{"id":218,"date":"2020-08-29T16:58:59","date_gmt":"2020-08-29T16:58:59","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-06-25T16:45:46","modified_gmt":"2025-06-25T16:45:46","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/donovanthomas\/skills-2\/","title":{"rendered":"Artifacts"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h4 class=\"wp-block-heading\">Brute force attack<\/h4>\n\n\n\n<p>This is a Project that I did in my Introduction to Linux where we used Kali Linux to simulate a Bruce force attack. This project shows skills of attention to detail, Command line basics, Understanding Virtual Machines and Executing attacks.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"798\" height=\"606\" src=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Brute-force-attack-lab.png\" alt=\"\" class=\"wp-image-381\" style=\"width:470px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Brute-force-attack-lab.png 798w, https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Brute-force-attack-lab-300x228.png 300w, https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Brute-force-attack-lab-768x583.png 768w, https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Brute-force-attack-lab-395x300.png 395w\" sizes=\"(max-width: 798px) 100vw, 798px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h4 class=\"wp-block-heading\">Python Greatest Value Assignment<\/h4>\n\n\n\n<p>This artifact below is code written in the python language. I created this in a class so that the code would know one number be greater than the next using the PYCHARM software. This assignment taught me a new programming language, how to pay attention to the little things within coding and to problem solve.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Greatest-Value-1024x576.png\" alt=\"\" class=\"wp-image-382\" style=\"width:833px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Greatest-Value-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Greatest-Value-300x169.png 300w, https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Greatest-Value-768x432.png 768w, https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Greatest-Value-1536x864.png 1536w, https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Greatest-Value-533x300.png 533w, https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Greatest-Value.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h4 class=\"wp-block-heading\">Research paper on Esports players Athletes <\/h4>\n\n\n\n<p>This Paper was written to create a discourse on the difference between Esports players and Athletes. The argument was if Esports players should be considered athletes or not. Read below to find out my perspective on the issue. This assignment I learned to use Critical thinking, research effectively, Use scholarly search engines properly and to cite research correctly.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Time-to-Play-The-Game_Recognizing-Esports-as-a-Sport.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Time-to-Play-The-Game_Recognizing-Esports-as-a-Sport.\"><\/object><a id=\"wp-block-file--media-bb45c0be-46ff-4f76-997e-27b59c79c91b\" href=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Time-to-Play-The-Game_Recognizing-Esports-as-a-Sport.pdf\">Time-to-Play-The-Game_Recognizing-Esports-as-a-Sport<\/a><a href=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Time-to-Play-The-Game_Recognizing-Esports-as-a-Sport.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-bb45c0be-46ff-4f76-997e-27b59c79c91b\">Download<br><\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Digital Forensics standards and Floor Plan <\/h2>\n\n\n\n<p>In this article I explained the Standards for a Digital forensics lab and created a floor plan that would follow these standards. This assignment is taught me the importance of pre planning and research.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Digital-Forensics-Midterm.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Digital-Forensics-Midterm.\"><\/object><a id=\"wp-block-file--media-04506565-cd9a-4832-b445-c9725faa2cee\" href=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Digital-Forensics-Midterm.pdf\">Digital-Forensics-Midterm<\/a><a href=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Digital-Forensics-Midterm.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-04506565-cd9a-4832-b445-c9725faa2cee\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h4 class=\"wp-block-heading\">HTML Website eportfolio <\/h4>\n\n\n\n<p>Below is a Eportfolio that I am creating from scratch. I am using Html coding language in order to achieve this where I will have my resume, my skills, pictures, and ways to contact me.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"456\" src=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/html-scrrenshot-1024x456.png\" alt=\"\" class=\"wp-image-395 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/html-scrrenshot-1024x456.png 1024w, https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/html-scrrenshot-300x134.png 300w, https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/html-scrrenshot-768x342.png 768w, https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/html-scrrenshot-1536x685.png 1536w, https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/html-scrrenshot-600x267.png 600w, https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/html-scrrenshot.png 1900w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Here is a portion of the html code.