{"id":218,"date":"2022-09-04T17:19:33","date_gmt":"2022-09-04T17:19:33","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-04-27T21:34:12","modified_gmt":"2025-04-27T21:34:12","slug":"skills-and-artifacts","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jb23435\/skills-and-artifacts\/","title":{"rendered":"Skills and Artifacts"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Skill 1: Network Design and Security Architecture<\/h2>\n\n\n\n<p>My education at Old Dominion University enabled me to master the creation of secure and operational network architectures. The work involved technical planning alongside budgeting activities and executing security measures to protect infrastructure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Artifacts:<\/h3>\n\n\n\n<ul>\n<li>The project for Maury High School Wired Network Design (IT 315 Project) created a fully wired network system which incorporates security protocols to separate student and staff traffic through VLANs and firewall implementation.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-jailyn-brahmabhatt wp-block-embed-jailyn-brahmabhatt\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"HXwoAbNdGx\"><a href=\"https:\/\/sites.wp.odu.edu\/jb23435\/case-analysis\/\">Case Analysis<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Case Analysis&#8221; &#8212; Jailyn Brahmabhatt\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/case-analysis\/embed\/#?secret=yG4o4fFCRm#?secret=HXwoAbNdGx\" data-secret=\"HXwoAbNdGx\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<ul>\n<li>Designed and configured a two-router network for a 100-workstation company, creating two internal subnets (10.0.1.x and 10.0.2.x) with full cross-subnet communication. Delivered network diagrams, router IP configurations, and routing tables to ensure secure and efficient connectivity.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-jailyn-brahmabhatt wp-block-embed-jailyn-brahmabhatt\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"DjE4NP5TgS\"><a href=\"https:\/\/sites.wp.odu.edu\/jb23435\/hands-on-task-2\/\">Hands On Task 2<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Hands On Task 2&#8221; &#8212; Jailyn Brahmabhatt\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/hands-on-task-2\/embed\/#?secret=sP2q6LTRdz#?secret=DjE4NP5TgS\" data-secret=\"DjE4NP5TgS\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<ul>\n<li>Create a subnet\/network diagram of three Internet connected networks that shows the routers that packets travel over when communicating between the three networks (Net A to Net B, Net B to Net C, and&nbsp;<strong>Net C to Net B<\/strong>).<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-jailyn-brahmabhatt wp-block-embed-jailyn-brahmabhatt\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"zVI9FufDwD\"><a href=\"https:\/\/sites.wp.odu.edu\/jb23435\/hands-on-task-1\/\">Hands On Task 1<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Hands On Task 1&#8221; &#8212; Jailyn Brahmabhatt\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/hands-on-task-1\/embed\/#?secret=3A214WoqFp#?secret=zVI9FufDwD\" data-secret=\"zVI9FufDwD\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Skill 2: Cybersecurity Analysis and Penetration Testing<\/h2>\n\n\n\n<p>The combination of interactive labs and real-world simulations helped me build expertise in ethical hacking together with vulnerability scanning and malware analysis. My education enabled me to detect security vulnerabilities for attacks while teaching me essential defense techniques.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Artifacts:<\/h3>\n\n\n\n<ul>\n<li>The Active Reconnaissance and Vulnerability Scanning Lab (CYSE 450) required students to perform reconnaissance and scanning exercises with Nmap and Nessus to find system vulnerabilities.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-jailyn-brahmabhatt wp-block-embed-jailyn-brahmabhatt\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"QOW4QzXAya\"><a href=\"https:\/\/sites.wp.odu.edu\/jb23435\/active-reconnaissance-and-vulnerability-scanning-lab\/\">Active Reconnaissance and Vulnerability Scanning Lab<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Active Reconnaissance and Vulnerability Scanning Lab&#8221; &#8212; Jailyn Brahmabhatt\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/active-reconnaissance-and-vulnerability-scanning-lab\/embed\/#?secret=r951sg0qPF#?secret=QOW4QzXAya\" data-secret=\"QOW4QzXAya\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<ul>\n<li>During the SQL Injection Exploitation Report (CYSE 450) project I tested databases through controlled SQL injection attacks to identify security vulnerabilities and develop recommended strategies for their prevention.