{"id":123,"date":"2026-05-15T02:46:20","date_gmt":"2026-05-15T02:46:20","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2026-05-16T04:09:47","modified_gmt":"2026-05-16T04:09:47","slug":"sample-page","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dbann005\/","title":{"rendered":"Darryl Bannerman"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image.jpeg\"><img loading=\"lazy\" decoding=\"async\" width=\"321\" height=\"157\" src=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image.jpeg\" alt=\"132,996 Cyber Crime Background Royalty ...\" class=\"wp-image-182\" style=\"width:839px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image.jpeg 321w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-300x147.jpeg 300w\" sizes=\"(max-width: 321px) 100vw, 321px\" \/><\/a><\/figure>\n\n\n\n<p>                                                                   <strong>     About Me<\/strong><\/p>\n\n\n\n<p>Hello my name is Darryl Bannerman and I decided to choose cybersecurity as my major because i like technology and working with computers ever since i was a little kid and in the future as my career job i want to become a cybersecurity analyst and help companies and networks stay secured and also another reason how i got into cybersecurity was my older brother he went to school for computer science and told me going into college tech is a good field and he recommended me do cybersecurity because it&#8217;s a growing field. The classes I&#8217;ve taken along the way that helped me grow with skills have been cybersecurity techniques and Linux and networking and programming these are hands on coding classes that helped me gain knowledge to know what I am doing for the future and will help me with my career.<\/p>\n\n\n\n<p>                                                                                <strong>Resume<\/strong><\/p>\n\n\n\n<p>                                                                    Darryl Bannerman <\/p>\n\n\n\n<p>5404291371   Darrylkbannerman@gmail.com<\/p>\n\n\n\n<p><strong><u>OBJECTIVE:<\/u><\/strong> Motivated Cybersecurity major seeking internships or entry-level positions to leverage my academic knowledge and growing expertise in safeguarding digital assets, identifying vulnerabilities, and enhancing organizational security.<\/p>\n\n\n\n<p><strong><u>EDUCATION:<\/u><\/strong><\/p>\n\n\n\n<p><strong>Old Dominion University&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Expected May 2027&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong>Bachelor of Science, Cybersecurity<strong>&nbsp;&nbsp;&nbsp;&nbsp;<\/strong><\/p>\n\n\n\n<p><strong><u>SKILLS: <\/u><\/strong>Hardware\/Software Troubleshooting, Windows 10\/11, MacOS, M365 Suite, Google Applications Suite, Kali, Ubuntu<\/p>\n\n\n\n<p><strong><u>RELEVANT COURSEWORK:<\/u><\/strong> Cybersecurity &amp; Social Science, Cybersecurity Technology &amp; Society, Linux System for Cybersecurity, Windows System Management &amp; Security, Intro to Criminology<\/p>\n\n\n\n<p><strong><u>EXPERIENCE:<\/u><\/strong><\/p>\n\n\n\n<p><strong>Amazon Fulfillment Center,<\/strong> <em>Warehouse Associate&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/em><strong>May 2024- September 2024<\/strong><\/p>\n\n\n\n<ul>\n<li>Leveraged technology and handheld devices to efficiently scan, sort, and prepare orders, ensuring accuracy and security in the inventory management process.<\/li>\n\n\n\n<li>Managed and transported high volumes of inventory, strictly adhering to safety protocols while using carts, dollies, and hand trucks in a fast-paced environment.<\/li>\n\n\n\n<li>Operated within a high-security environment, working around complex machinery and systems, including order pickers and stand-up forklifts, to ensure smooth and secure delivery operations.<\/li>\n\n\n\n<li>Participated in an inclusive workplace, contributing to diversity, equity, and inclusion (DEI) initiatives, fostering a collaborative and secure work environment.<\/li>\n<\/ul>\n\n\n\n<p><strong>Bob Evans, <\/strong><em>Server&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/em><strong>November 2022- March 2023<\/strong><\/p>\n\n\n\n<ul>\n<li>Utilized POS systems to accurately input orders, ensuring secure and efficient transaction processing, and maintaining data integrity within the system.<\/li>\n\n\n\n<li>Demonstrated strong communication skills by effectively interacting with guests, assessing their needs, and providing appropriate solutions, mirroring the customer service aspect of cybersecurity roles.<\/li>\n\n\n\n<li>Adhered to safety protocols while handling food prep equipment, emphasizing attention to detail and risk management in a high-pressure environment.<\/li>\n\n\n\n<li>Managed and resolved guest complaints promptly, involving management when necessary, highlighting the ability to address and escalate issues appropriately in a professional setting.<\/li>\n<\/ul>\n\n\n\n<p><strong><u>ORGANIZATIONS:<\/u><\/strong><\/p>\n\n\n\n<ul>\n<li><strong>African Student Association, <\/strong><em>Member<\/em>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <strong>August 2023- Present<\/strong><\/li>\n<\/ul>\n\n\n\n<p>                                                                                                 <\/p>\n\n\n\n<p>                                                                                                          <strong>Skills<\/strong><\/p>\n\n\n\n<p>                       <strong>Linux 270 skill set<\/strong><\/p>\n\n\n\n<p>This assignment allows you to see me take a problem one step at a time.