{"id":367,"date":"2025-04-30T03:02:22","date_gmt":"2025-04-30T03:02:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasondaamash\/?page_id=367"},"modified":"2025-04-30T03:50:11","modified_gmt":"2025-04-30T03:50:11","slug":"my-website","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jasondaamash\/","title":{"rendered":"MY WEBSITE"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-white-color has-luminous-dusk-gradient-background has-text-color has-background has-link-color has-large-font-size wp-elements-9c08967bbcdbd89e396dfc02a2794c00\">This is a little About me!<\/h1>\n\n\n\n<p id=\"block-8a8bddef-94ae-4b01-935f-111bf8bc24b9\">Hello my name is <em><strong>Jason Daamash!<\/strong><\/em><\/p>\n\n\n\n<p id=\"block-91ab159f-1bf6-4574-a4e3-ba66d50068f0\">I am a detail-oriented Information Technology professional currently pursuing a Bachelor\u2019s in BS Cybersecurity at Old Dominion University (ODU). Previously, I completed coursework at George Mason University and earned an Associate of Applied Science (AAS) in Information Technology from Northern Virginia Community College (NOVA).<\/p>\n\n\n\n<p id=\"block-477befc2-c5d7-4cd1-a27f-050c3756341e\">I hold a Google Cybersecurity Certificate (completion in July 2024) and CompTIA Security+ (SY0-701) certification, with expertise in threat detection, risk management, and technical support. My goal is to leverage my skills in IT and cybersecurity to contribute effectively to an organization&#8217;s success.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" id=\"block-69a319c9-f108-4e6c-98c9-926c9dcd387f\" \/>\n\n\n\n<p id=\"block-952f32b8-9f09-4600-b1a3-ddf19eacaad2\">My picture!<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"757\" height=\"889\" src=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/IMG_0350-1.jpg\" alt=\"\" class=\"wp-image-385\" style=\"width:371px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/IMG_0350-1.jpg 757w, https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/04\/IMG_0350-1-255x300.jpg 255w\" sizes=\"(max-width: 757px) 100vw, 757px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Experience<\/h2>\n\n\n\n<p>\ud83d\udcbc Associate \u2013 Friendly Rent-A-Car, VA (Jan 2023 \u2013 Present)<\/p>\n\n\n\n<p>Provided excellent customer service and resolved concerns regarding rentals.<br>Maintained rental records and ensured timely returns.<br>Addressed basic automotive issues for a smooth rental experience.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"block-0295668b-1ae7-4751-a284-c7d2364eb20b\">Education<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"block-b40d2c36-6fcf-40c2-b78e-830ad36528f1\">\ud83c\udf93 <strong>Old Dominion University (ODU), VA<\/strong> \u2013 <em>Bachelor\u2019s in Information Technology<\/em> (Present)<br>\ud83c\udf93 <strong>George Mason University, VA<\/strong> \u2013 <em>Completed Coursework in IT<\/em><br>\ud83c\udf93 <strong>Northern Virginia Community College (NOVA), VA<\/strong> \u2013 <em>Associate of Applied Science (AAS) in Information Technology<\/em> (2019 \u2013 2021)<br>\ud83c\udf93 <strong>Fairfax High School, VA<\/strong> \u2013 <em>High School Diploma<\/em> (2015 \u2013 2019)<\/h3>\n\n\n\n<p id=\"block-db9326fe-b584-4a8b-bfe7-52e7d31d66ff\"><strong>\ud83d\udee1 Certifications<\/strong><\/p>\n\n\n\n<ul id=\"block-c3a12ca0-f84d-4b6b-8a3b-83ddd3a95458\">\n<li><strong>Google Cybersecurity Certificate<\/strong> (July 2024)\n<ul>\n<li>Expertise in <strong>threat detection, risk management, and incident response<\/strong><\/li>\n\n\n\n<li>Hands-on experience with cybersecurity tools and best practices<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>CompTIA Security+ (SY0-701)<\/strong> (Completed)\n<ul>\n<li>Strong knowledge of <strong>network security, cryptography, and risk management<\/strong><\/li>\n\n\n\n<li>Proficiency in <strong>security controls, penetration testing, and vulnerability assessment<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"block-55686874-8e7b-469e-97de-51ea71d8df5f\"><strong>Extracurricular Activities &amp; Interests<\/strong><\/h3>\n\n\n\n<ul id=\"block-df11fcd5-0cbc-4acb-bf70-7987d3484417\">\n<li>I workout daily. go to the <strong>gym <\/strong>and <strong>swim actively<\/strong><\/li>\n\n\n\n<li>Passionate about <strong>problem-solving and troubleshooting technical issues<\/strong><\/li>\n\n\n\n<li>Avid learner, always expanding knowledge in <strong>cybersecurity and IT trends<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Image<\/p>\n\n\n\n<p>Upload an image file, pick one from your media library, or add one with a URL.UploadMedia LibraryInsert from URL<\/p>\n\n\n\n<figure class=\"wp-block-image\" id=\"block-a4ab1304-fa85-4dbb-8ec1-8b52a4c99e55\"><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/02\/image_2025-02-06_192043075-1024x538.png\" alt=\"This image has an empty alt attribute; its file name is image_2025-02-06_192043075-1024x538.png\" \/><figcaption class=\"wp-element-caption\">Features a digital lock surrounded by abstract shapes and data patterns, which effectively symbolizes the concept of cybersecurity. The visual elements, such as the lock and binary code, immediately communicate the theme of security in the digital world. The bright blue color gives it a modern and tech-driven feel, making it relevant to contemporary issues.