{"id":307,"date":"2026-03-07T18:11:29","date_gmt":"2026-03-07T18:11:29","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/?page_id=307"},"modified":"2026-03-07T18:21:26","modified_gmt":"2026-03-07T18:21:26","slug":"skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/skills\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<p>This section highlights key skills developed throughout my cybersecurity coursework at Old Dominion University. The artifacts below demonstrate technical ability, analytical thinking, and research skills gained through coursework and hands-on projects.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Technical Skills<\/h2>\n\n\n\n<p>Assignments that demonstrate hands-on cybersecurity abilities such as system analysis, networking, Linux, and digital forensics.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. CYSE 270 \u2013 Linux in Cybersecurity<\/h3>\n\n\n\n<p><strong>Lab 7: Managing Local Storage<\/strong><\/p>\n\n\n\n<p>In this lab, I worked with Linux storage management tools to examine disk devices, create partitions, and configure filesystems. I used commands such as <code>ls<\/code>, <code>fdisk<\/code>, <code>parted<\/code>, and <code>df<\/code> to analyze disk information and manage a new virtual disk attached to a Linux virtual machine.<\/p>\n\n\n\n<p>I created a new primary partition, formatted it with the <strong>ext4 filesystem<\/strong>, mounted it to a directory, and verified that the system could access the new storage. This lab strengthened my understanding of Linux system administration and how storage devices are managed in a Linux environment.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/CYSE270-Lab-7.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE270-Lab-7<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><br>2. Network Infrastructure Design<\/h3>\n\n\n\n<p><strong>IT 315 \u2013 Introduction to Networking and Security<\/strong><\/p>\n\n\n\n<p>This project involved designing a wired network infrastructure for a high school building. The assignment required calculating cabling needs, selecting networking equipment, estimating costs, and designing VLAN segmentation to improve network security.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/IT-315-Case-Analysis-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">IT-315-Case-Analysis-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">3. CYSE 407 \u2013 Digital Forensics<\/h3>\n\n\n\n<p>My midterm and final assignments focused on analyzing digital evidence and understanding how forensic investigators identify and preserve artifacts from computer systems. The project required applying investigative techniques used in cybersecurity incident analysis. <\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/CYSE-407-Midterm.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-407-Midterm<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/CYSE-407-Final-Paper.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-407-Final-Paper<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>For more details:<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/cyse-407-digital-forensics\/\">Digital Forensics Page<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Critical Thinking<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Cybersecurity Workforce Analysis<\/h3>\n\n\n\n<p><strong>IDS 300W \u2013 Interdisciplinary Theory and Concepts<\/strong><\/p>\n\n\n\n<p>This research paper examined the gap between cybersecurity education and industry expectations. The paper integrated perspectives from education, workforce development, and cybersecurity to analyze why many graduates struggle to transition into cybersecurity careers.<\/p>\n\n\n\n<p>IDS300W Research Paper \u2013 <em>The Reality of Studying Cybersecurity vs. Real-World Expectations<\/em><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/IDS300W-Research-Paper-FINAL-2.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">IDS300W-Research-Paper-FINAL-2<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Policy Analysis and Writing<\/h3>\n\n\n\n<p><strong>CYSE 425W \u2013 Cyber Strategy and Policy<\/strong><\/p>\n\n\n\n<p>This policy analysis paper examines the <strong>United States National Cybersecurity Strategy (2023)<\/strong> and its role in shaping national cybersecurity governance. The analysis explores how the strategy addresses systemic cybersecurity risks, promotes shared responsibility across public and private sectors, and strengthens national resilience against cyber threats.<\/p>\n\n\n\n<p>The paper connects cybersecurity policy with real-world governance challenges, drawing on concepts such as critical infrastructure protection, risk management, and international cooperation. It also reflects on how national strategies align with frameworks such as the <strong>NIST Cybersecurity Framework<\/strong> and the role of agencies like <strong>CISA<\/strong> in implementing cybersecurity policy.<\/p>\n\n\n\n<p>This assignment strengthened my ability to analyze cybersecurity policy, evaluate strategic governance approaches, and communicate complex security issues through structured academic writing.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/CYSE-425W-Policy-Analysis-Paper.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-425W-Policy-Analysis-Paper<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This section highlights key skills developed throughout my cybersecurity coursework at Old Dominion University. The artifacts below demonstrate technical ability, analytical thinking, and research skills gained through coursework and hands-on projects. Technical Skills Assignments that demonstrate hands-on cybersecurity abilities such as system analysis, networking, Linux, and digital forensics. 1. CYSE 270 \u2013 Linux in Cybersecurity &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/skills\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Skills<\/span><\/a><\/p>\n","protected":false},"author":30417,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages\/307"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/users\/30417"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/comments?post=307"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages\/307\/revisions"}],"predecessor-version":[{"id":383,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages\/307\/revisions\/383"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/media?parent=307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}