\u00a0Rather than see just the final solution I provide you will see how I arrived at that solution starting at Step 1 all the way to Step 4.I picked this assignment for my e Portfolio because it demonstrates process rather than just showing you the finished product.\u00a0It shows that I can follow directions, remain organized, and know how to complete each step of an assignment sequentially.\u00a0It also demonstrates my learning throughout the problem.In conclusion, I chose this because it shows you that I know how to do the work rather than what the work should look like when completed.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/step-1-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"647\" height=\"508\" src=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/step-1-2.png\" alt=\"\" class=\"wp-image-189\" srcset=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/step-1-2.png 647w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/step-1-2-300x236.png 300w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/step-1-2-600x471.png 600w\" sizes=\"(max-width: 647px) 100vw, 647px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/step-3-4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"641\" height=\"511\" src=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/step-3-4.png\" alt=\"\" class=\"wp-image-190\" srcset=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/step-3-4.png 641w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/step-3-4-300x239.png 300w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/step-3-4-600x478.png 600w\" sizes=\"(max-width: 641px) 100vw, 641px\" \/><\/a><\/figure>\n\n\n\n<p>For this artifact, I completed the Cybersecurity Technical Task as displayed in the screenshots.\u00a0There were step-by-step directions provided to complete the activity which taught me basic technical skills.\u00a0I learned how to pay attention to directions, troubleshoot, and grasp an understanding of certain processes.\u00a0This artifact displays my capability to complete technical tasks with great attention to detail.\u00a0This is beneficial when using security software, analyzing a system, and troubleshooting technical issues.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/task-A.2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"642\" height=\"282\" src=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/task-A.2.png\" alt=\"\" class=\"wp-image-191\" srcset=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/task-A.2.png 642w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/task-A.2-300x132.png 300w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/task-A.2-600x264.png 600w\" sizes=\"(max-width: 642px) 100vw, 642px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/task-A.png\"><img loading=\"lazy\" decoding=\"async\" width=\"627\" height=\"386\" src=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/task-A.png\" alt=\"\" class=\"wp-image-192\" srcset=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/task-A.png 627w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/task-A-300x185.png 300w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/task-A-600x369.png 600w\" sizes=\"(max-width: 627px) 100vw, 627px\" \/><\/a><\/figure>\n\n\n\n<p>For this artifact it shows you how I am able to break down the passwords and being able to create a new one which allows me to have access to the users now and also create more users it shows my ability to password crack and knowing how to trouble shoot.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/user-3-4-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"635\" height=\"525\" src=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/user-3-4-1.png\" alt=\"\" class=\"wp-image-196\" srcset=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/user-3-4-1.png 635w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/user-3-4-1-300x248.png 300w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/user-3-4-1-600x496.png 600w\" sizes=\"(max-width: 635px) 100vw, 635px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/step-5-.png\"><img loading=\"lazy\" decoding=\"async\" width=\"632\" height=\"207\" src=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/step-5-.png\" alt=\"\" class=\"wp-image-197\" srcset=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/step-5-.png 632w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/step-5--300x98.png 300w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/step-5--600x197.png 600w\" sizes=\"(max-width: 632px) 100vw, 632px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/user-1-.png\"><img loading=\"lazy\" decoding=\"async\" width=\"627\" height=\"500\" src=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/user-1-.png\" alt=\"\" class=\"wp-image-198\" srcset=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/user-1-.png 627w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/user-1--300x239.png 300w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/user-1--600x478.png 600w\" sizes=\"(max-width: 627px) 100vw, 627px\" \/><\/a><\/figure>\n\n\n\n<p>                          <strong>Cybersecurity techniques 301s skill set<\/strong><\/p>\n\n\n\n<p>For this assignment we had to capture packets from a network program and filter them. There were 82,838 packets captured and 18 packets displayed after filtering. This means that I filtered out unnecessary information to hone in on certain network actions. What I learned in this work was how filtering cuts down on extraneous information and allows you to work more efficiently. The skill that this artifact shows is my ability to capture network data and filter through it to find specific info.