{"id":218,"date":"2025-06-01T23:20:56","date_gmt":"2025-06-01T23:20:56","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-06-02T00:24:17","modified_gmt":"2025-06-02T00:24:17","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/juju-miller\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"<p data-start=\"486\" data-end=\"568\"><strong>Essential Work Habits<\/strong><\/p>\n<ul>\n<li data-start=\"486\" data-end=\"568\">Works carefully and pays attention to detail when handling sensitive information<\/li>\n<li data-start=\"569\" data-end=\"663\">\n<p data-start=\"571\" data-end=\"663\">Open-minded and willing to explore new ideas, even in unfamiliar topics like cybersecurity<\/p>\n<\/li>\n<li data-start=\"664\" data-end=\"733\">\n<p data-start=\"666\" data-end=\"733\">Adaptable in fast-paced environments (both in school and at work)<\/p>\n<\/li>\n<li data-start=\"734\" data-end=\"823\">\n<p data-start=\"736\" data-end=\"823\">Strong critical thinking skills when connecting course topics to real-world scenarios<\/p>\n<\/li>\n<li data-start=\"824\" data-end=\"875\">\n<p data-start=\"826\" data-end=\"875\">Able to work independently or as part of a team<\/p>\n<\/li>\n<li data-start=\"876\" data-end=\"972\">\n<p data-start=\"878\" data-end=\"972\">Aware of how digital vulnerabilities can impact people, especially in mental health settings<\/p>\n<\/li>\n<li data-start=\"973\" data-end=\"1049\">\n<p data-start=\"975\" data-end=\"1049\">Keeps up with current standards and frameworks (like the NIST Framework)<\/p>\n<\/li>\n<li data-start=\"1050\" data-end=\"1108\">\n<p data-start=\"1052\" data-end=\"1108\">Focused on follow-through and always gets the job done<\/p>\n<\/li>\n<\/ul>\n<p><strong>Soft Skills<\/strong><\/p>\n<ul>\n<li data-start=\"1303\" data-end=\"1361\">\n<p data-start=\"1305\" data-end=\"1361\">Effective communicator with both peers and instructors<\/p>\n<\/li>\n<li data-start=\"1362\" data-end=\"1465\">\n<p data-start=\"1364\" data-end=\"1465\">Can explain complex topics (like the CIA Triad or cyber ethics) in a way that makes sense to others<\/p>\n<\/li>\n<li data-start=\"1466\" data-end=\"1542\">\n<p data-start=\"1468\" data-end=\"1542\">Strong writing skills developed through reflections and discussion posts<\/p>\n<\/li>\n<li data-start=\"1543\" data-end=\"1631\">\n<p data-start=\"1545\" data-end=\"1631\">Uses active listening in classroom and work settings to support better collaboration<\/p>\n<\/li>\n<li data-start=\"1632\" data-end=\"1714\">\n<p data-start=\"1634\" data-end=\"1714\">Empathetic and emotionally aware, especially in team or customer service roles<\/p>\n<\/li>\n<li data-start=\"1715\" data-end=\"1786\">\n<p data-start=\"1717\" data-end=\"1786\">Brings positive energy, problem-solving, and leadership when needed<\/p>\n<\/li>\n<\/ul>\n<p><strong>Relevant Knowledge Areas<\/strong><\/p>\n<ul>\n<li data-start=\"2613\" data-end=\"2645\">\n<p data-start=\"2615\" data-end=\"2645\">NIST Cybersecurity Framework<\/p>\n<\/li>\n<li data-start=\"2646\" data-end=\"2701\">\n<p data-start=\"2648\" data-end=\"2701\">CIA Triad: Confidentiality, Integrity, Availability<\/p>\n<\/li>\n<li data-start=\"2702\" data-end=\"2775\">\n<p data-start=\"2704\" data-end=\"2775\">Importance of data privacy in clinical, educational, and legal spaces<\/p>\n<\/li>\n<li data-start=\"2776\" data-end=\"2841\">\n<p data-start=\"2778\" data-end=\"2841\">Basic understanding of cyber threats and how to mitigate risk<\/p>\n<\/li>\n<li data-start=\"2842\" data-end=\"2915\">\n<p data-start=\"2844\" data-end=\"2915\">Real-world connections between cybersecurity and mental health fields<\/p>\n<\/li>\n<li data-start=\"2916\" data-end=\"2985\">\n<p data-start=\"2918\" data-end=\"2985\">Recognizing ethical responsibilities when handling sensitive data<\/p>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Essential Work Habits Works carefully and pays attention to detail when handling sensitive information Open-minded and willing to explore new ideas, even in unfamiliar topics like cybersecurity Adaptable in fast-paced environments (both in school and at work) Strong critical thinking skills when connecting course topics to real-world scenarios Able to work independently or as part&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/juju-miller\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":30968,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/juju-miller\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/juju-miller\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/juju-miller\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/juju-miller\/wp-json\/wp\/v2\/users\/30968"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/juju-miller\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/juju-miller\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/juju-miller\/wp-json\/wp\/v2\/pages\/218\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/juju-miller\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}