{"id":218,"date":"2025-11-14T06:06:08","date_gmt":"2025-11-14T06:06:08","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-12-03T21:27:37","modified_gmt":"2025-12-03T21:27:37","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/skills-2\/","title":{"rendered":"Skills &amp; Artifacts"},"content":{"rendered":"<h2><strong>Skill 1: Network Systems and Operations\u00a0<\/strong><\/h2>\n<p>Artifact 1:\u00a0 Password Cracking\u00a0<\/p>\n<p>In my Cybersecurity Techniques and Operations (CYSE 301) course, I was given a project to create passwords and crack them in a controlled environment. Within the environment, I had to create three usernames and passwords but the passwords had to all be different strength levels. Following that, I had to use the John The Ripper also known as rockyou.txt command to crack the passwords. While also in this assignment it displays me decrypting WEP and WPA2 wireless traffic, analyzing decrypt packets in Wireshark, and cracking passwords hashes using Meterpreter.<\/p>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/for-ids-case-301-passwordpdfgear.com_-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of for-ids-case-301-passwordpdfgear.com_-1.\"><\/object><a id=\"wp-block-file--media-c63a0735-4b5c-467b-a70f-6546e541507f\" href=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/for-ids-case-301-passwordpdfgear.com_-1.pdf\">for-ids-case-301-passwordpdfgear.com_-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/for-ids-case-301-passwordpdfgear.com_-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c63a0735-4b5c-467b-a70f-6546e541507f\">Download<\/a><\/div>\n\n\n\n<p>Supporting Artifact 2:\u00a0 Monitoring and Sniffing Network Traffic<\/p>\n\n\n\n<p>Brief Description:&nbsp; In my Cyber Techniques and Operation (CYSE 301) course, I was tasked to monitor network traffic using Wireshark to find specific packet query and to pretend to be an attacker to achieve someone&#8217;s login information. While using Wireshark I was successfully able to sniff out a username and password, steal files, and display packet query from the main sources IP address and destination IP address.&nbsp;&nbsp;<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/Trafficing-and-Tracing-2pdfgear.com_.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Trafficing-and-Tracing_.\"><\/object><a id=\"wp-block-file--media-17e9b8fe-647e-4293-9b83-5910f7c40485\" href=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/Trafficing-and-Tracing-2pdfgear.com_.pdf\">Trafficing-and-Tracing_<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/Trafficing-and-Tracing-2pdfgear.com_.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-17e9b8fe-647e-4293-9b83-5910f7c40485\">Download<\/a><\/div>\n\n\n\n<p>Supporting Artifact 3:&nbsp;Installing&nbsp; Wiring and Computers for Emergency Room (Government Internship)<\/p>\n\n\n\n<p>Brief Description 3:&nbsp;In my internship for the government, I was asked to install wiring and computers in a room that could be used for emergency purposes. In this role, I had to collect the correct materials used to set up wiring for computers while also scanning the computers to make sure they are up to date and can be used when needed.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"560\" src=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/1000_F_1681874663_PoMML57Q01O8P9wGIOmEqammZJHLWwU0-1.jpg\" alt=\"\" class=\"wp-image-300\" srcset=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/1000_F_1681874663_PoMML57Q01O8P9wGIOmEqammZJHLWwU0-1.jpg 1000w, https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/1000_F_1681874663_PoMML57Q01O8P9wGIOmEqammZJHLWwU0-1-300x168.jpg 300w, https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/1000_F_1681874663_PoMML57Q01O8P9wGIOmEqammZJHLWwU0-1-768x430.jpg 768w, https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/1000_F_1681874663_PoMML57Q01O8P9wGIOmEqammZJHLWwU0-1-536x300.jpg 536w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Skill two: Data Collecting and Tracing<\/strong><\/h2>\n\n\n\n<p>Supporting Artifact 1:&nbsp; Finding the Source using the Digital Foot Print<\/p>\n\n\n\n<p>Brief Description:&nbsp;In my Cults and Conspiracy (REL 147G) course, I was asked to identify if a conspiracy theory is true or false and how it originated using the SIFT method. I had only been given&nbsp; a screenshot of a tweet. To do so, I performed in-depth research by finding the username on X from the screen of the tweet, then locating the person&#8217;s real name andwhere he went to school. I was able to use this information to verify if he actually received a Ph.D from the university he claimed he went to, while also figuring out the conspiracy theory he was spreading was false.