On this page, I have highlighted the skills I have gained through out my experiences attending Old Dominion university, through my internships, and other avenues. Most are taken from my Classes with a few outliers such as my internship.

Technical
When one thinks of Cybersecurity and or Data Science the first thing one thinks about is Technical skills. These skills are necessary and can not be ignored when applying or searching for jobs. Linked below are artifacts the highlight some important skills I have learned during the duration of my course studies.
In this lab, I was able to track packets through Wireshark and TCPdump to identify any security concerns or attempted attacks on the network.
In this lab, I was tasked with setting up a firewall with pfSense to protect a network from attacks.
In my Internship, learned a wide variety of things such as how to communicate with faculty in a professional setting as well as how to fix and issues on a organization’s ,such as ODU, computer.

Critical Thinking
Critical thinking a skill all should possess, however it takes on a new form and need when related to cybersecurity. In a the cyber realm one can not just rely on directions but should think out of the box to fix issues and find solutions. When errors occur or the directions are not as clear it is up to us to decipher the issue and correct it. The artifacts below reveal that i am not only capable of critical thinking but analyze and complete the necessary tasks.
In this Paper, explains the need in investing in strong cybersecurity measures while also emphasizing the hazards and countermeasures one could take.
These Journal Entires, demonstrate how i am able to think critically and answer various questions related to cybersecurity and how i would personally handle them.
In this paper, I dove into the ethical dilemma of jailbreaking and rooting mobile devices. Futhermore, I expanded on the legal ramifications.

Communication
This Speech, I gave in my Communication/Public Speaking course shows my ability to analyze the information i gathered during research and convert it into a cohesive and easy to follow speech.
This paper demonstrates how I was able to explain though an interdisciplinary view how Cybersecurity and Acceptable Use Policies overlap.
In this paper, I was able to show how Zero Trust Architecture and Window Operation Systems are able to come together and create stronger security.