{"id":1223,"date":"2025-04-26T18:51:04","date_gmt":"2025-04-26T22:51:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?page_id=1223"},"modified":"2025-04-26T22:41:59","modified_gmt":"2025-04-27T02:41:59","slug":"cybersecurity-applications","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/cybersecurity-applications\/","title":{"rendered":"Cybersecurity Applications"},"content":{"rendered":"\n<p>This Cybersecurity Applications section showcases classes that focus on applying cybersecurity concepts to real-world technical environments. These courses helped me develop practical skills through digital forensics, cybercrime investigation, group projects, and interdisciplinary research.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<p><strong>CRJS 310 \u2013 Cybercrime Foundations<\/strong><\/p>\n\n\n\n<p>This course introduced major types of cybercrime and how digital evidence is used in investigations. I participated in group projects creating PowerPoint presentations on topics such as crime categories, offender motivations, case studies, and societal impacts.<\/p>\n\n\n\n<p>You can view all of my Cybercrime Group Project Presentations <a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/categories-of-cybercrime\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/categories-of-cybercrime\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n\n<p><strong>CYSE 407 \u2013 Digital Forensics<\/strong> (In Progress)<\/p>\n\n\n\n<p>This course focuses on digital evidence recovery and analysis techniques.<\/p>\n\n\n\n<p>(Link coming soon \u2014 currently in progress.)<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n\n<p><strong>CYSE 409 \u2013 Crime and Computer Applications<\/strong> (In Progress)<\/p>\n\n\n\n<p>Known informally as &#8220;How to Commit a Crime,&#8221; this course studies criminal use of technology and countermeasures.<\/p>\n\n\n\n<p>(Link coming soon \u2014 currently in progress.)<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n\n<p><strong>IDS 300W \u2013 Interdisciplinary Theory and Concepts<\/strong><\/p>\n\n\n\n<p>This course emphasized interdisciplinary research, academic writing, and applying multiple academic perspectives to solve real-world problems. I completed a series of writing workshops focused on the Repko and Szostak (2021) 10-STEP interdisciplinary research model, a major term research paper, and multiple class discussions that helped me develop critical thinking and integrative research skills.<\/p>\n\n\n\n<p>You can view examples of my class discussion responses <a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/category\/ids-300w-discussions\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/category\/ids-300w-discussions\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<p>You can view my Writing Workshops PowerPoints \u2014 including a Visual Research Process Map, Data Table of Insights, Disciplinary Quotes Analysis, and Final Visual Argument <a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/visual-mapping-of-the-10-step-research-process\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/visual-mapping-of-the-10-step-research-process\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<p>You can also view my term research paper, <em>AI in Cloud Digital Forensics<\/em>, <a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/ids-300w-term-research-paper\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/ids-300w-writing-workshops\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This Cybersecurity Applications section showcases classes that focus on applying cybersecurity concepts to real-world technical environments. These courses helped me develop practical skills through digital forensics, cybercrime investigation, group projects, and interdisciplinary research. CRJS 310 \u2013 Cybercrime Foundations This course&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/cybersecurity-applications\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/1223"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=1223"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/1223\/revisions"}],"predecessor-version":[{"id":1298,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/1223\/revisions\/1298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=1223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}