{"id":291,"date":"2022-01-12T15:41:23","date_gmt":"2022-01-12T15:41:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jprosser91\/?page_id=291"},"modified":"2025-07-29T02:30:38","modified_gmt":"2025-07-29T02:30:38","slug":"about-me","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jprosser91\/","title":{"rendered":"About Me"},"content":{"rendered":"\n<div class=\"wp-block-cover aligncenter is-light\" style=\"min-height:500px\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-black-background-color has-background-dim-30 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" class=\"wp-block-cover__image-background wp-image-329\" alt=\"\" src=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2022\/01\/PXL_20210606_154712721.PORTRAIT.jpg?resize=768%2C1024\" style=\"object-position:52% 49%\" data-object-fit=\"cover\" data-object-position=\"52% 49%\" srcset=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2022\/01\/PXL_20210606_154712721.PORTRAIT-scaled.jpg?resize=768%2C1024&amp;ssl=1 768w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2022\/01\/PXL_20210606_154712721.PORTRAIT-scaled.jpg?resize=225%2C300&amp;ssl=1 225w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2022\/01\/PXL_20210606_154712721.PORTRAIT-scaled.jpg?resize=1152%2C1536&amp;ssl=1 1152w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2022\/01\/PXL_20210606_154712721.PORTRAIT-scaled.jpg?resize=1536%2C2048&amp;ssl=1 1536w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2022\/01\/PXL_20210606_154712721.PORTRAIT-scaled.jpg?resize=630%2C840&amp;ssl=1 630w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2022\/01\/PXL_20210606_154712721.PORTRAIT-scaled.jpg?resize=960%2C1280&amp;ssl=1 960w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2022\/01\/PXL_20210606_154712721.PORTRAIT-scaled.jpg?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 768px) 100vw, 768px\" data-recalc-dims=\"1\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-white-color has-text-color has-link-color wp-elements-5ea2a6d8da9e7d1f613af9f4c211de36\" style=\"font-size:25px\"><strong><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">Justin Prosser<\/mark><\/strong><\/p>\n<\/div><\/div>\n\n\n\n<p>Academic Computing Specialist at the University of Richmond. Pursuing a bachelor&#8217;s in Cybersecurity with a minor in Information Systems &amp; Technology. Interested in space and technology. Currently hold a CompTIA Security+ Certificate and am working on obtaining additional certifications.  Eagle Scout with leadership training looking to Progress further in the IT\/ cybersecurity field.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Academic Computing Specialist at the University of Richmond. Pursuing a bachelor&#8217;s in Cybersecurity with a minor in Information Systems &amp; Technology. Interested in space and technology. Currently hold a CompTIA Security+ Certificate and am working on obtaining additional certifications. Eagle Scout with leadership training looking to Progress further in the IT\/ cybersecurity field.&nbsp;<\/p>\n","protected":false},"author":22978,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":138,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-368\/","url_meta":{"origin":291,"position":0},"title":"CYSE 368","author":"jpros004","date":"January 12, 2022","format":false,"excerpt":"Cybersecurity Internship This course enables students to volunteer at an agency related to cybersecurity. Students must volunteer for 50 hours per course credit and complete course assignments. Course Material Internship Reflection Internship Journals Applying Course Knowledge What have you learned in coursework that relates to the world of work? I\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/Internship-SIEM-Example.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/Internship-SIEM-Example.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/Internship-SIEM-Example.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/Internship-SIEM-Example.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/Internship-SIEM-Example.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/Internship-SIEM-Example.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":516,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-270\/","url_meta":{"origin":291,"position":1},"title":"CYSE 270","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Linux System for Cybersecurity This course introduces the basic operations in major Linux distros for cybersecurity using both graphical interface and command-line interface. Students will learn about the basic installation and configuration, file systems management, shell scripts, and user authentication in Linux systems Assignments","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":159,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/awards-and-recognitions\/","url_meta":{"origin":291,"position":2},"title":"Awards and Recognitions","author":"jpros004","date":"January 12, 2022","format":false,"excerpt":"Please provide a description of any awards or recognitions you have received. Be sure to identify the organization making the award, and how you engaged with that organization. Describe what you did to qualify for the award. You may include embedded versions of your material (tutorial available here), pictures, audio\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":256,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/ids-493\/","url_meta":{"origin":291,"position":3},"title":"IDS 493","author":"jpros004","date":"January 12, 2022","format":false,"excerpt":"Electronic Portfolio Project About this Course Course Description:\u00a0This course culminates in the preparation of an Electronic Portfolio (ePortfolio) integrating the student's academic study, work experiences, skill identification, and work products. \u00a0Alternative formats are used for varying uses of the portfolio. Course Goals and Objectives: Successfully develop, using electronic tools, an\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":207,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/law-ethics\/phil-355e\/","url_meta":{"origin":291,"position":4},"title":"PHIL 355E","author":"jpros004","date":"January 12, 2022","format":false,"excerpt":"Cybersecurity Ethics This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":510,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-426\/","url_meta":{"origin":291,"position":5},"title":"CYSE 426","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Cyberwar Course Description and Objectives This course will explore the national security dimension of cybersecurity and examine cyber war in international relations. Our focus will start with looking at cybersecurity as a component of national security and investigate the topics of operational considerations in cybersecurity, planning in cyber war, different\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/users\/22978"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/291\/revisions"}],"predecessor-version":[{"id":476,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/291\/revisions\/476"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/media?parent=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}