Skills

Research

Within the digital world, Cybersecurity is still a relatively new topic. As a result, this creates a new area for investing in research and gaining new understanding on how cybersecurity can be applied in different fields, the effect that attacks can have both on controls and multiple industries, and how it’s development within new technologies could cause larger consequences. Below are three artifacts that represent my approaches in tackling these subjects and show how my capabilities with research have continually developed.

CYSE 200T – SCADA Systems Write-Up Assignment

annotated-Write-Up20-20SCADA20Systems

CS 462 – Blog Term Paper

annotated-CS2046220BLOG20PROJECT-44.docx-1

CYSE 526 – Final Research Paper Project

The-Potential-Emerging-Threat-of-Artificial-Intelligence-FINAL-1

Programming

Cybersecurity as a field is filled with a significant amount of technological depth. For any upcoming professional to be able to navigate the field’s more digital aspects requires experience with skills like coding or programming. This set of artifacts highlights my experience with programming languages and ethical hacking practice in the form of a Python group project, an ethical hacking assignment to break through multiple virtual machines, and a Java assignment on classes and the integration of several fundamental concepts into the language.

CYSE 250 – Socket Programming Group Project

annotated-Finding20the20Cheapest20Fast20Food20Restaurant

CYSE 301 – Ethical Hacking Assignment Part A and B

CYSE-301-Assignment-4-Part-A

CYSE-301-Assignment-4-Part-B

CS 151 – Programming Assignment on Classes

annotated-Assignment2023920Algorithm.docx

annotated-Employee.java_

annotated-TestEmployee.java_

Critical Thinking

Due to Cybersecurity overlapping within multiple fields of study and being integrated into other industries, it makes the concept interdisciplinary. For an interdisciplinary field of study to come to new conclusions, it requires the ability to think critically about multiple disciplines, approach them equally, and integrate them for a greater understanding that could not be reached without this form of thinking. The final set of artifacts demonstrates my ability to think critically by arguing the ethics of professional ethics between clients, employees, and the public, considering the ethical implications of financial incentives, and collaborating on a group project to understand how different federal agencies would simultaneously tackle a developing cybersecurity attack.

PHIL 355E – Professional Ethics Case Analysis

Professional-Ethics-Case-Analysis-1

CYSE 425W – Ethics of a Proposed Policy Paper

annotated-The20Ethical20Implications20of20Financial20Incentives20for20Investing20in20Cybersecurity20Policies.docx

CRJS 406 – Group Tabletop Project

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab