{"id":141,"date":"2025-12-08T06:27:18","date_gmt":"2025-12-08T06:27:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2025-12-09T23:12:37","modified_gmt":"2025-12-09T23:12:37","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dstaves\/cyse-300\/","title":{"rendered":"Technical and Problem-Solving Skills"},"content":{"rendered":"\n<p>Technical and problem-solving skills are essential in cybersecurity, where analysts must understand system behavior, interpret network activity, identify vulnerabilities, and apply the right tools to protect digital environments. This skill involves hands-on proficiency with diagnostic software, packet analysis, penetration testing methods, and the ability to troubleshoot system issues in real time. In the cybersecurity field, solving problems often means analyzing messy or incomplete data, thinking like both an attacker and a defender, and choosing techniques that lead to effective security decisions. Through my training, I learned how to break down complex technical tasks into manageable steps and evaluate multiple solution paths to determine the most secure and logical approach. I built strong technical and problem-solving skills through the hands-on labs and virtual environment simulations in&nbsp;CYSE 301: Cybersecurity Techniques and Operations. This course focused on the tools and techniques required to secure, analyze, and understand large-scale computer networks. The labs challenged me to engage directly with packet tracing, vulnerability discovery, and system analysis, helping me develop a deeper understanding of how networks operate and how attackers exploit weaknesses. Each assignment required analytical thinking, technical precision, and the ability to interpret results and communicate them clearly in a written report.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/dstaves\/wp-content\/uploads\/sites\/40336\/2025\/12\/Traffic-Tracing-and-Sniffing-Lab-Report.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Traffic-Tracing-and-Sniffing-Lab-Report<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/dstaves\/wp-content\/uploads\/sites\/40336\/2025\/12\/Sword-vs.-Shield-Lab-Report.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Sword-vs.-Shield-Lab-Report<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/dstaves\/wp-content\/uploads\/sites\/40336\/2025\/12\/Password-Cracking-Lab-Report-2_11zon.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Password-Cracking-Lab-Report-2_11zon<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technical and problem-solving skills are essential in cybersecurity, where analysts must understand system behavior, interpret network activity, identify vulnerabilities, and apply the right tools to protect digital environments. This skill involves hands-on proficiency with diagnostic software, packet analysis, penetration testing methods, and the ability to troubleshoot system issues in real time. In the cybersecurity field,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dstaves\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":25260,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dstaves\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dstaves\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dstaves\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dstaves\/wp-json\/wp\/v2\/users\/25260"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dstaves\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/dstaves\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":359,"href":"https:\/\/sites.wp.odu.edu\/dstaves\/wp-json\/wp\/v2\/pages\/141\/revisions\/359"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dstaves\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}