SKILL ONE: Cybersecurity Systems & Technical Operations
Artifact 1: Password Cracking Assignment
This assignment was my first real hands on look at how easy it is for weak passwords to get cracked. I used John the Ripper to break different password hashes, and it really opened my eyes to how attackers think. Once I saw how fast some passwords got cracked, it made a lot more sense why companies push for strong passwords and better security policies. This assignment helped me understand the offensive side of cybersecurity, and it definitely made me more aware of how important good password practices are.
Artifact 2: File Permissions Assignment
This assignment helped me learn how to properly manage file permissions in Linux and why access control matters so much. I worked with read, write, and execute permissions and saw how quickly a system can become vulnerable if permissions are set the wrong way. Doing this made me more confident navigating Linux and understanding how to lock down sensitive files so the wrong people can’t access them.
Artifact 3 – Network Traffic Tracing & Sniffing Lab
For this artifact, I used Wireshark to capture and analyze network traffic between my virtual machines. In my capture, I had 506 packets total, and I filtered them down to see specific types like ICMP and DNS traffic. Out of those 506 packets, 210 were ICMP pings, and later I filtered for DNS and saw 284 DNS packets in the capture.
Skill Two: Risk Management, Policy, & Organizational Awareness
Artifact 1: Company Research & Organizational Risk Review
For this assignment, I researched several companies including Dollar Tree, Enterprise Mobility, ABNB Federal Credit Union, and Amwins. To understand how real organizations deal with operational challenges, risk, and long term strategy. I analyzed how each company manages things like rapid expansion, digital transformation, customer expectations, sustainability, and industry competition.
This assignment helped me think about risk on a business level how companies make decisions, how they respond to market changes, and how their strategies can succeed or fail depending on how well they manage uncertainty. It also strengthened my ability to ask the right questions during interviews or field research and to look deeper into how organizations operate behind the scenes.
Artifact 2: Cybersecurity Policy & Risk Assessment Analysis
In this policy analysis paper, I explored risk assessment as a major cybersecurity policy and how it impacts politicians, government technology, and national security. I discussed how risk assessment helps identify vulnerabilities before attacks happen, and how political campaigns, government agencies, and public officials rely on cybersecurity firms to protect their data.
This assignment forced me to think about risk not just technically, but politically and socially. I analyzed how organizations make decisions about protection, the role of personal protection in cybersecurity, and why risk assessments are becoming more important as technology becomes central to modern politics.
Artifact 3: Economic Impact of Cybersecurity Policies
This paper focused on how cybersecurity policies can affect entire economies. I analyzed how the European Union responded after major cyberattacks and how updating their cybersecurity standards could strengthen their economy by increasing trust, reducing misinformation, and improving digital infrastructure.
I also explored how political constraints, fragmented markets, and past policy failures make cybersecurity policymaking complicated. This assignment helped me see how cyber policy isn’t just about security. It shapes business growth, international relationships, and economic stability.
SKILL THREE: Interdisciplinary Problem-Solving & Real-World Application
Artifact 1: Cyber Law Case Analysis
This assignment focused on breaking down a real cyber law case and understanding how the legal system handles digital evidence, cybercrime, warrants, and privacy. I analyzed how investigators apply laws like the CFAA, how warrants are structured, and what must be proven to justify a search. Working through the legal language helped me see how technical actions, like hacking, accessing systems, or using digital devices. Connect directly to criminal charges and legal consequences.
Artifact 2: Windows System Security Project
In this project, I researched ethical hacking and penetration testing to understand how cybersecurity professionals think and operate. I explained how ethical hackers look for weaknesses, test security controls, and use attacker style techniques to help organizations stay protected. I broke down different testing methods, real challenges penetration testers face, and why reporting and communication matter just as much as the technical work. This assignment required clear analysis, attention to detail, and an understanding of how attackers approach systems so defenders can stay one step ahead.
Artifact 3: Leadership Reflection & Theory Application
This assignment helped me reflect on who I am as a leader and how different leadership theories show up in my real life. I connected concepts like Authentic Leadership and LMX to how I communicate, solve problems, and support the people around me. Writing this reflection made me realize that staying calm, being understanding, and leading with honesty are strengths I already have and skills I want to keep improving.