<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/a799b7bc-ec7b-4ac1-8fb2-6f194a57332f\" width=\"322\" height=\"238\"><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"303\" height=\"224\" src=\"https:\/\/sites.wp.odu.edu\/df7d6612-d0a7-402e-a0f5-e11768528da1\"><\/p>\n\n\n\n<p>This artifact required me to search for files hidden within the system through means of cybersecurity attack methods and basic searches through the system.\u00a0I searched through folders and searched the system.\u00a0I learned how things are located in files and how computers are built.\u00a0Organization of information and files is crucial.\u00a0I also enhanced my skills of efficiently navigating through a system and being able to find what I am looking for even if it does not pop up at first.\u00a0This demonstrates my knowledge of finding certain files and where to manage them.<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"377\" src=\"https:\/\/sites.wp.odu.edu\/2ff1c857-c151-46a2-9432-95f053e5fa36\"><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/d508a0e0-80d4-4625-9b12-bd2420e7a130\" width=\"487\" height=\"311\"><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"570\" height=\"566\" src=\"https:\/\/sites.wp.odu.edu\/ccb3ba63-6db4-4baf-a324-92022c32a9a0\">d<\/p>\n\n\n\n<p>This assignment right here was really about the basic commands that are going to be used and to teach me and my fellow classmates the basics on what we need to understand before we get into deep to coding.<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/790e706b-fbad-48ee-a380-1ba1cbc119ed\" width=\"618\" height=\"491\"><\/p>\n\n\n\n<p> <strong> Programming and networking 250<\/strong><\/p>\n\n\n\n<p>The quiz was meant to help  my understanding of networking protocols and general cybersecurity fundamentals that we have learned so far in Cybersecurity 250.\u00a0I was able to better my understanding of how devices transfer data across networks and the protocols that allow systems to communicate.\u00a0Scoring well on this quiz demonstrated my grasp on key networking concepts and improved my technical problem-solving skills with cybersecurity.                  <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"491\" src=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-1024x491.png\" alt=\"\" class=\"wp-image-202\" srcset=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-1024x491.png 1024w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-300x144.png 300w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-768x368.png 768w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-600x288.png 600w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-945x453.png 945w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image.png 1151w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>This assignment required writing a program with python which was about numbers and me having to input the user and calculate the total average from the numbers given for this assignment. What i learned was how to use loops variables, and user input into the code and this assignment also helped me with my debugging skills because i had to go fix errors in the code while testing it,<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"688\" src=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-1.png\" alt=\"\" class=\"wp-image-203\" srcset=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-1.png 975w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-1-300x212.png 300w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-1-768x542.png 768w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-1-600x423.png 600w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-1-945x667.png 945w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><\/a><\/figure>\n\n\n\n<p>  This quiz was focused on network and topologies and different technology that are used in computer networks. Taking this quiz helped me learn how networks are structured and how devices communicate with other setups. I also gained a better understanding of networking concepts with technology that help systems connect and transfer data. I also earned a great score on this quiz by getting a 100% that shows my understanding of networks.    <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"400\" src=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-2-1024x400.png\" alt=\"\" class=\"wp-image-205\" srcset=\"https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-2-1024x400.png 1024w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-2-300x117.png 300w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-2-768x300.png 768w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-2-600x234.png 600w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-2-945x369.png 945w, https:\/\/sites.wp.odu.edu\/dbann005\/wp-content\/uploads\/sites\/41255\/2026\/05\/image-2.png 1452w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>                            <\/p>\n\n\n\n<p>                                                             <strong>  Reflection Essay <\/strong><\/p>\n\n\n\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>During my time being a cybersecurity student I&#8217;ve learned many technical and programming skills which has led me to be able to prepare myself for the real cybersecurity world after I graduate. I also plan to have a career as a cybersecurity analyst because that&#8217;s my goal and I have loved technology ever since I was a kid.I also love the idea of me learning how to protect people information and my companies information from cyberthreats and attacks. Cybersecurity is something ive became interested in because I always loved computers and games as a kid and they all allowed to run because of the security and the people who own the game protecting us online from any attacks.