{"id":218,"date":"2024-01-10T03:37:27","date_gmt":"2024-01-10T03:37:27","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-12-02T15:19:00","modified_gmt":"2025-12-02T15:19:00","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/esty05\/sample-page-2\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<p><strong>Technical Skills<\/strong><\/p>\n\n\n\n<p>I possess strong technical skills in cybersecurity, including performing penetration testing and password cracking to assess system defenses. I am proficient in writing shell scripts to automate security tasks and streamline vulnerability assessments. Additionally, I utilize tools such as Nessus and Zenmap to identify and analyze critical vulnerabilities within networks.<\/p>\n\n\n\n<p>Using Nmap and Nessus to scan the host 192.168.10.14 demonstrates my ability to identify network vulnerabilities and assess security risks. This hands-on experience strengthens my competencies in network security by applying industry-standard tools for vulnerability discovery.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1022\" height=\"630\" data-id=\"484\" src=\"https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/Screenshot-2025-11-27-223214.png\" alt=\"Network &amp; Security Course; demonstrates the discovery of vulnerabilities using nmap and Nessus, supporting my network security competencies\" class=\"wp-image-484\" srcset=\"https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/Screenshot-2025-11-27-223214.png 1022w, https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/Screenshot-2025-11-27-223214-300x185.png 300w, https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/Screenshot-2025-11-27-223214-768x473.png 768w, https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/Screenshot-2025-11-27-223214-487x300.png 487w\" sizes=\"(max-width: 1022px) 100vw, 1022px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"622\" height=\"810\" data-id=\"482\" src=\"https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/zmap-1.png\" alt=\"\" class=\"wp-image-482\" srcset=\"https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/zmap-1.png 622w, https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/zmap-1-230x300.png 230w\" sizes=\"(max-width: 622px) 100vw, 622px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><strong>CYSE 301 CYBERSECURITY TECHNIQUES AND OPERATIONS<\/strong><\/p>\n\n\n\n<p>The commands shown are used in a Linux environment to create new user groups and assign users to those groups, which is an essential part of managing permissions and access control. Proper group and user management helps ensure that only authorized individuals have access to specific resources, enhancing overall system security.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"685\" height=\"460\" data-id=\"489\" src=\"https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/penT2.png\" alt=\"\" class=\"wp-image-489\" srcset=\"https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/penT2.png 685w, https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/penT2-300x201.png 300w, https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/penT2-447x300.png 447w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"978\" height=\"615\" data-id=\"488\" src=\"https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/ubuntu.png\" alt=\"\" class=\"wp-image-488\" srcset=\"https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/ubuntu.png 978w, https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/ubuntu-300x189.png 300w, https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/ubuntu-768x483.png 768w, https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/ubuntu-477x300.png 477w\" sizes=\"(max-width: 978px) 100vw, 978px\" \/><\/figure>\n<\/figure>\n\n\n\n<p>CS 270 demonstrates how I implement Shell Scripting using a while loop, and I use the John the Ripper tool to crack their passwords in wordlist mode.<\/p>\n\n\n\n<p>A shell script can automate tasks in the Linux environment, such as processing files or managing system operations, using loops and conditional statements.  John the Ripper is a password-cracking tool that tests password strength by systematically trying words from a list against encrypted passwords.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/annotated-LAB20EIGHT20LOOP.docx-1-3.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-LAB20EIGHT20LOOP.docx-1-3.\"><\/object><a id=\"wp-block-file--media-620f52ad-2a6d-44a3-ae47-9b63d2f84f71\" href=\"https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/annotated-LAB20EIGHT20LOOP.docx-1-3.pdf\">annotated-LAB20EIGHT20LOOP.docx-1-3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/annotated-LAB20EIGHT20LOOP.docx-1-3.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-620f52ad-2a6d-44a3-ae47-9b63d2f84f71\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/annotated-linux20assignmnet205.docx-1-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-linux20assignmnet205.docx-1-1.\"><\/object><a id=\"wp-block-file--media-3c6254a6-522f-4dc8-bbba-aee0544b2d20\" href=\"https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/annotated-linux20assignmnet205.docx-1-1.pdf\">annotated-linux20assignmnet205.docx-1-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/esty05\/wp-content\/uploads\/sites\/35120\/2025\/11\/annotated-linux20assignmnet205.docx-1-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3c6254a6-522f-4dc8-bbba-aee0544b2d20\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Technical Skills I possess strong technical skills in cybersecurity, including performing penetration testing and password cracking to assess system defenses. I am proficient in writing shell scripts to automate security tasks and streamline vulnerability assessments. Additionally, I utilize tools such as Nessus and Zenmap to identify and analyze critical vulnerabilities within networks. Using Nmap and [&hellip;]<\/p>\n","protected":false},"author":28250,"featured_media":0,"parent":120,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/users\/28250"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":545,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/pages\/218\/revisions\/545"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/pages\/120"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}