{"id":184,"date":"2025-04-11T18:02:51","date_gmt":"2025-04-11T18:02:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ids493spring25\/?page_id=184"},"modified":"2025-04-29T02:01:40","modified_gmt":"2025-04-29T02:01:40","slug":"skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ids493spring25\/skills\/","title":{"rendered":"SKILLS"},"content":{"rendered":"\n<p>Here are three essential cybersecurity skills, along with three artifacts associated with each skill that I am interested in acquiring:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Threat Hunting<\/strong><\/h3>\n\n\n\n<p>Threat hunting involves proactively searching for indicators of compromise (IOCs) and malicious activities within an organization&#8217;s systems. Since my background is in Research I would be interested in developing this skill as it pertains to Cybersecurity.<\/p>\n\n\n\n<p><strong>Artifacts:<\/strong><\/p>\n\n\n\n<ul>\n<li><strong>Network-based Artifacts:<\/strong> Logs of TCP\/UDP port activity, such as SMTP or HTTP traffic, which can reveal unauthorized connections.<\/li>\n\n\n\n<li><strong>Host-based Artifacts:<\/strong> Registry keys and file system changes that indicate malware presence or configuration tampering.<\/li>\n\n\n\n<li><strong>Memory Dumps:<\/strong> Captured snapshots of system memory used to analyze active processes and identify malicious code.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Programming<\/strong><\/h3>\n\n\n\n<p>Programming is critical for developing secure systems, automating tasks, and analyzing vulnerabilities. I have some experience in SAS and Epi-Info so I would be honing my skills as it pertains to Cybersecurity programming.<\/p>\n\n\n\n<p><strong>Artifacts:<\/strong><\/p>\n\n\n\n<ul>\n<li><strong>Python Scripts:<\/strong> Used for tasks like log analysis, security audits, and automating incident response.<\/li>\n\n\n\n<li><strong>C\/C++ Code:<\/strong> Exploit development and system-level programming for securing operating systems and applications.<\/li>\n\n\n\n<li><strong>Bash Scripts:<\/strong> Automates routine security checks, such as scanning networks for intrusion attempts or monitoring system health.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Incident Response<\/strong><\/h3>\n\n\n\n<p>Incident response focuses on detecting, analyzing, and mitigating cyber threats to minimize damage. This skill set is extremely important in Cybersecurity for financial institutions and health systems.<\/p>\n\n\n\n<p><strong>Artifacts:<\/strong><\/p>\n\n\n\n<ul>\n<li><strong>Forensic Reports:<\/strong> Documentation of digital evidence collected during breach investigations.<\/li>\n\n\n\n<li><strong>System Logs:<\/strong> Records of system activity that help trace the origin and scope of an attack.<\/li>\n\n\n\n<li><strong>Incident Playbooks:<\/strong> Predefined procedures for responding to specific types of cyber incidents.<\/li>\n<\/ul>\n\n\n\n<p>These skills and their associated artifacts are vital for maintaining robust cybersecurity defenses and responding swiftly and effectively to evolving threats.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here are three essential cybersecurity skills, along with three artifacts associated with each skill that I am interested in acquiring: 1. Threat Hunting Threat hunting involves proactively searching for indicators of compromise (IOCs) and malicious activities within an organization&#8217;s systems. Since my background is in Research I would be interested in developing this skill as [&hellip;]<\/p>\n","protected":false},"author":29558,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ids493spring25\/wp-json\/wp\/v2\/pages\/184"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ids493spring25\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ids493spring25\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ids493spring25\/wp-json\/wp\/v2\/users\/29558"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ids493spring25\/wp-json\/wp\/v2\/comments?post=184"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ids493spring25\/wp-json\/wp\/v2\/pages\/184\/revisions"}],"predecessor-version":[{"id":246,"href":"https:\/\/sites.wp.odu.edu\/ids493spring25\/wp-json\/wp\/v2\/pages\/184\/revisions\/246"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ids493spring25\/wp-json\/wp\/v2\/media?parent=184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}