{"id":351,"date":"2026-03-07T16:48:23","date_gmt":"2026-03-07T16:48:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/?page_id=351"},"modified":"2026-03-07T19:06:49","modified_gmt":"2026-03-07T19:06:49","slug":"cybersecurity-coursework","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/cybersecurity-coursework\/","title":{"rendered":"Cybersecurity Coursework"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/Screenshot-2026-03-07-140450.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"552\" src=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/Screenshot-2026-03-07-140450-1024x552.png\" alt=\"\" class=\"wp-image-397\" srcset=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/Screenshot-2026-03-07-140450-1024x552.png 1024w, https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/Screenshot-2026-03-07-140450-300x162.png 300w, https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/Screenshot-2026-03-07-140450-768x414.png 768w, https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/Screenshot-2026-03-07-140450-1536x828.png 1536w, https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/Screenshot-2026-03-07-140450-833x449.png 833w, https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/Screenshot-2026-03-07-140450-192x104.png 192w, https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/Screenshot-2026-03-07-140450.png 1663w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>This section of my portfolio highlights the academic coursework that has shaped my development as a cybersecurity student at Old Dominion University. The cybersecurity program integrates interdisciplinary learning with technical and analytical training, preparing students to address complex security challenges in modern computing environments.<\/p>\n\n\n\n<p>The courses presented here reflect the progression of my studies through foundational concepts, networking and security principles, and hands-on technical applications such as Linux system administration and digital forensics. Together, these experiences have helped me build the technical knowledge, problem-solving ability, and critical thinking skills necessary for a career in cybersecurity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Core Courses<\/h2>\n\n\n\n<p>Core courses provide the foundational understanding of cybersecurity concepts, research, and interdisciplinary thinking.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Courses<\/h3>\n\n\n\n<p><strong>\u2022 <a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/cyse-201s-cybersecurity-and-social-science-page\/\">CYSE 201S \u2013 Cybersecurity and Social Science<\/a><br>\u2022 CYSE 301 Cybersecurity Techniques and Operations<br>\u2022 CYSE 406 Cyber Law <em>(currently in progress)<\/em><br>\u2022 CYSE 425W Cyber Strategy and Policy <em>(currently in progress)<\/em><br>\u2022 CS 464 \u2013 Cyber Fundamentals <\/strong><br><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Key Skills Developed<\/h3>\n\n\n\n<p>\u2022 Cybersecurity policy and governance awareness<br>\u2022 Interdisciplinary analysis of cybersecurity issues<br>\u2022 Security strategy and risk assessment<br>\u2022 Research and analytical writing<br>\u2022 Understanding the social and organizational impact of cybersecurity<\/p>\n<\/div>\n<\/div>\n<\/blockquote>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Principle Courses<\/h2>\n\n\n\n<p>Principle courses focus on networking concepts, security frameworks, and enterprise information assurance.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Courses<\/h3>\n\n\n\n<p>\u2022 IT 315 \u2013 Introduction to Network and Security<br>\u2022 IT 418 \u2013 Enterprise Information Assurance <em>(currently in progress)<\/em><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Key Skills Developed<\/h3>\n\n\n\n<p>\u2022 Networking fundamentals and secure network architecture<br>\u2022 Enterprise information assurance principles<br>\u2022 Security frameworks and compliance models<br>\u2022 Risk management and threat assessment<br>\u2022 Understanding security controls in enterprise environments<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Application Courses<\/h2>\n\n\n\n<p>Application courses emphasize hands-on technical experience, system security, and investigative techniques.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Courses<\/h2>\n\n\n\n<p>\u2022 CYSE 270 \u2013 Linux in Cybersecurity<br>\u2022 CYSE 407 \u2013 Digital Forensics<br>\u2022 CS 464 \u2013 Network Systems Security (<em>currently in progress)<\/em><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Key Skills Developed<\/h2>\n\n\n\n<ul>\n<li>Linux system administration<\/li>\n\n\n\n<li>Digital forensic analysis<\/li>\n\n\n\n<li>Network security investigation<\/li>\n\n\n\n<li>Incident response techniques<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Principle Courses Principle courses focus on networking concepts, security frameworks, and enterprise information assurance. Courses \u2022 IT 315 \u2013 Introduction to Network and Security\u2022 IT 418 \u2013 Enterprise Information Assurance (currently in progress) Key Skills Developed \u2022 Networking fundamentals and secure network architecture\u2022 Enterprise information assurance principles\u2022 Security frameworks and compliance models\u2022 Risk management and &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/cybersecurity-coursework\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Cybersecurity Coursework<\/span><\/a><\/p>\n","protected":false},"author":30417,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages\/351"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/users\/30417"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/comments?post=351"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages\/351\/revisions"}],"predecessor-version":[{"id":398,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages\/351\/revisions\/398"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/media?parent=351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}