{"id":218,"date":"2023-11-02T20:45:46","date_gmt":"2023-11-02T20:45:46","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2024-12-07T08:08:02","modified_gmt":"2024-12-07T08:08:02","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/eportfolio-\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"<p class=\"p1\"><b>1. Skills and Essential Work Habits<\/b><\/p>\n<p class=\"p2\"><b>Ability to Work Methodically and Be Detail-Oriented<\/b><\/p>\n<p class=\"p2\">My Ethical Hacking and Penetration Testing course involved detailed exercises requiring precision\u00a0in identifying vulnerabilities and applying the correct techniques for successful exploits.<\/p>\n<p class=\"p2\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-352\" src=\"http:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-3.03.37\u202fAM-277x300.png\" alt=\"\" width=\"277\" height=\"300\" srcset=\"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-3.03.37\u202fAM-277x300.png 277w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-3.03.37\u202fAM-944x1024.png 944w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-3.03.37\u202fAM-768x833.png 768w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-3.03.37\u202fAM.png 1327w\" sizes=\"(max-width: 277px) 100vw, 277px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-353\" src=\"http:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-3.06.04\u202fAM-300x296.png\" alt=\"\" width=\"300\" height=\"296\" srcset=\"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-3.06.04\u202fAM-300x296.png 300w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-3.06.04\u202fAM-1024x1009.png 1024w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-3.06.04\u202fAM-768x757.png 768w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-3.06.04\u202fAM-304x300.png 304w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-3.06.04\u202fAM.png 1465w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p class=\"p2\"><b>Eagerness to Dig into Technical Questions<\/b><\/p>\n<p class=\"p2\">The GIS for Cybersecurity course challenged me to tackle complex questions about using geospatial\u00a0intelligence to improve cybersecurity strategies, such as mapping vulnerabilities in infrastructure.<\/p>\n<p class=\"p2\">\u00a0 <img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-351\" src=\"http:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-2.57.04\u202fAM-300x152.png\" alt=\"\" width=\"300\" height=\"152\" srcset=\"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-2.57.04\u202fAM-300x152.png 300w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-2.57.04\u202fAM-1024x519.png 1024w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-2.57.04\u202fAM-768x389.png 768w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-2.57.04\u202fAM-1536x778.png 1536w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-2.57.04\u202fAM-2048x1037.png 2048w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-07-at-2.57.04\u202fAM-592x300.png 592w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p class=\"p1\"><b>2. Soft Skills<\/b><\/p>\n<p class=\"p2\"><b>Excellent Presentation and Communication Skills<\/b><\/p>\n\n\n<ol>\n<li><strong>GIS Briefing<\/strong><\/li>\n<\/ol>\n\n\n\n<p><strong>The GIS briefing, completed in my GIS for Cybersecurity class, showcases my technical and analytical skills in applying geospatial intelligence to cybersecurity challenges. This project involved analyzing spatial data to identify vulnerabilities in critical infrastructure and developing actionable solutions. I created maps and diagrams to illustrate my findings, demonstrating my ability to work methodically and examine technical questions from multiple perspectives. This artifact highlights my precision and critical thinking skills, which are essential in addressing complex cybersecurity problems.<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/briefing.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of briefing.\"><\/object><a id=\"wp-block-file--media-88afc176-f491-416e-bc68-665d2384a1da\" href=\"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/briefing.pdf\">briefing<\/a><a href=\"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/briefing.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-88afc176-f491-416e-bc68-665d2384a1da\">Download<\/a><\/div>\n\n\n\n<p><strong>2. Business Proposal<\/strong><\/p>\n\n\n\n<p><strong>The business proposal for a Digital Wellness App, created during my Entrepreneurship class, highlights my ability to think innovatively and solve problems effectively. This project involved identifying a market need and designing app features that addressed digital wellness challenges, such as screen time management and promoting healthy digital habits. I developed a comprehensive business plan, which included marketing strategies, a budget, and an implementation timeline. This artifact demonstrates my attention to detail and my ability to approach real-world problems with a structured and analytical mindset.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1545\" height=\"1494\" src=\"http:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-06-at-11.07.08\u202fPM-e1733556752638.png\" alt=\"\" class=\"wp-image-319\" srcset=\"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-06-at-11.07.08\u202fPM-e1733556752638.png 1545w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-06-at-11.07.08\u202fPM-e1733556752638-300x290.png 300w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-06-at-11.07.08\u202fPM-e1733556752638-1024x990.png 1024w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-06-at-11.07.08\u202fPM-e1733556752638-768x743.png 768w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-06-at-11.07.08\u202fPM-e1733556752638-1536x1485.png 1536w, https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/Screenshot-2024-12-06-at-11.07.08\u202fPM-e1733556752638-310x300.png 310w\" sizes=\"(max-width: 1545px) 100vw, 1545px\" \/><\/figure>\n\n\n\n<p><strong>3. Cryptocurrency and Blockchain Report<\/strong><\/p>\n\n\n\n<p><strong>The cryptocurrency and blockchain report, written for my Cryptography for Cybersecurity class, reflects my ability to research and articulate complex technical concepts. This project explored the role of cryptographic algorithms, such as RSA and hashing techniques, in securing blockchain technology. I documented my findings in a clear and accessible way, connecting theoretical concepts to practical applications in data security. This artifact demonstrates my technical communication skills, attention to detail, and ability to analyze emerging technologies.<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/CS463-Course-Project.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CS463-Course-Project.\"><\/object><a id=\"wp-block-file--media-8ca244b2-ae5b-4c81-81b7-9136596eafde\" href=\"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/CS463-Course-Project.pdf\">CS463-Course-Project<\/a><a href=\"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-content\/uploads\/sites\/34772\/2024\/12\/CS463-Course-Project.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8ca244b2-ae5b-4c81-81b7-9136596eafde\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>1. Skills and Essential Work Habits Ability to Work Methodically and Be Detail-Oriented My Ethical Hacking and Penetration Testing course involved detailed exercises requiring precision\u00a0in identifying vulnerabilities and applying the correct techniques for successful exploits. Eagerness to Dig into Technical Questions The GIS for Cybersecurity course challenged me to tackle complex questions about using geospatial\u00a0intelligence&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/eportfolio-\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":26547,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-json\/wp\/v2\/users\/26547"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":354,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-json\/wp\/v2\/pages\/218\/revisions\/354"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}