{"id":149,"date":"2022-10-23T18:30:35","date_gmt":"2022-10-23T18:30:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=149"},"modified":"2025-10-12T05:52:04","modified_gmt":"2025-10-12T05:52:04","slug":"skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/globle001\/skills\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<p>Through the numerous cybersecurity and information technology classes I have taken, I have had the great opportunity to complete assignments and projects that have allowed me to develop skills in networking, programming, and cybersecurity essentials. For each skill, there are three artifacts that showcases an assignment or project that has helped me learn these technical skills.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Networking<\/strong><\/h2>\n\n\n\n<p>Summary:<\/p>\n\n\n\n<p>Utilizing Cisco Packet Tracer and Ubuntu in Linux OS enabled me to gain a strong sense of how networking infrastructure works. This skill is especially important to know because it&#8217;s essentially how the devices we use everyday communicate with each other. <\/p>\n\n\n\n<p>Artifacts:<\/p>\n\n\n\n<ul>\n<li>Home Network Design Assignment <\/li>\n\n\n\n<li>Cisco Packet Tracer Assignment <\/li>\n\n\n\n<li>Linux Basic Network Configurations Assignment <\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Module-3-Submission-.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Module-3-Submission-.\"><\/object><a id=\"wp-block-file--media-6506898e-1b14-4660-b45a-fcda1b134a86\" href=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Module-3-Submission-.pdf\">Module-3-Submission-<\/a><a href=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Module-3-Submission-.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6506898e-1b14-4660-b45a-fcda1b134a86\">Download<\/a><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Packet-Tracer-Lab-2-2-1-1024x576.png\" alt=\"\" class=\"wp-image-339\" srcset=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Packet-Tracer-Lab-2-2-1-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Packet-Tracer-Lab-2-2-1-300x169.png 300w, https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Packet-Tracer-Lab-2-2-1-768x432.png 768w, https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Packet-Tracer-Lab-2-2-1-1536x864.png 1536w, https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Packet-Tracer-Lab-2-2-1-533x300.png 533w, https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Packet-Tracer-Lab-2-2-1.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Assignment-11-Basic-Network-Configurations-.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-11-Basic-Network-Configurations-.\"><\/object><a id=\"wp-block-file--media-44f90faf-d285-4585-a55e-cacff2828827\" href=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Assignment-11-Basic-Network-Configurations-.pdf\">Assignment-11-Basic-Network-Configurations-<\/a><a href=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Assignment-11-Basic-Network-Configurations-.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-44f90faf-d285-4585-a55e-cacff2828827\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Programming<\/strong><\/h2>\n\n\n\n<p>Summary:<\/p>\n\n\n\n<p>Primarily used Python and Ubuntu in Linux OS to perform programming and coding learning assignments. Understanding programming is important as a cybersecurity major because it allows me to understand cyber threats on a deeper level. <\/p>\n\n\n\n<p>Artifacts:<\/p>\n\n\n\n<ul>\n<li>CYSE 250 ifStatement Assignment <\/li>\n\n\n\n<li>CYSE 250 Socket Programming Project<\/li>\n\n\n\n<li>CYSE 270 Command Line Assignment<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"634\" src=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/ifStatementAssignment-1024x634.png\" alt=\"\" class=\"wp-image-346\" style=\"width:840px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/ifStatementAssignment-1024x634.png 1024w, https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/ifStatementAssignment-300x186.png 300w, https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/ifStatementAssignment-768x476.png 768w, https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/ifStatementAssignment-1536x952.png 1536w, https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/ifStatementAssignment-2048x1269.png 2048w, https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/ifStatementAssignment-484x300.png 484w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/CYSE-250-Project-Report.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE-250-Project-Report.\"><\/object><a id=\"wp-block-file--media-9de0dba3-4221-4860-b65a-114e19ac339e\" href=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/CYSE-250-Project-Report.pdf\">CYSE-250-Project-Report<\/a><a href=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/CYSE-250-Project-Report.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9de0dba3-4221-4860-b65a-114e19ac339e\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Assignment-2-Working-with-Command-Line.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-2-Working-with-Command-Line.\"><\/object><a id=\"wp-block-file--media-293960d0-ed83-4716-9b38-1165241a7205\" href=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Assignment-2-Working-with-Command-Line.pdf\">Assignment-2-Working-with-Command-Line<\/a><a href=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Assignment-2-Working-with-Command-Line.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-293960d0-ed83-4716-9b38-1165241a7205\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cybersecurity Essentials<\/strong><\/h2>\n\n\n\n<p>Summary:<\/p>\n\n\n\n<p>Using cybersecurity tools and interfaces such as Wireshark, Microsoft Windows, and Ubuntu has helped me learn essential cybersecurity technical skills such as password cracking, tracing and sniffing, and permission assignment. <\/p>\n\n\n\n<p>Artifacts:<\/p>\n\n\n\n<ul>\n<li>CYSE 250 Password Cracking Assignment <\/li>\n\n\n\n<li>CYSE 301 Traffic Tracing and Sniffing Assignment <\/li>\n\n\n\n<li>CYSE 270 File Permission Assignment<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Assignment_-Lab-5-Password-Cracking.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment_-Lab-5-Password-Cracking.\"><\/object><a id=\"wp-block-file--media-400fc549-7cb9-410a-b3bd-cd62540a3e1e\" href=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Assignment_-Lab-5-Password-Cracking.pdf\">Assignment_-Lab-5-Password-Cracking<\/a><a href=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Assignment_-Lab-5-Password-Cracking.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-400fc549-7cb9-410a-b3bd-cd62540a3e1e\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/CYSE301_Assignment-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE301_Assignment-2.\"><\/object><a id=\"wp-block-file--media-250dee27-30de-48c3-ab98-070277e971de\" href=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/CYSE301_Assignment-2.pdf\">CYSE301_Assignment-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/CYSE301_Assignment-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-250dee27-30de-48c3-ab98-070277e971de\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Assignment-6-File-Permission.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-6-File-Permission.\"><\/object><a id=\"wp-block-file--media-0878a025-e02b-4801-8946-7581d2f487d0\" href=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Assignment-6-File-Permission.pdf\">Assignment-6-File-Permission<\/a><a href=\"https:\/\/sites.wp.odu.edu\/globle001\/wp-content\/uploads\/sites\/30996\/2025\/10\/Assignment-6-File-Permission.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-0878a025-e02b-4801-8946-7581d2f487d0\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Through the numerous cybersecurity and information technology classes I have taken, I have had the great opportunity to complete assignments and projects that have allowed me to develop skills in networking, programming, and cybersecurity essentials. For each skill, there are three artifacts that showcases an assignment or project that has helped me learn these technical&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/globle001\/skills\/\">Read More<\/a><\/div>\n","protected":false},"author":25225,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/globle001\/wp-json\/wp\/v2\/pages\/149"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/globle001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/globle001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/globle001\/wp-json\/wp\/v2\/users\/25225"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/globle001\/wp-json\/wp\/v2\/comments?post=149"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/globle001\/wp-json\/wp\/v2\/pages\/149\/revisions"}],"predecessor-version":[{"id":348,"href":"https:\/\/sites.wp.odu.edu\/globle001\/wp-json\/wp\/v2\/pages\/149\/revisions\/348"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/globle001\/wp-json\/wp\/v2\/media?parent=149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}