{"id":522,"date":"2026-04-27T15:25:07","date_gmt":"2026-04-27T15:25:07","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ianhagmann\/?page_id=522"},"modified":"2026-05-01T18:31:47","modified_gmt":"2026-05-01T18:31:47","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ianhagmann\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n<p>With Cybersecurity being my major, I have gained a very general cybersecurity skill. I first started learning about cybersecurity in high school and earned my CompTIA Security+ (linked here: <a href=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/certifications\/\">https:\/\/sites.wp.odu.edu\/ianhagmann\/certifications\/<\/a>). My time studying at Old Dominion University has had me perform a number of cybersecurity tasks like deep research, white hat hacking, looking at policy, and group work creating a comprehensive network design. I believe these have left me ready for landing a role in all sorts of areas in cybersecurity.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-ian-hagmann-eportfolio wp-block-embed-ian-hagmann-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"uMm789clzP\"><a href=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/cybersecurity-fundamentals\/\">Cybersecurity Fundamentals<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Cybersecurity Fundamentals&#8221; &#8212; Ian Hagmann ePortfolio\" src=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/cybersecurity-fundamentals\/embed\/#?secret=lcwnPSynVl#?secret=uMm789clzP\" data-secret=\"uMm789clzP\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-ian-hagmann-eportfolio wp-block-embed-ian-hagmann-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"awu1oPRPdg\"><a href=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/cyse-301\/\">Cybersecurity Techniques and Operations<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Cybersecurity Techniques and Operations&#8221; &#8212; Ian Hagmann ePortfolio\" src=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/cyse-301\/embed\/#?secret=7kMBQVbbZJ#?secret=awu1oPRPdg\" data-secret=\"awu1oPRPdg\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-ian-hagmann-eportfolio wp-block-embed-ian-hagmann-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"J1VQ3OZO5q\"><a href=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/windows-system-management-and-security\/\">Windows System Management and Security<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Windows System Management and Security&#8221; &#8212; Ian Hagmann ePortfolio\" src=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/windows-system-management-and-security\/embed\/#?secret=mLFUjopf69#?secret=J1VQ3OZO5q\" data-secret=\"J1VQ3OZO5q\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-ian-hagmann-eportfolio wp-block-embed-ian-hagmann-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"lq1tnSWrYS\"><a href=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/cybersecurity-strategy-and-policy\/\">Cybersecurity Strategy and Policy<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Cybersecurity Strategy and Policy&#8221; &#8212; Ian Hagmann ePortfolio\" src=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/cybersecurity-strategy-and-policy\/embed\/#?secret=Roz7l1GlSO#?secret=lq1tnSWrYS\" data-secret=\"lq1tnSWrYS\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-ian-hagmann-eportfolio wp-block-embed-ian-hagmann-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"fkTljtfy69\"><a href=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/management-of-information-security\/\">Management of Information Security<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Management of Information Security&#8221; &#8212; Ian Hagmann ePortfolio\" src=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/management-of-information-security\/embed\/#?secret=EzRQQNdpOH#?secret=fkTljtfy69\" data-secret=\"fkTljtfy69\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Reflective Essay<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-content\/uploads\/sites\/30545\/2026\/05\/ReflectiveEssay.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of ReflectiveEssay.\"><\/object><a id=\"wp-block-file--media-227d7073-1dba-454f-8789-e24c8c3d189d\" href=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-content\/uploads\/sites\/30545\/2026\/05\/ReflectiveEssay.pdf\">ReflectiveEssay<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>With Cybersecurity being my major, I have gained a very general cybersecurity skill. I first started learning about cybersecurity in high school and earned my CompTIA Security+ (linked here: https:\/\/sites.wp.odu.edu\/ianhagmann\/certifications\/). My time studying at Old Dominion University has had me perform a number of cybersecurity tasks like deep research, white hat hacking, looking at policy,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":24902,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/pages\/522"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/users\/24902"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/comments?post=522"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/pages\/522\/revisions"}],"predecessor-version":[{"id":552,"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/pages\/522\/revisions\/552"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/media?parent=522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}