Communication Skills

The artifacts displayed below best demonstrates the communication skills that I have developed throughout my Cybersecurity Journey. Each one of these important artifacts hold a crucial role in the way they where created and designed . Which further helped me in advancing my skillset of communicating a variety of different cybersecurity concepts to a target audience.

Political Implications of the General Data Protection Regulation Essay:

This essay that was created within my Cyber Policy and strategy course 525, further examined the General data protection regulation (GDPR) from a political lens. Which I display the important criteria of incorporating a political stance within the strict data law that governs Europe. Throughout my research process, I was able to communicate the technical focus on the GDPR to citizens, local government, and tech companies. Which is important for the cybersecurity field since it is very interdisciplinary.

Memorandum for the State of Mongo Essay:

This writing that was developed during my CYSE 406 course, examined the importance of laws and regulations that govern the digital realm. Throughout this writing I further highlight the significance of protecting individuals data to a governor official of a state, that’s citizens where worried about there digital information being intercepted by different companies and organizations globally . I highlight the importance of digital security to the governor and the importance of establishing digital security for sensitive information, overall to better protect citizens within the state.

A Guide to Limiting Vulnerabilities in Windows Server Project:

This paper that was developed during my CYSE 280 course, highlights the technical issues that arise within windows server 2019, and why it is crucial for individual of non technical background, to take precaution when using the servers active directory and security features. I also highlight the importance of data backups and the importance of security awareness in which any individual can implement to better protect themselves from cyber related attacks, such as ransomware, phishing, and SQL injection.