{"id":810,"date":"2025-04-28T16:44:19","date_gmt":"2025-04-28T16:44:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/joshuarussell\/?page_id=810"},"modified":"2025-04-29T03:12:41","modified_gmt":"2025-04-29T03:12:41","slug":"skills-4","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/joshuarussell\/skills-4\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<p><strong>Essential Work Habits<\/strong><\/p>\n\n\n\n<ul>\n<li>Ability to work methodically and is very detail oriented<\/li>\n\n\n\n<li>Eagerness to dig into technical questions and examine them from all sides<\/li>\n\n\n\n<li>Enthusiastic and highly adaptable<\/li>\n\n\n\n<li>Strong analytical and diagnostic skills<\/li>\n\n\n\n<li>Demonstrated skills in innovation and collaboration<\/li>\n\n\n\n<li>Keep a current understanding of vulnerabilities from the Internet<\/li>\n\n\n\n<li>Maintaining awareness and knowledge of contemporary standards, practices, procedures and methods<\/li>\n\n\n\n<li>Ability to get the job done<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"776\" height=\"455\" src=\"http:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CM-Tech-Feedback-2.png\" alt=\"\" class=\"wp-image-817\" style=\"width:790px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CM-Tech-Feedback-2.png 776w, https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CM-Tech-Feedback-2-300x176.png 300w, https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CM-Tech-Feedback-2-768x450.png 768w\" sizes=\"(max-width: 776px) 100vw, 776px\" \/><figcaption class=\"wp-element-caption\"><em>Feedback Email from CM Technology Inc. Leadership Regarding My Internship<\/em><\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"616\" height=\"762\" src=\"http:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-406-Feedback.png\" alt=\"\" class=\"wp-image-821\" style=\"width:435px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-406-Feedback.png 616w, https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-406-Feedback-243x300.png 243w\" sizes=\"(max-width: 616px) 100vw, 616px\" \/><figcaption class=\"wp-element-caption\"><em>Feedback from Professor of CYSE 406: Cyber Law<\/em> <em>About  a Search and Seizure<\/em> <em>Scenario Assignment<\/em><\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"612\" height=\"277\" src=\"http:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-280-Feedback-2.png\" alt=\"\" class=\"wp-image-820\" style=\"width:506px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-280-Feedback-2.png 612w, https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-280-Feedback-2-300x136.png 300w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><figcaption class=\"wp-element-caption\"><em>Feedback from a Professor<\/em> <em>of CYSE 280: Windows Management Systems<\/em><\/figcaption><\/figure><\/div>\n\n\n<p><strong>Soft Skills<\/strong><\/p>\n\n\n\n<ul>\n<li>Excellent presentation and communications skills to effectively communicate with management and customers<\/li>\n\n\n\n<li>Ability to clearly articulate complex concepts both written and verbally<\/li>\n\n\n\n<li>Ability, understanding, and usage of active listening skills especially with customers<\/li>\n<\/ul>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-201S-Cybersecurity-Presentation.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-201S-Cybersecurity-Presentation<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>This PowerPoint presentation for CYSE 201: Cybersecurity and Social Sciences<\/em> <em>describes the intersection of Cybersecurity and Social Media.<\/em><\/p>\n\n\n\n<p><strong>Solid Technical Foundation<\/strong><\/p>\n\n\n\n<ul>\n<li>Understand architecture, administration, and management of operating systems, networking, and virtualization software<\/li>\n\n\n\n<li>General programming\/software development concepts and software analytical skills<\/li>\n\n\n\n<li>Proficiency in programming in Java, C\/C++, disassemblers, and assembly language and&nbsp; programming knowledge of two or more scripting languages (PHP, Python, Perl, or shell)<\/li>\n\n\n\n<li>Understanding of how the different type of firewalls and network load balancers work<\/li>\n\n\n\n<li>Deep understanding of how network routers and switches work<\/li>\n\n\n\n<li>Evaluate and design systems and network architectures<\/li>\n<\/ul>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-301-Ethical-Hacking-Part-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-301-Ethical-Hacking-Part-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"http:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-301-Ethical-Hacking-Part-2.pdf\">http:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-301-Ethical-Hacking-Part-2.pdf<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"http:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-301-Ethical-Hacking-Part-3.pdf\">http:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-301-Ethical-Hacking-Part-3.pdf<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Part 1 of the assignment is to exploit the SMB on Windows XP with the Meterpreter<\/em>.  <em>Part 2 of the assignment is to exploit EternalBlue on Windows Server 2008 with Metasploit<\/em>.  <em>Part 3 of the assignment is to exploit Windows 7 with a Deliverable Payload<\/em>.<\/p>\n\n\n\n<p><strong>Detailed Knowledge of Key Technologies<\/strong><\/p>\n\n\n\n<ul>\n<li>Open Source Applications<\/li>\n\n\n\n<li>Linux Operating Systems<\/li>\n\n\n\n<li>Microsoft Technologies<\/li>\n\n\n\n<li>Wireless Technologies<\/li>\n\n\n\n<li>Database Modeling<\/li>\n\n\n\n<li>Web Application Technologies<\/li>\n\n\n\n<li>Compiled and Interpreted Development Languages<\/li>\n\n\n\n<li>Network Implementation (Operational and Security)<\/li>\n\n\n\n<li>Telephony Technologies (Analog and IP)<\/li>\n\n\n\n<li>Social Engineering<\/li>\n\n\n\n<li>Physical Security<\/li>\n\n\n\n<li>Network Security and Analytical Software<\/li>\n<\/ul>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-301-Assignment-2-Traffic-Tracing-and-Sniffing-Part-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-301-Assignment-2-Traffic-Tracing-and-Sniffing-Part-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"http:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-301-Assignment-2-Traffic-Tracing-and-Sniffing-Part-2-1.pdf\">http:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-301-Assignment-2-Traffic-Tracing-and-Sniffing-Part-2-1.pdf<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Part 1 of the assignment is to trace traffic using the packet aalyzing software Wireshark<\/em>.  <em>Part 2 of the assignment is to use Wireshark<\/em> <em>and sniff traffic and analyze packets for hidden and non-hidden information.<\/em><strong><em>    <\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Essential Work Habits Soft Skills This PowerPoint presentation for CYSE 201: Cybersecurity and Social Sciences describes the intersection of Cybersecurity and Social Media. Solid Technical Foundation http:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-301-Ethical-Hacking-Part-2.pdf http:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-301-Ethical-Hacking-Part-3.pdf Part 1 <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/joshuarussell\/skills-4\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27002,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/pages\/810"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/users\/27002"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/comments?post=810"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/pages\/810\/revisions"}],"predecessor-version":[{"id":888,"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/pages\/810\/revisions\/888"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/media?parent=810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}