&nbsp;<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/The-Truth-About-Diedsuddenly-Conspiracy-Theory.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The-Truth-About-Diedsuddenly-Conspiracy-Theory.\"><\/object><a id=\"wp-block-file--media-eb248e7d-4263-4809-8525-12a3d3042ba5\" href=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/The-Truth-About-Diedsuddenly-Conspiracy-Theory.pdf\">The-Truth-About-Diedsuddenly-Conspiracy-Theory<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/The-Truth-About-Diedsuddenly-Conspiracy-Theory.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-eb248e7d-4263-4809-8525-12a3d3042ba5\">Download<\/a><\/div>\n\n\n\n<p>Supporting Artifact 2:&nbsp; New Technology vs Warfare Project<\/p>\n\n\n\n<p>Brief Description:&nbsp; In my Cyber Terrorism&nbsp; (CRJS 495) course, I wrote a paper and did a project on how terrorist organizations are using new technology devices and streaming platforms to gain members and perform attacks. Furthermore in this project, I wrote about what the U.S. has done and will do to stop these terrorist organizations from completing their missions. I had to sift through numerous websites and PDFs to gain information on what terrorists are using new tech, how are they doing, and what is the motive behind it. While also gathering data on how the U.S. has and will do to eliminate the threat.&nbsp;<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\">&lt;object class=&quot;wp-block-file__embed&quot; data=&quot;https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/annotated-New20technology20vs20warfare202B20End20Game.pdf&quot; type=&quot;application\/pdf&quot; style=&quot;width:100%;height:600px&quot; aria-label=&quot;New Technology VS Warfare&lt;br&gt;<br><\/object><a id=\"wp-block-file--media-2c09fe03-a9ab-4254-8a55-d386ff1abb62\" href=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/annotated-New20technology20vs20warfare202B20End20Game.pdf\">New Technology VS Warfare<br><br><\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/annotated-New20technology20vs20warfare202B20End20Game.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-2c09fe03-a9ab-4254-8a55-d386ff1abb62\">Download<\/a><\/div>\n\n\n\n<p>Supporting Artifact 3:&nbsp; John Albert Gardner III&nbsp;cases study<\/p>\n\n\n\n<p>Brief Description 3:&nbsp;In my Criminal Justice System (CRJS 222) course, I did a case study on John Albert Gardner III. For this case study, I had to gather information from several credible sources such as case summaries, newspaper articles and reports, interviews and Gardner the III\u2019s criminal history. After gathering said information, I was able to compare data on his victims, create a timeline of their disappearances, the steps and procedures law enforcement took throughout the investigation and view the final legal outcome\/sentencing. I also tracked how the evidence developed, such as Gardner&#8217;s previous cases, how close he was to the crime scene, and how the DNA found at the scene linked him back to the murders. Overall, the case study showed how each piece of evidence was important in identifying Gardner III as the suspect.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/CRJS-222-final-project-essay-final-draft-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CRJS-222-final-project-essay-final-draft-2.\"><\/object><a id=\"wp-block-file--media-c98a0281-37e6-43c6-8ef9-b6bb2c9d0a97\" href=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/CRJS-222-final-project-essay-final-draft-2.pdf\">CRJS-222-final-project-essay-final-draft-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/CRJS-222-final-project-essay-final-draft-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c98a0281-37e6-43c6-8ef9-b6bb2c9d0a97\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Skill 3: Communication\u00a0<\/strong><\/h2>\n\n\n\n<p>Supporting Artifact 1:&nbsp; Presenting a case studies<\/p>\n\n\n\n<p>Brief Description:&nbsp;In my government internship, I had to present numerous case studies with factual evidence to help&nbsp; contribute to the mission. Doing this allowed me to show leadership as I provided guidance and support to the other interns on the team, analyzed and compared different pieces of evidence to my peers, and presented said evidence to our superiors and team.