Skill 1: Network Design and Security Architecture
My education at Old Dominion University enabled me to master the creation of secure and operational network architectures. The work involved technical planning alongside budgeting activities and executing security measures to protect infrastructure.
Artifacts:
- The project for Maury High School Wired Network Design (IT 315 Project) created a fully wired network system which incorporates security protocols to separate student and staff traffic through VLANs and firewall implementation.
- Designed and configured a two-router network for a 100-workstation company, creating two internal subnets (10.0.1.x and 10.0.2.x) with full cross-subnet communication. Delivered network diagrams, router IP configurations, and routing tables to ensure secure and efficient connectivity.
- Create a subnet/network diagram of three Internet connected networks that shows the routers that packets travel over when communicating between the three networks (Net A to Net B, Net B to Net C, and Net C to Net B).
Skill 2: Cybersecurity Analysis and Penetration Testing
The combination of interactive labs and real-world simulations helped me build expertise in ethical hacking together with vulnerability scanning and malware analysis. My education enabled me to detect security vulnerabilities for attacks while teaching me essential defense techniques.
Artifacts:
- The Active Reconnaissance and Vulnerability Scanning Lab (CYSE 450) required students to perform reconnaissance and scanning exercises with Nmap and Nessus to find system vulnerabilities.
- During the SQL Injection Exploitation Report (CYSE 450) project I tested databases through controlled SQL injection attacks to identify security vulnerabilities and develop recommended strategies for their prevention.
- The Malware Analysis Project (CYSE 450) involved studying malicious software through both static and dynamic analysis methods while acquiring basic reverse-engineering knowledge.
Skill 3: Cyber Law and Data Privacy Policy Development
My expertise in analyzing privacy laws and cybersecurity ethics developed through legal and policy coursework. I reviewed existing regulatory structures and suggested enhancements to better protect data security.
Artifacts:
- Developed ethical implications that arise from my cybersecurity policy/strategy.
- Discussed the Implementation of the General Data Protection
Regulation (GDPR).
- Wrote a paper focused on the political implications of the policy I chose.