{"id":218,"date":"2025-02-17T01:51:42","date_gmt":"2025-02-17T01:51:42","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2026-03-08T17:07:20","modified_gmt":"2026-03-08T17:07:20","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Essential Work Habits<\/strong><\/h2>\n\n\n\n<ul>\n<li><strong>Detail-oriented &amp; methodical<\/strong> \u2013 Documented and validated remediation for <strong>12+ vulnerabilities<\/strong> during penetration testing labs using Kali Linux and Wireshark.<\/li>\n\n\n\n<li><strong>Analytical problem solver<\/strong> \u2013 Investigated systems from both attacker and defender perspectives to strengthen security posture.<\/li>\n\n\n\n<li><strong>Adaptable learner<\/strong> \u2013 Built and managed <strong>6+ virtual machines<\/strong> simulating enterprise environments (VMware, VirtualBox).<\/li>\n\n\n\n<li><strong>Collaborative<\/strong> \u2013 Worked in team labs designing segmented, multi-subnet networks.<\/li>\n\n\n\n<li><strong>Current with threats &amp; standards<\/strong> \u2013 Knowledge of NIST frameworks, risk mitigation, and threat analysis (Security+ &amp; CySA+).<\/li>\n\n\n\n<li><strong>Reliable and results-driven<\/strong> \u2013 Balanced labs, certifications, internship, and coursework while maintaining a <strong>3.8 GPA<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p><strong>Artifacts:<\/strong> Pen test reports, VM builds, Wireshark analysis, internship policy work.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-content\/uploads\/sites\/38717\/2026\/03\/Assignment-3-Sword-vs.-Shield-Fall2024-1-1-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Assignment-3-Sword-vs.-Shield-Fall2024-1-1-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Soft Skills<\/strong><\/h2>\n\n\n\n<ul>\n<li><strong>Technical communication<\/strong> \u2013 Wrote reports explaining vulnerabilities, risk, and remediation in clear, structured language.<\/li>\n\n\n\n<li><strong>Presentation skills<\/strong> \u2013 Delivered coursework presentations on cybersecurity strategy and policy frameworks.<\/li>\n\n\n\n<li><strong>Explaining complex topics<\/strong> \u2013 Translated technical findings into practical security improvements.<\/li>\n\n\n\n<li><strong>Active listening &amp; professionalism<\/strong> \u2013 Customer-facing experience handling high-volume interactions with accuracy and composure.<\/li>\n\n\n\n<li><strong>Team collaboration<\/strong> \u2013 Coordinated with peers in labs to complete network and security projects.<\/li>\n<\/ul>\n\n\n\n<p><strong>Artifacts:<\/strong> Presentation slides, written lab reports, strategy papers.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-content\/uploads\/sites\/38717\/2026\/03\/SCADA-Write-Up-2-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">SCADA-Write-Up-2-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Solid Technical Foundation<\/strong><\/h2>\n\n\n\n<ul>\n<li><strong>Operating Systems &amp; Virtualization<\/strong> \u2013 Linux hardening, system permissions, firewall rules, VMware &amp; VirtualBox environments.<\/li>\n\n\n\n<li><strong>Networking<\/strong> \u2013 Multi-subnet network design, router\/switch configuration, traffic analysis with Wireshark.<\/li>\n\n\n\n<li><strong>Security Tools<\/strong> \u2013 Kali Linux, Nmap, Metasploit, vulnerability scanning and validation.<\/li>\n\n\n\n<li><strong>System Hardening<\/strong> \u2013 Patch verification, access control, and secure configuration practices.<\/li>\n\n\n\n<li><strong>Architecture Awareness<\/strong> \u2013 Built simulated production-style environments with servers and endpoints.<\/li>\n<\/ul>\n\n\n\n<p><strong>Artifacts:<\/strong> Network diagrams, Linux configs, lab screenshots.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-content\/uploads\/sites\/38717\/2026\/03\/Module-5-Lab-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Module-5-Lab-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Detailed Knowledge of Key Technologies<\/strong><\/h2>\n\n\n\n<ul>\n<li><strong>Linux Systems<\/strong> \u2013 Server configuration, permissions, updates, firewall setup<\/li>\n\n\n\n<li><strong>Microsoft Technologies<\/strong> \u2013 Active Directory concepts, Windows networking<\/li>\n\n\n\n<li><strong>Open Source Security Tools<\/strong> \u2013 Kali Linux, Wireshark, Nmap, Metasploit<\/li>\n\n\n\n<li><strong>Network Implementation &amp; Security<\/strong> \u2013 Segmentation, traffic flow validation, vulnerability assessment<\/li>\n\n\n\n<li><strong>Web &amp; Database Environments<\/strong> \u2013 Exposure through virtual lab server setups<\/li>\n\n\n\n<li><strong>Development\/Scripting Exposure<\/strong> \u2013 Command-line scripting and tool-based automation<\/li>\n\n\n\n<li><strong>Security Operations Concepts<\/strong> \u2013 Threat analysis, incident response fundamentals (CySA+)<\/li>\n\n\n\n<li><strong>Social Engineering &amp; Physical Security<\/strong> \u2013 Understanding of human and layered security risks<\/li>\n<\/ul>\n\n\n\n<p><strong>Artifacts:<\/strong> Tool outputs, vulnerability reports, lab environment builds.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-content\/uploads\/sites\/38717\/2026\/03\/SOC-Automation-Project-Google-Docs.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">SOC-Automation-Project-Google-Docs<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-content\/uploads\/sites\/38717\/2026\/03\/SOC-Automation-Project-Google-Doc2.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">SOC-Automation-Project-Google-Doc2<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Essential Work Habits Artifacts: Pen test reports, VM builds, Wireshark analysis, internship policy work. Soft Skills Artifacts: Presentation slides, written lab reports, strategy papers. Solid Technical Foundation Artifacts: Network diagrams, Linux configs, lab screenshots. Detailed Knowledge of Key Technologies Artifacts: Tool outputs, vulnerability reports, lab environment builds.<\/p>\n","protected":false},"author":29376,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/users\/29376"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":343,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/pages\/218\/revisions\/343"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-pcumiskey\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}