<\/p>\n\n\n\n<p>I took classes that helped me evolve my skills which were cybersecurity networking and programming and cybersecurity 301 techniques, and linux 270. All these classes taught me how that skills in cybersecurity is important especially knowing the basics.Linux allowed me to learn how to code and use commands and also know how to give permission and access to certain systems and how to manage them.Programming and networking taught me how communications is important in the field and how to access certain networks and fix problems like troubleshooting and basic coding which I would need to understand. Lastly, cyber security techniques taught me how to use different security tools and how to identify and see problems before they happen and how to protect systems from any attackers. All these classes helped me gain hands on knowledge and experience and learn how to use technology for good reasons.<\/p>\n\n\n\n<p>This portfolio will include artifacts that show my skills in network security, linux, and technical problem solving. Each artifact was assigned in one of my courses and shows what I learned during my time with hands-on activities. After completing these courses I was able to reflect on my artifacts and see how much I have improved during the program and how learning different skills helped me.<\/p>\n\n\n\n<p>Network Security and Analysis<\/p>\n\n\n\n<p>Network and analysis skills I&#8217;ve learned from my programs is that network security is very important to cybersecurity because most big companies and businesses use networks that allow communication between systems and devices and also users. I learned about how the networks operate and how devices communicate with the networks and how they can detect or identify suspicious activity going on.<\/p>\n\n\n\n<p>The artifact that shows that I learned this skill is the packet capture analysis assignment. During this assignment I was able to use a tool to capture and analyze packets traveling through a network. The results of the assignment showed that 82,838 packets were captured while only 18 packets were shown after I was finished filtering. At first I did not think I would be able to understand all of the information being displayed. However, after I learned how to better filter and look for specific packets I started to become more comfortable. I learned how important it is to stay organized when analyzing large amounts of data. Cybersecurity professionals analyze network traffic to look for suspicious activity and these results show how traffic flows through networks.<\/p>\n\n\n\n<p>Cybersecurity Techniques Final Artifact<\/p>\n\n\n\n<p>Another artifact that shows I learned network security is various network assignments and cyber exercises that taught me about system communication. I learned about how certain devices communicate with each other on a network and how they need specific configurations to allow communication. I also became better at troubleshooting network issues which helped me become more patient and logical.<\/p>\n\n\n\n<p>Whether firewalls are disabled or not attackers can still attempt to exploit vulnerabilities present on the network. Network security taught me how cybersecurity professionals have to constantly monitor network traffic and investigate anything that may look suspicious. Learning about how networks operate helped me understand how attackers try to attack systems and what cybersecurity professionals can do to prevent them.<\/p>\n\n\n\n<p>Linux System Administration and Security<\/p>\n\n\n\n<p>Linux system administration and security are also skills I learned. Linux is very common in cybersecurity because a lot of servers, security systems, and enterprise systems are ran on Linux. Before this class I had limited experience with command prompt or linux. I thought it was difficult at first because it was nothing I was used to working with. I enjoy using windows computers for daily use so having to learn how to navigate through linux using commands was difficult. However, after doing the labs and practicing I became more confident in navigating through the terminal and understanding how to manage systems.<\/p>\n\n\n\n<p>Artifact That Demonstrates Skill Linux Permissions<\/p>\n\n\n\n<p>This artifact demonstrates the skill of Linux system security and administration. During this assignment I learned how to manage permissions and secure files using Linux. I learned how to change the settings of files to allow or deny access to certain users. Cybersecurity professionals have to make sure systems are secure and this assignment taught me how permissions play a role.<\/p>\n\n\n\n<p>Artifact That Demonstrates Skill <\/p>\n\n\n\n<p>I also learned about linux system navigation during an artifact where I had to find certain files in a system. During this cyber exercise I had to use my cybersecurity knowledge to locate certain folders and files. I learned about how files are located in directories and how important it is to understand how folders are organized. Cybersecurity professionals have to be able to navigate through systems when they\u2019re managing or securing data.<\/p>\n\n\n\n<p>Another skill I learned was how to follow step-by-step instructions when completing technical cybersecurity assignments. These artifacts helped me become better at paying attention to details. Cybersecurity involves a lot of problem solving which sometimes can be difficult. These assignments taught me to never give up when solving problems.