Skills & Artifacts

Skill 1: Network Systems and Operations 

Artifact 1:  Password Cracking 

In my Cybersecurity Techniques and Operations (CYSE 301) course, I was given a project to create passwords and crack them in a controlled environment. Within the environment, I had to create three usernames and passwords but the passwords had to all be different strength levels. Following that, I had to use the John The Ripper also known as rockyou.txt command to crack the passwords. While also in this assignment it displays me decrypting WEP and WPA2 wireless traffic, analyzing decrypt packets in Wireshark, and cracking passwords hashes using Meterpreter.

Supporting Artifact 2:  Monitoring and Sniffing Network Traffic

Brief Description:  In my Cyber Techniques and Operation (CYSE 301) course, I was tasked to monitor network traffic using Wireshark to find specific packet query and to pretend to be an attacker to achieve someone’s login information. While using Wireshark I was successfully able to sniff out a username and password, steal files, and display packet query from the main sources IP address and destination IP address.  

Supporting Artifact 3: Installing  Wiring and Computers for Emergency Room (Government Internship)

Brief Description 3: In my internship for the government, I was asked to install wiring and computers in a room that could be used for emergency purposes. In this role, I had to collect the correct materials used to set up wiring for computers while also scanning the computers to make sure they are up to date and can be used when needed.

Skill two: Data Collecting and Tracing

Supporting Artifact 1:  Finding the Source using the Digital Foot Print

Brief Description: In my Cults and Conspiracy (REL 147G) course, I was asked to identify if a conspiracy theory is true or false and how it originated using the SIFT method. I had only been given  a screenshot of a tweet. To do so, I performed in-depth research by finding the username on X from the screen of the tweet, then locating the person’s real name andwhere he went to school. I was able to use this information to verify if he actually received a Ph.D from the university he claimed he went to, while also figuring out the conspiracy theory he was spreading was false. 

Supporting Artifact 2:  New Technology vs Warfare Project

Brief Description:  In my Cyber Terrorism  (CRJS 495) course, I wrote a paper and did a project on how terrorist organizations are using new technology devices and streaming platforms to gain members and perform attacks. Furthermore in this project, I wrote about what the U.S. has done and will do to stop these terrorist organizations from completing their missions. I had to sift through numerous websites and PDFs to gain information on what terrorists are using new tech, how are they doing, and what is the motive behind it. While also gathering data on how the U.S. has and will do to eliminate the threat. 

<object class="wp-block-file__embed" data="https://sites.wp.odu.edu/jaqwah-lewis-eportfolio/wp-content/uploads/sites/40179/2025/11/annotated-New20technology20vs20warfare202B20End20Game.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="New Technology VS Warfare<br>
New Technology VS Warfare

Download

Supporting Artifact 3:  John Albert Gardner III cases study

Brief Description 3: In my Criminal Justice System (CRJS 222) course, I did a case study on John Albert Gardner III. For this case study, I had to gather information from several credible sources such as case summaries, newspaper articles and reports, interviews and Gardner the III’s criminal history. After gathering said information, I was able to compare data on his victims, create a timeline of their disappearances, the steps and procedures law enforcement took throughout the investigation and view the final legal outcome/sentencing. I also tracked how the evidence developed, such as Gardner’s previous cases, how close he was to the crime scene, and how the DNA found at the scene linked him back to the murders. Overall, the case study showed how each piece of evidence was important in identifying Gardner III as the suspect.

Skill 3: Communication 

Supporting Artifact 1:  Presenting a case studies

Brief Description: In my government internship, I had to present numerous case studies with factual evidence to help  contribute to the mission. Doing this allowed me to show leadership as I provided guidance and support to the other interns on the team, analyzed and compared different pieces of evidence to my peers, and presented said evidence to our superiors and team.  

close up. group of business people sitting at the negotiating table. business concept

Supporting Artifact 2:  Customer Services

Brief Description:  As a Customer Services Supervisor at Foodlion, I have to speak to numerous customers from different types of backgrounds and also assist them with the service they need. This could range from a problem they may be having with their card, transferring money, lottery tickets to them having problems with a problem with one of my coworkers, a product they bought, and/or Foodlion in general. Within this position I have to use my communication skills such as listening, code switching, and understanding. 

Supporting Artifact 3: Resident Assistant

Brief Description 3: Being a Resident Assistant at Old Dominion University, I handle multiple different types of situations and tasks. One of the main parts of my job as a Resident Assistant is handling crisis situations and conflicts. When handling crisis situations I have to approach it immediately by being level headed, alert, and analytic so I can properly handle the situation and uphold the University guidelines for Resident Assistants.  Following that, when handling conflict it evolves me thinking quickly on my feet,  communicating to both parties and coming up with a solution, and reporting it. This position as Resident Assistant shows that I have used problem solving skills, communications skills, and crisis management skills.