{"id":218,"date":"2025-02-02T08:05:32","date_gmt":"2025-02-02T08:05:32","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-10-13T18:37:53","modified_gmt":"2025-10-13T18:37:53","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Skill 1: Technical Proficiency &amp; Analytical Thinking<\/strong><\/h2>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 1: Windows Server Domain Configuration Lab<\/strong><\/h3>\n\n\n\n<p><strong>Course:<\/strong> CYSE 280 \u2013 Windows Systems Management and Security<\/p>\n\n\n\n<p><strong>Description:<\/strong><br>This lab involved configuring a Windows Server 2019 environment to simulate enterprise-level system administration. I created user accounts, applied Group Policy Objects, and managed access permissions to enforce security controls.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"814\" height=\"766\" src=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/image.png\" alt=\"\" class=\"wp-image-358\" srcset=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/image.png 814w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/image-300x282.png 300w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/image-768x723.png 768w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/image-319x300.png 319w\" sizes=\"(max-width: 814px) 100vw, 814px\" \/><\/figure>\n\n\n\n<p><strong>Reflection:<\/strong><br>Working on this lab strengthened my technical accuracy and ability to follow complex procedures methodically. I learned to troubleshoot authentication issues and identify misconfigurations efficiently. This experience developed my analytical mindset and taught me how every detail matters in system security.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 2: Linux Scripting and Permissions Exercise<\/strong><\/h3>\n\n\n\n<p><strong>Course:<\/strong> CYSE 301 \u2013 Linux Techniques and Operations<\/p>\n\n\n\n<p><strong>Description:<\/strong><br>In this assignment, I wrote shell scripts to automate file management and system maintenance tasks. I also configured file permissions using <code>chmod<\/code> and <code>chown<\/code> to enhance system security.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"894\" height=\"707\" src=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-134848-2.png\" alt=\"\" class=\"wp-image-357\" srcset=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-134848-2.png 894w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-134848-2-300x237.png 300w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-134848-2-768x607.png 768w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-134848-2-379x300.png 379w\" sizes=\"(max-width: 894px) 100vw, 894px\" \/><\/figure>\n\n\n\n<p><strong>Reflection:<\/strong><br>Completing this exercise helped me become more confident navigating Linux environments. Learning how to automate tasks and manage permissions reinforced my technical problem-solving ability and adaptability with different operating systems.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 3: Cryptography Project \u2013 RSA and Diffie-Hellman<\/strong><\/h3>\n\n\n\n<p><strong>Course:<\/strong> CYSE 463 \u2013 Cryptography<\/p>\n\n\n\n<p><strong>Description:<\/strong><br>This project explored asymmetric encryption through RSA and Diffie-Hellman key exchange. I generated key pairs, performed encryption\/decryption tests, and evaluated security implications of each method.<\/p>\n\n\n\n<p><strong>Excerpt:<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>\u201cRSA encryption relies on mathematical factorization for key security, while Diffie-Hellman enables secure key sharing over public channels \u2014 both fundamental to modern data confidentiality.\u201d<\/p>\n<\/blockquote>\n\n\n\n<p><strong>Reflection:<\/strong><br>This artifact shows my ability to apply theoretical concepts to practical encryption systems. It deepened my understanding of confidentiality, authentication, and secure communication \u2014 core principles for any cybersecurity analyst.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Skill 2: Communication &amp; Research Skills<\/strong><\/h2>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 1: Interdisciplinary Research Paper \u2013 Reducing Political Misinformation<\/strong><\/h3>\n\n\n\n<p><strong>Course:<\/strong> IDS 300W \u2013 Interdisciplinary Research and Writing<\/p>\n\n\n\n<p><strong>Description:<\/strong><br>This paper examined how misinformation spreads across social media platforms and proposed strategies to reduce it without violating free speech. The analysis combined insights from computer science, psychology, and political science.<\/p>\n\n\n\n<p><strong>Excerpt:<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>\u201cAddressing misinformation requires a balance between algorithmic precision and human judgment. Social media companies must pair automated detection systems with educational initiatives to promote digital literacy.\u201d<\/p>\n<\/blockquote>\n\n\n\n<p><strong>Reflection:<\/strong><br>This artifact highlights my ability to write with clarity, integrate multiple perspectives, and analyze real-world cybersecurity issues beyond the technical level. It demonstrates interdisciplinary thinking \u2014 essential for professionals who must communicate effectively across fields.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 2: PowerPoint Presentation \u2013 Social Engineering Threats in the Workplace<\/strong><\/h3>\n\n\n\n<p><strong>Course:<\/strong> CYSE 280 \u2013 Windows Systems Management and Security<\/p>\n\n\n\n<p><strong>Description:<\/strong><br>For this class presentation, I created a slideshow explaining common social-engineering tactics and how employees can recognize and prevent them.<\/p>\n\n\n\n<p><strong>Excerpt \/ Screenshot Placeholder:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"989\" height=\"405\" src=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/image-1.png\" alt=\"\" class=\"wp-image-359\" srcset=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/image-1.png 989w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/image-1-300x123.png 300w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/image-1-768x314.png 768w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/image-1-600x246.png 600w\" sizes=\"(max-width: 989px) 100vw, 989px\" \/><\/figure>\n\n\n\n<p><strong>Reflection:<\/strong><br>Preparing and presenting this topic built my public-speaking and professional communication skills. It taught me to explain technical risks in simple terms, a skill that\u2019s invaluable when briefing non-technical colleagues or management.