{"id":544,"date":"2025-10-16T01:26:08","date_gmt":"2025-10-16T01:26:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dcaplinger\/?page_id=544"},"modified":"2025-12-03T02:59:36","modified_gmt":"2025-12-03T02:59:36","slug":"skills-3","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dcaplinger\/skills-3\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\">Interdisciplinary Research<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><em>Interdisciplinary research has been integral to my coursework at ODU in connecting complex concepts and disciplines together. Cybersecurity itself is considered interdisciplinary, and forward-focused research must do the same. By connecting these dots between what might be considered separate fields, I am able to approach problems with diverse perspectives to reach innovative solutions. <\/em><\/p>\n\n\n\n<p>Blending cybersecurity operations with auditory alerting brings a new way for security analysts to handle incident response.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-layout-3 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-layout-1 wp-block-group-is-layout-flex\"><a href=\"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-content\/uploads\/sites\/36874\/2025\/11\/Sonification-for-SOCs.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Sonification-for-SOCs<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>Elections are increasingly becoming a target for cyber incidents, but examining how such cyber incidents affect the perception of elections, and as such our democracy, is crucial.<\/p>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-layout-6 wp-block-group-is-layout-flex\"><a href=\"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-content\/uploads\/sites\/36874\/2025\/08\/CYSE495-Research-Paper-DCaplinger-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE495-Research-Paper-DCaplinger-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>This analysis helps bridge the gap between how medical practices, regulatory issues, cybersecurity, and legal frameworks interact with one another to keep patients and the technologies they use safe.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-layout-7 wp-block-group-is-layout-flex\"><a href=\"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-content\/uploads\/sites\/36874\/2025\/08\/DCaplinger-IDS300W-Term-Paper-.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">DCaplinger-IDS300W-Term-Paper-<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>As technology begins to be integrated with other aspects of daily life, it is essential for ethical principles to be understood to keep biocybersecurity practices safe and responsible.<\/p>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-layout-8 wp-block-group-is-layout-flex\"><a href=\"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-content\/uploads\/sites\/36874\/2024\/12\/BioCybersecurity-Analytical-Paper.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">BioCybersecurity-Analytical-Paper<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Linux Tools<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><em>One of the core technical skills necessary for success in the cybersecurity industry is understanding Linux tools. It represents understanding command-line structure, system navigation, and problem-solving at a deeper level. Getting to dig into these labs and familiarizing myself with such an efficient operating system was very helpful in establishing a strong cybersecurity foundation.<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Scripting is an essential part of automating complex processes and getting the most out of a Linux architecture. This lab demonstrates that proficiency in system operations.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a href=\"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-content\/uploads\/sites\/36874\/2025\/11\/DCaplinger-270-Lab8.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">DCaplinger-270-Lab8<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>Networking is the underlying communication behind cyberspace, so a strong understanding of how to configure environments is essential to any cybersecurity professional&#8217;s knowledge base.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-content\/uploads\/sites\/36874\/2025\/11\/DCaplinger-270-Lab11.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">DCaplinger-270-Lab11<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>To defend against cyber attacks, a cybersecurity defender must understand the tools attackers use. This lab showcases my understanding of password cracking using common tools like John the Ripper.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-content\/uploads\/sites\/36874\/2025\/11\/DCaplinger-CYSE270-Lab5.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">DCaplinger-CYSE270-Lab5<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Digital Forensics Analysis<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><em>During my time at ODU, I specifically wanted to learn more about digital forensics and the processes that exist within this subdiscipline. Throughout that journey, I was able to understand the technical and administrative side of running such a lab while also leaning into a full investigation analysis. As with most of my assignments in the cybersecurity curriculum, I then took what I learned from this to cross it with other disciplines for research purposes. <\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Digital forensics analysis must start from a proper digital lab and accreditation process. This demonstrates my understanding of both, showing a well-rounded understanding of the digital forensics process. <\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-4 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a href=\"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-content\/uploads\/sites\/36874\/2025\/11\/DCaplinger-407-Midterm.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">DCaplinger-407-Midterm<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>As artificial intelligence becomes more commonplace, I wanted to begin looking towards the future of how AI can be integrated into digital forensics and the concerns that need to be addressed before doing so.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-content\/uploads\/sites\/36874\/2024\/12\/CYSE-270-Final-Paper-Zachary-Boozer-Danielle-Caplinger.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-270-Final-Paper-Zachary-Boozer-Danielle-Caplinger<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>As a culmination of my digital forensics journey at ODU, I was able to analyze a sample investigation to show the start-to-finish process of evidence collection, tools used, and cybercrime inferences made from evidence analysis. <\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-content\/uploads\/sites\/36874\/2025\/11\/DCaplinger-407-Final.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">DCaplinger-407-Final<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Interdisciplinary Research Interdisciplinary research has been integral to my coursework at ODU in connecting complex concepts and disciplines together. Cybersecurity itself is considered interdisciplinary, and forward-focused research must do the same. By connecting these dots between what might be considered separate fields, I am able to approach problems with diverse perspectives to reach innovative solutions&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dcaplinger\/skills-3\/\">Read More<\/a><\/div>\n","protected":false},"author":29408,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-json\/wp\/v2\/pages\/544"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-json\/wp\/v2\/users\/29408"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-json\/wp\/v2\/comments?post=544"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-json\/wp\/v2\/pages\/544\/revisions"}],"predecessor-version":[{"id":575,"href":"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-json\/wp\/v2\/pages\/544\/revisions\/575"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dcaplinger\/wp-json\/wp\/v2\/media?parent=544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}