{"id":218,"date":"2025-05-18T23:27:38","date_gmt":"2025-05-18T23:27:38","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-06-15T21:59:50","modified_gmt":"2025-06-15T21:59:50","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<p>\ud83d\udcd8\u00a0Clear, ethical communication of complex cybersecurity concepts across written, verbal, and technical contexts.<\/p>\n\n\n\n<ul>\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/it-cyse-200t-2\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/it-cyse-200t-2\/\">CYSE 200T<\/a> &#8211; Cybersecurity, Technology, and Society<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/ids-300w\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/ids-300w\/\">IDS 300W<\/a> &#8211; Interdisciplinary Theory and Concepts<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/law-ethics\/phil-355e\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/law-ethics\/phil-355e\/\">PHIL 355E<\/a> &#8211; Cybersecurity Ethics<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-425w\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-425w\/\">CYSE 425W<\/a> &#8211; Cybersecurity Strategy and Policy<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-406-2\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-406-2\/\">CYSE 406<\/a> &#8211; Cyber Law<\/li>\n<\/ul>\n\n\n\n<p>\ud83d\udee0Hands-on cybersecurity implementation across systems administration, network defense, cryptography, and policy analysis.<\/p>\n\n\n\n<ul>\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-270\/\">CYSE 270<\/a> &#8211; Introduction to Cybersecurity<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-300\/\">CYSE 280<\/a> &#8211; Linux Fundamentals<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/ece-416\/\">CYSE 301<\/a> &#8211; Windows Server Administration &amp; Security<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cs-462\/\">CS 462<\/a> &#8211; Cybersecurity Fundamentals<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-463\/\">CS 463<\/a> &#8211; Cryptography for Cybersecurity<\/li>\n<\/ul>\n\n\n\n<p>\ud83e\udde0Strategic, adaptable thinker with a strong drive to learn and grow in dynamic, interdisciplinary cybersecurity environments.<\/p>\n\n\n\n<ul>\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-425w\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-425w\/\">CYSE 425W<\/a> &#8211; Cybersecurity Strategy and Policy<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-406-2\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-406-2\/\">CYSE 406<\/a> &#8211; Cyber Law<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/ids-300w\/\">IDS 300W<\/a> &#8211; Interdisciplinary Theory and Concepts<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/it-cyse-200t-2\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/it-cyse-200t-2\/\">CYSE 200T<\/a> &#8211; Cybersecurity, Technology, and Society<\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/law-ethics\/phil-355e\/\">PHIL 355E<\/a> &#8211; Cybersecurity Ethics<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udcd8\u00a0Clear, ethical communication of complex cybersecurity concepts across written, verbal, and technical contexts. \ud83d\udee0Hands-on cybersecurity implementation across systems administration, network defense, cryptography, and policy analysis. \ud83e\udde0Strategic, adaptable thinker with a strong drive to learn and grow in dynamic, interdisciplinary cybersecurity environments.<\/p>\n","protected":false},"author":15711,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/users\/15711"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":482,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages\/218\/revisions\/482"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}