{"id":218,"date":"2022-09-21T16:13:07","date_gmt":"2022-09-21T16:13:07","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-04-26T01:12:56","modified_gmt":"2025-04-26T01:12:56","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/epres010\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Research<\/h2>\n\n\n\n<p>Within the digital world, Cybersecurity is still a relatively new topic. As a result, this creates a new area for investing in research and gaining new understanding on how cybersecurity can be applied in different fields, the effect that attacks can have both on controls and multiple industries, and how it&#8217;s development within new technologies could cause larger consequences. Below are three artifacts that represent my approaches in tackling these subjects and show how my capabilities with research have continually developed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CYSE 200T &#8211; SCADA Systems Write-Up Assignment<\/h3>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/uploads\/sites\/30561\/2025\/04\/annotated-Write-Up20-20SCADA20Systems.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-Write-Up20-20SCADA20Systems<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CS 462 &#8211; Blog Term Paper<\/h3>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/uploads\/sites\/30561\/2025\/04\/annotated-CS2046220BLOG20PROJECT-44.docx-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-CS2046220BLOG20PROJECT-44.docx-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CYSE 526 &#8211; Final Research Paper Project<\/h3>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/uploads\/sites\/30561\/2025\/04\/The-Potential-Emerging-Threat-of-Artificial-Intelligence-FINAL-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">The-Potential-Emerging-Threat-of-Artificial-Intelligence-FINAL-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Programming<\/h2>\n\n\n\n<p>Cybersecurity as a field is filled with a significant amount of technological depth. For any upcoming professional to be able to navigate the field&#8217;s more digital aspects requires experience with skills like coding or programming. This set of artifacts highlights my experience with programming languages and ethical hacking practice in the form of a Python group project, an ethical hacking assignment to break through multiple virtual machines, and a Java assignment on classes and the integration of several fundamental concepts into the language. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CYSE 250 &#8211; Socket Programming Group Project<\/h3>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/uploads\/sites\/30561\/2025\/04\/annotated-Finding20the20Cheapest20Fast20Food20Restaurant.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-Finding20the20Cheapest20Fast20Food20Restaurant<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CYSE 301 &#8211; Ethical Hacking Assignment Part A and B<\/h3>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/uploads\/sites\/30561\/2025\/04\/CYSE-301-Assignment-4-Part-A.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-301-Assignment-4-Part-A<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/uploads\/sites\/30561\/2025\/04\/CYSE-301-Assignment-4-Part-B.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-301-Assignment-4-Part-B<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CS 151 &#8211; Programming Assignment on Classes<\/h3>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/uploads\/sites\/30561\/2025\/04\/annotated-Assignment2023920Algorithm.docx.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-Assignment2023920Algorithm.docx<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/uploads\/sites\/30561\/2025\/04\/annotated-Employee.java_.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-Employee.java_<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/uploads\/sites\/30561\/2025\/04\/annotated-TestEmployee.java_.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-TestEmployee.java_<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Critical Thinking<\/h2>\n\n\n\n<p>Due to Cybersecurity overlapping within multiple fields of study and being integrated into other industries, it makes the concept interdisciplinary. For an interdisciplinary field of study to come to new conclusions, it requires the ability to think critically about multiple disciplines, approach them equally, and integrate them for a greater understanding that could not be reached without this form of thinking. The final set of artifacts demonstrates my ability to think critically by arguing the ethics of professional ethics between clients, employees, and the public, considering the ethical implications of financial incentives, and collaborating on a group project to understand how different federal agencies would simultaneously tackle a developing cybersecurity attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">PHIL 355E &#8211; Professional Ethics Case Analysis<\/h3>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/uploads\/sites\/30561\/2025\/04\/Professional-Ethics-Case-Analysis-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Professional-Ethics-Case-Analysis-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CYSE 425W &#8211; Ethics of a Proposed Policy Paper<\/h3>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/uploads\/sites\/30561\/2025\/04\/annotated-The20Ethical20Implications20of20Financial20Incentives20for20Investing20in20Cybersecurity20Policies.docx.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-The20Ethical20Implications20of20Financial20Incentives20for20Investing20in20Cybersecurity20Policies.docx<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">CRJS 406 &#8211; Group Tabletop Project<\/h3>\n\n\n<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fepres010%2Fwp-content%2Fuploads%2Fsites%2F30561%2F2025%2F04%2FGroup-Tabletop-project-3.pdf&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 100%;height: 500%;border: none;min-height: 500px;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading&#8230;<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/uploads\/sites\/30561\/2025\/04\/Group-Tabletop-project-3.pdf\" class=\"ead-document-btn\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/epres010\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Research Within the digital world, Cybersecurity is still a relatively new topic. As a result, this creates a new area for investing in research and gaining new understanding on how cybersecurity can be applied in different fields, the effect that attacks can have both on controls and multiple industries, and how it&#8217;s development within new &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/epres010\/skills-2\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Skills<\/span><\/a><\/p>\n","protected":false},"author":24915,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/users\/24915"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":1056,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/pages\/218\/revisions\/1056"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}