Reflection

Introduction 

In the world of cybersecurity, the greatest myth is that success is purely based on technical skill. The reality is that the tools, code, firewalls, and encryption algorithms are only a piece of this equation, as modern cyberattacks target the human element through social engineering (Spitzner, 2023). To achieve true success, a cybersecurity professional must operate in three woven layers: technical, forensic, and policy. A professional must not only possess the knowledge on how to defend a network but why it needs defending and how to prove exactly what happened after a disaster. My journey through the Cybersecurity program at Old Dominion University was not about learning these layers in isolation. It was about integration, the process of connecting these thoughts together into a unified, mult-layered professional mindset. My e-portfolio is the agent of that integration. It is designed to provide concrete evidence that I have not only mastered the isolated skills of my discipline but have also connected them into the comprehensive, professional framework required in the cybersecurity field.

This reflection will not just summarize my work, it will analyze it. It will break down how specific artifacts from my academic career prove my expertise across the core learning outcomes of my degree. I have selected three key artifacts for this analysis. The Password Cracking Lab from my CYSE 301 course to demonstrate my technical skills. A Policy and Political Effects on Elections Analysis paper from my CYSE 495 course to signify my understanding of human and organizational lapses. Finally, an Incident Response Policy Paper from my CYSE 425W course to reflect my forensic and strategic mindset. This reflection will prove how these artifacts are not separate assignments, but are all integrated parts of the same story.

To further support this analysis, I will incorporate insights from scholarly research on topics like security culture, leadership, and the future of the job market. This process directly follows the “What? So what? Now What?” model to move beyond simply describing my work but analyze why it matters and how I will use my cybersecurity proficiency in my future career. Ultimately, this reflection will demonstrate that an interdisciplinary approach is not just a benefit, but a requirement for success in the current landscape of cybersecurity. 

Technical Proficiency

The ability to manipulate and protect computer systems is a foundational skill of my cybersecurity degree. The Password Cracking Lab from my CYSE 301 course is the core proof of this skill. This artifact is a record of complex, multi-stage simulated attack. The ultimate objective was to prove that I could set up a penetration testing environment, identify vulnerabilities in both active Linux and Windows network environments, and use industry standard tools like Metasploit, John the Ripper, and aircrack-ng to successfully triumph over those vulnerabilities. This lab directly addresses the first learning outcome of my degree, but its true value shines from the lessons learned during the process. This lab was designed to think like a hacker, not just input the commands. 

The process of completing this lab was a practical lesson in the nature of cyberattacks. I understood that a successful triumph is not a single action, but a chain of them. The initial step was not to attack, but to conduct a survey using Wireshark to analyze network traffic and identify potential vulnerabilities. The key point for me was understanding that the attacker’s initial goal is always to find the path of least resistance. For this matter, that path was not through a complex software vulnerability, but through a weak password. The most demanding part of the creation process for this artifact was not in the cracking itself, but in the meticulous setup. I had to comprehend how to configure multiple virtual machines to communicate on a shared virtual network. A process which required me to troubleshoot network adapter settings and navigate through firewall rules. This lab is a direct application of Learning Outcome #2, which is to apply troubleshooting practices.

However, the most critical interdisciplinary connection came from my knowledge of networking, which I learned in my ITN 260 course. A crucial moment during this lab was when my first attempt to capture a WPA handshake with aircrack-ng failed. I just simply could keep running the same command. I had to figure out why my attempts were failing. By utilizing my knowledge of the 802.11 wireless protocols, I was able to identify the problem. The issue was that I was not correctly forcing a deauthentication to capture a new handshake. Without that essential knowledge from a completely different class, the sophisticated security tool had no function. Recent cybersecurity education has displayed, hands-on, offensively focused labs are vital because they force students to blend knowledge from multiple domains, like networking and security, to solve a complex problem (Namin et al.,2016). This experience proved that to me instantaneously. 

This lab was not only an academic exercise, it is solid proof that I possess the hard skills required for my future career. When I performed an analysis on the job ad for a “Special Agent” position with the FBI, they clarified that they were not looking for a candidate that could just follow a script. The ad required skills in “data analysis” and the knowledge to “identify and determine how to mitigate cyber threats.” The Wi-Fi analysis section of this lab, where I had to decrypt traffic and then perform a thorough network flow analysis with Wireshark, is a perfect representation of that skill. For my future career, I will use the lessons learned from this lab not to hack systems, but to develop better defenses. Since I have been through the exercise of exploiting weak passwords and unencrypted traffic, I now possess a much deeper and more practical understanding of precisely why policies require strong passwords and network encryption. These are not rules made to obey, they are nonadjustable rules to certify defense.