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-jailyn-brahmabhatt wp-block-embed-jailyn-brahmabhatt\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"oHXaeN5Ooo\"><a href=\"https:\/\/sites.wp.odu.edu\/jb23435\/sql-injection-attacks\/\">SQL Injection Attacks<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;SQL Injection Attacks&#8221; &#8212; Jailyn Brahmabhatt\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/sql-injection-attacks\/embed\/#?secret=Ia8NLQjUKB#?secret=oHXaeN5Ooo\" data-secret=\"oHXaeN5Ooo\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<ul>\n<li>The Malware Analysis Project (CYSE 450) involved studying malicious software through both static and dynamic analysis methods while acquiring basic reverse-engineering knowledge.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-jailyn-brahmabhatt wp-block-embed-jailyn-brahmabhatt\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"fKBipOYJ1n\"><a href=\"https:\/\/sites.wp.odu.edu\/jb23435\/malware-analysis\/\">Malware Analysis<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Malware Analysis&#8221; &#8212; Jailyn Brahmabhatt\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/malware-analysis\/embed\/#?secret=8JLZ1pE41l#?secret=fKBipOYJ1n\" data-secret=\"fKBipOYJ1n\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Skill 3: Cyber Law and Data Privacy Policy Development<\/h2>\n\n\n\n<p>My expertise in analyzing privacy laws and cybersecurity ethics developed through legal and policy coursework. I reviewed existing regulatory structures and suggested enhancements to better protect data security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Artifacts:<\/h3>\n\n\n\n<ul>\n<li>Developed ethical implications that arise from my cybersecurity policy\/strategy.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-jailyn-brahmabhatt wp-block-embed-jailyn-brahmabhatt\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"QQOL8YY3jv\"><a href=\"https:\/\/sites.wp.odu.edu\/jb23435\/what-does-the-general-data-protection-regulation-gdpr-mean-for-ethics\/\">What does the General Data Protection Regulation (GDPR) mean for ethics?<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;What does the General Data Protection Regulation (GDPR) mean for ethics?&#8221; &#8212; Jailyn Brahmabhatt\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/what-does-the-general-data-protection-regulation-gdpr-mean-for-ethics\/embed\/#?secret=vO94KxbbCz#?secret=QQOL8YY3jv\" data-secret=\"QQOL8YY3jv\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<ul>\n<li>Discussed the Implementation of the General Data Protection<br>Regulation (GDPR).<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-jailyn-brahmabhatt wp-block-embed-jailyn-brahmabhatt\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"Awws9cPpRb\"><a href=\"https:\/\/sites.wp.odu.edu\/jb23435\/review-of-implementation-of-the-general-data-protection-regulation-gdpr\/\">Review of Implementation of the General Data Protection Regulation (GDPR)<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Review of Implementation of the General Data Protection Regulation (GDPR)&#8221; &#8212; Jailyn Brahmabhatt\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/review-of-implementation-of-the-general-data-protection-regulation-gdpr\/embed\/#?secret=wGf8L24L3h#?secret=Awws9cPpRb\" data-secret=\"Awws9cPpRb\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<ul>\n<li>Wrote a paper focused on the political implications of the policy I chose.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-jailyn-brahmabhatt wp-block-embed-jailyn-brahmabhatt\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"qPKbfrx4ob\"><a href=\"https:\/\/sites.wp.odu.edu\/jb23435\/the-political-impact-of-the-general-data-protection-regulation-gdpr\/\">The Political Impact of the General Data Protection Regulation (GDPR)<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;The Political Impact of the General Data Protection Regulation (GDPR)&#8221; &#8212; Jailyn Brahmabhatt\" src=\"https:\/\/sites.wp.odu.edu\/jb23435\/the-political-impact-of-the-general-data-protection-regulation-gdpr\/embed\/#?secret=K0KxIkmQXy#?secret=qPKbfrx4ob\" data-secret=\"qPKbfrx4ob\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Skill 1: Network Design and Security Architecture My education at Old Dominion University enabled me to master the creation of secure and operational network architectures. The work involved technical planning alongside budgeting activities and executing security measures to protect infrastructure. Artifacts: Skill 2: Cybersecurity Analysis and Penetration Testing The combination of interactive labs and real-world&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jb23435\/skills-and-artifacts\/\">Read More<\/a><\/div>\n","protected":false},"author":24719,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/users\/24719"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":490,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages\/218\/revisions\/490"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}