<\/p>\n\n\n\n<p>Linux helped me improve my technical skills and learn how to confidently work on systems. It also taught me how to troubleshoot problems and allow me to learn how to problem solve on my own.<\/p>\n\n\n\n<p>Programming and Technical Problem Solving<\/p>\n\n\n\n<p>Programming and technical problem solving are skills I learned during my time in the program. Technical professionals may use programming to help them automate tasks, analyze large data, and more. During my networking and programming course I learned basic coding and how to think more logically.<\/p>\n\n\n\n<p>Artifact That Demonstrates Skill Week 7 Assignment<\/p>\n\n\n\n<p>This artifact shows me programming by requiring me to create and test my own code.While doing the assignment I ran into some bugs like some codes werent running properly and i was stuck completely and how one mistake or one problem can stop the entire code from working properly. When I started playing around with the codes and trying different ways I was able to finally understand what I did wrong and learned from my mistakes and learned how to fix it and have patience because if I overwhelm myself im not going to be able to get it.<\/p>\n\n\n\n<p>Technical problem solving is something I learned when completing cybersecurity tasks that required me to follow steps. These artifacts showed me how to carefully think about a problem and work through it step by step. Cybersecurity professionals always have to think about what is going on and analyze situations.<\/p>\n\n\n\n<p>All of these skills I learned helped me understand how cybersecurity uses different aspects of technology. Linux and networking taught me about how computer systems communicate with each other. Programming allowed me to think more logically and help me better understand the importance of problem solving.<\/p>\n\n\n\n<p>Interdisciplinary Learning and Growth<\/p>\n\n\n\n<p>What I value most from my studying  was the interdisciplinary experience I had while learning. Cybersecurity doesn\u2019t just use one particular skill or topic. It uses a variety of subjects and skills. Networking, operating systems, programming, communication, and problem solving are all incorporated when working in cybersecurity. During my time in college I was able to learn how all these subjects and more connect to each other.<\/p>\n\n\n\n<p>IIDS 300W taught me that you can apply what you learn from one class to another to aid you in completing tasks. Cybersecurity isn&#8217;t just about knowing how technology works, it&#8217;s about knowing how people work. Having knowledge on cyber will allow you to communicate with others, think critically, and learn continuously to keep up with technology. College has taught me how to be open minded and use skills from various fields of study to look at issues. After going through and finding the artifacts that I wanted to showcase in my portfolio I realized how much I actually learned during the program. I remember going into my first Linux class thinking I was going to not understand anything. However, as I took more courses I learned how to troubleshoot problems and became more comfortable working on systems and analyzing information.<\/p>\n\n\n\n<p>Making this portfolio made me realize how much I&#8217;ve learned through college and how it&#8217;s preparing me for when I start working. you can look at my artifacts and see my progress and the information I&#8217;m learning from cybersecurity courses. Some artifacts took me longer to complete because they were a challenge but that taught me to become more skilled in problem solving and staying calm when something is difficult.<\/p>\n\n\n\n<p>&nbsp;Conclusion<\/p>\n\n\n\n<p>In conclusion, my cybersecurity studying has allowed me to learn skills that will help me in my future career. I was able to take classes that gave me hands-on experience working with networks, Linux, and learning about cybersecurity. My artifacts displayed show skills in network security and analysis, linux, and technical problem solving.<\/p>\n\n\n\n<p>I truly believe that having an interdisciplinary knowledge is what will help me succeed in the cybersecurity field. Being able to network, program, and understand how Linux works helped me learn how systems operate and how they can be secured. As I progress in my career I will continue to learn on the job but my collegiate courses allowed me to learn and grow as a technological professional.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>About Me Hello my name is Darryl Bannerman and I decided to choose cybersecurity as my major because i like technology and working with computers ever since i was a little kid and in the future as my career job&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/dbann005\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28574,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dbann005\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dbann005\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dbann005\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dbann005\/wp-json\/wp\/v2\/users\/28574"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dbann005\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/dbann005\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":206,"href":"https:\/\/sites.wp.odu.edu\/dbann005\/wp-json\/wp\/v2\/pages\/123\/revisions\/206"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dbann005\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}