&nbsp;&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/istockphoto-1295446683-1024x1024-1.jpg\" alt=\"\" class=\"wp-image-324\" srcset=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/istockphoto-1295446683-1024x1024-1.jpg 1024w, https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/istockphoto-1295446683-1024x1024-1-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/istockphoto-1295446683-1024x1024-1-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/istockphoto-1295446683-1024x1024-1-960x640.jpg 960w, https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/istockphoto-1295446683-1024x1024-1-450x300.jpg 450w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">close up. group of business people sitting at the negotiating table. business concept<\/figcaption><\/figure>\n\n\n\n<p>Supporting Artifact 2:&nbsp; Customer Services<\/p>\n\n\n\n<p>Brief Description:&nbsp; As a Customer Services Supervisor at Foodlion, I have to speak to numerous customers from different types of backgrounds and also assist them with the service they need. This could range from a problem they may be having with their card, transferring money, lottery tickets to them having problems with a problem with one of my coworkers, a product they bought, and\/or Foodlion in general. Within this position I have to use my communication skills such as listening, code switching, and understanding.&nbsp;<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/Recommendation-letter-from-previous-supervisor-at-Food-Lion_.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Recommendation-letter-from-previous-supervisor-at-Food-Lion_.\"><\/object><a id=\"wp-block-file--media-e067ea82-d665-478b-b200-3959a59e0cda\" href=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/Recommendation-letter-from-previous-supervisor-at-Food-Lion_.pdf\">Recommendation-letter-from-previous-supervisor-at-Food-Lion_<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/Recommendation-letter-from-previous-supervisor-at-Food-Lion_.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e067ea82-d665-478b-b200-3959a59e0cda\">Download<\/a><\/div>\n\n\n\n<p>Supporting Artifact 3:&nbsp;Resident Assistant<\/p>\n\n\n\n<p>Brief Description 3:&nbsp;Being a Resident Assistant at Old Dominion University, I handle multiple different types of situations and tasks. One of the main parts of my job as a Resident Assistant is handling crisis situations and conflicts. When handling crisis situations I have to approach it immediately by being level headed, alert, and analytic so I can properly handle the situation and uphold the University guidelines for Resident Assistants.&nbsp; Following that, when handling conflict it evolves me thinking quickly on my feet,&nbsp; communicating to both parties and coming up with a solution, and reporting it. This position as Resident Assistant shows that I have used problem solving skills, communications skills, and crisis management skills.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/Jaqwah-RA-Development-Plan-Evaluation-Copy.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of RA JAQWAH Evaluation from supervisor.\"><\/object><a id=\"wp-block-file--media-a683a846-91d4-459a-b281-c1be37ce917e\" href=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/Jaqwah-RA-Development-Plan-Evaluation-Copy.pdf\">RA JAQWAH Evaluation from supervisor<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-content\/uploads\/sites\/40179\/2025\/11\/Jaqwah-RA-Development-Plan-Evaluation-Copy.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a683a846-91d4-459a-b281-c1be37ce917e\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Skill 1: Network Systems and Operations\u00a0 Artifact 1:\u00a0 Password Cracking\u00a0 In my Cybersecurity Techniques and Operations (CYSE 301) course, I was given a project to create passwords and crack them in a controlled environment. Within the environment, I had to create three usernames and passwords but the passwords had to all be different strength levels&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":25829,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-json\/wp\/v2\/users\/25829"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":329,"href":"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-json\/wp\/v2\/pages\/218\/revisions\/329"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaqwah-lewis-eportfolio\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}