical field\u2014it\u2019s a social issue, too. I had to think about how laws like GDPR could be adapted at the state level and what kind of impact that would have on people, businesses, and government agencies. It was one of the first times I truly saw myself applying what I\u2019d learned in a real-world context.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Professional Communication &amp; Team Collaboration<\/strong><\/p>\n\n\n\n<p>If there\u2019s one thing I\u2019ve learned from both class projects and real-world experiences, it\u2019s that cybersecurity is not a solo sport. You\u2019re constantly working with others\u2014whether it\u2019s other tech professionals, non-technical colleagues, or clients who rely on you to keep their systems secure. Being able to communicate clearly, listen, and collaborate has become one of the most important skills I\u2019ve developed, and it\u2019s something I\u2019ve had to practice in multiple settings.<\/p>\n\n\n\n<p>The Cybersecurity Awareness Campaign presentation is a great example. For this group project, we created a campus-wide campaign to educate students on things like phishing, strong passwords, and safe browsing. I worked with a team where everyone had different strengths\u2014some were better at design, some at research, and some (like me) at organizing the big picture. We had to coordinate across multiple tasks, give each other feedback, and present our findings clearly. It was like a crash course in real-world teamwork.<\/p>\n\n\n\n<p>The Email Exchange artifact also reflects this skill. It\u2019s a simulated conversation based on the kinds of messages I\u2019ve had to write while volunteering. It shows how I\u2019d professionally report a potential security incident, offer next steps, and respond to feedback. Even though it\u2019s just a sample, it represents the way I\u2019ve learned to handle communication in a cybersecurity setting\u2014direct, responsible, and respectful.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>Looking back on my coursework, experiences, and the artifacts I\u2019ve built, I can confidently say that this program has prepared me for a career in cybersecurity, not just technically, but professionally and personally. What made the difference wasn\u2019t just learning how to set up a firewall or write a security policy. It was the interdisciplinary approach, bringing together ideas from computer science, law, communication, and ethics, that helped me think more critically and act more responsibly.<\/p>\n\n\n\n<p>Courses like IDS 300W taught me how to see problems from multiple angles, and that\u2019s a skill I\u2019ve used in almost every project since. Being an interdisciplinary thinker means I\u2019m not just solving problems; I\u2019m asking better questions, thinking about the human impact of my work, and finding smarter, more inclusive solutions. In a field that\u2019s constantly evolving, that kind of mindset is not just helpful, it\u2019s essential.<\/p>\n\n\n\n<p>I\u2019m excited to move forward in my career knowing that I have both the technical foundation and the well-rounded thinking that this program helped me build. And I know that wherever I go next, these skills, developed through classroom learning, hands-on work, and cross-disciplinary thinking, will continue to guide me.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reflective Essay: Demonstrating Career Readiness through Interdisciplinary Learning As I look back on my academic journey in the cybersecurity program at Old Dominion University, I realize just how much I\u2019ve grown\u2014not only in my technical abilities, but also in how I think, communicate, and solve problems. This program hasn\u2019t just taught me how to use&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/david-smetek-cyse200tsum\/reflection\/\">Read More<\/a><\/div>\n","protected":false},"author":29071,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/david-smetek-cyse200tsum\/wp-json\/wp\/v2\/pages\/320"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/david-smetek-cyse200tsum\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/david-smetek-cyse200tsum\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-smetek-cyse200tsum\/wp-json\/wp\/v2\/users\/29071"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-smetek-cyse200tsum\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/david-smetek-cyse200tsum\/wp-json\/wp\/v2\/pages\/320\/revisions"}],"predecessor-version":[{"id":331,"href":"https:\/\/sites.wp.odu.edu\/david-smetek-cyse200tsum\/wp-json\/wp\/v2\/pages\/320\/revisions\/331"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/david-smetek-cyse200tsum\/wp-json\/wp\/v2\/media?parent=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}