{"id":378,"date":"2025-11-30T22:58:10","date_gmt":"2025-11-30T22:58:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ethanlombos\/?page_id=378"},"modified":"2025-12-01T00:26:44","modified_gmt":"2025-12-01T00:26:44","slug":"skills-3","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ethanlombos\/skills-3\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Skill 1: Critical Thinking<\/strong><\/h2>\n\n\n\n<p><strong>Artifact 1:<\/strong> Research Paper on Cybersecurity Threats<\/p>\n\n\n\n<ul>\n<li><strong>Description:<\/strong> A detailed analysis of current cybersecurity threats. Demonstrates ability to evaluate sources, synthesize information, and make evidence-based conclusions.<\/li>\n\n\n\n<li><strong>Artifact Link\/Embed:<\/strong><\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/annotated-7.420Complete20Case20Analysis.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-7.420Complete20Case20Analysis.docx.\"><\/object><a id=\"wp-block-file--media-25a7f284-0807-4dba-b9ea-842ab5295505\" href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/annotated-7.420Complete20Case20Analysis.docx.pdf\">annotated-7.420Complete20Case20Analysis.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/annotated-7.420Complete20Case20Analysis.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-25a7f284-0807-4dba-b9ea-842ab5295505\">Download<\/a><\/div>\n\n\n\n<p><strong>Artifact 2:<\/strong> IDS 300W Analytical Assignment<\/p>\n\n\n\n<ul>\n<li><strong>Description:<\/strong> Assignment where I broke down a complex research question into smaller components, evaluated evidence, and created a logical conclusion. Shows critical thinking in analyzing and structuring information.<\/li>\n\n\n\n<li><strong>Artifact Link\/Embed:<\/strong> <\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/annotated-IDS2030020Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-IDS2030020Paper.\"><\/object><a id=\"wp-block-file--media-80db4a09-41f0-49d5-aa57-57bfd6f03b33\" href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/annotated-IDS2030020Paper.pdf\">annotated-IDS2030020Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/annotated-IDS2030020Paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-80db4a09-41f0-49d5-aa57-57bfd6f03b33\">Download<\/a><\/div>\n\n\n\n<p><strong>Artifact 3:<\/strong> Case Study Analysis<\/p>\n\n\n\n<ul>\n<li><strong>Description:<\/strong> Evaluated a real-world cybersecurity incident, identified the risks, and recommended strategies for resolution. Highlights practical application of critical thinking skills.<\/li>\n\n\n\n<li><strong>Artifact Link\/Embed:<\/strong> <\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/Case-Analysis-on-Cyberconflict.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Case-Analysis-on-Cyberconflict.\"><\/object><a id=\"wp-block-file--media-42ad5481-34b0-4b12-bbcb-adf00b939080\" href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/Case-Analysis-on-Cyberconflict.pdf\">Case-Analysis-on-Cyberconflict<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/Case-Analysis-on-Cyberconflict.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-42ad5481-34b0-4b12-bbcb-adf00b939080\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Skill 2: Communication<\/strong><\/h2>\n\n\n\n<p><strong>Artifact 1:<\/strong> Group Presentation on Network Security Protocols<\/p>\n\n\n\n<ul>\n<li><strong>Description:<\/strong> Collaborative project where I explained technical concepts clearly to peers. Demonstrates verbal and visual communication skills.<\/li>\n\n\n\n<li><strong>Artifact Link\/Embed:<\/strong> <\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/Milestone-2-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Milestone-2-1.\"><\/object><a id=\"wp-block-file--media-68065817-cf06-45c0-a3b0-f15db058dc0e\" href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/Milestone-2-1.pdf\">Milestone-2-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/Milestone-2-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-68065817-cf06-45c0-a3b0-f15db058dc0e\">Download<\/a><\/div>\n\n\n\n<p><strong>Artifact 2:<\/strong> Lab Simulation Documentation<\/p>\n\n\n\n<ul>\n<li><strong>Description:<\/strong> Documented procedures and findings during cybersecurity lab simulations. Shows ability to communicate technical work clearly for others to follow.<\/li>\n\n\n\n<li><strong>Artifact Link\/Embed:<\/strong> <\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/Assignment-4-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-4-1.\"><\/object><a id=\"wp-block-file--media-feedabdf-5444-4d4a-b214-3e964608f08b\" href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/Assignment-4-1.pdf\">Assignment-4-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/Assignment-4-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-feedabdf-5444-4d4a-b214-3e964608f08b\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Skill 3: Problem-Solving<\/strong><\/h2>\n\n\n\n<p><strong>Artifact 1:<\/strong> Cybersecurity Attack Simulation Lab<\/p>\n\n\n\n<ul>\n<li><strong>Description:<\/strong> Solved technical challenges in a simulated cybersecurity attack environment using troubleshooting and reasoning skills.<\/li>\n\n\n\n<li><strong>Artifact Link\/Embed:<\/strong> [Insert lab report or embedded document]<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/Assignment-9-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-9-1.\"><\/object><a id=\"wp-block-file--media-80d0c787-1143-4626-aedc-8abfb4a6b8d3\" href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/Assignment-9-1.pdf\">Assignment-9-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/Assignment-9-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-80d0c787-1143-4626-aedc-8abfb4a6b8d3\">Download<\/a><\/div>\n\n\n\n<p><strong>Artifact 2:<\/strong> Network Troubleshooting Project<\/p>\n\n\n\n<ul>\n<li><strong>Description:<\/strong> Applied networking concepts to identify and resolve technical issues in a classroom lab setting. Demonstrates hands-on problem-solving.<\/li>\n\n\n\n<li><strong>Artifact Link\/Embed:<\/strong> [Insert PDF or embedded document]<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/assignment-2-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of assignment-2-1.\"><\/object><a id=\"wp-block-file--media-cd89ae95-bb05-43c1-b5b5-6666e54a4c2c\" href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/assignment-2-1.pdf\">assignment-2-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-content\/uploads\/sites\/31973\/2025\/12\/assignment-2-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-cd89ae95-bb05-43c1-b5b5-6666e54a4c2c\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Skill 1: Critical Thinking Artifact 1: Research Paper on Cybersecurity Threats Artifact 2: IDS 300W Analytical Assignment Artifact 3: Case Study Analysis Skill 2: Communication Artifact 1: Group Presentation on Network Security Protocols Artifact 2: Lab Simulation Documentation Skill 3: Problem-Solving Artifact 1: Cybersecurity Attack Simulation Lab Artifact 2: Network Troubleshooting Project<\/p>\n","protected":false},"author":25871,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/pages\/378"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/users\/25871"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/comments?post=378"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/pages\/378\/revisions"}],"predecessor-version":[{"id":403,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/pages\/378\/revisions\/403"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/media?parent=378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}