<\/p>\n\n\n\n<p><\/p>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h4 class=\"wp-block-heading\">Internship journal 3 <\/h4>\n\n\n\n<p>While doing my internship I wrote journals that talked about my experiences and what I have learned. This entry in particular is important to me because at this time I had learned more about networking, assets management and coordinating with a team.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Reflection-Paper-3.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Reflection-Paper-3.\"><\/object><a id=\"wp-block-file--media-8b9ebac4-e165-4db8-a44b-efa59632fa9b\" href=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Reflection-Paper-3.pdf\">Reflection-Paper-3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Reflection-Paper-3.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8b9ebac4-e165-4db8-a44b-efa59632fa9b\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h4 class=\"wp-block-heading\">Ransomware Attack Analysis <\/h4>\n\n\n\n<p>Here is a analysis on a ransomware attack on a New Jersey hospital that I did an analysis on. This paper help me understand the severity and the damage that an attack like this can do. It also helped me further understand research and citing.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Ransomware-on-New-Jersey-Health-systems.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Ransomware-on-New-Jersey-Health-systems.\"><\/object><a id=\"wp-block-file--media-66d227a6-5f6a-455e-8caa-65426e3b15c1\" href=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Ransomware-on-New-Jersey-Health-systems.pdf\">Ransomware-on-New-Jersey-Health-systems<\/a><a href=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Ransomware-on-New-Jersey-Health-systems.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-66d227a6-5f6a-455e-8caa-65426e3b15c1\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h4 class=\"wp-block-heading\">How Much Time to Game Survey Based research paper <\/h4>\n\n\n\n<p>This paper is a research paper I wrote where I created a google survey that had various question on the amount of time someone had to play video games with there friends. I used a google forms to create my survey and used various social media platforms to promote the survey <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/How-Much-Time-to-Game-complete.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of How-Much-Time-to-Game-complete.\"><\/object><a id=\"wp-block-file--media-242cf1e2-6703-4c5d-8200-6ead7dbb9066\" href=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/How-Much-Time-to-Game-complete.pdf\">How-Much-Time-to-Game-complete<\/a><a href=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/How-Much-Time-to-Game-complete.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-242cf1e2-6703-4c5d-8200-6ead7dbb9066\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h4 class=\"wp-block-heading\">Constant Hall Network Infrastructure Budgeting <\/h4>\n\n\n\n<p>I created a estimated budget for the constant hall at Old Dominion University so that I can grasp an understanding of mapping out an budget that can match the environment.  <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Constant-hall-networking-.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Constant-hall-networking-.\"><\/object><a id=\"wp-block-file--media-d9e469dd-ba97-4b40-a489-a79c4e1187a8\" href=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Constant-hall-networking-.pdf\">Constant-hall-networking-<\/a><a href=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/Constant-hall-networking-.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d9e469dd-ba97-4b40-a489-a79c4e1187a8\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h4 class=\"wp-block-heading\">Linux basics <\/h4>\n\n\n\n<p>Here I am just using some basic commands on the command line like echo to repeat what I just typed and pwd that shows my current working directory.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/terminal-.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of terminal-.\"><\/object><a id=\"wp-block-file--media-050fa759-a2b1-4e4a-a62c-39e1037b0e2b\" href=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/terminal-.pdf\">terminal-<\/a><a href=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-content\/uploads\/sites\/20231\/2025\/06\/terminal-.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-050fa759-a2b1-4e4a-a62c-39e1037b0e2b\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Brute force attack This is a Project that I did in my Introduction to Linux where we used Kali Linux to simulate a Bruce force attack. This project shows skills of attention to detail, Command line basics, Understanding Virtual Machines and Executing attacks. Python Greatest Value Assignment This artifact below is code written in the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/donovanthomas\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":18019,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-json\/wp\/v2\/users\/18019"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":409,"href":"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-json\/wp\/v2\/pages\/218\/revisions\/409"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/donovanthomas\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}