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image\" id=\"block-71aa0a92-26af-4433-a9bc-b69ff66f5060\"><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/02\/image_2025-02-06_192648889.png\" alt=\"This image has an empty alt attribute; its file name is image_2025-02-06_192648889.png\" \/><figcaption class=\"wp-element-caption\">Digital ethics is essentially about how we should behave when we&#8217;re online, how we interact with technology, and how technology affects our lives.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image\" id=\"block-88b3d299-f923-4649-96c5-8d25b460950f\"><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/02\/image_2025-02-06_192743335-1024x752.png\" alt=\"This image has an empty alt attribute; its file name is image_2025-02-06_192743335-1024x752.png\" \/><figcaption class=\"wp-element-caption\">This focuses on presenting cybersecurity policies in an easy to understand type of format. It&#8217;s a structured list of actionable points or guidelines on cybersecurity practices. The design uses contrasting colors to make each point stand out clearly. This approach gives it the feel of an infographic, breaking down complex rules into digestible pieces. It is approachable for people who may not be deeply familiar with cybersecurity but are interested in learning how to protect themselves. Step by- step guide that encourages viewers to engage with cybersecurity practices on a personal level.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image\" id=\"block-dd3f4785-881d-42c8-96fd-379a548e90e3\"><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/02\/image_2025-02-06_192821763.png\" alt=\"This image has an empty alt attribute; its file name is image_2025-02-06_192821763.png\" \/><figcaption class=\"wp-element-caption\">This is a great visual for publicizing an event, this also encourages people to take action and be more aware of cybersecurity risks in their daily lives.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image\" id=\"block-c84acae0-d747-4932-8fe8-10e18d9c7a7c\"><img decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-content\/uploads\/sites\/38535\/2025\/02\/image_2025-02-06_192902925.png\" alt=\"This image has an empty alt attribute; its file name is image_2025-02-06_192902925.png\" \/><figcaption class=\"wp-element-caption\">Cybercrime globally is about the bad stuff that happens when people use the internet to hurt others. Shows how much people are getting affected by this, and you should start to take caution.<\/figcaption><\/figure>\n\n\n\n<p id=\"block-d843fb1b-ff50-4f62-a26f-0b1dd49cb88e\">Citations for Images:<\/p>\n\n\n\n<p id=\"block-f8893381-c41f-435b-9e85-b7c2d7c3be31\">BeeSmart City. (n.d.). <em>Cybersecurity social graphic<\/em> [Image]. BeeSmart City. Retrieved from <a href=\"https:\/\/www.beesmart.city\/hubfs\/04-insights\/06-blog-posts-strategy\/17-cybersecurity\/cybersecurity-social.jpg\">https:\/\/www.beesmart.city\/hubfs\/04-insights\/06-blog-posts-strategy\/17-cybersecurity\/cybersecurity-social.jpg<\/a><\/p>\n\n\n\n<p id=\"block-888dcb49-4937-4709-a484-01f3de03d070\">Consultants Review. (n.d.). <em>Cybersecurity image<\/em> [Image]. Consultants Review. Retrieved from <a href=\"https:\/\/www.consultantsreview.com\/newstransfer\/upload\/cbi3617165557736704171014806759213472.jpg\">https:\/\/www.consultantsreview.com\/newstransfer\/upload\/cbi3617165557736704171014806759213472.jpg<\/a><\/p>\n\n\n\n<p id=\"block-063b7572-07a5-4265-b2a2-29e108c6839f\">Sprinto. (2023). <em>Examples of cybersecurity policies<\/em> [Image]. Sprinto. Retrieved from <a href=\"https:\/\/sprinto.com\/wp-content\/uploads\/2023\/10\/Examples-of-cyber-security-policies.jpg\">https:\/\/sprinto.com\/wp-content\/uploads\/2023\/10\/Examples-of-cyber-security-policies.jpg<\/a><\/p>\n\n\n\n<p id=\"block-2c0e2517-4f75-44b9-ac65-23bf0edc742a\">Cyber JIF. (2024). <em>Cybersecurity Awareness Month 2024 poster<\/em> [Image]. Cyber JIF. Retrieved from <a href=\"https:\/\/cyberjif.org\/wp-content\/uploads\/2024\/10\/Cybersecurity-Awareness-Month-2024-Posters_Page_2-768x1024.jpg\">https:\/\/cyberjif.org\/wp-content\/uploads\/2024\/10\/Cybersecurity-Awareness-Month-2024-Posters_Page_2-768&#215;1024.jpg<\/a><\/p>\n\n\n\n<p id=\"block-4bb4f71a-ef48-4c67-ad3f-d46d00f07430\">Edcor. (2017). <em>GW University news image<\/em> [Image]. Edcor. Retrieved from <a href=\"https:\/\/www.edcor.com\/wp-content\/uploads\/2017\/01\/gwuniv-news1.jpg\">https:\/\/www.edcor.com\/wp-content\/uploads\/2017\/01\/gwuniv-news1.jpg<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is a little About me! Hello my name is Jason Daamash! I am a detail-oriented Information Technology professional currently pursuing a Bachelor\u2019s in BS Cybersecurity at Old Dominion University (ODU). Previously, I completed coursework at George Mason University and earned an Associate of Applied Science (AAS) in Information Technology from Northern Virginia Community College&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jasondaamash\/\">Read More<\/a><\/div>\n","protected":false},"author":30554,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/pages\/367"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/users\/30554"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/comments?post=367"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/pages\/367\/revisions"}],"predecessor-version":[{"id":387,"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/pages\/367\/revisions\/387"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasondaamash\/wp-json\/wp\/v2\/media?parent=367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}