Skip to content
Jason Rivers ePortfolio
Jason M. Rivers
Menu
About Me
Resume
Skills
Awards, Recognitions, and Certifications
Professional Goals
Final Semester Capstone Projects
Cybersecurity Foundations
Information Literacy for Cybersecurity (CYSE 202G)
CYSE 202G Citation, Quotation, & Plagiarism
CYSE 202G Communities of Practice
CYSE 202G Big Data Lecture & Article Reflection
CYSE 202G Term Research Paper
Linux Systems (CYSE 270)
CYSE 270 Lab 4
Intro to Cybersec (CYSE 300)
CYSE 300 Discussion Board 1-10
CYSE 300 Discussion Board 1
CYSE 300 Discussion Board 2
CYSE 300 Discussion Board 3
CYSE 300 Discussion Board 4
CYSE 300 Discussion Board 5
CYSE 300 Discussion Board 6
CYSE 300 Discussion Board 7
CYSE 300 Discussion Board 8
CYSE 300 Discussion Board 9
CYSE 300 Discussion Board 10
CYSE 300 Discussion Board 11-15
CYSE 300 Discussion Board 11
CYSE 300 Discussion Board 12
CYSE 300 Discussion Board 13
CYSE 300 Discussion Board 14
CYSE 300 Discussion Board 15
Cybersec Techniques and Operations (CYSE 301)
CYSE 301 Assignments
Tech & Society
IT/CYSE 200T Overview
CYSE 200T Portfolio
The CIA Triad
Ethics of CRISPR Gene Editing
How SCADA System Protect Our Infrastructure
The Human Factor in Cybersecurity
Opportunities for Workplace Deviances created by Advances in Cyber Technology
Thoughts on Protecting Availability
CYSE 201S (CYBERSECURITY & SOCIAL SCIENCE)
CYSE201S Assignments
Article Review #1
Article Review #2
Career Professional Paper – Penetration Testers
CYSE201S Journals 1-10
CYSE 201S Journal One
CYSE 201S Journal Two
CYSE 201S Journal Three
CYSE 201S Journal Four
CYSE 201S Journal Five
CYSE 201S Journal Six
CYSE 201S Journal Seven
CYSE 201S Journal Eight
CYSE 201S Journal Nine
CYSE201S Journal Entry Ten
CYSE201S Journals 11-15
CYSE201S Journal Eleven
CYSE201S Journal Twelve
CYSE201S Journal Thirteen
CYSE201S Journal Fourteen
CYSE201S Journal Fifteen
CYSE 280
Chapter 1, Homework 1 – Windows Systems
Chapter 2, Homework 2
Chapter 3, Homework 3
Chapter 4, Homework 4
Chapter 3 and 4, Homework 5
Cyber Warfare (CYSE 426)
CYSE 426 Capstone Research Project
Interdisciplinary Theory and Concepts (IDS 300W)
CARP Infographic Assignment
Multimedia Assignment
Contignuity Assignment
Modality Assignment
Redundancy Assignment
Pre-Training Assignment
Personalization Assignment
Segmentation Assignment
Law & Ethics
Cyber Law (CYSE 406)
CYSE 406 Assignments
PHIL 355E
User Data Case Analysis
Corporate Social Responsibility (CSR) Case Study
Internship/Entrepreneurship
Cybersecurity Entrepreneurship (WCS 494)
Week 1 Journal
Week 2 Journal
Week 3 Journal
Week 4 Journal
Week 5 Journal
Week 6 Journal
Group Reflection 1
Group Reflection 2
Group Reflection 3
Entrepreneurship Presentation
Cybersecurity Entrepreneurship Collage
Cybersecurity Applications
Cybersec Strategy and Policy (CYSE 425W)
CYSE 425 Multi-Analytical Research on Japan’s 2018 National Cybersecurity Policy
Ethical Hacking and Pentesting (CYSE 450)
CS 463
Cryptography – Homework 2
Cryptography – Homework 3
Cryptography – Homework 4
Information Assurance for Cybersecurity (CS 465)
CS 465 Incident Response and Recommendation Capstone
Blog
Identification VS Authorization
CS462 Term Blog
Contact
Cybersec Strategy and Policy (CYSE 425W)
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
Accept