Strategic Analysis

A cybersecurity professional who only comprehends the technical perspective is a professional who is certain to fail. The most paramount lesson I learned at Old Dominion University is that the greatest weaknesses in any system are not technical, they are human and organizational (Whitman, 2003). My analysis paper from my CYSE 495 course, which examined the political and policy effects surrounding the recent Ecuadorian election, is the best artifact to prove my knowledge in Learning Outcome 2, to identify security lapses, especially the lapses that have nothing to do with technology. This paper required me to move beyond the technical aspect and into the much more complex world of human motivation, organizational failure, and political friction. The paper is solid evidence of my ability to analyze the “big picture.”

The central focus of this paper was my analysis of how non-technical conflicts in a chain of command can entirely destroy an effective technical defense. The process of writing this paper was a fundamental learning process. I started my research by identifying the technical claims of election fraud in Ecuador, such as accusations of “transferable ink” and ransomware attacks. However, as I researched further, I realized that the true story was not about technology at all. The real narrative was about the “human element” security lapse. The most crucial aspect in creating this artifact was not understanding the technical details, but in unraveling the web of allegations, political motivations, and the deep public distrust that made the entire election so unpredictable.  

Forensic and Strategic Application

The final layer of a complete cybersecurity professional is not just possessing the ability to analyze a political election or perform technical actions, but the skill to create a policy that controls those actions. My Incident Response Policy Paper from my CYSE 425W course is the prime artifact to prove this ability. It reflects my competency in the third learning outcome of my degree, which is to “examine and collect forensic evidence.” This is not just in a technical sense, but within the legally defensible framework that a professional policy needs. 

This artifact perfectly demonstrates that I can think strategically and create the necessary documentation that is required for a business to survive against a real-world cyberattack. The assignment had required me to draft a full-scale incident response plan for a fictional organization, a process that was rigorous and difficult. The main obstacle was understanding that good policy is not just a technical document. It is a document that revolves around communication. It must be written explicitly so that anyone, from a C-suite executive to an intern, can understand their exact role and duties during an intensely stressful security attack.

The key lesson that I learned from this artifact was a deep understanding of what management deems “process standardization,” the idea that a distinct, well-defined process is the only way to ensure a powerful and synchronized response in a crisis. This paper made me develop this process from scratch. Fundamentally, it acts as a direct link to all of my other artifacts. The realistic simulations I had to plan in for my policy like what to do when an employee’s credentials have been captured. Directly results from the weak points I had identified in my Password Cracking Lab. This signifies that I am a strategist that can write a certified plan that technicians can follow.

Conclusion

Overall, my e-portfolio isn’t a collection of assignments, it is the definitive proof of my transformation from a student into a cybersecurity professional. It is the story of my journey learning cybersecurity. My journey throughout my courses in the cybersecurity program have prepared me for the challenges of my future career, by teaching me how to connect these technical tools to combat the complex realities of policy, human behavior, and organizational politics, which are critical components for building a strong security culture (Enisa, 2017). The portfolio represents the knowledge I have gained to engage with my coursework assignments by actively seeking out the connections between them. This precise interdisciplinary thinking is absolutely required to ensure success in the cybersecurity field. The future of threats we must combat are constantly evolving, our defenses need to evolve as well. The current cyber field requires cybersecurity professionals who are strategists, analysts, and leaders that integrate all parts of the discipline (Karyda 2007). My e-portfolio is validated evidence that I am ready to become one of them. 

References 

Enisa, E. (2017b, November 11). Cyber security culture in organisations – ENISA. www.enisa.europa.eu. https://www.enisa.europa.eu/sites/default/files/publications/WP2017 O-3-3-1 Cyber Security Cultures in Organizations.pdf https://www.enisa.europa.eu/sites/default/files/publications/WP2017%20O-3-3-1%20Cyber%20Security%20Cultures%20in%20Organizations.pdf

Karyda, M. (2007, September 18). Fostering Information Security Culture In Organizations: A Research Agenda. https://files.core.ac.uk/. https://core.ac.uk/download/pdf/301373754.pdf

Namin, A. S., Aguirre-Muñoz, Z., & Jones, K. S. (2016, May 21). Teaching cyber security through competition. www.myweb.ttu.edu. http://www.myweb.ttu.edu/asiamina/research_files/CyberCorpsData/Namin-etal-CSEIT2016-V6.pdf

Spitzner, L. (2023, July 25). Sans 2023 security awareness report: Managing human risk. SANS Institute. https://www.sans.org/blog/sans-2023-security-awareness-report-managing-human-risk

Whitman, M. E. (2003, August 16). Enemy at the Gate: Threats to Information Security. https://digitalcommons.kennesaw.edu/. https://digitalcommons.kennesaw.edu/cgi/viewcontent.cgi?article=2421&context=facpubs