{"id":318,"date":"2025-11-17T03:52:36","date_gmt":"2025-11-17T03:52:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/isaac-huston\/?page_id=318"},"modified":"2025-11-17T16:52:55","modified_gmt":"2025-11-17T16:52:55","slug":"skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/isaac-huston\/skills\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<h3 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-3183fbea3d0f06bccbdcf866b4636a19\"><a href=\"https:\/\/sites.wp.odu.edu\/isaac-huston\/skills\/network-security-analysis\/\">Network Security Analysis<\/a><\/h3>\n\n\n\n<p>This skill covers my ability to analyze network behavior, identify vulnerabilities, and interpret security data during a full engagement.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-cb432152336f72c873d45a5d88d0aebf\"><a href=\"https:\/\/sites.wp.odu.edu\/isaac-huston\/skills\/scripting-and-automation\/\">Scripting and Automation<\/a><\/h3>\n\n\n\n<p>This skill highlights how I write scripts to automate reconnaissance, scanning, and data collection for repeatable workflows.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-a775c99ccb76a5dbaf10c013d27999c8\"><a href=\"https:\/\/sites.wp.odu.edu\/isaac-huston\/skills\/penetration-testing-and-exploitation\/\">Penetration Testing and Exploitation<\/a><\/h3>\n\n\n\n<p>This skill focuses on exploiting vulnerabilities, gaining access, escalating privileges, and documenting offensive security actions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network Security Analysis This skill covers my ability to analyze network behavior, identify vulnerabilities, and interpret security data during a full engagement. Scripting and Automation This skill highlights how I write scripts to automate reconnaissance, scanning, and data collection for repeatable workflows. Penetration Testing and Exploitation This skill focuses on exploiting vulnerabilities, gaining access, escalating&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/isaac-huston\/skills\/\">Read More<\/a><\/div>\n","protected":false},"author":30346,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/pages\/318"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/users\/30346"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/comments?post=318"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/pages\/318\/revisions"}],"predecessor-version":[{"id":357,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/pages\/318\/revisions\/357"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/media?parent=318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}