{"id":334,"date":"2026-05-04T13:31:35","date_gmt":"2026-05-04T13:31:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/hbvportfolio\/?page_id=334"},"modified":"2026-05-05T05:30:55","modified_gmt":"2026-05-05T05:30:55","slug":"three-main-skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/hbvportfolio\/three-main-skills\/","title":{"rendered":"Three Main Skills"},"content":{"rendered":"\n<p>The three main skills that I wish to share with employers in this eportfolio are my intermediate Python proficiency, understanding of cybersecurity tools, and ability to write analytical reports.<\/p>\n\n\n\n<p>Python is an important programming language for cybersecurity professionals to understand because it is used in a wide variety of contexts. It is the main programming language employed by applications available on the app store, making it increasingly relevant as mobile devices such as those manufactured by Apple lapse personal computers in terms of widespread use. In the PDF below are three small programs written in Python to demonstrate my proficiency. Collected into one document for reader convenience.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Python-Demo.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Python-Demo.\"><\/object><a id=\"wp-block-file--media-9411584e-8622-4a14-a1dd-525078c82814\" href=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Python-Demo.pdf\">Python-Demo<\/a><a href=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Python-Demo.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9411584e-8622-4a14-a1dd-525078c82814\">Download<\/a><\/div>\n\n\n\n<p>The world of cybersecurity has numerous tools that are employed to make work more efficient. An understanding of these tools is necessary if a cybersecurity professional wishes to avoid wasting time or making mistakes that would have been avoided through proper use of cybersecurity tools. Attached are three PDFs showcasing my proficiency with the skills available in the Kali Linux suite specialized for cybersecurity and pen testing.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Assignment-3-CYSE301-HBV.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-3-CYSE301-HBV.\"><\/object><a id=\"wp-block-file--media-73242b21-96f2-4215-aa2c-db64f57c03b4\" href=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Assignment-3-CYSE301-HBV.pdf\">Assignment-3-CYSE301-HBV<\/a><a href=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Assignment-3-CYSE301-HBV.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-73242b21-96f2-4215-aa2c-db64f57c03b4\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Lab-Assignment-4-5-HBV.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-Assignment-4-5-HBV.\"><\/object><a id=\"wp-block-file--media-7f7468d0-d724-4510-b093-3e76ef264f3f\" href=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Lab-Assignment-4-5-HBV.pdf\">Lab-Assignment-4-5-HBV<\/a><a href=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Lab-Assignment-4-5-HBV.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7f7468d0-d724-4510-b093-3e76ef264f3f\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Lab-Assignment-6-HBV.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-Assignment-6-HBV.\"><\/object><a id=\"wp-block-file--media-c4460343-03e9-411d-88f9-6d9189a7ebb0\" href=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Lab-Assignment-6-HBV.pdf\">Lab-Assignment-6-HBV<\/a><a href=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Lab-Assignment-6-HBV.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c4460343-03e9-411d-88f9-6d9189a7ebb0\">Download<\/a><\/div>\n\n\n\n<p>The last skill I wish to illustrate is my skill in analytical writing. This is an understated but absolutely critical skill in cybersecurity. In the context of an academic environment, one&#8217;s ability to write analytical reports is stress tested by university standards. The ability to gather reliable information is also stress tested by the reliance on peer-reviewed studies in many cases. Embedded below are three examples of analytical writing that should paint a clear picture of my proficiency in differing contexts.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Analysis-on-Hacking-Humans-and-the-Threat-of-DNA-Cybercrime.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Analysis-on-Hacking-Humans-and-the-Threat-of-DNA-Cybercrime.\"><\/object><a id=\"wp-block-file--media-010b1807-f394-4719-aa33-b909bff1b47e\" href=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Analysis-on-Hacking-Humans-and-the-Threat-of-DNA-Cybercrime.pdf\">Analysis-on-Hacking-Humans-and-the-Threat-of-DNA-Cybercrime<\/a><a href=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Analysis-on-Hacking-Humans-and-the-Threat-of-DNA-Cybercrime.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-010b1807-f394-4719-aa33-b909bff1b47e\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Research-Paper-HBV.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Research-Paper-HBV.\"><\/object><a id=\"wp-block-file--media-415ceca8-aec2-4d81-8f1d-49b75f858fd0\" href=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Research-Paper-HBV.pdf\">Research-Paper-HBV<\/a><a href=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/Research-Paper-HBV.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-415ceca8-aec2-4d81-8f1d-49b75f858fd0\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/CS-465-final-project-HBV.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CS-465-final-project-HBV.\"><\/object><a id=\"wp-block-file--media-c9494501-66ba-4d0e-a1a7-02d45b887691\" href=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/CS-465-final-project-HBV.pdf\">CS-465-final-project-HBV<\/a><a href=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-content\/uploads\/sites\/34276\/2026\/05\/CS-465-final-project-HBV.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c9494501-66ba-4d0e-a1a7-02d45b887691\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The three main skills that I wish to share with employers in this eportfolio are my intermediate Python proficiency, understanding of cybersecurity tools, and ability to write analytical reports. Python is an important programming language for cybersecurity professionals to understand because it is used in a wide variety of contexts. It is the main programming&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/hbvportfolio\/three-main-skills\/\">Read More<\/a><\/div>\n","protected":false},"author":27557,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-json\/wp\/v2\/pages\/334"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-json\/wp\/v2\/users\/27557"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-json\/wp\/v2\/comments?post=334"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-json\/wp\/v2\/pages\/334\/revisions"}],"predecessor-version":[{"id":352,"href":"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-json\/wp\/v2\/pages\/334\/revisions\/352"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/hbvportfolio\/wp-json\/wp\/v2\/media?parent=334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}