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 3: Discussion Post Reflection \u2013 Ethics in Cybersecurity<\/strong><\/h3>\n\n\n\n<p><strong>Course:<\/strong> IDS 300W<\/p>\n\n\n\n<p><strong>Description:<\/strong><br>This discussion assignment explored the ethical balance between user privacy and government surveillance. I participated in an online debate, providing evidence-based responses and citing scholarly sources.<\/p>\n\n\n\n<p><strong>Excerpt:<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>\u201cCybersecurity policy cannot exist in isolation from ethics \u2014 transparency and accountability are as vital as technical safeguards.\u201d<\/p>\n<\/blockquote>\n\n\n\n<p><strong>Reflection:<\/strong><br>This artifact demonstrates my ability to think critically, engage respectfully in professional discussions, and support arguments with credible research. It also shows my awareness of how communication impacts decision-making in cybersecurity policy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Skill 3: Problem-Solving &amp; Professional Growth<\/strong><\/h2>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 1: Wireshark Network Analysis<\/strong><\/h3>\n\n\n\n<p><strong>Course:<\/strong> CYSE 301 \u2013 Linux Techniques and Operations<\/p>\n\n\n\n<p><strong>Description:<\/strong><br>Using Wireshark, I analyzed ICMP packet exchanges to measure response time and identify potential network latency. I learned how to filter traffic and interpret packet data for troubleshooting.<\/p>\n\n\n\n<p><strong>Excerpt \/ Screenshot Placeholder:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"892\" height=\"540\" src=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-141013.png\" alt=\"\" class=\"wp-image-360\" srcset=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-141013.png 892w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-141013-300x182.png 300w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-141013-768x465.png 768w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-141013-496x300.png 496w\" sizes=\"(max-width: 892px) 100vw, 892px\" \/><\/figure>\n\n\n\n<p><strong>Reflection:<\/strong><br>This exercise improved my investigative thinking and patience in data analysis. It taught me how to spot anomalies in network behavior and verify findings \u2014 skills that directly translate to threat detection and system monitoring.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 2: Security+ Certification Study Plan and Reflection<\/strong><\/h3>\n\n\n\n<p><strong>Professional Artifact<\/strong><\/p>\n\n\n\n<p><strong>Description:<\/strong><br>While studying for my CompTIA Security+ certification, I developed a structured study schedule using online simulations, flashcards, and performance-based testing.<\/p>\n\n\n\n<p><strong>Excerpt \/ Screenshot Placeholder:<\/strong><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"555\" src=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-141350-1024x555.png\" alt=\"\" class=\"wp-image-361\" srcset=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-141350-1024x555.png 1024w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-141350-300x163.png 300w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-141350-768x416.png 768w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-141350-554x300.png 554w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/Screenshot-2025-10-13-141350.png 1056w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Reflection:<\/strong><br>This artifact demonstrates self-discipline and long-term commitment to learning. Preparing for this certification expanded my knowledge of risk management, encryption, and network security frameworks \u2014 key foundations for my future cybersecurity career.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 3: Workplace Collaboration \u2013 Naval Station Norfolk<\/strong><\/h3>\n\n\n\n<p><strong>Professional Artifact<\/strong><\/p>\n\n\n\n<p><strong>Description:<\/strong><br>In my role as an Administrative Assistant at Naval Station Norfolk, I managed secure digital records, coordinated with command personnel, and assisted in implementing efficient workflows.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"499\" src=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/image-2.png\" alt=\"\" class=\"wp-image-362\" srcset=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/image-2.png 800w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/image-2-300x187.png 300w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/image-2-768x479.png 768w, https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-content\/uploads\/sites\/38397\/2025\/10\/image-2-481x300.png 481w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<p>Representative image of the collaborative, detail-oriented workflow environment I contribute to at Naval Station Norfolk.<\/p>\n\n\n\n<p><strong>Reflection:<\/strong><br>Balancing full-time work with full-time study strengthened my time-management and teamwork skills. This artifact represents professional growth \u2014 learning to adapt, communicate effectively, and uphold security standards in a real-world setting.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Skill 1: Technical Proficiency &amp; Analytical Thinking Artifact 1: Windows Server Domain Configuration Lab Course: CYSE 280 \u2013 Windows Systems Management and Security Description:This lab involved configuring a Windows Server 2019 environment to simulate enterprise-level system administration. I created user accounts, applied Group Policy Objects, and managed access permissions to enforce security controls. Reflection:Working on&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":26886,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/users\/26886"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":363,"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/pages\/218\/revisions\/363"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaidaseportfolio\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}